Mock Version: 1.2.17 ENTER ['do'](['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --target ppc64le --nodeps /builddir/build/SPECS/nss.spec'], chrootPath='/var/lib/mock/nss-3.90.0-2.el7_9-20231018133608-27165/root'shell=FalseprintOutput=Falseenv={'LANG': 'en_GB.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'}gid=135user='mockbuild'timeout=0logger=uid=1005) Executing command: ['bash', '--login', '-c', '/usr/bin/rpmbuild -bs --target ppc64le --nodeps /builddir/build/SPECS/nss.spec'] with env {'LANG': 'en_GB.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'} and shell False Building target platforms: ppc64le Building for target ppc64le Wrote: /builddir/build/SRPMS/nss-3.90.0-2.el7_9.src.rpm Child return code was: 0 ENTER ['do'](['bash', '--login', '-c', u'/usr/bin/rpmbuild -bb --target ppc64le --nodeps /builddir/build/SPECS/nss.spec'], chrootPath='/var/lib/mock/nss-3.90.0-2.el7_9-20231018133608-27165/root'shell=Falseuid=1005env={'LANG': 'en_GB.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'}gid=135user='mockbuild'timeout=0private_network=Truelogger=printOutput=False) Executing command: ['bash', '--login', '-c', u'/usr/bin/rpmbuild -bb --target ppc64le --nodeps /builddir/build/SPECS/nss.spec'] with env {'LANG': 'en_GB.UTF-8', 'TERM': 'vt100', 'SHELL': '/bin/bash', 'PROMPT_COMMAND': 'printf "\x1b]0;\x07"', 'PATH': '/usr/bin:/bin:/usr/sbin:/sbin', 'HOME': '/builddir', 'HOSTNAME': 'mock'} and shell False Building target platforms: ppc64le Building for target ppc64le Executing(%prep): /bin/sh -e /var/tmp/rpm-tmp.iIy56o + umask 022 + cd /builddir/build/BUILD + cd /builddir/build/BUILD + rm -rf nss-3.90 + /usr/bin/gzip -dc /builddir/build/SOURCES/nss-3.90.tar.gz + /usr/bin/tar -xf - + STATUS=0 + '[' 0 -ne 0 ']' + cd nss-3.90 + /usr/bin/chmod -Rf a+rX,u+w,g-w,o-w . Patch #2 (add-relro-linker-option.patch): + echo 'Patch #2 (add-relro-linker-option.patch):' + /usr/bin/cat /builddir/build/SOURCES/add-relro-linker-option.patch + /usr/bin/patch -p0 -b --suffix .relro --fuzz=0 patching file nss/coreconf/Linux.mk Hunk #1 succeeded at 188 (offset 14 lines). Patch #3 (renegotiate-transitional.patch): + echo 'Patch #3 (renegotiate-transitional.patch):' + /usr/bin/cat /builddir/build/SOURCES/renegotiate-transitional.patch + /usr/bin/patch -p0 -b --suffix .transitional --fuzz=0 patching file nss/lib/ssl/sslsock.c Hunk #1 succeeded at 72 (offset 5 lines). Patch #40 (nss-3.14.0.0-disble-ocsp-test.patch): + echo 'Patch #40 (nss-3.14.0.0-disble-ocsp-test.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.14.0.0-disble-ocsp-test.patch + /usr/bin/patch -p0 -b --suffix .noocsptest --fuzz=0 patching file nss/tests/chains/scenarios/scenarios Hunk #1 succeeded at 18 (offset -32 lines). Patch #47 (utilwrap-include-templates.patch): + echo 'Patch #47 (utilwrap-include-templates.patch):' + /usr/bin/cat /builddir/build/SOURCES/utilwrap-include-templates.patch + /usr/bin/patch -p0 -b --suffix .templates --fuzz=0 patching file nss/lib/nss/config.mk Patch #50 (iquote.patch): + echo 'Patch #50 (iquote.patch):' + /usr/bin/cat /builddir/build/SOURCES/iquote.patch + /usr/bin/patch -p0 -b --suffix .iquote --fuzz=0 patching file nss/coreconf/location.mk Hunk #1 succeeded at 72 (offset -3 lines). ~/build/BUILD/nss-3.90/nss ~/build/BUILD/nss-3.90 Patch #49 (nss-skip-bltest-and-fipstest.patch): + pushd nss + echo 'Patch #49 (nss-skip-bltest-and-fipstest.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-skip-bltest-and-fipstest.patch + /usr/bin/patch -p0 -b --suffix .skipthem --fuzz=0 patching file ./cmd/Makefile patching file ./cmd/shlibsign/Makefile Patch #52 (Bug-1001841-disable-sslv2-libssl.patch): + echo 'Patch #52 (Bug-1001841-disable-sslv2-libssl.patch):' + /usr/bin/cat /builddir/build/SOURCES/Bug-1001841-disable-sslv2-libssl.patch + /usr/bin/patch -p1 -b --suffix .disableSSL2libssl --fuzz=0 patching file lib/ssl/config.mk Hunk #1 succeeded at 49 (offset -4 lines). patching file lib/ssl/sslsock.c Hunk #1 succeeded at 1437 (offset 32 lines). Patch #53 (Bug-1001841-disable-sslv2-tests.patch): + echo 'Patch #53 (Bug-1001841-disable-sslv2-tests.patch):' + /usr/bin/cat /builddir/build/SOURCES/Bug-1001841-disable-sslv2-tests.patch + /usr/bin/patch -p1 -b --suffix .disableSSL2tests --fuzz=0 patching file tests/ssl/ssl.sh Patch #56 (p-ignore-setpolicy.patch): + echo 'Patch #56 (p-ignore-setpolicy.patch):' + /usr/bin/cat /builddir/build/SOURCES/p-ignore-setpolicy.patch + /usr/bin/patch -p1 -b --suffix .1026677_ignore_set_policy --fuzz=0 patching file lib/ssl/sslsock.c Hunk #1 succeeded at 1723 (offset 332 lines). Hunk #2 succeeded at 1734 (offset 332 lines). Patch #62 (nss-fix-deadlock-squash.patch): + echo 'Patch #62 (nss-fix-deadlock-squash.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-fix-deadlock-squash.patch + /usr/bin/patch -p1 -b --suffix .fix_deadlock --fuzz=0 patching file lib/pki/tdcache.c Hunk #1 succeeded at 373 (offset -1 lines). Hunk #2 succeeded at 421 (offset -1 lines). Hunk #3 succeeded at 435 (offset -1 lines). Hunk #4 succeeded at 472 (offset -1 lines). Hunk #5 succeeded at 1109 (offset 7 lines). Patch #100 (nss-3.79-version-range.patch): + echo 'Patch #100 (nss-3.79-version-range.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-version-range.patch + /usr/bin/patch -p1 -b --suffix .version-range --fuzz=0 patching file lib/ssl/sslsock.c Hunk #1 succeeded at 104 (offset 2 lines). ~/build/BUILD/nss-3.90 Patch #108 (nss-sni-c-v-fix.patch): + popd + echo 'Patch #108 (nss-sni-c-v-fix.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-sni-c-v-fix.patch + /usr/bin/patch -p0 -b --suffix .sni_c_v_fix --fuzz=0 patching file nss/tests/ssl/sslauth.txt Hunk #1 succeeded at 72 (offset 8 lines). ~/build/BUILD/nss-3.90/nss ~/build/BUILD/nss-3.90 Patch #123 (nss-skip-util-gtest.patch): + pushd nss + echo 'Patch #123 (nss-skip-util-gtest.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-skip-util-gtest.patch + /usr/bin/patch -p1 -b --suffix .skip-util-gtests --fuzz=0 patching file gtests/manifest.mn Hunk #1 succeeded at 55 (offset 20 lines). patching file gtests/ssl_gtest/manifest.mn Hunk #1 succeeded at 72 (offset 5 lines). Patch #126 (nss-reorder-cipher-suites.patch): + echo 'Patch #126 (nss-reorder-cipher-suites.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-reorder-cipher-suites.patch + /usr/bin/patch -p1 -b --suffix .reorder-cipher-suites --fuzz=0 patching file lib/ssl/ssl3con.c Hunk #1 succeeded at 100 (offset 10 lines). Hunk #2 succeeded at 146 (offset 10 lines). patching file lib/ssl/sslenum.c Patch #127 (nss-disable-cipher-suites.patch): + echo 'Patch #127 (nss-disable-cipher-suites.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-disable-cipher-suites.patch + /usr/bin/patch -p1 -b --suffix .disable-cipher-suites --fuzz=0 patching file lib/ssl/ssl3con.c Hunk #1 succeeded at 106 (offset 10 lines). Hunk #2 succeeded at 118 (offset 10 lines). Patch #130 (nss-reorder-cipher-suites-gtests.patch): + echo 'Patch #130 (nss-reorder-cipher-suites-gtests.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-reorder-cipher-suites-gtests.patch + /usr/bin/patch -p1 -b --suffix .reorder-cipher-suites-gtests --fuzz=0 patching file gtests/ssl_gtest/ssl_auth_unittest.cc Hunk #1 succeeded at 1275 (offset 239 lines). Hunk #2 succeeded at 2231 (offset 398 lines). Hunk #3 succeeded at 2264 (offset 398 lines). patching file gtests/ssl_gtest/ssl_recordsize_unittest.cc patching file gtests/ssl_gtest/ssl_staticrsa_unittest.cc patching file gtests/ssl_gtest/tls_agent.cc Hunk #1 succeeded at 683 (offset 80 lines). Patch #136 (nss-sql-default.patch): + echo 'Patch #136 (nss-sql-default.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-sql-default.patch + /usr/bin/patch -p1 -b --suffix .sql-default --fuzz=0 patching file tests/all.sh Hunk #1 succeeded at 118 (offset 4 lines). Hunk #2 succeeded at 175 (offset 4 lines). patching file tests/merge/merge.sh Patch #139 (nss-modutil-skip-changepw-fips.patch): + echo 'Patch #139 (nss-modutil-skip-changepw-fips.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-modutil-skip-changepw-fips.patch + /usr/bin/patch -p1 -b --suffix .modutil-skip-changepw-fips --fuzz=0 patching file cmd/modutil/pk11.c Hunk #1 succeeded at 813 (offset 49 lines). Patch #148 (nss-sysinit-userdb.patch): + echo 'Patch #148 (nss-sysinit-userdb.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-sysinit-userdb.patch + /usr/bin/patch -p1 -b --suffix .sysinit-userdb --fuzz=0 -R patching file lib/sysinit/nsssysinit.c Hunk #1 succeeded at 36 (offset -1 lines). Hunk #2 succeeded at 49 (offset -1 lines). Patch #141 (nss-sysinit-getenv.patch): + echo 'Patch #141 (nss-sysinit-getenv.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-sysinit-getenv.patch + /usr/bin/patch -p1 -b --suffix .sysinit-getenv --fuzz=0 patching file lib/sysinit/nsssysinit.c Hunk #3 succeeded at 100 (offset 1 line). Patch #149 (nss-skip-sysinit-gtests.patch): + echo 'Patch #149 (nss-skip-sysinit-gtests.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-skip-sysinit-gtests.patch + /usr/bin/patch -p1 -b --suffix .skip-sysinit-gtests --fuzz=0 patching file gtests/manifest.mn Hunk #1 succeeded at 33 (offset 2 lines). Patch #150 (nss-3.79-ssl2-compatible-client-hello.patch): + echo 'Patch #150 (nss-3.79-ssl2-compatible-client-hello.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-ssl2-compatible-client-hello.patch + /usr/bin/patch -p1 -b --suffix .ssl2hello --fuzz=0 patching file lib/ssl/sslsock.c Patch #152 (nss-version-range-set.patch): + echo 'Patch #152 (nss-version-range-set.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-version-range-set.patch + /usr/bin/patch -p1 -b --suffix .version-range-set --fuzz=0 patching file gtests/ssl_gtest/ssl_versionpolicy_unittest.cc patching file lib/ssl/sslsock.c Hunk #1 succeeded at 2799 (offset 257 lines). Hunk #2 succeeded at 2807 (offset 257 lines). Patch #156 (nss-skip-cavs-tests.patch): + echo 'Patch #156 (nss-skip-cavs-tests.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-skip-cavs-tests.patch + /usr/bin/patch -p1 -b --suffix .skip-cavs --fuzz=0 patching file tests/fips/fips.sh Patch #128 (nss-3.67-revert-sql-manage-change.patch): + echo 'Patch #128 (nss-3.67-revert-sql-manage-change.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.67-revert-sql-manage-change.patch + /usr/bin/patch -p1 -b --suffix .sql-man-page --fuzz=0 -R patching file doc/certutil.xml patching file doc/html/certutil.html patching file doc/html/derdump.html patching file doc/html/modutil.html patching file doc/html/pk12util.html patching file doc/html/pp.html patching file doc/html/signver.html patching file doc/html/ssltap.html patching file doc/modutil.xml patching file doc/nroff/certutil.1 patching file doc/nroff/crlutil.1 patching file doc/nroff/derdump.1 patching file doc/nroff/modutil.1 patching file doc/nroff/pk12util.1 patching file doc/nroff/pp.1 patching file doc/nroff/signtool.1 patching file doc/nroff/signver.1 patching file doc/nroff/ssltap.1 patching file doc/nroff/vfychain.1 patching file doc/nroff/vfyserv.1 patching file doc/pk12util.xml patching file doc/signver.xml Patch #158 (nss-sql-default-tests.patch): + echo 'Patch #158 (nss-sql-default-tests.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-sql-default-tests.patch + /usr/bin/patch -p1 -b --suffix .sql-default-tests --fuzz=0 patching file tests/all.sh patching file tests/common/init.sh Hunk #1 succeeded at 722 (offset 71 lines). patching file tests/remote/Makefile Patch #159 (nss-disable-dc.patch): + echo 'Patch #159 (nss-disable-dc.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-disable-dc.patch + /usr/bin/patch -p1 -b --suffix .dc --fuzz=0 patching file gtests/ssl_gtest/manifest.mn patching file lib/ssl/sslsock.c Hunk #1 succeeded at 822 (offset 3 lines). Hunk #2 succeeded at 1348 (offset 11 lines). Patch #160 (nss-3.66-restore-old-pkcs12-default.patch): + echo 'Patch #160 (nss-3.66-restore-old-pkcs12-default.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.66-restore-old-pkcs12-default.patch + /usr/bin/patch -p1 -b --suffix .restore-pkcs12-defaults --fuzz=0 patching file cmd/pk12util/pk12util.c Hunk #1 succeeded at 1041 (offset 10 lines). Hunk #2 succeeded at 1159 (offset 10 lines). patching file tests/tools/tools.sh Patch #161 (nss-3.66-disable-external-host-test.patch): + echo 'Patch #161 (nss-3.66-disable-external-host-test.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.66-disable-external-host-test.patch + /usr/bin/patch -p1 -b --suffix .brew --fuzz=0 patching file tests/ssl/ssl.sh Hunk #1 succeeded at 1654 (offset 13 lines). Patch #162 (nss-3.79-distrusted-certs.patch): + echo 'Patch #162 (nss-3.79-distrusted-certs.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-distrusted-certs.patch + /usr/bin/patch -p1 -b --suffix .distrusted-certs --fuzz=0 -R patching file lib/ckfw/builtins/certdata.txt Hunk #1 succeeded at 7185 (offset -478 lines). Hunk #2 succeeded at 7499 (offset -838 lines). Hunk #3 succeeded at 8204 (offset -838 lines). Patch #163 (nss-3.90-no-dbm-25519.patch): + echo 'Patch #163 (nss-3.90-no-dbm-25519.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.90-no-dbm-25519.patch + /usr/bin/patch -p1 -b --suffix .no-dbm-25519 --fuzz=0 patching file tests/ec/ectest.sh Patch #164 (nss-3.90-certutil-dump-speed.patch): + echo 'Patch #164 (nss-3.90-certutil-dump-speed.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.90-certutil-dump-speed.patch + /usr/bin/patch -p1 -b --suffix .certutil-dump-speed --fuzz=0 patching file tests/dbtests/dbtests.sh Patch #165 (nss-3.67-cve-2021-43527-test.patch): + echo 'Patch #165 (nss-3.67-cve-2021-43527-test.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.67-cve-2021-43527-test.patch + /usr/bin/patch -p1 -b --suffix .cve-2021-43527-test --fuzz=0 patching file tests/cert/Leaf-bogus-dsa.crt patching file tests/cert/Leaf-bogus-rsa-pss.crt patching file tests/cert/cert.sh Patch #166 (nss-3.90-disable-ech.patch): + echo 'Patch #166 (nss-3.90-disable-ech.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.90-disable-ech.patch + /usr/bin/patch -p1 -b --suffix .disable-ech --fuzz=0 patching file lib/ssl/sslsock.c Hunk #1 succeeded at 4387 (offset -7 lines). patching file gtests/ssl_gtest/manifest.mn Patch #300 (nss-3.79-r7-remove-explicit-ipv4.patch): + echo 'Patch #300 (nss-3.79-r7-remove-explicit-ipv4.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.79-r7-remove-explicit-ipv4.patch + /usr/bin/patch -p1 -b --suffix .remove-explicit-ipv4 --fuzz=0 patching file tests/ssl/ssl.sh Patch #301 (nss-3.90-add-ems-policy.patch): + echo 'Patch #301 (nss-3.90-add-ems-policy.patch):' + /usr/bin/cat /builddir/build/SOURCES/nss-3.90-add-ems-policy.patch + /usr/bin/patch -p1 -b --suffix .ems --fuzz=0 patching file lib/pk11wrap/pk11pars.c patching file lib/pk11wrap/secmodti.h patching file lib/ssl/ssl3con.c Hunk #2 succeeded at 3476 (offset -5 lines). patching file lib/util/secoid.c Hunk #2 succeeded at 2087 (offset -13 lines). patching file lib/util/secoidt.h ~/build/BUILD/nss-3.90 + popd + /usr/bin/cp ./nss/lib/softoken/lowkeyi.h ./nss/cmd/rsaperf + /usr/bin/cp ./nss/lib/softoken/lowkeyti.h ./nss/cmd/rsaperf + /usr/bin/mv ./nss/lib/util/verref.h ./nss/verref.h + /usr/bin/rm -rf ./nss/lib/freebl + /usr/bin/rm -rf ./nss/lib/softoken + /usr/bin/rm -rf ./nss/lib/util + /usr/bin/rm -rf ./nss/cmd/bltest + /usr/bin/rm -rf ./nss/cmd/fipstest + /usr/bin/rm -rf ./nss/cmd/rsaperf_low ~/build/BUILD/nss-3.90/nss/tests/ssl ~/build/BUILD/nss-3.90 + pushd nss/tests/ssl + cat sslcov.txt + sed -r 's/^([^#].*EXPORT|^[^#].*SSL2)/#disabled \1/' + cat sslstress.txt + sed -r 's/^([^#].*EXPORT|^[^#].*SSL2)/#disabled \1/' ~/build/BUILD/nss-3.90 + popd + exit 0 Executing(%build): /bin/sh -e /var/tmp/rpm-tmp.zSYfi2 + umask 022 + cd /builddir/build/BUILD + cd nss-3.90 + export NSS_NO_SSL2=1 + NSS_NO_SSL2=1 + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + export BUILD_OPT=1 + BUILD_OPT=1 + XCFLAGS='-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8' + export XCFLAGS + PKG_CONFIG_ALLOW_SYSTEM_LIBS=1 + PKG_CONFIG_ALLOW_SYSTEM_CFLAGS=1 + export PKG_CONFIG_ALLOW_SYSTEM_LIBS + export PKG_CONFIG_ALLOW_SYSTEM_CFLAGS ++ /usr/bin/pkg-config --cflags-only-I nspr ++ sed s/-I// + NSPR_INCLUDE_DIR='/usr/include/nspr4 ' + NSPR_LIB_DIR=/usr/lib64 + export NSPR_INCLUDE_DIR + export NSPR_LIB_DIR ++ /usr/bin/pkg-config --cflags-only-I nss-util ++ sed s/-I// + export 'NSSUTIL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' + NSSUTIL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' + export NSSUTIL_LIB_DIR=/usr/lib64 + NSSUTIL_LIB_DIR=/usr/lib64 ++ /usr/bin/pkg-config --cflags-only-I nss-softokn ++ sed s/-I// + export 'FREEBL_INCLUDE_DIR=/usr/include/nss3 -I/usr/include/nspr4 ' + FREEBL_INCLUDE_DIR='/usr/include/nss3 -I/usr/include/nspr4 ' + export FREEBL_LIB_DIR=/usr/lib64 + FREEBL_LIB_DIR=/usr/lib64 + export USE_SYSTEM_FREEBL=1 + USE_SYSTEM_FREEBL=1 + export NSS_USE_SYSTEM_FREEBL=1 + NSS_USE_SYSTEM_FREEBL=1 ++ /usr/bin/pkg-config --libs nss-softokn + export 'FREEBL_LIBS=-L/usr/lib64 -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl ' + FREEBL_LIBS='-L/usr/lib64 -lfreebl3 -lnssdbm3 -lsoftokn3 -lnssutil3 -lplds4 -lplc4 -lnspr4 -lpthread -ldl ' + export SOFTOKEN_LIB_DIR=/usr/lib64 + SOFTOKEN_LIB_DIR=/usr/lib64 + export USE_SYSTEM_NSSUTIL=1 + USE_SYSTEM_NSSUTIL=1 + export USE_SYSTEM_SOFTOKEN=1 + USE_SYSTEM_SOFTOKEN=1 + export NSS_BUILD_WITHOUT_SOFTOKEN=1 + NSS_BUILD_WITHOUT_SOFTOKEN=1 + NSS_USE_SYSTEM_SQLITE=1 + export NSS_USE_SYSTEM_SQLITE + export NSS_ALLOW_SSLKEYLOGFILE=1 + NSS_ALLOW_SSLKEYLOGFILE=1 + USE_64=1 + export USE_64 + export IN_TREE_FREEBL_HEADERS_FIRST=1 + IN_TREE_FREEBL_HEADERS_FIRST=1 + export NSS_BLTEST_NOT_AVAILABLE=1 + NSS_BLTEST_NOT_AVAILABLE=1 + export IN_TREE_FREEBL_HEADERS_FIRST=1 + IN_TREE_FREEBL_HEADERS_FIRST=1 + export NSS_FORCE_FIPS=1 + NSS_FORCE_FIPS=1 + export POLICY_FILE=nss-rhel7.config + POLICY_FILE=nss-rhel7.config + export POLICY_PATH=/etc/pki/nss-legacy + POLICY_PATH=/etc/pki/nss-legacy + /usr/bin/mkdir -p ./dist/private/nss + /usr/bin/mv ./nss/verref.h ./dist/private/nss/verref.h + export NSS_DISABLE_GTESTS=1 + NSS_DISABLE_GTESTS=1 + /usr/bin/make -C ./nss all make: Entering directory `/builddir/build/BUILD/nss-3.90/nss' coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 # no real way to encode these in any sensible way /usr/bin/make -C coreconf/nsinstall program make[1]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/coreconf/nsinstall' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 nsinstall.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pathsub.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pathsub.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/coreconf -I../../../dist/private/coreconf -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pathsub.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro -lpthread -ldl -lc true -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[1]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/coreconf/nsinstall' /usr/bin/make export make[1]: Entering directory `/builddir/build/BUILD/nss-3.90/nss' coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[2]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/coreconf' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/coreconf/nsinstall' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/coreconf/nsinstall' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/coreconf' make[2]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/base' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 baset.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 base.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssbaset.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssbase.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/base' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/certdb' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 genname.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 xconst.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 certxutl.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 certi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cert.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 certt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 certdb.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/certdb' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/certhigh' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ocspti.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ocspi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ocsp.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ocspt.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/certhigh' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/cryptohi' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 keyi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cryptohi.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cryptoht.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 key.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 keyhi.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 keyt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 keythi.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 sechash.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/cryptohi' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/dev' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckhelper.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 devm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 devtm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 devt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 dev.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssdevt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssdev.h ../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/dev' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/include' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_crlsel.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_errorstrings.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_results.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkixt.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certsel.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_params.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_revchecker.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certstore.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_pki.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_sample_modules.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_checker.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_system.h ../../../../dist/private/nss ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_util.h ../../../../dist/private/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/include' make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certselector.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_comcertselparams.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/certsel' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_comcrlselparams.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_crlselector.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/crlsel' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/checker' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_basicconstraintschecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_certchainchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_crlchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_ekuchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_expirationchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_namechainingchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_nameconstraintschecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_ocspchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_policychecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_revocationmethod.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_revocationchecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_signaturechecker.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_targetcertchecker.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/checker' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/params' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_procparams.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_trustanchor.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_valparams.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_resourcelimits.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/params' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/results' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_buildresult.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_policynode.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_valresult.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_verifynode.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/results' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/store' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_store.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/store' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/top' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_build.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_lifecycle.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_validate.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/top' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/util' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_tools.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_error.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_logger.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_list.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/util' make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix' make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_basicconstraints.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_cert.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_certpolicyinfo.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_certpolicymap.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_certpolicyqualifier.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_crl.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_crldp.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_crlentry.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_date.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_generalname.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_infoaccess.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_nameconstraints.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ocsprequest.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ocspresponse.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_publickey.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_x500name.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ocspcertid.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/pki' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_common.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_mem.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_object.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_string.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_primhash.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_bigint.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_mutex.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_bytearray.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_lifecycle.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_oid.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_hashtable.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_rwlock.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_monitorlock.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/system' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_aiamgr.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_colcertstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_httpcertstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_httpdefaultclient.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapt.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapcertstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapresponse.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldaprequest.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_ldapdefaultclient.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_nsscontext.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_pk11certstore.h ../../../../../dist/private/nss ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkix_pl_socket.h ../../../../../dist/private/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/module' make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/pk11wrap' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmodi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmodti.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 dev3hack.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmod.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmodt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secpkcs5.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11func.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11hpke.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11pub.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11priv.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11sdr.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11pqg.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/pk11wrap' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/pki' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pki.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nsspkit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nsspki.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkistore.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pki3hack.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkitm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkim.h ../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/pki' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/nss' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssrenam.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssoptions.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nss.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/nss' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ck.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckfw.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckfwm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckfwtm.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckmd.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ckt.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssck.api ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckepv.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckft.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckfw.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckfwc.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckfwt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckg.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckmdt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckt.h ../../../dist/public/nss make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw' make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 nssckbi.h ../../../../dist/public/nss make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins/testlib' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Nothing to be done for `export'. make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins/testlib' make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/crmf' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 crmfi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 crmfit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmmfi.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmmfit.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 crmf.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 crmft.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmmf.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmmft.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/crmf' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/jar' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 jar.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 jar-ds.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 jarfile.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/jar' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/pkcs12' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs12t.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs12.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 p12plcy.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 p12.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 p12t.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/pkcs12' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/pkcs7' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 p7local.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secmime.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secpkcs7.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pkcs7t.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/pkcs7' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/smime' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmslocal.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cms.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmst.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 smime.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 cmsreclist.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/smime' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ssl' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ssl.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 sslt.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 sslerr.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 sslexp.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 sslproto.h ../../../dist/public/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 preenc.h ../../../dist/public/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ssl' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/sysinit' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/sysinit' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm/include' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 hsearch.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 page.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 extern.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 queue.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 hash.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 search.h ../../../../dist/private/dbm ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 mcom_db.h ../../../../dist/public/dbm ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 ncompat.h ../../../../dist/public/dbm ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 winfile.h ../../../../dist/public/dbm make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm/include' make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm/src' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Nothing to be done for `export'. make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm/src' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib' make[2]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/lib' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 basicutil.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 secutil.h ../../../dist/private/nss ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 444 pk11table.h ../../../dist/private/nss make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/lib' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/shlibsign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/shlibsign/mangle' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Nothing to be done for `export'. make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/shlibsign/mangle' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/shlibsign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/addbuiltin' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/addbuiltin' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/atob' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/atob' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/btoa' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/btoa' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/certutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/certutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/chktest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/chktest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/crlutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/crlutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/crmftest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/crmftest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/dbtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/dbtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/derdump' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/derdump' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/digest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/digest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/httpserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/httpserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/listsuites' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/listsuites' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/makepqg' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/makepqg' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/multinit' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/multinit' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/nss-policy-check' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/nss-policy-check' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ocspclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ocspclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ocspresp' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ocspresp' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/oidcalc' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/oidcalc' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7content' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7content' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7env' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7env' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7sign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7sign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7verify' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7verify' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk12util' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk12util' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11importtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11importtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11ectest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11ectest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11gcmtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11gcmtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11mode' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11mode' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk1sign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk1sign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pp' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pp' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pwdecrypt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pwdecrypt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/rsaperf' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/rsaperf' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/rsapoptst' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/rsapoptst' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/sdbthreadtst' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/sdbthreadtst' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/sdrtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/sdrtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/selfserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/selfserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/signtool' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/signtool' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/signver' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/signver' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/smimetools' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 rules.mk:7: warning: overriding recipe for target `install' ../../coreconf/rules.mk:73: warning: ignoring old recipe for target `install' make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/smimetools' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ssltap' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ssltap' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/strsclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/strsclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/symkeyutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/symkeyutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/tests' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/tests' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/tstclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/tstclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/validation' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/validation' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/vfychain' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/vfychain' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/vfyserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/vfyserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/modutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/modutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pkix-errcodes' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Nothing to be done for `export'. make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pkix-errcodes' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss' /usr/bin/make libs make[1]: Entering directory `/builddir/build/BUILD/nss-3.90/nss' coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[2]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/coreconf' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/coreconf/nsinstall' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 true -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/coreconf/nsinstall' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/coreconf' make[2]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/base' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/arena.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 arena.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/error.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 error.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/errorval.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 errorval.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/hashops.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 hashops.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libc.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 libc.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tracker.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 tracker.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/item.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 item.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/utf8.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 utf8.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/list.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 list.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/hash.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 hash.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssb.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssb.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/arena.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/error.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/errorval.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/hashops.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libc.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tracker.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/item.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/utf8.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/list.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/hash.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssb.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssb.a ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssb.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/base' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/certdb' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/alg1485.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 alg1485.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certdb.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 certdb.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certv3.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 certv3.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certxutl.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 certxutl.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crl.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 crl.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/genname.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 genname.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/stanpcertdb.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 stanpcertdb.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/polcyxtn.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 polcyxtn.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secname.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 secname.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/xauthkid.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 xauthkid.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/xbsconst.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 xbsconst.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/xconst.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 xconst.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libcertdb.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libcertdb.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/alg1485.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certdb.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certv3.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certxutl.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crl.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/genname.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/stanpcertdb.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/polcyxtn.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secname.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/xauthkid.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/xbsconst.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/xconst.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libcertdb.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libcertdb.a ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libcertdb.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/certdb' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/certhigh' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certhtml.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 certhtml.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certreq.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 certreq.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crlv2.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 crlv2.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ocsp.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 ocsp.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ocspsig.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 ocspsig.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certhigh.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 certhigh.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certvfy.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 certvfy.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certvfypkix.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 certvfypkix.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/xcrldist.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 xcrldist.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libcerthi.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libcerthi.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certhtml.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certreq.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crlv2.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ocsp.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ocspsig.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certhigh.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certvfy.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certvfypkix.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/xcrldist.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libcerthi.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libcerthi.a ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libcerthi.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/certhigh' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/cryptohi' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sechash.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sechash.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/seckey.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 seckey.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secsign.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 secsign.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secvfy.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 secvfy.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dsautil.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nssutil -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 dsautil.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libcryptohi.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libcryptohi.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sechash.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/seckey.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secsign.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secvfy.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dsautil.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libcryptohi.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libcryptohi.a ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libcryptohi.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/cryptohi' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/dev' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/devslot.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 devslot.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/devtoken.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 devtoken.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/devutil.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 devutil.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ckhelper.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 ckhelper.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssdev.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssdev.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/devslot.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/devtoken.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/devutil.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ckhelper.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssdev.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssdev.a ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssdev.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/dev' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/include' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Nothing to be done for `libs'. make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/include' make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/certsel' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_certselector.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_certselector.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_comcertselparams.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_comcertselparams.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_certselector.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_comcertselparams.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixcertsel.a ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/certsel' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/crlsel' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_crlselector.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_crlselector.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_comcrlselparams.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_comcrlselparams.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_crlselector.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_comcrlselparams.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixcrlsel.a ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/crlsel' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/checker' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_basicconstraintschecker.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_basicconstraintschecker.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_certchainchecker.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_certchainchecker.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_crlchecker.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_crlchecker.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_ekuchecker.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_ekuchecker.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_expirationchecker.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_expirationchecker.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_namechainingchecker.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_namechainingchecker.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_nameconstraintschecker.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_nameconstraintschecker.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_ocspchecker.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_ocspchecker.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_revocationmethod.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_revocationmethod.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_revocationchecker.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_revocationchecker.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_policychecker.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_policychecker.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_signaturechecker.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_signaturechecker.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_targetcertchecker.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_targetcertchecker.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixchecker.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixchecker.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_basicconstraintschecker.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_certchainchecker.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_crlchecker.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_ekuchecker.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_expirationchecker.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_namechainingchecker.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_nameconstraintschecker.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_ocspchecker.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_revocationmethod.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_revocationchecker.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_policychecker.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_signaturechecker.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_targetcertchecker.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixchecker.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixchecker.a ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixchecker.a ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/checker' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/params' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_trustanchor.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_trustanchor.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_procparams.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_procparams.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_valparams.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_valparams.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_resourcelimits.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_resourcelimits.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixparams.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixparams.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_trustanchor.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_procparams.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_valparams.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_resourcelimits.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixparams.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixparams.a ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixparams.a ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/params' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/results' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_buildresult.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_buildresult.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_policynode.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_policynode.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_valresult.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_valresult.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_verifynode.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_verifynode.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixresults.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixresults.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_buildresult.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_policynode.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_valresult.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_verifynode.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixresults.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixresults.a ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixresults.a ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/results' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/store' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_store.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_store.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixstore.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixstore.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_store.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixstore.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixstore.a ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixstore.a ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/store' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/top' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_validate.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_validate.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_lifecycle.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_lifecycle.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_build.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_build.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixtop.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixtop.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_validate.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_lifecycle.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_build.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixtop.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixtop.a ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixtop.a ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/top' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/util' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_tools.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_tools.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_error.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_error.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_logger.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_logger.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_list.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_list.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_errpaths.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_errpaths.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixutil.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixutil.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_tools.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_error.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_logger.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_list.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_errpaths.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixutil.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixutil.a ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixutil.a ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix/util' make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix' make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/pki' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_basicconstraints.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_basicconstraints.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_cert.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_cert.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyinfo.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_certpolicyinfo.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicymap.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_certpolicymap.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyqualifier.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_certpolicyqualifier.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_crl.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_crl.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_crldp.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_crldp.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_crlentry.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_crlentry.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_date.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_date.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_generalname.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_generalname.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_infoaccess.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_infoaccess.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_nameconstraints.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_nameconstraints.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocsprequest.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_ocsprequest.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspresponse.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_ocspresponse.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_publickey.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_publickey.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_x500name.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_x500name.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspcertid.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_ocspcertid.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixpki.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixpki.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_basicconstraints.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_cert.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyinfo.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicymap.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyqualifier.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_crl.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_crldp.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_crlentry.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_date.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_generalname.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_infoaccess.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_nameconstraints.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocsprequest.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspresponse.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_publickey.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_x500name.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspcertid.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixpki.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixpki.a ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixpki.a ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/pki' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/system' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_bigint.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_bigint.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_bytearray.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_bytearray.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_common.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_common.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_error.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_error.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_hashtable.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_hashtable.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_lifecycle.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_lifecycle.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_mem.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_mem.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_monitorlock.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_monitorlock.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_mutex.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_mutex.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_object.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_object.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_oid.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_oid.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_primhash.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_primhash.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_rwlock.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_rwlock.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_string.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_string.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixsystem.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixsystem.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_bigint.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_bytearray.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_common.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_error.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_hashtable.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_lifecycle.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_mem.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_monitorlock.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_mutex.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_object.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_oid.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_primhash.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_rwlock.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_string.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixsystem.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixsystem.a ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixsystem.a ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/system' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/module' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_aiamgr.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_aiamgr.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_colcertstore.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_colcertstore.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpcertstore.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_httpcertstore.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpdefaultclient.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_httpdefaultclient.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaptemplates.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_ldaptemplates.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapcertstore.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_ldapcertstore.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapresponse.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_ldapresponse.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaprequest.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_ldaprequest.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapdefaultclient.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_ldapdefaultclient.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_nsscontext.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_nsscontext.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_pk11certstore.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_pk11certstore.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_socket.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DSHLIB_VERSION=\"\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix_pl_socket.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixmodule.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixmodule.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_aiamgr.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_colcertstore.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpcertstore.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpdefaultclient.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaptemplates.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapcertstore.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapresponse.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaprequest.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapdefaultclient.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_nsscontext.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_pk11certstore.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_socket.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixmodule.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixmodule.a ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkixmodule.a ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss/module' make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix/pkix_pl_nss' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/libpkix' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/pk11wrap' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dev3hack.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 dev3hack.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11akey.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11akey.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11auth.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11auth.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11cert.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11cert.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11cxt.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11cxt.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11err.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11err.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11hpke.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11hpke.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11kea.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11kea.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11list.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11list.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11load.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11load.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11mech.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11mech.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11merge.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11merge.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11nobj.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11nobj.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11obj.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11obj.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11pars.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11pars.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11pbe.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11pbe.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11pk12.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11pk12.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11pqg.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11pqg.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11sdr.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11sdr.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11skey.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11skey.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11slot.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11slot.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11util.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -DNSS_SHLIB_VERSION=\"3\" -DSOFTOKEN_SHLIB_VERSION=\"3\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11util.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpk11wrap.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpk11wrap.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dev3hack.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11akey.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11auth.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11cert.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11cxt.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11err.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11hpke.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11kea.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11list.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11load.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11mech.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11merge.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11nobj.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11obj.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11pars.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11pbe.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11pk12.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11pqg.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11sdr.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11skey.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11slot.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11util.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpk11wrap.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpk11wrap.a ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpk11wrap.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/pk11wrap' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/pki' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/asymmkey.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 asymmkey.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certificate.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 certificate.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cryptocontext.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cryptocontext.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/symmkey.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 symmkey.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/trustdomain.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 trustdomain.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tdcache.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 tdcache.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certdecode.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 certdecode.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkistore.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkistore.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkibase.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkibase.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pki3hack.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pki3hack.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnsspki.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnsspki.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/asymmkey.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certificate.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cryptocontext.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/symmkey.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/trustdomain.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tdcache.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certdecode.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkistore.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkibase.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pki3hack.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnsspki.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnsspki.a ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnsspki.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/pki' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/nss' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nssinit.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss-rhel7.config\" -DPOLICY_PATH=\"/etc/pki/nss-legacy\" -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 nssinit.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nssoptions.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss-rhel7.config\" -DPOLICY_PATH=\"/etc/pki/nss-legacy\" -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 nssoptions.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nssver.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss-rhel7.config\" -DPOLICY_PATH=\"/etc/pki/nss-legacy\" -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 nssver.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/utilwrap.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DPOLICY_FILE=\"nss-rhel7.config\" -DPOLICY_PATH=\"/etc/pki/nss-legacy\" -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I/usr/include/nss3/templates -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 utilwrap.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnss.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnss.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nssinit.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nssoptions.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nssver.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/utilwrap.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnss.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnss.a grep -v ';-' nss.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nss.def ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnss3.so cc -shared -m64 -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnss3.so -Wl,--version-script,Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nss.def -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnss3.so Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nssinit.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nssoptions.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nssver.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/utilwrap.o ../certhigh/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certhtml.o ../certhigh/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certreq.o ../certhigh/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crlv2.o ../certhigh/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ocsp.o ../certhigh/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ocspsig.o ../certhigh/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certhigh.o ../certhigh/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certvfy.o ../certhigh/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certvfypkix.o ../certhigh/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/xcrldist.o ../cryptohi/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sechash.o ../cryptohi/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/seckey.o ../cryptohi/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secsign.o ../cryptohi/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secvfy.o ../cryptohi/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dsautil.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dev3hack.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11akey.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11auth.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11cert.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11cxt.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11err.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11hpke.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11kea.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11list.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11load.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11mech.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11merge.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11nobj.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11obj.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11pars.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11pbe.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11pk12.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11pqg.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11sdr.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11skey.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11slot.o ../pk11wrap/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11util.o ../certdb/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/alg1485.o ../certdb/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certdb.o ../certdb/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certv3.o ../certdb/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certxutl.o ../certdb/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crl.o ../certdb/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/genname.o ../certdb/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/stanpcertdb.o ../certdb/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/polcyxtn.o ../certdb/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secname.o ../certdb/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/xauthkid.o ../certdb/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/xbsconst.o ../certdb/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/xconst.o ../pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/asymmkey.o ../pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certificate.o ../pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cryptocontext.o ../pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/symmkey.o ../pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/trustdomain.o ../pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tdcache.o ../pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certdecode.o ../pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkistore.o ../pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkibase.o ../pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pki3hack.o ../dev/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/devslot.o ../dev/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/devtoken.o ../dev/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/devutil.o ../dev/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ckhelper.o ../base/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/arena.o ../base/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/error.o ../base/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/errorval.o ../base/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/hashops.o ../base/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libc.o ../base/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tracker.o ../base/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/item.o ../base/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/utf8.o ../base/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/list.o ../base/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/hash.o ../libpkix/pkix/certsel/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_certselector.o ../libpkix/pkix/certsel/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_comcertselparams.o ../libpkix/pkix/checker/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_basicconstraintschecker.o ../libpkix/pkix/checker/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_certchainchecker.o ../libpkix/pkix/checker/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_crlchecker.o ../libpkix/pkix/checker/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_ekuchecker.o ../libpkix/pkix/checker/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_expirationchecker.o ../libpkix/pkix/checker/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_namechainingchecker.o ../libpkix/pkix/checker/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_nameconstraintschecker.o ../libpkix/pkix/checker/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_ocspchecker.o ../libpkix/pkix/checker/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_revocationmethod.o ../libpkix/pkix/checker/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_revocationchecker.o ../libpkix/pkix/checker/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_policychecker.o ../libpkix/pkix/checker/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_signaturechecker.o ../libpkix/pkix/checker/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_targetcertchecker.o ../libpkix/pkix/params/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_trustanchor.o ../libpkix/pkix/params/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_procparams.o ../libpkix/pkix/params/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_valparams.o ../libpkix/pkix/params/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_resourcelimits.o ../libpkix/pkix/results/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_buildresult.o ../libpkix/pkix/results/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_policynode.o ../libpkix/pkix/results/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_valresult.o ../libpkix/pkix/results/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_verifynode.o ../libpkix/pkix/top/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_validate.o ../libpkix/pkix/top/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_lifecycle.o ../libpkix/pkix/top/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_build.o ../libpkix/pkix/util/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_tools.o ../libpkix/pkix/util/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_error.o ../libpkix/pkix/util/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_logger.o ../libpkix/pkix/util/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_list.o ../libpkix/pkix/util/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_errpaths.o ../libpkix/pkix/crlsel/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_crlselector.o ../libpkix/pkix/crlsel/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_comcrlselparams.o ../libpkix/pkix/store/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_store.o ../libpkix/pkix_pl_nss/pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_basicconstraints.o ../libpkix/pkix_pl_nss/pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_cert.o ../libpkix/pkix_pl_nss/pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyinfo.o ../libpkix/pkix_pl_nss/pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicymap.o ../libpkix/pkix_pl_nss/pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_certpolicyqualifier.o ../libpkix/pkix_pl_nss/pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_crl.o ../libpkix/pkix_pl_nss/pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_crldp.o ../libpkix/pkix_pl_nss/pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_crlentry.o ../libpkix/pkix_pl_nss/pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_date.o ../libpkix/pkix_pl_nss/pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_generalname.o ../libpkix/pkix_pl_nss/pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_infoaccess.o ../libpkix/pkix_pl_nss/pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_nameconstraints.o ../libpkix/pkix_pl_nss/pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocsprequest.o ../libpkix/pkix_pl_nss/pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspresponse.o ../libpkix/pkix_pl_nss/pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_publickey.o ../libpkix/pkix_pl_nss/pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_x500name.o ../libpkix/pkix_pl_nss/pki/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ocspcertid.o ../libpkix/pkix_pl_nss/system/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_bigint.o ../libpkix/pkix_pl_nss/system/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_bytearray.o ../libpkix/pkix_pl_nss/system/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_common.o ../libpkix/pkix_pl_nss/system/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_error.o ../libpkix/pkix_pl_nss/system/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_hashtable.o ../libpkix/pkix_pl_nss/system/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_lifecycle.o ../libpkix/pkix_pl_nss/system/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_mem.o ../libpkix/pkix_pl_nss/system/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_monitorlock.o ../libpkix/pkix_pl_nss/system/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_mutex.o ../libpkix/pkix_pl_nss/system/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_object.o ../libpkix/pkix_pl_nss/system/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_oid.o ../libpkix/pkix_pl_nss/system/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_primhash.o ../libpkix/pkix_pl_nss/system/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_rwlock.o ../libpkix/pkix_pl_nss/system/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_string.o ../libpkix/pkix_pl_nss/module/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_aiamgr.o ../libpkix/pkix_pl_nss/module/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_colcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_httpdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaptemplates.o ../libpkix/pkix_pl_nss/module/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapcertstore.o ../libpkix/pkix_pl_nss/module/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapresponse.o ../libpkix/pkix_pl_nss/module/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldaprequest.o ../libpkix/pkix_pl_nss/module/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_ldapdefaultclient.o ../libpkix/pkix_pl_nss/module/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_nsscontext.o ../libpkix/pkix_pl_nss/module/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_pk11certstore.o ../libpkix/pkix_pl_nss/module/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix_pl_socket.o -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnss3.so ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnss.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnss3.so ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/nss' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crypto.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 crypto.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/find.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 find.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/hash.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 hash.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/instance.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 instance.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/mutex.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 mutex.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/object.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 object.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/session.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 session.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sessobj.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sessobj.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/slot.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 slot.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/token.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 token.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/wrap.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 wrap.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/mechanism.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/nspr -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 mechanism.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssckfw.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssckfw.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crypto.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/find.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/hash.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/instance.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/mutex.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/object.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/session.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sessobj.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/slot.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/token.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/wrap.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/mechanism.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssckfw.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssckfw.a ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssckfw.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw' make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/anchor.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 anchor.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/constants.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 constants.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bfind.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 bfind.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/binst.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 binst.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bobject.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 bobject.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bsession.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 bsession.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bslot.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 bslot.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/btoken.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 btoken.c perl certdata.perl certdata.txt Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certdata.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certdata.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certdata.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ckbiver.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -I../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 ckbiver.c grep -v ';-' nssckbi.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nssckbi.def rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssckbi.so cc -shared -m64 -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnssckbi.so -Wl,--version-script,Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nssckbi.def -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssckbi.so Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/anchor.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/constants.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bfind.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/binst.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bobject.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bsession.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bslot.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/btoken.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certdata.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ckbiver.o ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssckbi.so ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssckbi.so ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins' make[5]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins/testlib' ../../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/anchor.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 -I../../../../lib/ckfw/builtins ../anchor.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bfind.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 -I../../../../lib/ckfw/builtins ../bfind.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/binst.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 -I../../../../lib/ckfw/builtins ../binst.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bobject.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 -I../../../../lib/ckfw/builtins ../bobject.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bsession.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 -I../../../../lib/ckfw/builtins ../bsession.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bslot.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 -I../../../../lib/ckfw/builtins ../bslot.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/btoken.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 -I../../../../lib/ckfw/builtins ../btoken.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ckbiver.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 -I../../../../lib/ckfw/builtins ../ckbiver.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/constants.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 -I../../../../lib/ckfw/builtins ../constants.c perl ../certdata.perl certdata-testlib.txt Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certdata-testlib.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certdata-testlib.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../../dist/public/nss -I../../../../../dist/private/nss -I../../../../../dist/public/nspr -I. -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 -I../../../../lib/ckfw/builtins Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certdata-testlib.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssckbi-testlib.so cc -shared -m64 -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnssckbi-testlib.so -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssckbi-testlib.so Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/anchor.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bfind.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/binst.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bobject.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bsession.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bslot.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/btoken.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ckbiver.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/constants.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certdata-testlib.o ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssckbi-testlib.so ../../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssckbi-testlib.so ../../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[5]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins/testlib' ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssckbi.so ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw/builtins' ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnssckfw.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ckfw' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/crmf' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crmfenc.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 crmfenc.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crmftmpl.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 crmftmpl.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crmfreq.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 crmfreq.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crmfpop.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 crmfpop.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crmfdec.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 crmfdec.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crmfget.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 crmfget.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crmfcont.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 crmfcont.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmmfasn1.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmmfasn1.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmmfresp.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmmfresp.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmmfrec.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmmfrec.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmmfchal.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmmfchal.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/servget.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 servget.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/encutil.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 encutil.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/respcli.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 respcli.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/respcmn.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 respcmn.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/challcli.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 challcli.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/asn1cmn.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 asn1cmn.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libcrmf.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libcrmf.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crmfenc.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crmftmpl.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crmfreq.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crmfpop.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crmfdec.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crmfget.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crmfcont.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmmfasn1.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmmfresp.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmmfrec.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmmfchal.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/servget.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/encutil.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/respcli.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/respcmn.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/challcli.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/asn1cmn.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libcrmf.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libcrmf.a ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libcrmf.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/crmf' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/jar' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/jarver.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 jarver.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/jarsign.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 jarsign.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/jar.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 jar.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/jar-ds.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 jar-ds.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/jarfile.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 jarfile.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/jarint.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DMOZILLA_CLIENT=1 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 jarint.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libjar.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libjar.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/jarver.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/jarsign.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/jar.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/jar-ds.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/jarfile.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/jarint.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libjar.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libjar.a ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libjar.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/jar' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/pkcs12' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12local.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 p12local.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12creat.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 p12creat.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12dec.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 p12dec.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12plcy.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 p12plcy.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12tmpl.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 p12tmpl.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12e.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 p12e.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12d.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 p12d.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkcs12.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkcs12.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12local.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12creat.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12dec.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12plcy.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12tmpl.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12e.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12d.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkcs12.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkcs12.a ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkcs12.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/pkcs12' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/pkcs7' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certread.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 certread.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7common.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 p7common.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7create.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 p7create.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7decode.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 p7decode.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7encode.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 p7encode.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7local.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 p7local.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secmime.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 secmime.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkcs7.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkcs7.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certread.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7common.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7create.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7decode.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7encode.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7local.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secmime.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkcs7.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkcs7.a ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libpkcs7.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/pkcs7' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/smime' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsarray.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmsarray.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsasn1.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmsasn1.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsattr.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmsattr.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmscinfo.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmscinfo.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmscipher.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmscipher.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsdecode.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmsdecode.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsdigdata.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmsdigdata.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsdigest.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmsdigest.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsencdata.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmsencdata.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsencode.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmsencode.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsenvdata.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmsenvdata.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsmessage.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmsmessage.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmspubkey.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmspubkey.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsrecinfo.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmsrecinfo.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsreclist.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmsreclist.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmssigdata.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmssigdata.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmssiginfo.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmssiginfo.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsudf.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmsudf.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsutil.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmsutil.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/smimemessage.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 smimemessage.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/smimeutil.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 smimeutil.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/smimever.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 smimever.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libsmime.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libsmime.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsarray.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsasn1.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsattr.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmscinfo.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmscipher.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsdecode.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsdigdata.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsdigest.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsencdata.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsencode.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsenvdata.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsmessage.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmspubkey.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsrecinfo.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsreclist.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmssigdata.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmssiginfo.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsudf.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsutil.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/smimemessage.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/smimeutil.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/smimever.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libsmime.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libsmime.a grep -v ';-' smime.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/smime.def ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libsmime3.so cc -shared -m64 -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libsmime3.so -Wl,--version-script,Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/smime.def -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libsmime3.so Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsarray.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsasn1.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsattr.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmscinfo.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmscipher.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsdecode.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsdigdata.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsdigest.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsencdata.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsencode.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsenvdata.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsmessage.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmspubkey.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsrecinfo.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsreclist.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmssigdata.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmssiginfo.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsudf.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsutil.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/smimemessage.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/smimeutil.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/smimever.o ../pkcs12/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12local.o ../pkcs12/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12creat.o ../pkcs12/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12dec.o ../pkcs12/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12plcy.o ../pkcs12/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12tmpl.o ../pkcs12/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12e.o ../pkcs12/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p12d.o ../pkcs7/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certread.o ../pkcs7/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7common.o ../pkcs7/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7create.o ../pkcs7/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7decode.o ../pkcs7/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7encode.o ../pkcs7/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7local.o ../pkcs7/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secmime.o -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -lnss3 -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libsmime3.so ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libsmime.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libsmime3.so ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/smime' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/ssl' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/authcert.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 authcert.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmpcert.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmpcert.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dtls13con.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 dtls13con.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dtlscon.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 dtlscon.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/prelib.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 prelib.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/selfencrypt.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 selfencrypt.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssl3con.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 ssl3con.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssl3ecc.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 ssl3ecc.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssl3ext.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 ssl3ext.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssl3exthandle.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 ssl3exthandle.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssl3gthr.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 ssl3gthr.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslauth.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sslauth.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslbloom.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sslbloom.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslcert.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sslcert.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslcon.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sslcon.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssldef.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 ssldef.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslencode.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sslencode.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslenum.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sslenum.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslerr.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sslerr.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslerrstrs.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sslerrstrs.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslgrp.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sslgrp.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslinfo.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sslinfo.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslinit.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sslinit.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslmutex.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sslmutex.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslnonce.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sslnonce.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslprimitive.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sslprimitive.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslreveal.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sslreveal.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslsecur.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sslsecur.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslsnce.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sslsnce.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslsock.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sslsock.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslspec.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sslspec.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssltrace.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 ssltrace.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslver.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sslver.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13con.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 tls13con.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13ech.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 tls13ech.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13echv.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 tls13echv.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13exthandle.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 tls13exthandle.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13hashstate.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 tls13hashstate.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13hkdf.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 tls13hkdf.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13psk.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 tls13psk.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13replay.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 tls13replay.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13subcerts.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 tls13subcerts.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/unix_err.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_NO_SSL2 -DNSS_ALLOW_SSLKEYLOGFILE=1 -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 unix_err.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libssl.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libssl.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/authcert.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmpcert.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dtls13con.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dtlscon.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/prelib.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/selfencrypt.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssl3con.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssl3ecc.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssl3ext.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssl3exthandle.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssl3gthr.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslauth.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslbloom.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslcert.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslcon.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssldef.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslencode.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslenum.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslerr.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslerrstrs.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslgrp.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslinfo.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslinit.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslmutex.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslnonce.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslprimitive.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslreveal.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslsecur.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslsnce.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslsock.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslspec.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssltrace.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslver.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13con.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13ech.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13echv.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13exthandle.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13hashstate.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13hkdf.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13psk.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13replay.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13subcerts.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/unix_err.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libssl.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libssl.a grep -v ';-' ssl.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssl.def rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libssl3.so cc -shared -m64 -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libssl3.so -Wl,--version-script,Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssl.def -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libssl3.so Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/authcert.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmpcert.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dtls13con.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dtlscon.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/prelib.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/selfencrypt.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssl3con.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssl3ecc.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssl3ext.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssl3exthandle.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssl3gthr.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslauth.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslbloom.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslcert.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslcon.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssldef.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslencode.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslenum.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslerr.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslerrstrs.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslgrp.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslinfo.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslinit.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslmutex.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslnonce.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslprimitive.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslreveal.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslsecur.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslsnce.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslsock.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslspec.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssltrace.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sslver.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13con.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13ech.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13echv.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13exthandle.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13hashstate.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13hkdf.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13psk.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13replay.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tls13subcerts.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/unix_err.o -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -lnss3 -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libssl3.so ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libssl.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libssl3.so ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/ssl' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/sysinit' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsssysinit.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 nsssysinit.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnsssysinit.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnsssysinit.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsssysinit.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnsssysinit.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnsssysinit.a grep -v ';-' nsssysinit.def | sed -e 's,;+,,' -e 's; DATA ;;' -e 's,;;,,' -e 's,;.*,;,' > Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsssysinit.def rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnsssysinit.so cc -shared -m64 -Wl,--gc-sections -Wl,-z,defs -Wl,-z,relro -Wl,-soname -Wl,libnsssysinit.so -Wl,--version-script,Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsssysinit.def -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnsssysinit.so Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsssysinit.o -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc chmod +x Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnsssysinit.so ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnsssysinit.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libnsssysinit.so ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/sysinit' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm/include' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Nothing to be done for `libs'. make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm/include' make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm/src' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/db.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 db.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/h_bigkey.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 h_bigkey.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/h_func.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 h_func.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/h_log2.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 h_log2.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/h_page.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 h_page.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/hash.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 hash.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/hash_buf.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 hash_buf.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/mktemp.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 mktemp.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dirent.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DSTDC_HEADERS -DHAVE_STRERROR -DHAVE_SNPRINTF -DMEMMOVE -D__DBINTERFACE_PRIVATE -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/dbm -I../../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 dirent.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libdbm.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libdbm.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/db.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/h_bigkey.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/h_func.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/h_log2.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/h_page.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/hash.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/hash_buf.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/mktemp.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dirent.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libdbm.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libdbm.a ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libdbm.a ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm/src' make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib/dbm' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/lib' make[2]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd' ../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/lib' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/basicutil.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 basicutil.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secutil.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 secutil.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secpwd.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 secpwd.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/derprint.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 derprint.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/moreoids.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 moreoids.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pppolicy.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pppolicy.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ffs.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 ffs.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11table.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11table.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libsectool.a ar cr Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libsectool.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/basicutil.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secutil.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secpwd.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/derprint.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/moreoids.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pppolicy.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ffs.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11table.o echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libsectool.a Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libsectool.a ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 664 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/libsectool.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/lib' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/shlibsign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 make[4]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/shlibsign/mangle' ../../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/mangle.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 mangle.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/mangle cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/mangle -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../../dist/public/nss -I../../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/mangle.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/mangle ../../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[4]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/shlibsign/mangle' cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/shlibsign.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 shlibsign.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/shlibsign cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/shlibsign -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DSHLIB_SUFFIX=\"so\" -DSHLIB_PREFIX=\"lib\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/shlibsign.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/shlibsign ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/shlibsign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/addbuiltin' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/addbuiltin.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 addbuiltin.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/addbuiltin cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/addbuiltin -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/addbuiltin.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/addbuiltin ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/addbuiltin' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/atob' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/atob.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 atob.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/atob cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/atob -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/atob.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/atob ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/atob' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/btoa' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/btoa.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 btoa.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/btoa cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/btoa -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/btoa.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/btoa ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/btoa' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/certutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certext.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 certext.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certutil.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 certutil.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/keystuff.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 keystuff.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certutil cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certutil -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certext.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certutil.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/keystuff.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certutil ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/certutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/chktest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/chktest.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 chktest.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/chktest cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/chktest -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/chktest.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /usr/lib64/libfreebl.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /usr/lib64/libfreebl.a -L/usr/lib64 -lsoftokn3 -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/chktest ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/chktest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/crlutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crlgen_lex.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 crlgen_lex.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crlgen.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 crlgen.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crlutil.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 crlutil.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crlutil cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crlutil -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crlgen_lex.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crlgen.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crlutil.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crlutil ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/crlutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/crmftest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/testcrmf.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 testcrmf.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crmftest cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crmftest -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/testcrmf.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/crmftest ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/crmftest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/dbtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dbtest.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 dbtest.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dbtest cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dbtest -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dbtest.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dbtest ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/dbtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/derdump' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/derdump.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 derdump.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/derdump cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/derdump -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/derdump.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/derdump ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/derdump' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/digest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/digest.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 digest.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/digest cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/digest -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/digest.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/digest ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/digest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/httpserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/httpserv.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 httpserv.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/httpserv cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/httpserv -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/httpserv.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/httpserv ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/httpserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/listsuites' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/listsuites.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 listsuites.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/listsuites cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/listsuites -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/listsuites.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/listsuites ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/listsuites' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/makepqg' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/makepqg.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 makepqg.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/makepqg cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/makepqg -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/makepqg.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/makepqg ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/makepqg' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/multinit' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/multinit.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 multinit.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/multinit cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/multinit -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/multinit.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/multinit ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/multinit' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/nss-policy-check' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nss-policy-check.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 nss-policy-check.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nss-policy-check cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nss-policy-check -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nss-policy-check.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nss-policy-check ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/nss-policy-check' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ocspclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ocspclnt.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 ocspclnt.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ocspclnt cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ocspclnt -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ocspclnt.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ocspclnt ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ocspclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ocspresp' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ocspresp.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 ocspresp.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ocspresp cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ocspresp -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ocspresp.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ocspresp ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ocspresp' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/oidcalc' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/oidcalc.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 oidcalc.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/oidcalc cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/oidcalc -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/oidcalc.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/oidcalc ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/oidcalc' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7content' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7content.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 p7content.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7content cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7content -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7content.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7content ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7content' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7env' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7env.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 p7env.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7env cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7env -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7env.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7env ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7env' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7sign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7sign.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 p7sign.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7sign cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7sign -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7sign.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7sign ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7sign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7verify' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7verify.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 p7verify.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7verify cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7verify -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7verify.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/p7verify ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/p7verify' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk12util' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk12util.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk12util.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk12util cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk12util -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk12util.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk12util ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk12util' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11importtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11importtest.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11importtest.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11importtest cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11importtest -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11importtest.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11importtest ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11importtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11ectest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11ectest.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11ectest.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11ectest cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11ectest -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11ectest.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /usr/lib64/libfreebl.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /usr/lib64/libfreebl.a -L/usr/lib64 -lsoftokn3 -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11ectest ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11ectest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11gcmtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11gcmtest.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11gcmtest.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11gcmtest cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11gcmtest -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11gcmtest.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11gcmtest ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11gcmtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11mode' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11mode.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11mode.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11mode cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11mode -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11mode.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11mode ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk11mode' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk1sign' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk1sign.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk1sign.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk1sign cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk1sign -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk1sign.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk1sign ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pk1sign' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pp' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pp.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pp.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pp cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pp -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pp.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pp ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pp' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pwdecrypt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pwdecrypt.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pwdecrypt.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pwdecrypt cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pwdecrypt -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pwdecrypt.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pwdecrypt ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pwdecrypt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/rsaperf' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/rsaperf.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 rsaperf.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/defkey.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 defkey.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/rsaperf cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/rsaperf -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -DNSS_USE_STATIC_LIBS -I../../nss/lib/softoken -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/rsaperf.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/defkey.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libssl.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /usr/lib64/libfreebl.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnss.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /usr/lib64/libfreebl.a -L/usr/lib64 -lsoftokn3 -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -lsqlite3 -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/rsaperf ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/rsaperf' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/rsapoptst' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/rsapoptst.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -I../../../dist/public/softoken -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 rsapoptst.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/rsapoptst cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/rsapoptst -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -I../../../dist/public/softoken -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/rsapoptst.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/rsapoptst ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/rsapoptst' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/sdbthreadtst' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sdbthreadtst.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sdbthreadtst.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sdbthreadtst cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sdbthreadtst -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sdbthreadtst.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sdbthreadtst ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/sdbthreadtst' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/sdrtest' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sdrtest.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sdrtest.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sdrtest cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sdrtest -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sdrtest.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sdrtest ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/sdrtest' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/selfserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/selfserv.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 selfserv.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/selfserv cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/selfserv -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/selfserv.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/selfserv ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/selfserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/signtool' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/signtool.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 signtool.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certgen.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 certgen.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/javascript.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 javascript.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/list.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 list.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sign.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 sign.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/util.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 util.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/verify.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 verify.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/zip.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 zip.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/signtool cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/signtool -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/signtool.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/certgen.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/javascript.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/list.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/sign.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/util.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/verify.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/zip.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libjar.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/signtool ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/signtool' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/signver' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/signver.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 signver.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk7print.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk7print.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/signver cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/signver -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/signver.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk7print.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/signver ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/signver' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/smimetools' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 rules.mk:7: warning: overriding recipe for target `install' ../../coreconf/rules.mk:73: warning: ignoring old recipe for target `install' cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsutil.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 cmsutil.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsutil cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsutil -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsutil.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/cmsutil ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/smimetools' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ssltap' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssltap.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 ssltap.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssltap cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssltap -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssltap.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/ssltap ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/ssltap' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/strsclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/strsclnt.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 strsclnt.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/strsclnt cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/strsclnt -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/strsclnt.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/strsclnt ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/strsclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/symkeyutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/symkeyutil.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 symkeyutil.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/symkeyutil cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/symkeyutil -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/symkeyutil.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/symkeyutil ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/symkeyutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/tests' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/baddbdir.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 baddbdir.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/baddbdir cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/baddbdir -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/baddbdir.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/conflict.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 conflict.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/conflict cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/conflict -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/conflict.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dertimetest.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 dertimetest.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dertimetest cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dertimetest -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dertimetest.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/encodeinttest.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 encodeinttest.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/encodeinttest cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/encodeinttest -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/encodeinttest.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nonspr10.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 nonspr10.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nonspr10 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nonspr10 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nonspr10.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/remtest.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 remtest.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/remtest cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/remtest -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/remtest.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secmodtest.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 secmodtest.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secmodtest cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secmodtest -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secmodtest.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/baddbdir Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/conflict Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/dertimetest Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/encodeinttest Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nonspr10 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/remtest Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/secmodtest ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/tests' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/tstclnt' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tstclnt.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 tstclnt.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tstclnt cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tstclnt -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tstclnt.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/tstclnt ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/tstclnt' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/validation' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/validation.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 validation.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/validation cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/validation -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/dbm -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/validation.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/validation ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/validation' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/vfychain' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/vfychain.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 vfychain.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/vfychain cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/vfychain -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/vfychain.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/vfychain ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/vfychain' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/vfyserv' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/vfyserv.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 vfyserv.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/vfyutil.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 vfyutil.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/vfyserv cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/vfyserv -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DDLL_PREFIX=\"lib\" -DDLL_SUFFIX=\"so\" -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -I../../../dist/public/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/vfyserv.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/vfyutil.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/vfyserv ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/vfyserv' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/modutil' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/modutil.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 modutil.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pk11.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/instsec.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 instsec.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/install.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 install.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/installparse.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 installparse.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/install-ds.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 install-ds.c cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lex.Pk11Install_yy.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 lex.Pk11Install_yy.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/modutil cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/modutil -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -DNSPR20 -DYY_NO_UNPUT -DYY_NO_INPUT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/sectools -I../../../dist/private/sectools -I../../../dist/public/seccmd -I../../../dist/public/nss -I../../../dist/public/dbm -I../../../dist/private/seccmd -I../../../dist/private/nss -I../../../dist/private/dbm -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/modutil.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pk11.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/instsec.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/install.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/installparse.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/install-ds.o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lex.Pk11Install_yy.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libjar.a ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc -lz ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/modutil ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/modutil' make[3]: Entering directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pkix-errcodes' ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix-errcodes.o -c -std=c99 -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 pkix-errcodes.c rm -f Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix-errcodes cc -o Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix-errcodes -O2 -fPIC -m64 -pipe -ffunction-sections -fdata-sections -DHAVE_STRERROR -DLINUX -Dlinux -Wall -Wshadow -Werror -DXP_UNIX -DXP_UNIX -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -UDEBUG -DNDEBUG -D_DEFAULT_SOURCE -D_BSD_SOURCE -D_POSIX_SOURCE -DSDB_MEASURE_USE_TEMP_DIR -D_REENTRANT -DNSS_DISABLE_AVX2 -DNSS_DISABLE_SSE3 -DUSE_UTIL_DIRECTLY -DNO_NSPR_10_SUPPORT -DSSL_DISABLE_DEPRECATED_CIPHER_SUITE_NAMES -I/usr/include/nspr4 -I/usr/include/nss3 -I/usr/include/nspr4 -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../public/nss -iquote ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/../private/nss -I../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/include -I../../../dist/public/nss -I../../../dist/private/nss -I../../../dist/public/seccmd -O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mcpu=power8 -mtune=power8 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix-errcodes.o -m64 -z noexecstack -Wl,-z,relro -m64 -z noexecstack -Wl,-z,relro ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /usr/lib64/libfreebl.a -L../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib -L/usr/lib64 -lnssutil3 -L/usr/lib64 -lplc4 -lplds4 -lnspr4 -lssl3 -lsmime3 -lnss3 -L/usr/lib64 -lsoftokn3 -lpthread -ldl -lc ../../coreconf/nsinstall/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/nsinstall -R -m 775 Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/pkix-errcodes ../../../dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin make[3]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd/pkix-errcodes' make[2]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss/cmd' make[1]: Leaving directory `/builddir/build/BUILD/nss-3.90/nss' make: Leaving directory `/builddir/build/BUILD/nss-3.90/nss' + /usr/bin/make -C ./nss latest make: Entering directory `/builddir/build/BUILD/nss-3.90/nss' coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 echo Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ > ./../dist/latest make: Leaving directory `/builddir/build/BUILD/nss-3.90/nss' ~/build/BUILD/nss-3.90/nss/doc ~/build/BUILD/nss-3.90 + unset NSS_BLTEST_NOT_AVAILABLE + pushd ./nss/doc + rm -rf ./nroff + /usr/bin/make clean rm -f date.xml version.xml *.tar.bz2 rm -f html/*.proc rm -fr nss-man ascii + echo -n 'Nov 13 2013' + echo -n 3.90.0 + /usr/bin/make mkdir -p html mkdir -p nroff xmlto -o nroff man certutil.xml Note: Writing certutil.1 xmlto -o nroff man cmsutil.xml Note: Writing cmsutil.1 xmlto -o nroff man crlutil.xml Note: Writing crlutil.1 xmlto -o nroff man pk12util.xml Note: Writing pk12util.1 xmlto -o nroff man modutil.xml Note: Writing modutil.1 xmlto -o nroff man ssltap.xml Note: Writing ssltap.1 xmlto -o nroff man derdump.xml Note: Writing derdump.1 xmlto -o nroff man signtool.xml Note: Writing signtool.1 xmlto -o nroff man signver.xml Note: Writing signver.1 xmlto -o nroff man pp.xml Note: Writing pp.1 xmlto -o nroff man vfychain.xml Note: Writing vfychain.1 xmlto -o nroff man vfyserv.xml Note: Writing vfyserv.1 xmlto -o nroff man nss-policy-check.xml Note: Writing nss-policy-check.1 xmlto -o html html pk12util.xml Writing index.html for refentry(pk12util) mv html/index.html html/pk12util.html xmlto -o html html modutil.xml Writing index.html for refentry(modutil) mv html/index.html html/modutil.html xmlto -o html html nss-policy-check.xml Writing index.html for refentry(nss-policy-check) mv html/index.html html/nss-policy-check.html ~/build/BUILD/nss-3.90 + popd + /usr/bin/mkdir -p ./dist/doc/nroff + /usr/bin/cp ./nss/doc/nroff/certutil.1 ./nss/doc/nroff/cmsutil.1 ./nss/doc/nroff/crlutil.1 ./nss/doc/nroff/derdump.1 ./nss/doc/nroff/modutil.1 ./nss/doc/nroff/nss-policy-check.1 ./nss/doc/nroff/pk12util.1 ./nss/doc/nroff/pp.1 ./nss/doc/nroff/signtool.1 ./nss/doc/nroff/signver.1 ./nss/doc/nroff/ssltap.1 ./nss/doc/nroff/vfychain.1 ./nss/doc/nroff/vfyserv.1 ./dist/doc/nroff + /usr/bin/mkdir -p ./dist/pkgconfig + /usr/bin/cat /builddir/build/SOURCES/nss.pc.in + sed -e s,%libdir%,/usr/lib64,g -e s,%prefix%,/usr,g -e s,%exec_prefix%,/usr,g -e s,%includedir%,/usr/include/nss3,g -e s,%NSS_VERSION%,3.90.0,g -e s,%NSPR_VERSION%,4.35.0,g -e s,%NSSUTIL_VERSION%,3.90.0,g -e s,%SOFTOKEN_VERSION%,3.90.0,g ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMAJOR' ++ awk '{print $3}' + NSS_VMAJOR=3 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VMINOR' ++ awk '{print $3}' + NSS_VMINOR=90 ++ cat nss/lib/nss/nss.h ++ grep '#define.*NSS_VPATCH' ++ awk '{print $3}' + NSS_VPATCH=0 + export NSS_VMAJOR + export NSS_VMINOR + export NSS_VPATCH + /usr/bin/cat /builddir/build/SOURCES/nss-config.in + sed -e s,@libdir@,/usr/lib64,g -e s,@prefix@,/usr,g -e s,@exec_prefix@,/usr,g -e s,@includedir@,/usr/include/nss3,g -e s,@MOD_MAJOR_VERSION@,3,g -e s,@MOD_MINOR_VERSION@,90,g -e s,@MOD_PATCH_VERSION@,0,g + chmod 755 ./dist/pkgconfig/nss-config + /usr/bin/cat /builddir/build/SOURCES/setup-nsssysinit.sh + chmod 755 ./dist/pkgconfig/setup-nsssysinit.sh + /usr/bin/cp ./nss/lib/ckfw/nssck.api ./dist/private/nss/ + echo -n 'Nov 13 2013' + echo -n 3.90.0 + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/nss-config.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/setup-nsssysinit.xml . + for m in /builddir/build/SOURCES/nss-config.xml /builddir/build/SOURCES/setup-nsssysinit.xml /builddir/build/SOURCES/pkcs11.txt.xml + cp /builddir/build/SOURCES/pkcs11.txt.xml . + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man nss-config.xml Note: Writing nss-config.1 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man setup-nsssysinit.xml Note: Writing setup-nsssysinit.1 + for m in nss-config.xml setup-nsssysinit.xml pkcs11.txt.xml + xmlto man pkcs11.txt.xml Note: Writing pkcs11.txt.5 + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/cert8.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/cert9.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/key3.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/key4.db.xml . + for m in /builddir/build/SOURCES/cert8.db.xml /builddir/build/SOURCES/cert9.db.xml /builddir/build/SOURCES/key3.db.xml /builddir/build/SOURCES/key4.db.xml /builddir/build/SOURCES/secmod.db.xml + cp /builddir/build/SOURCES/secmod.db.xml . + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man cert8.db.xml Note: Writing cert8.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man cert9.db.xml Note: Writing cert9.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man key3.db.xml Note: Writing key3.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man key4.db.xml Note: Writing key4.db.5 + for m in cert8.db.xml cert9.db.xml key3.db.xml key4.db.xml secmod.db.xml + xmlto man secmod.db.xml Note: Writing secmod.db.5 + exit 0 Executing(%install): /bin/sh -e /var/tmp/rpm-tmp.CAWLxL + umask 022 + cd /builddir/build/BUILD + '[' /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le '!=' / ']' + rm -rf /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le ++ dirname /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le + mkdir -p /builddir/build/BUILDROOT + mkdir /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le + cd nss-3.90 + /usr/bin/rm -rf /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3/templates + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/bin + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64 + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64/nss/unsupported-tools + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64/pkgconfig + mkdir -p /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man1 + mkdir -p /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man5 + touch /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/lib64/libnssckbi.so + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64/nss/libnssckbi.so + for file in libnss3.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64 + for file in libnss3.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64 + for file in libnss3.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64 + for file in libnss3.so libnsssysinit.so libsmime3.so libssl3.so + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64 + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//etc/pki/nssdb + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert8.db /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//etc/pki/nssdb/cert8.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key3.db /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//etc/pki/nssdb/key3.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-secmod.db /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//etc/pki/nssdb/secmod.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-cert9.db /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//etc/pki/nssdb/cert9.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/blank-key4.db /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//etc/pki/nssdb/key4.db + /usr/bin/install -p -m 644 /builddir/build/SOURCES/system-pkcs11.txt /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//etc/pki/nssdb/pkcs11.txt + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64 + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64 + for file in libcrmf.a libnssb.a libnssckfw.a + /usr/bin/install -p -m 644 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64 + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/certutil /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/cmsutil /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/crlutil /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/modutil /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/nss-policy-check /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/signver /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/bin + for file in certutil cmsutil crlutil modutil nss-policy-check pk12util signver ssltap + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/ssltap /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/bin + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/atob /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/btoa /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/derdump /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/listsuites /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/ocspclnt /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pp /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/selfserv /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/signtool /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/strsclnt /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/symkeyutil /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/tstclnt /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/vfyserv /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/vfychain /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64/nss/unsupported-tools + for file in atob btoa derdump listsuites ocspclnt pp selfserv signtool strsclnt symkeyutil tstclnt vfyserv vfychain validation + /usr/bin/install -p -m 755 dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/validation /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64/nss/unsupported-tools + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cert.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/certdb.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/certt.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmmf.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmmft.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cms.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmsreclist.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cmst.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/crmf.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/crmft.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cryptohi.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/cryptoht.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jar-ds.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jar.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/jarfile.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/key.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keyhi.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keyt.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/keythi.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nss.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssbase.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssbaset.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckbi.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckepv.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckft.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfw.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfwc.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckfwt.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckg.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckmdt.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/nssckt.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ocsp.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ocspt.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12plcy.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/p12t.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11func.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11hpke.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11pqg.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11priv.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11pub.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pk11sdr.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs12.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs12t.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/pkcs7t.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/preenc.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sechash.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmime.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmod.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secmodt.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secpkcs5.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/secpkcs7.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/smime.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/ssl.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslerr.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslexp.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslproto.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in 'dist/public/nss/*.h' + /usr/bin/install -p -m 644 dist/public/nss/sslt.h /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3 + for file in dist/private/nss/nssck.api + /usr/bin/install -p -m 644 dist/private/nss/nssck.api /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/include/nss3/templates + /usr/bin/install -p -m 644 ./dist/pkgconfig/nss.pc /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/lib64/pkgconfig/nss.pc + /usr/bin/install -p -m 755 ./dist/pkgconfig/nss-config /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/bin/nss-config + /usr/bin/install -p -m 755 ./dist/pkgconfig/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/bin/setup-nsssysinit.sh + ln -r -s -f /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/bin/setup-nsssysinit.sh /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le//usr/bin/setup-nsssysinit + for f in nss-config setup-nsssysinit + install -c -m 644 nss-config.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man1/nss-config.1 + for f in nss-config setup-nsssysinit + install -c -m 644 setup-nsssysinit.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man1/setup-nsssysinit.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/certutil.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man1/certutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/cmsutil.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man1/cmsutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/crlutil.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man1/crlutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/derdump.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man1/derdump.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/modutil.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man1/modutil.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/nss-policy-check.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man1/nss-policy-check.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/pk12util.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man1/pk12util.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/pp.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man1/pp.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/signtool.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man1/signtool.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/signver.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man1/signver.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/ssltap.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man1/ssltap.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/vfychain.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man1/vfychain.1 + for f in '""certutil' cmsutil crlutil derdump modutil nss-policy-check pk12util pp signtool signver ssltap vfychain 'vfyserv""' + install -c -m 644 ./dist/doc/nroff/vfyserv.1 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man1/vfyserv.1 + for f in pkcs11.txt + install -c -m 644 pkcs11.txt.5 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man5/pkcs11.txt.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 cert8.db.5 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man5/cert8.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 cert9.db.5 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man5/cert9.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 key3.db.5 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man5/key3.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 key4.db.5 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man5/key4.db.5 + for f in cert8.db cert9.db key3.db key4.db secmod.db + install -c -m 644 secmod.db.5 /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/share/man/man5/secmod.db.5 + /usr/bin/mkdir -p /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/etc/pki/nss-legacy + /usr/bin/install -p -m 644 /builddir/build/SOURCES/nss-rhel7.config /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/etc/pki/nss-legacy/nss-rhel7.config + /usr/lib/rpm/find-debuginfo.sh --strict-build-id -m --run-dwz --dwz-low-mem-die-limit 10000000 --dwz-max-die-limit 50000000 /builddir/build/BUILD/nss-3.90 extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/lib64/libsmime3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/lib64/libnss3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/lib64/libnsssysinit.so extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/lib64/nss/libnssckbi.so extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/lib64/nss/unsupported-tools/strsclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/lib64/nss/unsupported-tools/vfyserv extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/lib64/nss/unsupported-tools/selfserv extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/lib64/nss/unsupported-tools/vfychain extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/lib64/nss/unsupported-tools/signtool extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/lib64/nss/unsupported-tools/pp extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/lib64/nss/unsupported-tools/tstclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/lib64/nss/unsupported-tools/derdump extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/lib64/nss/unsupported-tools/symkeyutil extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/lib64/nss/unsupported-tools/btoa extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/lib64/nss/unsupported-tools/validation extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/lib64/nss/unsupported-tools/ocspclnt extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/lib64/nss/unsupported-tools/listsuites extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/lib64/nss/unsupported-tools/atob extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/lib64/libssl3.so extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/bin/ssltap extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/bin/modutil extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/bin/crlutil extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/bin/certutil extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/bin/nss-policy-check extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/bin/signver extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/bin/cmsutil extracting debug info from /builddir/build/BUILDROOT/nss-3.90.0-2.el7_9.ppc64le/usr/bin/pk12util /usr/lib/rpm/sepdebugcrcfix: Updated 27 CRC32s, 0 CRC32s did match. cpio: nss-3.90/nss/cmd/modutil/lex.Pk11Install_yy.cpp: Cannot stat: No such file or directory cpio: nss-3.90/nss/cmd/modutil/ytab.c: Cannot stat: No such file or directory 26752 blocks + /usr/lib/rpm/check-buildroot + /usr/lib/rpm/redhat/brp-compress + /usr/lib/rpm/redhat/brp-strip-static-archive /usr/bin/strip + /usr/lib/rpm/brp-python-bytecompile /usr/bin/python 1 + /usr/lib/rpm/redhat/brp-python-hardlink + /usr/lib/rpm/redhat/brp-java-repack-jars Executing(%check): /bin/sh -e /var/tmp/rpm-tmp.1iCAaz + umask 022 + cd /builddir/build/BUILD + cd nss-3.90 + '[' 0 -eq 1 ']' + export NSS_NO_SSL2=1 + NSS_NO_SSL2=1 + FREEBL_NO_DEPEND=1 + export FREEBL_NO_DEPEND + export BUILD_OPT=1 + BUILD_OPT=1 + USE_64=1 + export USE_64 + export NSS_BLTEST_NOT_AVAILABLE=1 + NSS_BLTEST_NOT_AVAILABLE=1 + export NSS_FORCE_FIPS=1 + NSS_FORCE_FIPS=1 + export 'NSS_FIPS_VERSION=nss\ 3.90.0-%{srpmhash}' + NSS_FIPS_VERSION='nss\ 3.90.0-%{srpmhash}' ++ sed -e 's/ /\\ /g' ++ sed -n 's/^\(\(NAME\|VERSION_ID\)=.*\)/OS_\1/p' /etc/os-release + eval 'OS_NAME="CentOS\' 'Linux"' 'OS_VERSION_ID="7"' ++ OS_NAME='CentOS\ Linux' ++ OS_VERSION_ID=7 + export 'FIPS_MODULE_OS=CentOS\ Linux\ 7' + FIPS_MODULE_OS='CentOS\ Linux\ 7' + export 'NSS_FIPS_MODULE_ID=CentOS\ Linux\ 7\ nss\ 3.90.0-%{srpmhash}' + NSS_FIPS_MODULE_ID='CentOS\ Linux\ 7\ nss\ 3.90.0-%{srpmhash}' + export SOFTOKEN_LIB_DIR=/usr/lib64 + SOFTOKEN_LIB_DIR=/usr/lib64 + export 'GTESTS=certhigh_gtest certdb_gtest der_gtest pk11_gtest softoken_gtest smime_gtest' + GTESTS='certhigh_gtest certdb_gtest der_gtest pk11_gtest softoken_gtest smime_gtest' + export GTESTFILTER=-TlsConnectTest.DisallowSSLv3HelloWithTLSv13Enabled + GTESTFILTER=-TlsConnectTest.DisallowSSLv3HelloWithTLSv13Enabled + export NSS_IGNORE_SYSTEM_POLICY=1 + NSS_IGNORE_SYSTEM_POLICY=1 + export NSS_SKIP_PWDECRYPT_TIME=true + NSS_SKIP_PWDECRYPT_TIME=true ++ find ./nss/tests ++ grep -c ' ' + SPACEISBAD=0 + : + '[' 0 -ne 0 ']' ++ perl -e 'print 9000 + int rand 1000' 9997 selfserv_9997 + MYRAND=9997 + echo 9997 + RANDSERV=selfserv_9997 + echo selfserv_9997 ++ ls -d ./dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin ./dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin + DISTBINDIR=./dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin + echo ./dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin ++ pwd ~/build/BUILD/nss-3.90 ~/build/BUILD/nss-3.90 + pushd /builddir/build/BUILD/nss-3.90 + cd ./dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin + ln -s selfserv selfserv_9997 ~/build/BUILD/nss-3.90 + popd + find ./nss/tests -type f + grep -v '\.db$' + grep -v '\.crl$' + grep -v '\.crt$' + grep -vw CVS + xargs -l perl -pi -e 's/\bselfserv\b/selfserv_9997/g' + xargs grep -lw selfserv + killall selfserv_9997 selfserv_9997: no process found + : + rm -rf ./tests_results ~/build/BUILD/nss-3.90/nss/tests ~/build/BUILD/nss-3.90 + pushd ./nss/tests/ + export NSS_DEFAULT_DB_TYPE=dbm + NSS_DEFAULT_DB_TYPE=dbm + export NSS_EXPECTED_TIME=8 + NSS_EXPECTED_TIME=8 ++ rpm -q nss-softokn + soft=nss-softokn-3.90.0-6.el7_9.ppc64le + soft_minor=90 + nss_soft=3.90.0 + nss_soft_minor=90 + export 'NSS_CYCLES=standard pkix upgradedb sharedb threadunsafe' + NSS_CYCLES='standard pkix upgradedb sharedb threadunsafe' + export 'NSS_TESTS=libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec %{do_gtests} %{do_ssl_gtests}' + NSS_TESTS='libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec %{do_gtests} %{do_ssl_gtests}' + export NSS_SSL_RUN= + NSS_SSL_RUN= + export NSS_SSL_TESTS= + NSS_SSL_TESTS= + '[' 90 -lt 90 ']' + HOST=localhost + DOMSUF=localdomain + PORT=9997 + ./all.sh ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 ../../coreconf/config.mk:151: CPU_ARCH is not x86_64, disabling -mavx2 testdir is /builddir/build/BUILD/nss-3.90/tests_results/security init.sh init: Creating /builddir/build/BUILD/nss-3.90/tests_results/security ******************************************** Platform: Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ Results: localhost.1 ******************************************** init.sh init: Testing PATH .:/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin:/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib:/bin:/usr/bin:/usr/sbin:/sbin:/usr/local/sbin:/builddir/.local/bin:/builddir/bin against LIB /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib: Running tests for cert TIMESTAMP cert BEGIN: Wed Oct 18 13:42:30 UTC 2023 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #79: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #80: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #81: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #82: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #84: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #85: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #86: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #108: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #109: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/clientCA-ec.ca.cert cert.sh: #110: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/clientCA-dsa.ca.cert cert.sh: #111: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #113: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #114: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/clientCA.ca.cert cert.sh: #115: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #116: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k cbbfa1d4a5f46022e34aa9c6e7507c3c72fb2074 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k 118b9321f4ceecb54430662f1aef1a2d57c0ce08 -s CN=orphan -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:21:fa:c0:b7:ca:22:fa:36:32:6c:27:ac:05:e6:c0: 46:07:03:db:fa:df:3f:e0:6b:37:fc:b1:c1:da:1e:9b: fe:f1:9b:d1:34:6b:97:72:dd:cc:51:bb:69:54:bf:53: 69:cd:b8:35:24:49:fb:6f:a7:d6:c1:68:88:b8:5e:ae: 37:07:f9:0c:fd:20:a7:28:67:1c:59:9c:d5:bd:f1:ad: 2d:20:ab:de:65:0f:c4:15:97:1c:3d:0d:84:8e:db:95: 44:1c:88:82:0f:e3:a1:e5:bb:96:bd:e4:b4:06:c1:60: bf:06:e6:4e:ae:ca:6f:48:4d:97:ba:58:1d:54:8a:b2: 20:88:d7:e5:3f:40:a0:21:69:4f:5a:94:2c:d8:e6:7d: 1d:54:03:2c:31:29:0d:f8:52:cd:ad:29:88:88:2b:43: b6:e6:33:fe:b9:1b:bc:75:47:8f:22:9f:64:18:9b:98: d9:5a:bd:eb:47:48:31:68:86:d0:79:4c:aa:53:56:be: d7:0c:93:48:30:ed:77:c2:da:0d:c7:8b:22:b6:e3:84: e7:3e:80:79:90:20:53:27:90:d0:87:08:b9:58:59:c1: 89:71:29:3d:2b:2f:76:cd:97:58:4d:41:9c:52:8f:82: b1:31:ac:89:25:77:ac:e0:5b:67:93:3b:4a:95:02:0b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:37:b8:f9:6b:2f:5e:a4:55:52:b5:b8:69:d0:21:5d: e5:4a:f0:13:fb:9d:e9:3d:53:95:66:b3:74:8c:0b:7e: af:da:62:a8:cc:f0:4d:c0:7b:c9:5c:d2:06:15:11:e7: 01:f3:27:1e:e8:6f:87:ea:9b:a8:82:fd:1a:16:ef:0b: 12:7c:f8:a3:8a:87:5c:b0:41:1b:5b:b5:ff:82:93:7f: 3a:55:b1:5a:1e:f0:01:7f:d7:06:be:c0:6e:57:32:56: f6:35:ea:97:11:dd:8d:f0:3d:a9:a4:04:5d:6d:54:b6: 6a:c9:5e:cc:e4:fd:68:d8:7e:1f:10:86:36:b0:ce:18: 21:d3:ea:e2:96:27:ae:f8:b6:3a:54:a1:54:da:39:cc: 20:f9:e8:8e:f9:da:15:92:78:d1:c3:fa:a2:56:d2:69: d8:93:d3:5b:de:ce:05:70:ec:be:18:53:d1:b2:e2:4b: a8:8a:b5:e6:10:d7:9c:1d:5e:29:3c:8a:7c:1a:1b:60: b8:68:f6:a9:14:2a:34:7e:6d:eb:be:98:fb:56:7b:b8: 8e:89:c4:49:9d:7f:d8:ec:40:ad:9d:11:f9:27:eb:51: 2a:fb:41:48:7d:fa:f5:5d:d3:0d:e9:ee:76:d9:80:fd: 57:cc:dd:ac:3b:4a:7f:0f:15:73:ac:2a:f3:a4:31:93 Fingerprint (SHA-256): 4D:1C:08:87:30:35:19:F7:42:F1:01:20:54:23:5E:12:31:24:7B:62:A6:03:34:11:9D:E1:9A:E5:2A:88:32:64 Fingerprint (SHA1): AB:00:2F:4F:FB:72:3E:7C:3C:54:DA:5D:09:3D:DD:8C:5E:E1:D6:7F cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips -f ../tests.fipspw cert.sh: #289: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #290: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #291: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Setting invalid database password in FIPS mode -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips -f ../tests.fipspw -@ ../tests.fipsbadpw Failed to change password. certutil: Could not set password for the slot: SEC_ERROR_INVALID_PASSWORD: Password entered is invalid. Please pick a different one. cert.sh: #292: Setting invalid database password in FIPS mode - PASSED cert.sh: Attempt to generate a key with exponent of 3 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #293: Attempt to generate a key with exponent of 3 (too small) - PASSED cert.sh: Attempt to generate a key with exponent of 17 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #294: Attempt to generate a key with exponent of 17 (too small) - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@example.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #295: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eccurves -f ../tests.pw cert.sh: #296: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #297: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #298: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw cert.sh: #308: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #309: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #310: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #311: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #312: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #313: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #314: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #315: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #316: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #317: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #318: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #319: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #320: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #321: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #322: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #323: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #324: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #325: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #326: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #327: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #328: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #329: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #330: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:ba:1b Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:52 2023 Not After : Thu Jan 18 13:42:52 2024 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:64:bf:ed:fe:c6:32:b9:be:d3:65:8b:21:54:c6:42: fd:83:d1:fc:25:c7:b0:e0:50:af:dd:e0:75:fe:fb:40: 5e:3e:60:86:a5:1b:9e:7d:1a:c9:44:3a:62:0b:7f:30: f6:cd:93:cc:27:5b:9a:6e:1d:cd:4a:81:b5:10:af:94: 18:6a:a6:f4:25:09:26:14:fb:6f:b6:2a:15:28:56:94: 13:1a:76:17:d9:55:1e:a2:6b:8b:48:ff:20:fc:cf:79: 70:3d:42:0d:c2:88:70:da:1a:86:06:f6:50:ad:8e:76: e2:0d:40:60:69:93:1d:91:22:79:cf:7a:67:ad:ad:d1: 76:4d:85:8b:57:d9:9f:87:ec:d2:7d:2c:ed:ba:e4:d7: 13:54:e0:3d:83:f8:e6:0a:31:b5:25:e5:c4:80:20:5a: 90:fa:9c:d0:06:0e:dc:76:09:1e:53:35:73:ba:be:d1: 78:e8:72:76:af:4c:cb:8a:cb:0c:f9:d1:cf:10:91:16: 74:5c:24:65:cd:37:d6:9a:54:98:38:00:29:81:fa:c0: 40:bf:48:18:14:70:45:ad:53:3c:56:cb:6d:07:74:d4: 42:66:d9:f1:39:f3:6c:bc:3f:d6:18:0b:ef:ee:4d:13: ac:24:c6:26:68:b5:b0:19:87:a9:36:3a:4b:45:35:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:9f:e6:e3:61:ad:2c:d0:c1:6a:ff:50:bd:dd:7f:bb: a0:7c:2b:bd:f3:84:34:95:ff:09:c0:31:84:fc:b1:aa: fa:3d:c5:b8:36:74:95:c2:71:12:a9:74:65:83:70:4e: a2:9c:76:12:f8:76:f6:e9:0f:f3:73:85:19:b3:af:9c: a5:cf:fc:1d:ab:ba:25:b3:9c:db:31:c1:e0:6f:af:15: 2b:61:f3:d1:fb:b1:3f:cb:99:2d:e0:da:d6:5d:53:a8: d0:f8:f8:cc:b3:a3:7a:e8:e4:f5:e4:87:b9:b6:9c:c8: a9:4f:07:54:35:56:6f:1c:c6:71:e1:08:01:28:0a:16: c3:5b:61:e3:e3:89:f3:5d:95:f9:52:59:b2:54:a8:16: ae:7c:40:58:f1:12:ca:05:03:d6:c9:1b:8e:e8:09:c8: 70:44:ab:d8:14:72:34:ee:ec:4e:fc:d7:aa:f4:fa:34: 29:7c:a5:11:4c:e4:1d:c1:ea:ce:45:92:3a:47:51:f4: fe:8f:83:d4:ab:c9:2a:7b:7c:36:8e:52:65:88:18:d0: 72:38:ea:fa:39:b5:36:f3:08:5d:49:9f:13:b9:8b:7e: 34:58:f3:b0:4f:a9:b0:39:69:3d:69:ac:96:e3:bb:d3: 9c:cc:0e:5c:78:57:4a:bc:3f:13:33:5e:f9:46:8f:ab Fingerprint (SHA-256): A6:AB:35:E4:3F:31:CD:B5:E0:CE:29:19:DF:65:21:B3:DA:4A:59:6C:95:C4:D3:0C:BD:3D:4B:B2:5D:7F:7E:24 Fingerprint (SHA1): 1A:55:D8:65:F6:68:F2:0A:79:2C:E7:0B:53:0A:48:B2:0E:2E:72:6F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:ba:1c Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:53 2023 Not After : Thu Jan 18 13:42:53 2024 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:1f:c9:32:6c:6e:47:da:1c:76:83:4f:82:ef:0b:12: 21:e4:46:b8:c7:ca:97:74:90:1e:be:89:b5:6c:6a:16: 16:bb:e8:4f:78:c1:c3:40:3a:3e:3b:60:68:3f:3d:14: b4:70:28:64:e1:d2:90:5b:76:b6:33:10:c9:70:99:bc: f1:51:45:75:de:31:2e:76:e4:43:b8:a1:47:c5:0f:b9: d9:bc:38:70:98:18:4d:c1:8d:7b:77:50:e2:69:15:46: d0:d6:c7:40:d5:ba:fd:2a:19:f0:93:be:7e:81:e3:cf: 3a:72:e0:8e:e3:34:f4:b8:4e:81:4b:fb:9e:cf:6f:be: bb:fe:09:49:ee:55:7b:db:f7:28:f0:b9:4b:21:9b:97: 53:18:d0:b9:a6:f1:56:08:c0:36:19:12:64:6b:bd:62: 53:58:ee:cb:7f:a5:a7:0b:95:2f:93:f2:1e:64:3d:17: 0d:79:d9:fa:9f:18:2b:3f:d1:83:d6:c8:41:80:a0:3a: a8:a8:a7:b4:10:5e:cf:73:76:4d:05:a4:59:56:e4:d6: fd:c7:0c:fc:94:fc:13:e2:7f:29:80:01:f3:83:f1:17: 32:ef:76:fa:1e:17:04:82:e9:cc:60:5e:bc:cc:c1:18: 20:43:42:48:68:06:3e:87:7f:29:ac:8e:d4:2a:b7:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ce:75:f2:10:50:1f:ab:8c:e1:73:50:8e:3e:03:c4:81: 4f:50:82:97:83:04:93:db:df:20:d4:00:0b:ac:fc:09: aa:50:8e:eb:bc:46:29:e3:70:97:ad:0d:34:ab:8b:ee: 6d:82:2b:9b:fd:de:19:49:c1:7f:6b:08:4b:c9:d3:96: 31:34:6e:0e:34:3c:ef:1b:b7:74:d2:3f:44:9f:11:1f: e6:39:9f:40:ef:bf:86:5f:31:d7:8c:df:74:50:76:cb: 5c:e1:ba:91:bd:8b:2a:29:04:3a:17:26:3b:da:82:9e: c5:dd:35:2a:0f:45:c0:2c:2b:a1:3a:9d:3c:c0:78:6d: 7b:1d:ae:d4:fd:0d:e1:1a:c4:bb:ba:9e:bf:c9:9f:f7: 27:47:b5:8d:89:2e:27:a4:de:cc:00:37:82:41:23:33: ed:e3:30:14:38:50:00:34:d9:e5:56:aa:73:18:e8:24: 44:96:75:b1:c7:67:1e:de:14:53:a8:ad:18:a7:62:e7: 9d:24:ed:f6:3c:2d:0e:37:2f:a6:97:fc:85:f5:64:1c: 25:bb:07:e9:41:92:27:16:3f:3f:a9:da:32:77:3e:3c: ef:5f:d3:09:ad:22:fa:26:11:a5:e8:ef:2c:7f:77:1e: 07:f3:cd:9a:03:0a:1c:72:8d:82:ec:12:53:a5:6a:fe Fingerprint (SHA-256): F2:88:B2:9F:1E:84:11:BA:C1:70:C1:39:51:73:9C:8D:07:F8:C5:89:C2:A1:E7:1C:11:B9:C6:BA:45:55:E4:80 Fingerprint (SHA1): 38:D3:7B:75:88:EF:0F:DF:68:5D:1B:82:1C:03:87:FD:C8:C5:7B:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:ba:1d Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:54 2023 Not After : Thu Jan 18 13:42:54 2024 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:8b:88:51:00:09:67:76:f5:c7:a3:af:26:ce:78:86: 0e:62:04:0b:67:bf:44:a3:ec:19:55:a2:39:c1:db:b6: 57:3a:12:71:7b:59:fb:0e:14:d2:f5:47:55:3a:dd:cd: 41:a3:97:d5:43:89:c1:d1:91:4c:39:34:f1:b1:07:39: 22:f7:66:33:28:7e:07:20:cc:43:49:8a:66:3c:87:0e: 44:24:af:34:b7:2d:60:9e:f6:f1:b1:e2:c3:f9:7a:95: e4:c1:30:9b:8f:6a:30:9c:95:72:f7:cb:32:41:95:65: ea:9d:2b:bf:c4:d0:a8:5e:58:90:5c:0d:f2:3d:b3:18: 55:95:f8:a1:2a:57:43:81:0b:50:fc:8d:99:ca:89:b8: 72:f6:2e:2f:44:8c:4a:32:ee:5f:8e:34:31:b0:c7:c5: 4f:cc:a2:82:b1:82:fa:14:7f:6a:91:8c:19:2e:cf:06: 4a:c6:02:25:69:11:66:92:24:26:29:c1:7e:03:a0:82: 56:3f:82:10:28:66:d9:b2:f3:d3:3a:84:05:dc:ab:cb: 5a:4c:06:7c:8f:eb:1c:49:c3:65:28:f6:1c:00:c3:83: 4a:40:18:56:91:9b:7b:ed:a1:c0:f5:7a:b7:7f:cb:33: 74:5a:39:f8:1b:cf:db:93:aa:5b:cd:45:51:de:92:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 04:1d:9a:58:d5:3d:94:6b:8b:0e:a6:06:97:b4:8a:3f: b5:9a:26:04:df:a0:9b:b8:c9:03:d6:91:d7:44:db:c1: c5:e8:53:15:11:1a:e5:f0:a1:dc:e5:13:b5:0d:5c:8d: 97:79:fe:b2:0a:22:b4:9b:9b:ac:79:b2:40:51:0a:14: a3:f6:ca:82:99:8d:3d:c6:0d:c0:4c:8e:9b:5b:cc:91: ad:fc:38:b0:10:54:5a:9e:3e:76:6c:a5:4f:07:b9:e6: 35:10:ce:42:84:c1:2a:97:6c:67:f8:e5:bc:55:3a:50: 78:27:9c:5e:df:4c:93:62:d4:6f:62:04:02:dc:35:41: b4:60:35:81:f8:c9:4c:ad:ed:3a:ef:ca:51:d9:76:1e: 0f:1f:62:bb:44:55:36:07:71:8b:14:e4:34:6a:e9:5f: 65:a0:be:18:7a:7d:38:88:2a:cb:d6:8a:c0:b6:57:15: e0:bd:b6:78:2f:c7:64:4a:de:04:ed:81:e8:3e:1a:62: c7:fa:2e:f6:43:0d:75:af:fc:bf:2c:c8:45:18:55:67: f1:80:d8:60:49:c6:05:bf:75:72:e6:23:66:7a:a2:6f: 31:e0:a5:74:dc:e3:59:64:b8:27:e0:20:cc:9c:89:50: 69:d9:35:37:c0:26:61:73:e1:40:c5:38:c3:d2:9c:13 Fingerprint (SHA-256): AA:87:A6:30:E2:9E:B5:3D:83:3A:B1:DB:28:3C:2A:AD:B8:47:33:8F:A2:BA:4F:FF:56:08:2C:2B:7A:95:04:F2 Fingerprint (SHA1): FE:8E:7A:CC:21:2C:11:5B:78:89:47:3A:3E:C3:AD:1A:67:FA:3E:48 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:ba:1e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:54 2023 Not After : Thu Jan 18 13:42:54 2024 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e1:ae:b0:66:1e:14:48:2c:92:67:ba:cc:86:fc:85:0f: a8:43:34:a3:aa:ed:5e:2a:fe:bc:86:96:9b:a6:38:ce: 0e:6b:26:97:07:0d:92:34:e5:b7:1f:39:aa:dc:de:b4: c6:de:46:07:8a:c1:b7:c6:dd:1d:62:96:7c:7f:12:0b: 35:5e:21:88:05:da:60:6c:dc:87:d1:0d:fa:5f:d0:9c: 0c:2b:9b:b5:03:fe:64:d2:b3:68:b6:b5:83:2b:68:ba: ad:53:f9:23:44:fb:17:7b:2d:9d:9a:4e:5a:76:a3:63: e4:ba:cf:a7:95:35:8f:b5:f3:4b:05:a3:f2:47:c6:ad: de:9b:46:04:e8:8d:e7:93:01:01:e0:3a:d1:e9:13:9b: 3a:29:33:e7:a5:0b:d6:9b:a3:bc:1b:53:b8:a6:9f:c4: 64:b3:3b:87:d4:70:6d:55:e4:40:b1:33:82:c7:c7:10: fa:09:1e:82:50:dd:9e:b0:d7:51:d2:e7:cd:9a:60:e3: 3a:1b:45:9c:dc:4f:40:65:a3:56:67:a0:36:51:bd:16: ee:26:e6:82:52:06:4c:84:de:e6:8e:89:22:3e:60:19: f2:e2:2f:8a:18:68:6c:a1:92:b0:af:b6:0f:c6:db:14: 53:2c:79:a8:31:b1:ca:32:00:c6:a4:12:6a:0b:81:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: da:e9:42:92:70:a8:27:6f:15:a7:ea:1a:ed:26:bd:47: dc:7d:81:38:21:b6:63:0e:3d:dd:67:6a:46:23:19:a7: b7:3c:c1:69:ab:ac:bc:19:c6:02:9a:36:1d:a4:76:38: a1:cb:35:a7:6e:00:73:4d:54:1f:28:a8:3e:04:33:a2: 99:8e:a6:61:e4:e7:29:fa:be:fc:8b:41:07:47:2c:f3: 0d:9d:97:77:ec:67:54:20:b6:7e:be:eb:28:ec:f2:17: 5f:a2:d3:ee:41:c2:56:40:e1:50:1a:b9:84:8d:55:5b: 4c:5b:92:23:16:6f:68:fe:20:77:09:eb:61:d6:2a:be: f3:ea:e8:7b:9e:96:1c:3c:72:2e:fb:44:2e:f2:bb:ff: 57:6e:f0:b6:b4:bf:5e:03:c6:a4:3f:8c:68:2e:77:a1: ae:68:e1:c6:8b:39:8f:0f:ae:49:0b:a4:90:88:14:bc: ce:70:bf:56:c8:e3:dd:de:05:40:c9:d8:21:6b:80:ad: 5c:04:d4:95:9a:2a:3b:31:73:8a:0f:b5:fc:dc:4d:af: 9a:e2:1a:a2:8a:df:9f:63:8a:e3:e9:ec:ca:9c:a7:a3: 60:f2:0b:28:19:aa:0c:3d:c6:9e:4f:9a:5f:5a:45:32: 91:f5:5a:34:44:62:60:10:2f:6d:78:85:c5:bc:ec:8e Fingerprint (SHA-256): 38:E0:FE:0B:3A:FC:7A:BA:23:AB:17:D8:29:7B:30:07:95:84:85:6C:2F:17:D7:E7:33:9F:54:5B:64:B4:79:35 Fingerprint (SHA1): 51:2A:86:30:D8:16:02:17:AA:33:55:AC:4B:90:11:DD:39:7E:A8:39 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:ba:1f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:54 2023 Not After : Thu Jan 18 13:42:54 2024 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:ad:95:69:8d:ac:32:bf:d8:88:eb:c1:b0:ea:57:f7: 33:bc:cb:a0:1b:09:a9:e7:db:fb:c5:82:4f:4e:a9:6b: 5c:17:e6:f0:3a:0c:b3:17:f3:ec:85:17:65:77:d8:6d: 08:93:54:04:20:8a:1e:b0:82:f8:4f:f6:fe:10:2f:e7: 51:40:90:5d:ab:c2:f0:be:de:a5:fe:53:16:d0:b0:74: 50:f3:7f:f5:7f:0a:e8:27:95:62:41:dc:0c:15:79:e5: f4:33:cc:2b:83:4d:b4:04:54:89:04:1f:b7:37:d1:c3: 13:b4:4b:e8:6b:d4:fa:f7:4b:64:1f:b7:0e:63:3c:27: 6d:bb:64:33:57:19:bc:4a:49:92:31:64:c2:bd:16:06: 28:d2:b3:b8:74:b1:09:e8:04:f2:81:84:ba:e5:d6:a7: 53:b3:bd:fa:6d:f3:e1:e9:77:4a:8e:29:54:cc:82:2f: 09:a0:25:e7:1c:d2:70:c6:08:db:35:4f:ab:6c:2b:c5: 0b:1b:e3:64:45:79:49:fa:46:20:92:6f:50:e9:d1:ce: 7a:35:a9:b9:83:b2:da:76:cc:d8:e1:47:5a:b2:53:76: 42:9c:34:65:42:24:66:5b:ef:96:e1:46:1c:2c:bd:8c: d1:8c:0c:bb:bb:57:87:2d:50:43:9b:84:bd:ed:74:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 83:89:c5:2e:25:b5:4b:a1:fa:66:11:17:b6:b4:d9:15: b2:f7:20:f8:f7:60:ed:57:5f:ab:af:1b:31:f4:c9:4d: fc:13:91:30:12:ed:6b:ef:fc:41:62:30:a0:fa:4d:4a: f9:e8:17:b4:91:d0:74:14:0e:c7:ac:9d:68:59:af:f1: ca:99:39:6a:a6:2b:e5:15:fa:f3:24:88:56:f5:1b:98: 16:7d:48:fe:b1:d8:99:0d:0c:ef:32:55:14:cf:a6:42: be:ef:ef:57:af:ec:05:cd:2a:02:3f:05:c0:23:8e:25: 81:4f:45:61:d0:d4:60:6e:98:75:d8:fa:90:3c:00:08: 2d:22:b8:87:9f:08:06:2f:be:33:f9:81:0e:09:b8:0a: 5d:26:60:df:71:63:d0:5e:1a:b2:43:7f:ad:e9:71:02: 0f:37:20:e3:a1:c0:af:10:d8:10:8f:44:37:73:f3:83: a8:20:06:c1:74:b7:ee:5e:95:35:c1:f1:2e:83:ec:0b: cf:52:ee:79:d6:fb:0c:6a:9d:17:22:09:a0:52:95:f8: 7b:61:ba:a3:65:de:9d:6f:40:e9:68:3c:ea:a6:03:ef: 0e:bd:83:0a:8b:5f:25:dc:a4:4f:c2:4c:41:a5:92:68: 12:58:f5:9c:e6:a9:29:e6:5e:fa:77:e5:53:11:6a:fa Fingerprint (SHA-256): 48:BF:8E:AD:84:A1:00:27:5C:DA:CB:A4:A1:CA:3C:26:CA:89:5D:47:66:2E:74:F3:CA:63:EC:0C:88:23:99:31 Fingerprint (SHA1): B6:C3:FA:21:C4:F6:C2:DA:BA:EE:60:E9:53:4D:9F:F7:34:72:67:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:ba:1f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:55 2023 Not After : Thu Jan 18 13:42:55 2024 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f7:8a:da:13:31:78:d1:8a:bf:ec:3c:db:39:9d:2f:7e: 95:9b:ee:8c:d7:e9:f6:98:c6:12:cc:cf:a0:52:c9:b9: a4:54:45:3b:ce:1b:93:11:72:1f:ae:aa:55:53:20:51: 89:1c:11:63:63:f6:2f:c4:94:fd:cb:a5:e1:9d:11:54: 3a:6e:83:bc:3c:10:01:36:22:10:ae:7b:0c:8b:3e:74: e4:29:96:67:43:33:fa:12:12:80:6c:a7:6c:67:60:a2: 0c:12:ed:2d:7e:ef:c6:5a:c2:32:5e:17:73:0b:67:36: 25:98:d0:b0:c8:d2:41:5f:9e:c5:1e:b9:65:aa:61:cd: a1:3d:8a:0a:71:d0:85:8c:48:44:90:21:fa:95:f8:05: 53:74:0c:26:60:6d:15:33:d3:42:e7:db:e3:0c:7c:50: 8d:3e:df:65:16:38:67:71:30:11:02:b2:fe:cd:fd:17: 14:ad:38:ef:75:a5:f0:6c:b2:e2:f5:d1:56:fe:6f:e7: 52:7a:16:5d:86:16:b0:1b:49:d0:33:d3:bf:fc:d7:20: bb:2d:7d:f1:c2:da:d1:12:89:a5:73:cb:65:9b:18:78: 4e:39:fd:e2:61:3c:99:a7:6e:1d:4b:61:52:10:ed:fd: 65:f2:35:16:b7:ac:a3:86:ad:67:fc:29:9f:b1:9d:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 88:96:3a:45:ea:d5:06:c7:51:22:46:62:58:6a:99:37: 7c:42:fd:68:01:03:98:f9:4d:85:1e:70:63:5f:22:fc: be:b1:e6:af:eb:4a:6c:90:4c:cf:29:88:9f:16:a6:30: 08:cb:b0:b5:7c:8d:67:4f:92:57:a9:b0:04:80:50:85: 42:24:24:de:2a:42:3a:ab:03:c8:33:42:5b:85:91:92: fd:8f:4c:ee:7c:7b:e5:56:43:77:a0:b8:d4:35:cd:ef: 43:eb:99:7d:be:5b:2b:f7:a9:64:90:96:f2:61:fe:45: 19:4f:95:d1:52:b2:04:85:f9:c0:90:b0:08:ec:f3:4a: c0:c7:c6:46:e5:c9:c4:81:39:9b:b1:09:68:24:61:96: ed:49:6b:df:2b:27:a4:47:db:ff:c9:23:59:4f:87:52: 38:76:3b:38:c0:07:48:59:cc:f7:f1:78:1d:a7:3c:86: d0:87:67:f8:fa:f7:c1:d9:49:05:6e:67:f8:b1:c8:38: da:03:04:5a:33:b7:6d:93:c6:62:3c:61:af:01:f1:19: 98:76:7d:e3:87:23:25:26:08:b8:1c:d6:ea:d5:c0:45: 55:fa:af:75:84:0f:86:bb:ba:3d:85:47:9e:41:4f:c4: 36:fc:2c:d2:2f:62:73:5e:3d:12:8d:16:4b:c4:d3:72 Fingerprint (SHA-256): 70:6D:A6:FB:E1:74:47:88:25:29:E6:E7:85:7F:73:01:74:20:DA:F3:E9:A0:93:1F:C7:EC:6F:55:B3:D1:AE:54 Fingerprint (SHA1): DB:3E:7B:5F:7E:6F:E3:95:8A:97:CD:23:C7:87:EC:83:7E:D9:F0:F8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:ba:22 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:56 2023 Not After : Thu Jan 18 13:42:56 2024 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:15:ca:c5:d9:fb:2e:93:f6:ef:79:90:e3:6e:71:6f: 1c:9f:dc:b8:08:55:f7:08:c8:bf:73:03:97:9f:6c:ea: e4:92:05:ac:79:fa:59:8c:be:b4:12:15:d9:28:70:80: ee:54:e2:3d:6f:1b:23:1e:9d:3b:d1:6e:9d:c0:2d:d1: 40:0d:48:36:82:b8:34:07:ac:56:96:be:8f:88:f8:b6: fb:44:c2:e3:eb:db:80:d9:d2:08:bc:0d:91:75:70:a3: 47:0e:0e:b2:03:0f:b7:a9:bf:ac:01:a1:7c:2d:60:8f: 88:1b:69:3f:36:06:bb:be:9a:8b:c7:e2:57:37:81:53: 42:f9:e5:0d:19:76:62:f7:99:84:4d:d6:67:53:95:f7: e6:7d:1a:f5:c1:c7:b8:61:49:2a:81:fd:36:ab:2a:1f: ef:be:26:00:ef:e7:31:8f:c0:2a:e8:b5:b6:e5:f4:f3: c6:a5:9d:2e:91:11:0c:8c:9d:07:4e:35:f4:df:c1:21: 11:3b:90:d1:85:a2:54:0a:cd:76:2a:e8:10:fb:ad:c1: d2:1e:44:b4:0a:49:8d:de:a3:4c:2a:64:d0:15:cb:24: 58:ec:81:da:65:55:80:4f:5c:71:ce:f0:6e:75:fd:53: cf:20:d0:71:4d:38:e0:00:04:52:f0:9d:d5:2e:77:cb Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:6c:a4:5d:48:fe:6e:53:de:ac:e5:a4:58:e3:c8:87: d5:1a:d5:85:b9:ed:a6:5a:92:ad:78:0f:74:04:3c:2f: 00:49:2a:af:6d:e9:c3:a1:b0:f1:8e:88:4d:f2:f5:42: e4:fc:4f:c5:9a:89:75:b1:7b:b4:e2:d8:f8:7e:db:98: 46:74:97:91:3c:da:34:b5:6a:c9:29:62:c6:34:e4:e0: df:b5:2f:b1:c7:21:4d:53:b3:1c:67:9e:80:5f:14:a0: 5c:26:12:f0:9c:4f:6a:ab:59:f0:a7:d2:3c:e9:fb:d1: d2:2c:8a:39:cc:6f:52:c8:96:1c:95:a2:7d:0b:b0:63: ff:dd:0b:d9:e1:3c:7f:2d:73:67:60:e7:e7:e9:92:d4: 50:36:44:c4:98:31:a2:de:a3:d0:6f:e4:98:c5:34:8a: 57:be:85:cb:d2:f0:7d:66:0f:0b:c9:ec:8e:ae:01:da: 25:2c:d0:c4:bc:c7:50:2a:e4:88:ba:40:ac:e4:42:00: 5e:68:86:96:e7:fa:81:73:99:9a:c9:9d:b0:97:62:66: f9:d8:0f:8c:e7:d0:d0:bb:ef:9d:4c:b6:d4:f8:51:7a: 16:e3:41:35:9e:98:99:cc:de:26:22:1f:a3:c3:8e:32: a6:fc:c4:39:ec:48:c5:8f:24:c5:e8:02:1d:fc:02:9e Fingerprint (SHA-256): E2:92:17:80:B2:69:34:DE:45:1F:A0:13:9F:C0:6C:8D:B4:2C:98:E8:CE:CF:0F:1D:3D:FE:4D:0E:22:A7:7D:7D Fingerprint (SHA1): A7:51:63:4E:F6:B4:47:59:C2:FD:D9:8B:1F:AD:F4:C6:6E:1D:28:01 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #337: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:ba:22 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:56 2023 Not After : Thu Jan 18 13:42:56 2024 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:91:d0:77:c8:89:97:ec:e3:54:0e:5d:3f:9d:dc:8d: 3f:30:7c:56:f0:da:99:01:6a:98:70:0f:23:c1:1e:3f: d8:c7:2f:29:fc:ac:b5:97:b4:ae:a3:f5:6f:09:fe:d2: 1a:87:d2:f7:84:cf:f9:84:cc:ec:1c:1e:29:1b:74:7e: e4:23:32:a5:0f:bf:01:1d:97:9e:4c:b8:2e:af:15:89: ef:c9:45:87:1f:a8:fa:98:a5:13:23:95:8f:38:df:f8: e3:b4:7b:1f:3c:f2:ff:3d:99:0d:e3:6d:26:f3:e5:0b: fa:0e:af:e6:da:c6:2d:87:5b:36:e0:4e:48:22:33:a9: 20:f8:60:b4:19:67:f0:9c:a4:96:72:ea:46:3f:76:25: 69:3e:23:3b:47:28:d1:e5:be:8e:47:fa:fd:bf:0d:49: 61:c4:48:36:26:b9:bf:58:08:bc:46:e8:0d:0b:a8:b5: 2d:1f:86:39:2a:9f:66:ea:69:c4:63:92:89:7d:c3:13: 27:ab:a7:dc:ef:bd:eb:0f:d8:5e:b4:9b:8b:52:9f:d6: 64:40:6e:4c:a9:53:a6:c7:e8:72:99:57:2f:92:0d:35: 2d:22:ef:15:b6:a7:e2:e3:95:31:a4:3e:ae:43:1a:15: 63:df:7b:ed:af:0a:57:23:e1:e0:bb:ad:9d:dd:bf:bf Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:ed:1f:ad:cd:1b:34:e1:84:6d:f6:6a:e5:9a:1e:33: c0:05:e3:2c:0e:c6:fa:e7:bc:72:c9:b0:9f:02:3f:87: 65:96:85:cd:d1:95:3b:e4:5f:c7:14:9c:22:d2:b3:87: b2:08:27:5b:e5:49:d0:f6:11:f4:21:ee:bb:bb:a6:c8: 75:fd:3b:eb:14:ce:bf:3b:f2:3b:9b:f8:42:3a:28:4e: 87:d8:e7:e4:a6:f9:a8:c8:49:94:76:c5:c3:88:ef:7e: c7:ea:06:8e:6e:60:a6:c4:5a:ec:52:6d:a2:de:67:29: 64:5d:f8:4e:e3:98:bc:d2:91:12:64:e4:52:10:fe:df: 64:29:fc:1f:9a:75:b4:21:0c:a1:d5:3f:e5:82:80:a1: a3:fd:11:85:1d:dd:a2:1a:89:fd:07:3f:6b:cb:0f:ef: 69:5f:2c:d4:53:60:88:00:83:13:99:63:25:4c:59:56: bb:2b:43:68:dd:66:30:0e:33:85:09:b1:2a:d9:25:6e: fd:1c:2d:d0:c7:38:86:5b:67:7f:da:46:8b:b3:00:d6: 12:2f:7d:0d:ea:5d:cb:7a:b4:cd:5a:61:56:98:12:af: 6e:0f:fc:06:45:50:99:9a:67:5b:8f:58:ec:36:a3:4f: f8:37:31:bc:9a:ce:71:5f:7d:14:d2:b9:4f:1e:43:99 Fingerprint (SHA-256): 82:EE:8E:BF:43:B1:DE:3E:1D:0D:84:05:B8:52:F2:A8:67:54:AC:52:CD:24:0D:C4:CE:2B:00:0C:F7:04:38:3D Fingerprint (SHA1): B9:ED:37:87:97:8A:60:8F:47:46:B9:A6:B1:0D:C7:F9:36:41:A5:23 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #338: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:ba:23 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:57 2023 Not After : Thu Jan 18 13:42:57 2024 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:d2:56:27:76:f5:62:ad:52:7e:99:48:00:d4:c9:0e: bd:e9:3d:b2:b2:2d:ed:d5:c5:a8:b7:af:89:be:0f:a4: d1:96:f2:00:93:ae:e2:19:b2:7b:e5:0d:6b:35:cf:b9: 99:02:69:ab:df:66:79:d5:db:66:6a:0b:ff:b8:b1:17: d6:a4:9e:1c:6c:10:df:0f:1c:44:6d:e9:ab:32:eb:79: aa:90:60:5a:6b:f1:34:b7:9e:f9:84:32:fa:d7:1e:f5: da:c5:d8:86:06:31:26:90:1e:7d:ca:5b:e4:d1:8e:0e: 58:3f:d9:71:07:3e:20:28:3b:09:55:c2:06:7b:7a:47: 08:d9:36:e6:d2:cc:79:5d:29:15:96:f2:fc:19:e6:9e: 30:bc:ff:0c:e8:c2:17:11:1c:4d:39:0d:87:82:f1:3d: 96:8e:a9:20:67:e5:ff:d3:2b:20:f4:ce:1b:eb:61:0d: d8:2d:d0:13:41:82:59:aa:15:89:2a:09:6a:01:0d:97: 6c:63:9f:c8:6c:e0:8a:24:a4:63:48:91:21:a6:98:55: d8:28:4e:c1:e7:66:be:6e:cc:21:29:da:b8:16:37:1e: 4b:75:aa:0c:67:3c:bd:1d:49:63:c3:0b:3b:5d:28:fe: 5d:50:23:0c:42:80:4f:af:8b:ba:68:7f:d5:f4:f7:d5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:e4:2b:88:b4:bd:3f:45:fa:65:7e:c1:ba:80:1d:09: a1:d1:d9:c6:8d:07:6b:11:59:9a:d9:2e:04:a9:9a:32: 26:fa:89:b5:22:a4:68:a1:cf:88:41:da:f6:07:11:87: d9:79:a1:fb:20:11:3a:24:f2:4b:7a:70:25:f8:dc:8b: ca:70:2d:bb:47:93:73:3d:10:c2:df:97:ba:44:60:ee: b9:44:4f:a7:6f:f3:34:1e:4f:75:31:f9:08:8a:83:08: 2c:4e:3b:01:7f:1b:8a:40:e8:32:cf:83:4f:81:6c:11: 17:6e:7b:a2:88:21:cc:31:05:63:5e:9c:4b:ed:e7:27: 51:0d:01:f9:29:1a:6c:71:e5:0d:dd:6d:bd:fa:e0:7e: 07:f7:4c:4f:9e:eb:41:01:08:f5:1c:2e:b4:c6:d1:e8: 7c:95:80:40:ed:83:61:0c:23:7e:53:8d:e8:69:1e:a6: 99:3c:6b:7b:66:41:e7:d0:7f:6d:79:eb:95:e6:c9:97: 07:27:ab:87:d7:06:7b:9b:c9:2b:c4:e4:0a:da:cf:a6: 44:02:39:ad:f5:ee:c2:a9:3b:39:a8:e7:2d:6f:fe:ed: 63:73:0e:78:02:1c:5d:40:62:72:a7:4a:bb:42:06:94: 22:59:75:d2:bc:8a:d7:e9:a2:d3:de:5d:80:ee:80:91 Fingerprint (SHA-256): 1C:D7:79:33:DD:C1:60:F9:0B:BC:A6:9B:DA:76:A1:F3:21:0D:47:D0:96:AF:A6:43:56:94:22:6E:3E:DB:96:CB Fingerprint (SHA1): 0F:A7:6C:6A:B6:18:8E:9D:EA:BB:D6:F1:E1:57:68:2E:77:D4:23:A6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #339: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:ba:24 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:57 2023 Not After : Thu Jan 18 13:42:57 2024 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:57:4a:67:98:87:bc:7f:e6:39:58:97:51:1c:5e:4c: 01:57:c7:dd:00:4e:1f:61:c4:7c:2b:3b:d7:30:74:33: 1b:58:7a:2e:86:78:67:73:23:b0:36:1e:c7:a3:82:c8: 1c:b1:bc:cf:40:08:66:67:57:bf:bb:0c:2e:a3:29:0c: 00:1c:d2:6f:bd:c9:13:b0:e6:69:53:c4:60:61:b6:79: 3d:e3:54:16:c3:89:4f:e8:a3:3c:ed:be:43:d0:94:8f: 1a:51:f4:23:e7:a2:ab:a8:52:1d:3f:37:f1:fb:df:5c: 2a:a9:71:72:75:84:0e:39:48:f6:69:4c:d7:be:c8:ca: eb:1d:a0:e9:7c:e1:7e:44:7f:ba:8d:a8:2f:c1:cd:aa: 17:ac:21:ff:68:02:ff:cd:ad:70:12:be:b4:16:21:9c: c0:cf:6d:e3:73:77:79:aa:c2:7f:40:fe:a4:73:05:f2: f8:0d:76:de:d5:5d:0d:b7:ce:5b:9d:06:fd:b5:89:d1: c9:59:a6:c3:05:00:a0:a2:8e:d8:f4:c4:57:c8:d0:58: fa:fa:92:18:a5:25:17:f5:b2:7d:82:e6:a7:52:ad:d3: 80:44:63:d7:e1:d4:f3:da:df:0b:e0:6c:8f:4b:0e:5c: 5d:9a:8b:11:f6:f5:9b:5c:cd:21:17:c7:d9:ca:45:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:19:aa:8d:38:70:5c:16:eb:4a:21:e6:4c:ee:7d:9c: 36:1f:46:0c:f9:68:14:cb:e4:86:5d:3b:6e:79:0d:3a: af:2f:02:1d:e0:9d:cb:28:88:0c:5f:d4:18:fe:ad:f7: 12:7b:fe:1e:05:28:56:38:c5:39:25:f1:1c:af:1c:c0: f0:04:aa:9c:f7:41:0e:f6:2c:69:2a:c1:89:09:dc:5a: a9:d8:a4:21:4d:f5:8b:26:b6:25:9d:56:8a:01:2d:91: 31:26:38:79:7a:19:35:ac:16:22:97:af:30:0a:82:63: 1e:72:d5:56:a2:cf:af:bc:e6:cc:b9:07:12:af:9f:ea: 08:f0:8f:2e:82:28:17:87:e7:83:f9:ce:11:0f:05:36: 6e:96:32:16:91:51:cd:4d:b8:90:56:47:2d:04:23:01: 4c:e9:1a:9c:68:b1:51:90:20:2d:c8:ef:53:9e:b5:9f: 9a:a2:08:16:bb:52:10:10:03:09:ed:be:94:68:fe:d4: 57:9c:9c:bd:ee:7d:7f:08:c8:30:ed:b0:bd:ae:cf:99: 0e:8d:0d:a8:28:4e:ff:8f:d8:d7:c3:ad:10:7f:9b:88: ee:a1:13:ca:64:54:ce:fd:47:e1:2f:92:3e:7c:82:4c: 10:23:a8:9e:a9:b9:0c:df:32:e5:d2:5a:dd:6d:bd:e2 Fingerprint (SHA-256): 23:B3:87:FE:5C:67:3D:46:CA:52:0C:7A:FD:ED:0A:B3:88:C0:09:BB:03:73:70:5E:84:AE:98:B1:CE:4A:9F:26 Fingerprint (SHA1): C8:E4:60:B2:1B:DC:C2:AC:9F:17:E9:B1:CE:2E:BC:43:40:69:67:2D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:ba:24 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Wed Oct 18 13:42:57 2023 Not After : Thu Jan 18 13:42:57 2024 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:19:65:23:e4:3d:c7:7b:89:da:b1:57:a5:c3:20:5b: 3b:14:7a:cd:f8:21:89:43:52:d1:b1:02:83:0a:a6:69: 7f:07:d0:c2:92:57:ee:fc:0d:29:c2:13:39:89:2f:48: 38:d0:bf:02:2c:f0:d7:53:fc:d1:8b:c0:7f:b0:84:5c: 11:e2:29:8e:5e:50:3d:44:24:ae:b8:ee:0a:8b:b3:b5: 3e:f3:85:e9:81:b0:a4:56:49:19:76:cc:77:05:56:91: 3e:a4:79:de:c8:64:45:0d:7b:cf:b6:f8:b5:28:5d:69: b6:f5:05:d5:e2:b7:bf:e0:82:68:ed:15:9e:63:6e:9b: e0:92:4a:9d:70:fd:05:75:dc:5b:e5:e6:33:6c:93:12: 1c:8e:3a:78:a9:ba:b1:b5:e9:bc:20:fd:4c:59:be:1a: 53:77:1e:b5:7a:7c:11:a5:41:a6:1b:0e:39:5f:8f:12: d7:db:15:40:46:b0:ae:fa:ef:91:5e:37:37:c2:3f:f3: 1c:9a:e8:8a:af:91:62:4f:01:60:04:a2:76:cd:43:bf: 1e:1f:a1:88:01:2a:27:c5:15:b7:27:07:f3:c8:95:b5: 38:38:35:ee:54:a0:35:e2:a0:d2:f5:5e:03:c6:6f:14: 44:6a:ed:76:90:e8:c0:be:ff:03:4d:c0:a1:37:e9:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:00:05:d5:45:77:78:d7:41:5c:4f:70:dc:dc:29:4a: f9:57:87:13:fe:96:89:c2:9a:b3:45:09:73:e8:4c:32: ad:e0:9d:d2:7c:5b:0f:76:30:be:c5:e3:e4:a0:62:a7: fc:a2:35:ed:99:ff:52:2a:4b:0e:c7:b5:ab:30:ae:7d: 2d:53:b1:89:26:7d:d5:5c:35:15:f2:9c:b1:6b:22:1a: 07:c0:b7:a2:a7:4b:d9:10:44:e7:cc:8a:10:45:81:9a: 01:e3:a5:01:32:ce:76:4a:b7:4b:2d:1f:ad:35:0f:08: 8c:2c:f1:cd:c9:2c:2f:a2:e6:23:96:47:f6:13:31:96: 23:cf:51:09:59:66:8f:02:93:71:b3:01:a0:77:68:9b: 4d:b6:70:11:cf:34:f8:97:04:55:cc:79:b6:1f:c6:0e: b1:c3:a4:fc:c0:2c:7c:32:ab:99:5f:ae:91:75:f9:b6: 3d:31:c3:4e:54:59:82:87:2b:b0:7f:a1:d2:a7:fa:0f: 90:82:cd:61:a0:b5:1c:b5:60:0e:c2:c6:4f:c5:db:dc: 94:3c:7b:9e:a0:ac:7a:0e:37:9b:82:d1:53:52:b1:6e: 2f:77:60:67:9d:df:c4:23:f5:5d:1a:3d:6c:a7:84:29: 8e:c7:04:8c:d7:e4:ef:56:07:28:c2:06:a3:09:af:de Fingerprint (SHA-256): E5:71:23:76:79:87:94:4F:66:3D:AF:37:B8:DD:06:A6:55:6D:14:1A:73:10:EF:DB:B0:A5:3A:2D:11:BC:3D:AE Fingerprint (SHA1): F9:49:72:55:F3:E8:5E:35:66:2E:D6:8B:51:EB:05:C9:81:9F:5F:A1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #341: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #342: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #343: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #344: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:ba:26 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed Oct 18 13:42:58 2023 Not After : Thu Jan 18 13:42:58 2024 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e5:ae:93:19:fb:5b:4f:14:52:87:df:f1:5f:8c:1b:63: d8:e6:96:81:b2:f8:a4:ae:fa:b7:a1:48:06:3f:d5:f9: 1d:16:11:74:09:b8:15:30:db:36:e3:3d:e9:00:0b:ae: 9b:fb:f8:80:65:e0:2c:d7:0f:85:0e:b8:62:1e:ae:83: 6f:3a:93:40:f9:2c:07:12:c0:b7:39:82:64:6e:69:38: 0e:16:33:06:d5:36:50:9f:ca:99:83:10:ed:47:17:ef: ae:07:6b:00:b3:c8:98:41:dc:97:8e:08:92:04:f1:21: a6:57:30:ef:91:80:14:10:eb:62:ac:2d:d0:38:f3:45: 3e:01:a1:35:91:68:33:c5:de:21:33:52:79:15:9a:d4: e7:0f:1a:06:99:7d:e1:e1:53:fd:7a:12:74:79:90:37: 74:74:f8:fa:46:30:66:38:be:93:b5:8c:25:b3:1e:72: a1:ec:13:69:f4:95:06:1e:61:2a:c6:75:45:77:88:e7: 96:84:d7:92:f3:92:68:0f:a3:68:ec:32:d3:af:20:a8: bf:2f:1c:3f:0d:97:9e:b8:5e:48:b9:70:b4:c4:7c:48: 3f:ef:66:ca:52:8d:5c:1e:33:7a:18:49:68:52:46:ea: 72:03:60:9c:5d:1d:0f:91:73:5c:37:70:7c:ca:28:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:30:60:20:66:46:fe:8a:3f:a1:64:95:2f:d1:e0:63: 7d:29:9c:dc:33:76:83:9c:68:47:c6:53:98:25:92:d0: 59:fd:c1:bc:79:e4:f8:66:c1:c6:0f:2d:5a:15:84:14: 2b:d5:52:c4:e0:d6:95:1a:c6:2a:71:2a:ca:c4:41:d0: 1f:44:a8:81:49:a7:9d:ac:ae:d7:fe:02:82:df:1f:6b: 9e:45:12:ed:c2:10:af:be:6e:c5:76:88:ae:17:f9:33: ec:b0:c7:49:1d:ce:56:04:be:7f:63:5f:47:c5:de:87: 81:85:c7:7a:9e:dd:f9:1f:3e:96:38:fe:a2:87:98:8d: be:ae:d7:01:df:48:c4:08:41:ae:31:8a:d0:3a:9f:7d: 13:3d:90:c4:cd:3c:e4:57:53:43:42:8d:6e:cb:a0:38: d8:9c:bc:20:cb:db:f9:2d:c6:72:13:99:79:ce:a8:f3: 01:ca:b8:eb:ea:83:36:61:11:c2:59:1a:78:c9:2e:d8: 92:86:95:5c:e8:bd:60:db:85:6b:02:af:44:2e:96:2e: 5f:18:fc:89:9c:fe:e5:05:80:79:10:06:49:5b:92:b5: 8a:c2:0f:45:29:a6:71:81:ce:6e:2b:0a:64:44:1b:3c: 84:3d:dd:8d:82:5d:b7:ec:29:40:53:93:59:3a:db:92 Fingerprint (SHA-256): D1:00:18:3F:2E:D7:93:C8:28:1F:48:9F:2A:CD:14:25:AD:B2:84:63:5F:77:B0:A8:86:F1:11:C2:42:A6:B2:57 Fingerprint (SHA1): A6:7B:6D:F0:D1:1B:D3:96:D8:FB:BF:6E:95:BD:35:2A:64:9F:76:A3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #345: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der cert.sh: #346: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #347: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #348: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #349: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #350: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der: error 0: Success cert.sh: #351: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #352: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:ba:29 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed Oct 18 13:43:00 2023 Not After : Thu Jan 18 13:43:00 2024 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:90:95:97:ab:59:58:16:0f:27:82:ee:f2:e9:a3:52: 6a:54:32:84:be:f5:fc:1d:f3:4e:78:fb:fe:ef:90:76: 9e:b3:31:a9:26:60:52:9b:50:2d:b6:83:14:7f:4b:72: 87:bb:d6:cb:e5:87:6f:6f:ab:b0:a5:05:03:01:0c:f7: 27:fd:4f:df:a6:0e:ed:92:64:b2:3f:ed:89:50:b4:2d: 15:ff:8d:20:0e:74:44:7f:4a:e0:7f:8f:0b:b4:97:dd: 6c:fb:c8:ce:a0:77:34:0b:07:47:06:b2:85:f2:9b:2f: 5e:43:06:c4:10:1b:1d:ce:96:c3:b2:0e:f2:4c:ac:c0: d8:d1:e4:7c:39:15:c1:3a:2b:e0:e4:fd:76:48:99:a2: 87:7a:82:c8:21:ca:52:8a:75:da:e3:45:c5:c8:3b:a1: e9:95:3a:87:8d:81:30:a6:09:2c:79:82:e1:67:ee:83: 1b:ff:3d:e6:c6:5d:30:76:e6:ad:22:dc:0f:40:be:6c: 25:3a:7c:4e:ff:3a:89:d9:86:42:db:72:b6:88:c9:d9: 56:71:0e:c5:58:92:38:34:df:e6:59:1a:40:d8:27:ef: e9:66:37:b3:a4:f0:11:a9:51:82:3e:0d:98:82:91:64: 40:26:df:23:1e:5d:3d:27:58:a6:bf:e4:61:61:9f:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:8f:07:b6:71:c0:2e:2d:d8:c1:76:36:7f:8b:99:ed: 92:00:a3:a8:13:1a:29:71:06:4f:d0:48:6f:e0:e9:36: 5a:e1:77:7f:b1:33:45:2c:c0:4f:83:31:61:9b:0b:9b: c0:bf:af:3f:51:1b:27:cb:6e:8a:2a:4a:38:ec:6c:a6: f2:38:93:af:5b:8a:8a:60:ae:f9:b5:fb:11:31:16:fb: 65:b2:f7:ce:77:bd:ec:da:de:ec:0b:5e:3f:45:86:b3: 41:b3:98:00:cf:fc:65:66:05:62:51:d6:45:a7:b7:a0: 54:97:64:1e:1a:93:53:ba:79:6e:84:b5:17:59:24:ca: 02:4e:22:ae:ab:42:84:c2:d9:79:da:13:92:49:9f:c3: 2f:81:b7:e2:74:d6:c9:7e:f6:1b:dc:f1:6e:2b:af:27: dd:42:f5:76:72:a6:5d:e9:b2:ce:a1:8f:30:93:65:09: 01:1b:cc:fd:d9:b0:50:7a:f2:bd:c4:98:d5:85:54:d7: dd:f2:e4:19:13:04:d7:c4:5f:09:28:06:eb:35:ce:42: 75:12:ba:53:11:e5:1e:56:d7:d5:30:ac:4f:2a:3a:81: e2:55:a8:0b:17:f0:73:86:d1:68:84:44:68:d4:1a:80: 5b:15:95:f8:f1:c4:19:74:1d:39:59:f0:e6:00:9e:9d Fingerprint (SHA-256): 16:0B:4B:54:D7:7F:5A:B9:FE:F1:C7:A3:99:13:24:CD:60:94:40:2E:6B:70:26:AB:D7:EE:88:36:DA:92:08:09 Fingerprint (SHA1): 67:C4:B7:9E:F7:B8:CD:29:72:6B:BB:02:67:7A:F0:92:2A:4B:61:D2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #353: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #354: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #355: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dbpass -f ../tests.pw cert.sh: #356: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #357: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #358: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dbpass -o root.cert cert.sh: #359: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #360: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #361: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #362: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #363: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #364: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -i ../CA/TestCA.ca.cert cert.sh: #365: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #366: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #367: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #369: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #372: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #375: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #378: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #381: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #383: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #384: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw cert.sh: #386: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #387: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -o root.cert cert.sh: #388: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #389: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #390: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #391: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #392: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #394: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #395: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #396: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #397: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #400: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #401: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #402: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #403: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #404: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #405: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw cert.sh: #406: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #407: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #408: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #409: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #410: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #411: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #412: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #413: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #414: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #417: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #422: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #427: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #432: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #437: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #441: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #442: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #443: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #444: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #445: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #446: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #449: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #454: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #458: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #459: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #460: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #461: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #462: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #463: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> rsa 11a47e774f9b5f52268a4d2de937fff9ac001eb3 NSS Certificate DB:localhost.localdomain < 1> dsa bbc98607373dae13b41cb2cf1ce57942a6e2c47a NSS Certificate DB:localhost-sni.localdomain-dsamixed < 2> rsa ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 3> rsa 118b9321f4ceecb54430662f1aef1a2d57c0ce08 (orphan) < 4> dsa 70772d8a9f284e1bacbba6c8d49a061c59d394df NSS Certificate DB:localhost.localdomain-dsamixed < 5> ec 51ab49319bdd9cc855759899527a6e3a0767a278 NSS Certificate DB:localhost.localdomain-ecmixed < 6> dsa a183d280e087415fcee3fb038aebfe8cfc352850 NSS Certificate DB:localhost-sni.localdomain-dsa < 7> ec 4e643ae9a8bf8c46f0823e314e525445ad05f423 NSS Certificate DB:localhost-sni.localdomain-ecmixed < 8> ec 8663ddab8ba2c1e6bc389c96dda70d0185839514 NSS Certificate DB:localhost.localdomain-ec < 9> rsa 0039054f879bd3544b9597160be797603d0f1cb2 NSS Certificate DB:localhost-sni.localdomain <10> dsa edeec6abff702f675505a4019df42c3b216a9777 NSS Certificate DB:localhost.localdomain-dsa <11> ec 47a7b34bd0bf3ab40e2dd5450c6be06a6c4bbef9 NSS Certificate DB:localhost-sni.localdomain-ec cert.sh: #464: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #465: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #466: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #467: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #468: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #469: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #470: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #471: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #472: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #473: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #474: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #475: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #476: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #477: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #478: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #479: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #480: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #481: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #482: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #483: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #484: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #485: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #486: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #487: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #488: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #489: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #490: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #491: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #492: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #493: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #494: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #495: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #496: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #497: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #498: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #499: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #500: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #501: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #502: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #503: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #504: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #505: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #506: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #507: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #508: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #509: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #510: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #511: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #512: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #513: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #514: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #515: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #516: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #517: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #518: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #519: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #520: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #521: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #522: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #523: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #524: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #525: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #526: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #527: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #528: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #529: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #530: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #531: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #532: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #533: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #534: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #535: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #536: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #537: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #538: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #539: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #540: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #541: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #542: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #543: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #544: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #545: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #546: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #547: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #548: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #549: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #550: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #551: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #552: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #553: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #554: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #555: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #556: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #557: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #558: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #559: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #560: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #561: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #562: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #563: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #564: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #565: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #566: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #567: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #568: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #569: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #570: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #571: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #572: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #573: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #574: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #575: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #576: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #577: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #578: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #579: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #580: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #581: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #582: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #583: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #584: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #585: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #586: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #587: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #588: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #589: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #590: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #591: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #592: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #593: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #594: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #595: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #596: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #597: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #598: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #599: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #600: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #601: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #602: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #603: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #604: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #605: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #606: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #607: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #608: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #609: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #610: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #611: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #612: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #613: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #614: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #615: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #616: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #617: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #618: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #619: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #620: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #621: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #622: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #623: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #624: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #625: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #626: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #627: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #628: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #629: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #630: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #631: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #632: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #633: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #634: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #635: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #636: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #637: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #638: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #639: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #640: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #641: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #642: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #643: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #644: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #645: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #646: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #647: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #648: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #649: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #650: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #651: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #652: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #653: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #654: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #655: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #656: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #657: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #658: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #659: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #660: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #661: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #662: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #663: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #664: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #665: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #666: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #667: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #668: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #669: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #670: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #671: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #672: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #673: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #674: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #675: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #676: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #677: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #678: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #679: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #680: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #681: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #682: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #683: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #684: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #685: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #686: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #687: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #688: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #689: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #690: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #691: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #692: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #693: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #694: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #695: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #696: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #697: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #698: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #699: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #700: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #701: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #702: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #703: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #704: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #705: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #706: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #707: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #708: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #709: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #710: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #711: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #712: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #713: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #714: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #715: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #716: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh: Verify large rsa pss signature -------------- vfychain -a Leaf-bogus-dsa.crt Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=decodeECorDSASignature-testCase/taviso : ERROR -8010: The signature algorithm in the signature field of the certificate does not match the algorithm in its signatureAlgorithm field. cert.sh: #717: Verify large dsa signature - PASSED cert.sh: Verify large rsa pss signature -------------- vfychain -a Leaf-bogus-rsa-pss.crt Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. taviso@google.com : ERROR -8010: The signature algorithm in the signature field of the certificate does not match the algorithm in its signatureAlgorithm field. cert.sh: #718: Verify large rsa pss signature - PASSED cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Wed Oct 18 13:43:30 UTC 2023 Running tests for dbtests TIMESTAMP dbtests BEGIN: Wed Oct 18 13:43:30 UTC 2023 dbtests.sh: CERT and Key DB Tests =============================== --------------------------------------------------------------- | test opening the database read/write in a nonexisting directory --------------------------------------------------------------- certutil: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #1: Certutil didn't work in a nonexisting dir 255 - PASSED dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #2: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED --------------------------------------------------------------- | test force opening the database in a nonexisting directory --------------------------------------------------------------- dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtests.sh: #3: Dbtest force succeeded in a nonexisting dir 0 - PASSED --------------------------------------------------------------- | test opening the database readonly in an empty directory --------------------------------------------------------------- tstclnt: unable to open cert database: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #4: Tstclnt didn't work in an empty dir 1 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #5: Dbtest readonly didn't work in an empty dir 46 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir dbtests.sh: #6: Dbtest logout after empty DB Init has key - PASSED dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir dbtests.sh: #7: Dbtest password DB Init maintains needlogin state - PASSED certutil: could not find certificate named "xxxx": SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #8: Certutil didn't work in an empty dir 255 - PASSED --------------------------------------------------------------- | test force opening the database readonly in a empty directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/emptydir/key3.db" does not exist. dbtests.sh: #9: Dbtest force readonly succeeded in an empty dir 0 - PASSED --------------------------------------------------------------- | test opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/secmod.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/cert8.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/key3.db" is not writeable. dbtest: function failed: SEC_ERROR_LEGACY_DATABASE: The certificate/key database is in an old, unsupported format. dbtests.sh: #10: Dbtest r/w didn't work in an readonly dir 46 - PASSED certutil: could not find certificate named "TestUser": SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #11: Certutil didn't work in an readonly dir 255 - PASSED --------------------------------------------------------------- | test opening the database ronly in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/secmod.db database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/cert8.db database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/key3.db dbtests.sh: #12: Dbtest readonly succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | test force opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/secmod.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/cert8.db" is not writeable. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/key3.db" is not writeable. dbtests.sh: #13: Dbtest force succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | ls -l /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir --------------------------------------------------------------- dr-xr-xr-x. 2 mockbuild mockbuild 4096 Oct 18 13:43 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir -r--r-----. 1 mockbuild mockbuild 1228 Oct 18 13:43 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/TestUser-dsa.cert -r--r-----. 1 mockbuild mockbuild 1427 Oct 18 13:43 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/TestUser-dsamixed.cert -r--r-----. 1 mockbuild mockbuild 582 Oct 18 13:43 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/TestUser-ec.cert -r--r-----. 1 mockbuild mockbuild 707 Oct 18 13:43 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/TestUser-ecmixed.cert -r--r-----. 1 mockbuild mockbuild 881 Oct 18 13:43 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/TestUser-rsa-pss.cert -r--r-----. 1 mockbuild mockbuild 872 Oct 18 13:43 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/TestUser.cert -r--------. 1 mockbuild mockbuild 360448 Oct 18 13:43 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/cert8.db -r--------. 1 mockbuild mockbuild 176128 Oct 18 13:43 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/key3.db -r--r-----. 1 mockbuild mockbuild 728 Oct 18 13:43 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/req -r--------. 1 mockbuild mockbuild 16384 Oct 18 13:43 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ronlydir/secmod.db --------------------------------------------------------------- | test creating a new cert with a conflicting nickname --------------------------------------------------------------- /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/conflictdir certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database. dbtests.sh: #14: Nicknane conflict test, could not import conflict nickname 255 - PASSED --------------------------------------------------------------- | test importing an old cert to a conflicting nickname --------------------------------------------------------------- Certificate: Data: Version: 3 (0x2) Serial Number: 40 (0x28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:47 2023 Not After : Wed Oct 18 13:42:47 2028 Subject: "CN=Bob,E=Bob@example.com,O=BOGUS NSS,L=Mountain View,ST=Cal ifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:7d:a7:b5:01:34:46:9d:24:cf:dd:f9:5b:ff:2d:9d: f1:68:3a:8b:a6:af:78:3f:67:d0:97:b0:c6:f8:81:08: 9c:02:1e:a1:d2:2e:68:2f:9f:47:30:8b:82:87:32:49: 04:43:65:58:92:95:79:e7:71:ce:4c:7a:98:d5:8b:f2: 63:5c:0e:e1:d8:c5:44:c9:ce:3d:01:40:c9:a8:0e:cb: 5f:6b:34:a9:38:2e:a5:71:33:8c:39:c8:22:9a:53:db: c4:18:7a:25:5b:48:19:06:51:ff:e7:60:f8:a9:68:12: 43:24:f5:29:39:bd:ab:9b:c6:04:f2:c3:41:3f:09:00: 3c:3f:97:f1:e5:16:b3:f6:9d:fc:01:ec:ac:f5:3c:16: b1:06:00:c1:a8:c1:d8:91:a6:97:a0:eb:5b:df:7b:63: 75:c0:4f:2b:a9:b1:97:a7:c1:2b:2e:63:87:02:b4:23: 24:bd:d1:ce:ee:cc:49:2e:1a:88:39:aa:ac:bb:bf:c8: ad:f3:26:62:7c:ae:46:3d:76:68:ec:66:e0:71:02:e6: 04:a2:9e:5e:2d:47:49:66:4f:15:8a:5b:a9:9b:1c:f7: 29:65:6f:53:be:e8:e2:30:7a:99:f9:02:24:15:ce:b2: 00:09:0a:9c:60:cb:eb:51:ae:32:22:8c:ec:b4:16:b5 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:b6:d8:08:df:ee:92:63:c7:88:d2:59:92:cb:dc:0b: a7:9f:f0:06:03:0d:62:c6:ec:dc:ef:08:79:3f:da:05: 45:ce:bd:73:4b:81:97:be:47:3c:14:f6:db:54:d2:e5: 2c:4f:87:16:17:86:3f:52:74:d5:99:ec:d9:8c:8b:b3: 24:24:68:fb:e3:d7:84:3f:9e:1d:82:a0:5e:c1:0e:a8: b8:3c:03:84:64:a1:b0:4d:8b:39:b6:2a:5c:04:f2:8a: 39:1e:3a:f2:6a:0c:b5:c8:59:00:bc:19:b9:05:4b:5e: c2:fa:fc:86:7f:7e:7f:2e:e0:4c:8d:14:ea:74:7a:af: c5:f9:40:9a:fd:1f:27:9f:c6:85:2d:dd:4d:43:f1:a4: d9:a1:4c:0e:f7:c0:ac:9a:f7:8b:7f:bc:f8:ae:ce:97: 2d:0c:36:cd:a4:c5:ba:3c:dd:f3:75:f7:a7:1a:97:6f: ff:03:6e:e6:52:82:56:cd:f2:56:a1:44:f5:03:1c:91: 71:75:53:bb:58:75:70:44:24:df:35:7e:46:a0:d9:3e: e7:04:c2:56:38:e0:4c:ef:43:e1:af:ef:a0:b4:46:8f: 28:5c:e5:e2:6c:6e:44:35:b1:43:2a:f6:13:52:5c:51: 3d:cf:91:75:7d:9b:7e:b3:ad:c9:39:0f:64:e9:19:0f Fingerprint (SHA-256): 44:30:84:07:52:CF:56:FC:67:0B:7A:8D:8D:B1:CF:FD:C1:DA:58:1D:CF:6F:C1:33:EF:8E:C7:5E:09:8D:DF:D8 Fingerprint (SHA1): DE:30:18:44:A3:71:EC:09:37:B0:32:99:68:D1:4E:2B:CA:F8:C7:8E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: dbtests.sh: #15: Nickname conflict test-setting nickname conflict was correctly rejected - PASSED Testing RSA PrivateKeyImport *********************** RSA PrivateKeyImport PASSED *********************** Testing DSA PrivateKeyImport *********************** CKA_ID does not match priv key, checking next key DSA PrivateKeyImport PASSED *********************** Testing ECC PrivateKeyImport *********************** CKA_ID does not match priv key, checking next key CKA_ID does not match priv key, checking next key ECC PrivateKeyImport PASSED *********************** pubValue = [128 bytes] { e8, 17, 29, e0, 9b, 32, 0b, 9b, 2d, c7, 2a, 9c, 41, 0b, 9e, 11 85, 09, ff, 24, 9e, ab, 78, 14, 28, 69, a0, 72, d9, fb, b8, 73 e4, 69, 20, 7f, 4e, f1, 3c, 3d, d5, 90, 80, 32, 27, f6, 6d, dc 2a, f0, 9b, 9f, 28, d0, 0f, 49, 2e, d0, 62, 78, c7, 6b, 8c, e0 16, c9, 7c, 24, e7, a2, ac, 58, ce, a0, 84, 69, 15, 08, a0, d4 f8, db, 62, d1, 62, 38, 34, fe, 2d, 81, ac, a0, 01, 41, e8, 34 5d, 96, 6a, b6, 49, 03, 80, 3d, 72, 87, 3e, 41, 00, 2b, 24, f4 0a, 7d, 93, b1, 46, ed, ca, a9, fa, d4, 9a, 9f, 5b, 21, 5d, 4b}; privKey CKA_ID = [20 bytes] { e1, cc, e4, de, 78, f1, be, 18, 9d, 3f, 4f, b1, 3e, c6, 73, 8e a8, 30, c3, 4a}; pubKey CKA_ID = [20 bytes] { e1, cc, e4, de, 78, f1, be, 18, 9d, 3f, 4f, b1, 3e, c6, 73, 8e a8, 30, c3, 4a}; matching public key found pubValue = [128 bytes] { 69, f6, 97, 65, bf, d5, 9c, 09, 43, 7c, 19, 82, a5, 96, 31, 6c b9, 95, e6, 1c, 2e, 49, a3, 8a, 40, 47, 38, 20, ff, e4, 8d, 93 7c, 38, ee, 95, 86, 8c, 3d, 9b, 6d, f0, 4c, 8e, f8, 3c, 69, 5f 03, 35, 36, 17, a9, 31, 1d, 91, 75, 6b, 6d, db, 78, cc, 6c, 29 a0, 80, 58, b9, e9, 75, 49, 3e, 2e, 4d, ea, 7a, d3, 56, e2, 3a d3, 5b, 08, 33, 6f, 56, 0f, 01, e8, 4e, 90, f4, f9, ed, a0, 0a c7, 97, 32, 5f, 2f, c4, 23, dd, 1d, 5c, 24, 58, 08, 81, dc, 36 24, 18, d7, ef, c4, a8, 97, 97, eb, 59, 59, 23, 22, 49, 85, 56}; privKey CKA_ID = [20 bytes] { bf, 4d, 00, 9a, 12, dc, eb, 08, 66, 64, d8, 2d, f0, a4, f1, 6b 4a, 42, 62, d8}; pubKey CKA_ID = [20 bytes] { e1, cc, e4, de, 78, f1, be, 18, 9d, 3f, 4f, b1, 3e, c6, 73, 8e a8, 30, c3, 4a}; pubKey CKA_ID = [20 bytes] { bf, 4d, 00, 9a, 12, dc, eb, 08, 66, 64, d8, 2d, f0, a4, f1, 6b 4a, 42, 62, d8}; matching public key found pubValue = [65 bytes] { 04, 47, 78, 9e, b1, d8, 6f, fb, 8d, aa, 34, ea, 2b, 44, 22, 9f 4d, 78, b7, 51, dd, 05, f5, 72, 61, 6e, 98, de, 8e, bf, a1, c7 fe, 5e, 30, 48, 48, 72, f1, 49, 04, 09, cc, 1d, 10, fe, 2f, 5d 94, f7, ce, 36, 7f, 28, 76, 66, 58, 5d, 7c, d9, 91, 3e, 8b, 97 55}; privKey CKA_ID = [20 bytes] { 92, 4b, e2, 69, 9c, 0b, 84, 23, 4e, 7a, 59, 62, 30, e4, 38, 65 34, b7, e9, 4d}; pubKey CKA_ID = [20 bytes] { e1, cc, e4, de, 78, f1, be, 18, 9d, 3f, 4f, b1, 3e, c6, 73, 8e a8, 30, c3, 4a}; pubKey CKA_ID = [20 bytes] { bf, 4d, 00, 9a, 12, dc, eb, 08, 66, 64, d8, 2d, f0, a4, f1, 6b 4a, 42, 62, d8}; pubKey CKA_ID = [20 bytes] { 92, 4b, e2, 69, 9c, 0b, 84, 23, 4e, 7a, 59, 62, 30, e4, 38, 65 34, b7, e9, 4d}; matching public key found dbtests.sh: #16: Importing Token Private Key correctly creates the corrresponding Public Key - PASSED /bin/sqlite3 --------------------------------------------------------------- | skipping key corruption test: requires sql database --------------------------------------------------------------- TIMESTAMP dbtests END: Wed Oct 18 13:43:31 UTC 2023 Running tests for tools TIMESTAMP tools BEGIN: Wed Oct 18 13:43:31 UTC 2023 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 17:56:61:82:6e:dd:c3:7e:15:fc:cf:8e:d6:23:dc:b9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 29:4a:16:62:0b:69:ed:25:d0:e1:25:c8:34:4b:94:bb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 13:42:34 2023 Not After : Wed Oct 18 13:42:34 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:ee:47:55:75:96:bf:c4:61:a5:e6:6b:24:0c:7f: 7c:e6:c6:b5:37:b0:a7:21:0c:88:f7:4e:a5:7a:cc:bc: f4:65:d6:93:a9:83:1f:7a:8b:5f:d1:0f:a1:2d:42:74: 18:78:f2:91:72:e9:ff:ab:0b:95:bc:69:ce:50:fc:07: 91:1a:b9:00:2e:55:75:63:15:90:f4:0a:9b:ee:8b:f7: 0c:f5:ab:b0:8a:8f:08:55:93:52:84:3f:c7:34:e1:24: 16:5f:02:07:77:3a:88:0f:c4:a4:6c:8c:56:42:48:81: ad:41:2e:de:5e:46:9a:54:fc:ab:24:ef:c2:3c:1b:ff: 9d:94:8d:5b:42 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:57:5c:a1:b2:50:47:46:e0:bb:2c: d2:85:d6:27:36:03:6a:90:4d:26:77:84:68:d4:0f:6e: bb:6c:6c:94:d3:d2:6c:cf:b1:fe:3e:19:3f:a8:22:04: 48:7c:40:52:83:b4:43:82:de:aa:7c:18:c5:23:b1:e2: c5:f2:03:00:31:b0:f3:02:42:01:36:3c:8f:91:7d:d5: fb:fd:03:14:da:67:3c:e9:a3:0a:0c:ae:ca:57:12:a0: 41:a2:da:0a:5a:84:3e:2a:19:ad:c8:c0:1d:4c:22:69: a7:50:87:d1:16:61:5f:cc:29:28:c4:10:85:87:19:8a: a9:49:22:af:b9:94:45:a9:3c:40:88 Fingerprint (SHA-256): F2:FE:51:E6:5F:0D:5D:63:CF:1E:D9:24:FA:6D:76:24:C7:87:E8:79:9F:4D:E3:72:9A:D5:00:D9:DD:8F:E8:EE Fingerprint (SHA1): 7B:29:39:F2:CA:CC:04:97:DB:6F:DB:8E:80:98:8F:D0:0E:B1:DC:A8 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:70:89:da:48:e3:7f:79:a0:0b:69:64:a4:5e:bc:4f: 42:8d:2e:9f:4b:6e:ea:48:24:2c:ce:e6:71:04:d4:79: 2b:14:af:67:c9:97:f2:8d:6e:95:bf:02:bc:7d:0e:67: b4:f3:0e:1d:3a:20:26:2b:92:e1:25:87:8c:fb:91:1d: df:8f:ae:2c:d7:78:69:77:89:ca:ac:10:ce:5a:5d:51: a1:0e:bf:a9:c5:81:2a:31:01:f5:c4:ea:d1:77:4a:78: 88 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:95:6f:6a:d4:45:12:9e:dc:f2:1c: 12:7d:24:94:39:15:f7:3d:bf:81:a0:c5:42:7f:ff:15: d4:b9:ee:88:48:fe:4d:46:fa:97:02:98:ab:3c:26:fe: 22:83:ea:17:70:5c:f0:24:13:54:75:b3:fa:51:21:4d: 29:12:17:69:83:0a:38:02:42:01:3b:97:9c:55:ca:ee: 12:2d:7b:e8:5f:a6:f9:22:58:e9:0b:be:91:07:67:f7: 69:68:41:e2:26:ca:39:ae:6a:42:e0:13:f7:0d:98:1d: b1:29:d8:a9:4c:75:90:9a:86:58:b6:d9:38:ab:be:18: 9d:10:29:fb:9b:29:45:f6:6c:f9:eb Fingerprint (SHA-256): B7:85:BA:51:74:5A:19:0F:B0:3A:D4:61:F2:3E:9B:C3:AD:F7:2E:57:1E:0B:A4:43:E3:07:25:74:31:C5:AE:DC Fingerprint (SHA1): D1:0D:B2:33:29:7C:BF:F1:C0:88:CC:51:C1:ED:1E:4F:0A:4A:A1:3E Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED tools.sh: Exporting Alice's email EC cert & key with long pw------ pk12util -o Alice-ec-long.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.longpw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting Alice's email EC cert & key with long pw (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #10: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key with long pw----- pk12util -i Alice-ec-long.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.longpw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #11: Importing Alice's email EC cert & key with long pw (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file with long pw ------------ pk12util -l Alice-ec-long.p12 -w ../tests.longpw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 52:00:da:a3:5f:5f:c9:e5:54:26:10:a1:d4:01:11:13 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 13:42:34 2023 Not After : Wed Oct 18 13:42:34 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:ee:47:55:75:96:bf:c4:61:a5:e6:6b:24:0c:7f: 7c:e6:c6:b5:37:b0:a7:21:0c:88:f7:4e:a5:7a:cc:bc: f4:65:d6:93:a9:83:1f:7a:8b:5f:d1:0f:a1:2d:42:74: 18:78:f2:91:72:e9:ff:ab:0b:95:bc:69:ce:50:fc:07: 91:1a:b9:00:2e:55:75:63:15:90:f4:0a:9b:ee:8b:f7: 0c:f5:ab:b0:8a:8f:08:55:93:52:84:3f:c7:34:e1:24: 16:5f:02:07:77:3a:88:0f:c4:a4:6c:8c:56:42:48:81: ad:41:2e:de:5e:46:9a:54:fc:ab:24:ef:c2:3c:1b:ff: 9d:94:8d:5b:42 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:57:5c:a1:b2:50:47:46:e0:bb:2c: d2:85:d6:27:36:03:6a:90:4d:26:77:84:68:d4:0f:6e: bb:6c:6c:94:d3:d2:6c:cf:b1:fe:3e:19:3f:a8:22:04: 48:7c:40:52:83:b4:43:82:de:aa:7c:18:c5:23:b1:e2: c5:f2:03:00:31:b0:f3:02:42:01:36:3c:8f:91:7d:d5: fb:fd:03:14:da:67:3c:e9:a3:0a:0c:ae:ca:57:12:a0: 41:a2:da:0a:5a:84:3e:2a:19:ad:c8:c0:1d:4c:22:69: a7:50:87:d1:16:61:5f:cc:29:28:c4:10:85:87:19:8a: a9:49:22:af:b9:94:45:a9:3c:40:88 Fingerprint (SHA-256): F2:FE:51:E6:5F:0D:5D:63:CF:1E:D9:24:FA:6D:76:24:C7:87:E8:79:9F:4D:E3:72:9A:D5:00:D9:DD:8F:E8:EE Fingerprint (SHA1): 7B:29:39:F2:CA:CC:04:97:DB:6F:DB:8E:80:98:8F:D0:0E:B1:DC:A8 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:70:89:da:48:e3:7f:79:a0:0b:69:64:a4:5e:bc:4f: 42:8d:2e:9f:4b:6e:ea:48:24:2c:ce:e6:71:04:d4:79: 2b:14:af:67:c9:97:f2:8d:6e:95:bf:02:bc:7d:0e:67: b4:f3:0e:1d:3a:20:26:2b:92:e1:25:87:8c:fb:91:1d: df:8f:ae:2c:d7:78:69:77:89:ca:ac:10:ce:5a:5d:51: a1:0e:bf:a9:c5:81:2a:31:01:f5:c4:ea:d1:77:4a:78: 88 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:95:6f:6a:d4:45:12:9e:dc:f2:1c: 12:7d:24:94:39:15:f7:3d:bf:81:a0:c5:42:7f:ff:15: d4:b9:ee:88:48:fe:4d:46:fa:97:02:98:ab:3c:26:fe: 22:83:ea:17:70:5c:f0:24:13:54:75:b3:fa:51:21:4d: 29:12:17:69:83:0a:38:02:42:01:3b:97:9c:55:ca:ee: 12:2d:7b:e8:5f:a6:f9:22:58:e9:0b:be:91:07:67:f7: 69:68:41:e2:26:ca:39:ae:6a:42:e0:13:f7:0d:98:1d: b1:29:d8:a9:4c:75:90:9a:86:58:b6:d9:38:ab:be:18: 9d:10:29:fb:9b:29:45:f6:6c:f9:eb Fingerprint (SHA-256): B7:85:BA:51:74:5A:19:0F:B0:3A:D4:61:F2:3E:9B:C3:AD:F7:2E:57:1E:0B:A4:43:E3:07:25:74:31:C5:AE:DC Fingerprint (SHA1): D1:0D:B2:33:29:7C:BF:F1:C0:88:CC:51:C1:ED:1E:4F:0A:4A:A1:3E Friendly Name: Alice-ec tools.sh: #12: Listing Alice's pk12 EC file with long pw (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 4e:ee:08:e0:7f:cb:79:f6:88:ba:13:52:8f:23:32:37 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #17: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 43:63:5b:13:e7:29:4c:73:3f:a4:a8:d4:2d:f4:15:15 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #21: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 77:68:f4:d8:7a:42:73:cb:d2:98:47:5f:cb:54:c3:dd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #25: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #26: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: ee:13:8e:b8:e1:3e:16:c6:ab:06:94:9f:9a:a9:7e:1f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #29: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #30: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 36:36:80:02:46:66:ed:87:90:6e:1d:b5:ac:7f:86:98 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:28:69:cb:a6:ca:05:74:d0:80:6c:72:d6:46:8e: 2f:35 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #33: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #34: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: ee:a4:ca:18:05:54:1f:5e:e3:2f:0a:f0:9c:86:ad:6d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #37: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #38: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 31:73:6a:08:1b:6e:e7:88:5a:d7:63:70:a2:82:07:4b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 8d:60:e9:a4:f6:f3:ca:c3:85:71:fc:84:70:18:8b:4c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 6f:88:5c:ee:43:b1:e9:0d:83:1c:fc:fb:ca:40:14:70 Iteration Count: 600000 (0x927c0) tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 4e:72:82:3d:2d:bc:7f:09:a2:4c:36:e9:a3:df:e2:02 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 13:df:5a:2a:45:c4:27:ba:05:0e:66:fb:ac:96:1c:75 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #57: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: fd:a4:50:37:0c:36:fb:aa:72:84:3d:0d:d3:b5:2b:3b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #61: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 40:b8:da:65:c2:f5:7a:d8:95:66:ed:58:1f:60:96:b7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #65: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #66: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 13:5d:5c:46:63:49:de:1b:09:bd:5e:fd:83:8e:b3:a3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #69: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #70: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 50:84:5f:a0:a3:95:3a:1c:e8:93:a4:3e:62:2f:65:5a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ee:6d:b3:4a:73:96:a4:aa:50:fa:a5:ce:85:2b: 40:1c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #73: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #74: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 64:bc:ab:29:86:df:54:7f:27:89:c1:36:99:f3:23:e7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #77: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #78: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 12:cf:3a:37:91:3b:cb:03:25:fb:aa:cd:76:c0:df:f1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 2a:b3:6e:ed:30:d2:61:b7:13:b6:68:bf:bf:f3:2a:f5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: d2:a8:57:dc:6b:ab:7b:59:83:cc:84:5b:25:72:e7:52 Iteration Count: 600000 (0x927c0) tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #89: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 23:3f:c5:57:fc:be:e1:b9:f5:0b:5a:d9:7b:43:d7:04 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #93: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 92:d9:dd:5e:55:53:09:c9:50:ec:b6:f8:e3:fc:ff:80 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #97: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #98: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 1a:6a:7a:8d:fb:80:85:f6:0d:07:17:3d:ae:01:8a:dc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #101: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #102: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 83:01:6b:d1:8e:10:90:fd:40:20:53:8c:ab:78:2f:ad Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:eb:bf:a6:c5:1c:c4:16:3b:54:5e:7c:cb:dd:87: 35:59 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #105: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #106: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 30:03:cf:f2:3f:12:29:f0:ff:95:fa:c9:51:24:99:e7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #109: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #110: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6f:b0:c3:e8:df:61:7c:b3:ac:54:04:9b:a3:96:7e:d3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 35:d3:31:4d:36:38:bd:d0:1f:e5:05:b1:d0:d3:e4:bd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c3:0b:bd:20:1a:d9:6b:72:02:31:f0:e7:1b:e8:ae:bf Iteration Count: 600000 (0x927c0) tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 8b:dc:ef:56:54:64:8c:02:5e:46:4a:2f:cb:47:87:b7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #125: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 48:80:01:d2:a1:69:a8:bb:bf:3c:1e:fc:fc:63:ff:37 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 0c:52:d9:d9:81:fe:1b:bd:17:4c:01:49:06:31:4b:d2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3f:fc:09:8d:47:d5:58:bc:31:05:3d:9e:7c:0a:5e:9b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #137: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #138: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 1e:9a:ca:5a:90:c9:12:64:02:d4:a1:5b:0b:70:67:7f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #141: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #142: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c8:de:e1:c4:a5:73:75:c8:bc:98:40:72:33:5a:1c:29 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d7:b1:d3:32:5a:00:42:78:fd:54:75:39:4a:91: 3a:77 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #145: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #146: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: b8:ab:ae:86:7e:be:cd:2b:88:5e:4b:28:0b:3c:57:67 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #149: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #150: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 74:44:e3:34:71:ed:03:e3:5d:f7:98:7b:55:60:b2:a9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: e4:68:e7:e4:bb:00:f3:3e:45:6c:29:0d:f8:8d:c4:47 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 0e:00:4f:97:f4:11:f7:fb:f7:a1:f0:d5:dd:ec:0b:05 Iteration Count: 600000 (0x927c0) tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #161: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 81:74:b1:ed:b7:d5:f5:04:0c:35:88:dc:45:61:d6:8a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #165: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 78:aa:24:c9:59:fc:80:1c:5e:cb:6c:cf:8a:81:e8:a2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: fd:1d:ce:62:82:ff:22:20:38:d6:e8:8c:d2:8f:82:13 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3d:c1:87:53:01:3a:c7:ab:72:80:5b:e6:58:05:1e:e5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #177: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #178: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 5e:f5:08:01:c9:c0:84:69:dd:01:cd:08:54:a0:b5:41 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #181: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #182: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 38:32:73:89:46:45:85:19:76:eb:76:b6:62:eb:35:66 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:0a:78:f5:e7:38:8d:e4:98:dc:07:16:f2:24:c1: 7c:39 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #185: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #186: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 5f:f6:ad:4e:3a:00:f8:a4:40:47:36:16:45:3d:b7:ad Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #189: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #190: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8e:e8:a0:3d:4f:37:05:60:f6:a9:5a:18:bf:74:df:59 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: c9:2c:ea:10:73:af:67:34:e4:87:67:65:c2:61:1e:97 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 52:6e:80:57:3a:45:fa:87:11:27:6b:e6:1b:a5:97:ca Iteration Count: 600000 (0x927c0) tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #201: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: fa:2f:66:08:fe:77:00:e1:f7:da:f6:4d:4c:0f:0d:37 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #205: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 50:37:77:21:72:b1:9c:f9:c4:40:bd:52:5c:20:df:70 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #209: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #210: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 38:2e:e0:7e:b4:b9:0e:02:b9:1c:6c:04:f3:c0:f1:ba Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #213: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #214: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 02:92:f0:07:28:50:49:23:bc:41:9b:03:ec:a8:d6:a0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b5:e4:64:9b:39:7f:6a:f9:4a:8f:33:ae:cc:4a: 3b:cb Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #217: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #218: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 21:55:b2:f1:e3:a9:70:ca:11:ec:e4:a2:7f:d8:11:51 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #222: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b7:a0:a7:df:98:6b:4e:84:67:7a:c2:28:a8:11:f7:71 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4c:98:59:f6:e6:04:2d:9e:80:08:d3:45:3e:f2:59:9a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1e:36:c0:ff:3a:0e:2d:a7:c7:19:c5:e4:3a:05:63:09 Iteration Count: 600000 (0x927c0) tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 95:04:23:47:4a:37:c0:86:8e:c9:96:93:b2:51:78:65 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #237: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 9d:04:a5:ae:de:8b:4c:16:ba:24:1b:35:f3:01:d2:52 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 6c:7a:e3:46:34:0b:b9:3b:53:38:a8:21:22:79:d8:f8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f7:49:8f:81:13:e8:86:09:2b:b0:b9:98:6e:b3:21:4d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #249: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #250: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 99:8d:02:02:74:9d:03:91:38:a0:63:ae:b8:e7:eb:5c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #253: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #254: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f0:ba:7a:71:cc:d3:7b:3d:7c:96:99:5e:32:f5:25:cc Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:40:81:67:6a:a3:52:90:45:30:4a:20:5c:17:55: d4:04 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #258: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: e1:0c:a4:03:01:ae:de:9d:7f:64:71:59:18:18:80:d6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #261: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #262: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b7:6a:84:a4:aa:53:ad:12:b6:b3:24:aa:8d:5d:d1:5a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: fe:b5:4c:f5:6f:42:06:60:23:44:6e:02:a5:ee:03:e3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: e3:d0:24:2e:f9:28:ea:69:a3:b6:b8:b3:56:02:10:b2 Iteration Count: 600000 (0x927c0) tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #273: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 2b:84:39:d0:07:81:24:e0:8a:ca:8c:9a:a2:90:23:b1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #277: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 00:36:a4:eb:c0:a7:4c:36:57:75:2b:af:13:e1:c2:1f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 19:4d:0d:6d:31:5d:c1:f2:7e:a9:23:bf:e4:9d:ed:16 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fe:a2:ef:3a:ab:68:b9:42:b0:d3:02:f3:e7:1a:c1:ca Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #289: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #290: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 51:0d:7e:be:51:c9:60:cd:b3:3d:f3:a5:7a:c6:a4:65 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #294: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 72:9b:a3:f2:ac:fd:75:dc:89:65:86:be:d2:9a:f8:17 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:76:8e:1e:9e:28:7d:3b:bb:02:e5:11:05:0f:88: 8c:41 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #297: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #298: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 38:1a:00:79:f4:1d:66:68:2c:d6:b6:03:37:fb:f6:f6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #301: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #302: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c8:35:0a:33:f2:68:73:f7:ad:d5:16:cb:82:4d:e3:b1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 21:e6:47:08:77:30:b5:b4:85:d8:b9:b3:16:98:47:82 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: ec:5d:15:cf:f0:3d:92:63:75:87:23:88:19:4a:79:65 Iteration Count: 600000 (0x927c0) tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #313: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: e0:25:5d:86:a5:cd:c6:e7:32:10:17:a8:43:43:75:f5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #318: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 14:27:23:8b:fd:cb:77:4d:7e:c3:27:f0:06:5c:32:b7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #321: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #322: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 9e:26:cb:d7:2d:4e:3c:58:7a:8b:07:4b:52:69:c0:81 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #325: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #326: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a9:7a:5f:a2:48:b0:7d:66:73:13:e2:a4:be:81:e1:56 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #330: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: dd:91:97:e0:87:ff:5a:e4:1e:c3:b4:a8:8e:37:89:6d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #333: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #334: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c4:70:ca:5c:f7:5d:b2:2f:87:07:ae:49:82:44:2c:9e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:6f:53:a1:f1:4c:7c:8c:7a:a5:34:62:17:c2:ea: ba:14 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #337: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #338: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: ef:1c:14:4e:3d:20:ec:7c:17:83:a1:a1:6d:24:3f:a7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #342: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ad:34:cc:7e:ca:35:68:62:31:17:e8:10:9a:dd:e8:22 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #345: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: f9:8c:3d:bc:b5:9a:1f:0c:17:c0:3d:8b:d1:80:e2:cd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #349: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: ea:98:bf:f8:5b:5f:06:60:54:2c:83:d7:15:68:f0:2d Iteration Count: 600000 (0x927c0) tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [RC2-CBC:RC2-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #354: Verifying p12 file generated with [RC2-CBC:RC2-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 0f:e0:f8:63:2c:0a:3e:e8:bd:b5:f4:2d:4a:b8:50:f5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #358: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 1b:92:94:11:4b:a7:fa:35:3d:62:53:61:84:6c:7a:b7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #361: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #362: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 87:b6:79:10:d0:5e:24:92:34:b1:99:78:39:91:9f:3d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #366: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 82:f9:c6:f7:53:04:cf:5a:7f:af:3e:a1:2e:53:26:c3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #369: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #370: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 97:a9:cf:4d:d5:4f:ad:52:fd:00:42:4f:fb:c9:1d:37 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #373: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #374: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0f:10:38:01:e4:0c:14:16:17:2b:66:21:df:9c:31:7a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ea:2c:5a:0a:27:4c:a0:5a:d9:cc:c6:41:f1:ee: 0d:e5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #378: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2c:a1:93:87:eb:9c:da:13:04:93:2e:81:bd:8e:2d:c5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #381: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #382: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e2:c8:2a:92:39:36:bd:a0:27:3e:63:f4:8e:3f:ed:45 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #385: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: dd:db:df:67:5d:ba:61:51:48:4b:63:9e:d7:1e:b3:d4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #389: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: db:b2:e3:aa:2b:f4:d9:30:0c:4c:f5:bf:e5:71:c8:e0 Iteration Count: 600000 (0x927c0) tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #393: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #394: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8f:f7:af:20:2a:e3:7b:2c:1e:c8:4e:e4:0c:22:64:aa Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #397: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #398: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 1b:dd:6a:7e:0f:db:0c:39:5c:2d:70:31:c8:ab:8a:13 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #401: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #402: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 55:4f:47:c2:ba:c2:07:f4:b3:eb:4e:e1:9e:f3:80:d8 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:36:2e:08:fe:6e:0b:b5:bd:2c:58:23:5f:55:8a: 1d:ca Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #405: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #406: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b1:53:f8:14:1f:8a:ce:f6:88:f9:66:ce:07:f7:b0:3d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #409: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 44:0b:3b:0c:4f:f9:2f:13:b7:3b:92:73:3d:72:91:67 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:13:cb:da:a5:ac:ee:f5:d9:b5:43:24:09:6f:65: b1:a4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #413: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 81:89:79:ab:a1:b3:00:87:63:7e:d9:33:74:2a:de:e3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:dd:01:19:d0:ce:1c:3f:69:0a:de:55:55:0f:9b: b9:9f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #417: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #418: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a0:d2:e1:cf:b4:da:af:34:8f:41:c0:22:7a:7a:55:0f Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:88:e6:88:5b:4b:71:0e:a8:f6:64:b3:97:38:41: 5d:c2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #421: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #422: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7d:5c:a7:62:85:3c:f8:7a:10:df:06:77:c5:0b:5f:2d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #425: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 74:f9:cb:84:db:9c:3e:b9:08:13:53:c6:f5:cc:ad:15 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:7e:a1:3a:31:7e:f5:e6:0e:78:cb:58:f8:ae:55: 65:7c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #429: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b9:bc:ec:02:c0:4f:24:ae:9e:18:94:bf:28:85:6b:3d Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:3e:3f:71:87:a0:cc:67:1d:5c:d4:43:c9:a4:d9: 24:b7 tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #433: Exporting with [AES-128-CBC:AES-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #434: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7b:73:8f:fe:20:e3:ac:33:0d:4f:67:6d:a4:8a:ca:2d Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: AES-128-CBC Args: 04:10:ef:83:14:dc:2e:51:e3:41:b0:07:02:1d:fc:7c: 02:53 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #437: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #438: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 32:03:02:42:62:a2:46:13:4a:60:df:8c:4a:97:b2:21 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #441: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #442: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c3:d1:7a:dd:c2:8c:fb:c8:20:5f:9b:07:bb:90:83:c6 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:35:a4:29:42:0f:69:6c:07:ef:92:a3:fc:02:cc: 24:39 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #445: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #446: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f9:8c:ad:f3:04:36:79:e2:01:07:ac:2d:bf:e7:35:6e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #449: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 65:4a:4d:55:9a:c5:40:8a:df:81:50:a5:99:6f:5c:e4 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:e3:73:05:00:f8:b7:93:e2:dd:ab:8e:79:ef:44: ab:65 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #453: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c4:be:e2:ae:33:d8:fc:6a:93:f3:ca:82:1c:cd:6a:99 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:98:ae:0d:a2:93:97:55:e6:e2:6f:aa:be:2f:b6: 2b:97 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #457: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #458: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b4:9d:86:02:b7:b0:1b:80:90:16:20:64:b2:80:6e:58 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:3d:e7:af:3f:76:a6:6f:ee:00:4d:45:63:53:00: 5a:ad Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #461: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #462: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 47:86:6e:e5:4f:4f:70:19:49:b6:79:07:24:f8:3e:72 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #465: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a8:2d:3d:79:55:6b:0d:24:b5:b3:b3:89:e9:15:10:11 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:4f:ce:4d:75:62:00:6b:fc:65:4c:3c:94:1e:36: cf:06 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #469: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ea:30:44:84:1f:26:3d:05:85:d9:05:c3:c5:2d:98:95 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:9b:23:93:88:3c:fd:a1:54:52:ec:13:e4:5f:8e: 24:21 tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #473: Exporting with [AES-192-CBC:AES-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #474: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f7:67:01:3a:a4:f7:68:7d:dd:ed:01:98:e0:7d:26:9c Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: AES-192-CBC Args: 04:10:15:f5:83:5b:fa:bc:de:a9:75:70:85:84:30:64: ac:58 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #477: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #478: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3b:b5:4d:80:ce:a9:de:36:63:77:1a:3c:a6:6b:67:13 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #481: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #482: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: bf:c6:75:02:2e:68:08:9b:38:fa:ad:a9:5a:aa:aa:14 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:f3:4d:4c:04:37:e8:01:65:35:ad:3e:8e:61:f4: f2:12 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #485: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #486: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f0:bb:55:20:a9:01:3b:10:70:20:71:61:d5:dd:9e:eb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #489: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #490: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4e:bb:5f:52:e3:90:6d:0e:fd:73:d1:a8:1a:84:00:ce Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:d9:cd:0a:cf:b1:d0:fb:3e:f1:4a:97:df:74:80: 36:7f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #493: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #494: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 95:f3:4c:7c:7a:b1:bb:4e:4c:f4:fc:7d:84:3d:a2:fa Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #497: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7c:b8:9c:ec:69:3b:c6:08:95:b0:11:a0:48:87:78:17 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:78:c3:f4:71:c2:cc:99:08:21:f9:f9:bd:16:e9: 17:66 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #501: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 56:7f:a4:aa:1a:66:fd:a3:b3:b2:b2:99:d6:42:d3:8e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:ad:f5:e7:3c:fc:52:c7:a4:71:0c:23:f1:95:cc: a8:fc tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #505: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #506: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1c:c0:83:a3:54:e3:7d:31:52:4a:d3:a4:da:5e:75:3a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:b3:a8:53:fd:0f:88:38:10:e1:6e:04:9d:88:ec: 6f:4e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #509: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #510: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d6:6d:2c:cb:82:08:ec:85:15:88:05:72:dc:89:50:b6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #513: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #514: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 73:0d:25:df:ca:ec:2d:24:84:fc:f0:ec:b0:e1:7f:9d Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:cc:03:91:09:bd:8d:af:d9:f8:4f:8b:5a:ac:07: 8c:9a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #517: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #518: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 62:d7:2c:ec:63:81:a1:70:e2:e4:83:4e:f8:3c:95:30 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #521: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #522: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a1:fa:24:78:34:45:5d:55:7e:31:aa:c9:77:49:de:ee Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:18:f5:92:58:ba:75:39:a5:82:4e:b4:0a:09:ce: 34:82 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #525: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #526: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e5:33:fb:5b:42:7b:b1:57:de:ef:89:54:a1:c4:62:7a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:1f:91:09:b7:0c:90:40:2a:74:ec:fe:c5:89:16: e7:94 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #529: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #530: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0f:94:63:c3:3f:85:85:a6:9f:f7:a4:9c:83:c3:57:4a Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:27:4e:12:b8:87:1f:a8:13:6c:f5:45:9c:40:23: 8a:0a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #533: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #534: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 35:dd:fe:e1:4f:4c:3e:51:d0:f2:df:c3:07:73:dc:c1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #537: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a9:ce:39:da:88:5b:d0:39:1d:1f:48:1b:11:bc:81:13 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:3d:f4:b7:12:34:20:86:63:f9:2b:17:45:64:19: 4e:fc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #541: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f3:6b:f7:68:fe:04:e2:eb:39:0d:f6:87:e1:f1:b0:94 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:1b:59:bd:35:22:ad:71:e1:d9:54:eb:d8:e5:5c: 03:5c tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #545: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #546: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 98:c6:27:9a:19:fc:bd:04:e3:7e:d3:f2:77:88:2d:19 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-128-CBC Args: 04:10:b8:99:a4:e5:d9:eb:3f:b6:1f:a3:cc:db:cc:dc: eb:c1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #550: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ec:14:4e:b4:f3:ba:c2:86:17:22:68:cd:85:31:e7:41 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #553: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #554: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0d:08:7e:d3:67:9f:32:cd:f5:f7:98:7a:97:76:98:a5 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:6d:56:57:99:1d:15:cd:37:11:e3:82:ad:da:a3: d3:34 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #557: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #558: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 22:2b:12:f7:8e:42:33:37:a1:5a:d9:59:f4:9b:a9:91 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #561: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #562: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 09:a8:5a:54:8b:a1:69:71:67:5b:b0:62:65:38:e8:ba Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:8a:85:db:29:c0:d1:ef:07:28:5e:1d:f1:97:20: a2:e3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #565: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #566: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 29:c1:0e:dd:83:08:b5:cf:b5:4a:ba:cc:61:97:38:b3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:1a:0d:33:1a:ef:d8:65:27:06:1c:ab:41:58:64: 3b:b0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #569: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #570: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: db:47:a5:5f:d4:d1:f9:ff:64:5f:28:39:27:51:8c:63 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:ff:f4:74:b8:e4:b6:c2:e5:3e:37:03:0f:f9:2a: 8f:c6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #573: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #574: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 44:aa:7f:26:6f:0b:9b:a2:26:b8:28:fd:84:65:d9:c7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #577: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4a:ae:67:d3:ab:e3:c5:ca:c7:8e:fc:ab:64:e6:9a:d4 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:7b:af:0d:df:89:b2:90:ed:d1:b3:c9:ca:5b:ad: 94:3d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #581: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 30:d3:05:b4:a3:b6:62:bd:0d:14:d5:19:68:d1:0a:92 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:71:2d:eb:8e:8c:ed:46:27:dc:e9:25:7a:af:18: 2b:fc tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #585: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #586: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 48:d7:21:9b:b7:11:03:85:42:17:3a:36:02:1a:76:41 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-192-CBC Args: 04:10:eb:12:52:56:20:19:34:13:2a:88:83:e2:e4:5e: da:6c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #590: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d3:d3:a7:46:ec:e0:9a:2d:51:bc:c0:6b:cc:18:3d:46 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #593: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #594: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e8:b0:af:a6:b7:34:66:7e:e3:4a:28:92:b7:1c:6a:a8 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:78:78:01:09:33:a0:a7:dd:74:60:d1:3b:e6:4a: b8:8a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #597: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #598: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 47:4b:5a:aa:c7:ed:7f:5c:33:c2:5c:01:45:12:40:87 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #602: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ca:f8:d2:b7:e1:1d:0a:b0:c7:06:40:db:ab:dc:f1:3c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:cd:f2:5a:fb:27:a4:1b:e1:33:2a:79:da:18:b4: ae:76 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #605: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #606: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c0:a8:7d:28:1d:77:9e:c0:3c:60:d8:8c:94:61:23:ec Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:d6:0f:b9:f6:10:52:16:1c:d4:c0:4c:41:55:90: 85:71 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #609: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #610: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 65:5b:b7:bf:a7:95:e3:00:2f:7a:05:30:9a:2e:24:49 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:88:4e:d1:91:5c:da:ba:b6:d1:b4:15:72:f4:ed: e7:ef Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #614: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a7:2c:91:ea:bd:cf:98:45:fa:29:a5:3a:76:3c:8f:b1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #617: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5b:f7:3e:89:35:e9:b0:95:33:d1:74:6c:da:73:b9:bd Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:c3:88:e7:ef:28:cf:04:e4:a3:50:86:e0:68:af: 00:26 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #621: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d0:e2:6d:17:e9:5f:dd:fb:f5:4f:e8:50:86:0e:08:b2 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:bf:76:74:98:72:b0:69:72:cf:fc:7c:c1:a1:37: 5c:b7 tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #626: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9e:f6:98:f2:56:ab:6f:45:c0:85:9f:a6:3c:59:18:c9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-256-CBC Args: 04:10:28:f5:3c:f9:4b:f4:79:0c:91:72:db:c4:ec:bf: eb:2f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 78:fd:cd:ae:2b:9c:a6:f9:82:99:ee:c2:f8:0f:80:90 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d3:8f:ff:0b:ec:e8:b0:12:8c:cf:d8:2b:ee:1e:6b:93 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 70:68:8c:15:a5:92:1e:30:b3:5c:f3:2b:c7:f1:d9:58 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f6:13:48:25:0c:09:97:34:b6:10:d9:e3:ab:8b:9f:f6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ec:62:0d:37:22:65:b1:49:65:51:74:41:23:58:6e:55 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 16:bd:49:82:35:b9:d4:d6:49:08:68:33:80:26:5e:35 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 30:9b:ab:eb:65:c9:06:c4:a2:f1:63:d9:a2:5b:34:4f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5e:08:95:fa:2a:ee:3d:61:1f:e9:84:9e:6a:ae:03:48 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 83:80:9f:8e:c9:fe:d8:82:cd:d0:09:31:c9:0d:56:f3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c4:5c:a5:fb:af:a3:46:54:b8:8c:28:bb:1b:5a:59:83 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #669: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #670: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c5:8f:25:24:18:81:87:76:c4:9a:8b:15:dd:58:9b:14 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #674: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d5:fa:6d:87:ed:b8:4e:6f:5f:24:18:00:e7:34:0f:86 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 33:8e:cd:61:f6:cd:c0:69:d3:f6:55:f9:6b:7f:bb:8d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:58:26:48:89:83:4f:36:fc:41:b8:79:c8:db:c4: f6:28 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: bd:eb:09:cf:6b:78:43:29:63:be:bb:48:b6:b6:3f:b4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:ea:29:0e:c0:4b:93:b0:fd:3a:96:4d:50:c2:38: 3a:f8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 51:83:b3:84:a6:5d:c8:b5:f1:de:f0:2a:5e:76:e9:c4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:7b:c9:75:53:6f:7f:ba:93:87:e8:a0:53:04:f2: aa:28 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #689: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #690: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 11:27:9e:29:f9:5e:1c:f0:4b:cc:e5:73:18:bf:23:dc Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:c3:b5:bf:16:6f:22:de:35:00:fe:ad:d6:35:29: f0:d2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #693: Exporting with [AES-256-CBC:AES-256-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #694: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b2:56:86:19:49:f1:be:7a:c1:af:36:94:45:62:29:c4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:07:f5:8c:2a:4b:92:36:c7:89:64:d6:89:93:c3: 30:7f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #698: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a4:7d:98:af:e0:74:14:1c:d4:77:6b:30:ee:b1:06:e3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:cd:8a:99:ca:31:d2:59:56:7c:7f:51:ac:35:a1: c4:95 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #701: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 94:84:2a:5b:93:81:11:f1:ce:b9:2e:80:af:76:62:03 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #705: Exporting with [default:default:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 57:22:41:ab:1a:bc:a3:57:a6:5d:41:2b:f1:96:33:a5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #710: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 92:a8:21:da:40:09:95:b2:08:df:13:a8:12:72:9c:df Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #711: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #712: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #713: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #714: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d5:31:8a:f1:60:34:1b:1d:77:db:85:05:86:80:7f:ce Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #715: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #717: Exporting with [default:default:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #718: Verifying p12 file generated with [default:default:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6d:39:d6:6d:45:0c:a2:2c:6a:bd:19:2e:f4:aa:49:26 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting with [default:default:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #722: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 45:ac:21:48:ca:d7:f9:ef:51:0e:0c:a4:69:af:2a:b0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #723: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #724: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #725: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #726: Exporting with [default:none:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #727: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #728: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #729: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #730: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #731: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #732: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #733: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #734: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #735: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #736: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #737: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #738: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #739: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Wed Oct 18 14:00:25 UTC 2023 Running tests for fips TIMESTAMP fips BEGIN: Wed Oct 18 14:00:25 UTC 2023 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Internal%20Crypto%20Services;library-version=3.90 slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB uri: pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 2. RootCerts library name: /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Builtin%20Object%20Cryptoki%20Modu;library-version=2.60 slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token uri: pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 ----------------------------------------------------------- FIPS mode enabled. fips.sh: #1: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa a6f2180c24258eadc194ac7b2a4669db0e15e26d NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #3: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #4: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #7: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #11: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #13: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa a6f2180c24258eadc194ac7b2a4669db0e15e26d FIPS_PUB_140_Test_Certificate fips.sh: #14: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #15: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #16: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #17: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #18: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa a6f2180c24258eadc194ac7b2a4669db0e15e26d FIPS_PUB_140_Test_Certificate fips.sh: #19: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 99. **** **** ALL TESTS PASSED **** fips.sh: #20: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 97. **** **** ALL TESTS PASSED **** fips.sh: #21: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi-testlib.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib64/libsoftokn3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle Changing byte 0x00074e38 (478776): from 00 (0) to 20 (32) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/fips/mangle dbtest -r -d ../fips fips.sh: #22: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Wed Oct 18 14:00:39 UTC 2023 Running tests for sdr TIMESTAMP sdr BEGIN: Wed Oct 18 14:00:39 UTC 2023 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests.v1.17687 -t "Test1" -f ../tests.pw sdr.sh: #1: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests.v2.17687 -t "The quick brown fox jumped over the lazy dog" -f ../tests.pw sdr.sh: #2: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests.v3.17687 -t "1234567" -f ../tests.pw sdr.sh: #3: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests.v1.17687 -t "Test1" -f ../tests.pw sdr.sh: #4: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests.v2.17687 -t "The quick brown fox jumped over the lazy dog" -f ../tests.pw sdr.sh: #5: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests.v3.17687 -t "1234567" -f ../tests.pw sdr.sh: #6: Decrypt - Value 3 - PASSED sdr.sh: pwdecrypt - 300 Entries time pwdecrypt -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/SDR/combined.17687 -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/SDR/decoded.17687 -l /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/SDR/log.17687 -d . -f ../tests.pw ------------- result ---------------------- Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" 9800 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/SDR/decoded.17687 sdr.sh: #7: pwdecrypt success - PASSED ------------- log ---------------------- 0 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/SDR/log.17687 sdr.sh: #8: pwdecrypt no error log - PASSED ------------- time ---------------------- real 0.13 user 0.12 sys 0.01 0 seconds sdr.sh: #9: pwdecrypt no time regression - PASSED TIMESTAMP sdr END: Wed Oct 18 14:00:39 UTC 2023 Running tests for crmf TIMESTAMP crmf BEGIN: Wed Oct 18 14:00:39 UTC 2023 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #1: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #2: CMMF test . - PASSED TIMESTAMP crmf END: Wed Oct 18 14:00:39 UTC 2023 Running tests for smime TIMESTAMP smime BEGIN: Wed Oct 18 14:00:39 UTC 2023 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #1: Create Detached Signature Alice (1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #2: Verifying Alice's Detached Signature (1) . - PASSED smime.sh: Signing Attached Message (1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #3: Create Attached Signature Alice (1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.1 smime.sh: #4: Decode Alice's Attached Signature (1) . - PASSED diff alice.txt alice.data.1 smime.sh: #5: Compare Attached Signed Data and Original (1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #6: Create Detached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #7: Verifying Alice's Detached Signature (ECDSA w/ 1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #8: Create Attached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.1 smime.sh: #9: Decode Alice's Attached Signature (ECDSA w/ 1) . - PASSED diff alice.txt alice-ec.data.1 smime.sh: #10: Compare Attached Signed Data and Original (ECDSA w/ 1) . - PASSED smime.sh: Signing Detached Message {256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #11: Create Detached Signature Alice (256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #12: Verifying Alice's Detached Signature (256) . - PASSED smime.sh: Signing Attached Message (256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #13: Create Attached Signature Alice (256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.256 smime.sh: #14: Decode Alice's Attached Signature (256) . - PASSED diff alice.txt alice.data.256 smime.sh: #15: Compare Attached Signed Data and Original (256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #16: Create Detached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #17: Verifying Alice's Detached Signature (ECDSA w/ 256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #18: Create Attached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.256 smime.sh: #19: Decode Alice's Attached Signature (ECDSA w/ 256) . - PASSED diff alice.txt alice-ec.data.256 smime.sh: #20: Compare Attached Signed Data and Original (ECDSA w/ 256) . - PASSED smime.sh: Signing Detached Message {384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #21: Create Detached Signature Alice (384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #22: Verifying Alice's Detached Signature (384) . - PASSED smime.sh: Signing Attached Message (384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #23: Create Attached Signature Alice (384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.384 smime.sh: #24: Decode Alice's Attached Signature (384) . - PASSED diff alice.txt alice.data.384 smime.sh: #25: Compare Attached Signed Data and Original (384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #26: Create Detached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #27: Verifying Alice's Detached Signature (ECDSA w/ 384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #28: Create Attached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.384 smime.sh: #29: Decode Alice's Attached Signature (ECDSA w/ 384) . - PASSED diff alice.txt alice-ec.data.384 smime.sh: #30: Compare Attached Signed Data and Original (ECDSA w/ 384) . - PASSED smime.sh: Signing Detached Message {512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #31: Create Detached Signature Alice (512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #32: Verifying Alice's Detached Signature (512) . - PASSED smime.sh: Signing Attached Message (512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #33: Create Attached Signature Alice (512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.512 smime.sh: #34: Decode Alice's Attached Signature (512) . - PASSED diff alice.txt alice.data.512 smime.sh: #35: Compare Attached Signed Data and Original (512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #36: Create Detached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #37: Verifying Alice's Detached Signature (ECDSA w/ 512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #38: Create Attached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.512 smime.sh: #39: Decode Alice's Attached Signature (ECDSA w/ 512) . - PASSED diff alice.txt alice-ec.data.512 smime.sh: #40: Compare Attached Signed Data and Original (ECDSA w/ 512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@example.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #41: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #42: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #43: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@example.com,dave@example.com smime.sh: #44: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@example.net smime.sh: #45: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #46: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #47: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #48: Decrypt with a Multiple Email cert . - PASSED smime.sh: #49: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #50: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #51: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@example.com,dave@example.com" \ -d ../alicedir > co.der smime.sh: #52: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #53: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@example.com" > alice.enc smime.sh: #54: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #55: Decode Encrypted-Data . - PASSED smime.sh: #56: Compare Decoded and Original Data . - PASSED pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #57: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice_p7.env -o alice_p7.data smime.sh: #58: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #59: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #60: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #61: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Wed Oct 18 14:00:53 UTC 2023 Running tests for ssl TIMESTAMP ssl BEGIN: Wed Oct 18 14:00:53 UTC 2023 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30017 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30017 found at Wed Oct 18 14:00:53 UTC 2023 selfserv_9997 with PID 30017 started at Wed Oct 18 14:00:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30017 at Wed Oct 18 14:00:54 UTC 2023 kill -USR1 30017 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30017 killed at Wed Oct 18 14:00:54 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30070 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30070 found at Wed Oct 18 14:00:54 UTC 2023 selfserv_9997 with PID 30070 started at Wed Oct 18 14:00:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30070 at Wed Oct 18 14:00:54 UTC 2023 kill -USR1 30070 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30070 killed at Wed Oct 18 14:00:54 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30122 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30122 found at Wed Oct 18 14:00:54 UTC 2023 selfserv_9997 with PID 30122 started at Wed Oct 18 14:00:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30122 at Wed Oct 18 14:00:54 UTC 2023 kill -USR1 30122 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30122 killed at Wed Oct 18 14:00:54 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:00:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30188 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30188 found at Wed Oct 18 14:00:54 UTC 2023 selfserv_9997 with PID 30188 started at Wed Oct 18 14:00:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30188 at Wed Oct 18 14:00:54 UTC 2023 kill -USR1 30188 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30188 killed at Wed Oct 18 14:00:54 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:00:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30240 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30240 found at Wed Oct 18 14:00:54 UTC 2023 selfserv_9997 with PID 30240 started at Wed Oct 18 14:00:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30240 at Wed Oct 18 14:00:54 UTC 2023 kill -USR1 30240 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30240 killed at Wed Oct 18 14:00:54 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:00:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30292 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30292 found at Wed Oct 18 14:00:55 UTC 2023 selfserv_9997 with PID 30292 started at Wed Oct 18 14:00:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30292 at Wed Oct 18 14:00:55 UTC 2023 kill -USR1 30292 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30292 killed at Wed Oct 18 14:00:55 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30358 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30358 found at Wed Oct 18 14:00:55 UTC 2023 selfserv_9997 with PID 30358 started at Wed Oct 18 14:00:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 30358 at Wed Oct 18 14:00:55 UTC 2023 kill -USR1 30358 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30358 killed at Wed Oct 18 14:00:55 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30410 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30410 found at Wed Oct 18 14:00:55 UTC 2023 selfserv_9997 with PID 30410 started at Wed Oct 18 14:00:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30410 at Wed Oct 18 14:00:55 UTC 2023 kill -USR1 30410 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30410 killed at Wed Oct 18 14:00:55 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30463 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30463 found at Wed Oct 18 14:00:55 UTC 2023 selfserv_9997 with PID 30463 started at Wed Oct 18 14:00:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 30463 at Wed Oct 18 14:00:55 UTC 2023 kill -USR1 30463 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30463 killed at Wed Oct 18 14:00:55 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30529 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30529 found at Wed Oct 18 14:00:55 UTC 2023 selfserv_9997 with PID 30529 started at Wed Oct 18 14:00:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 30529 at Wed Oct 18 14:00:55 UTC 2023 kill -USR1 30529 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30529 killed at Wed Oct 18 14:00:55 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30582 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30582 found at Wed Oct 18 14:00:55 UTC 2023 selfserv_9997 with PID 30582 started at Wed Oct 18 14:00:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 30582 at Wed Oct 18 14:00:56 UTC 2023 kill -USR1 30582 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30582 killed at Wed Oct 18 14:00:56 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30634 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30634 found at Wed Oct 18 14:00:56 UTC 2023 selfserv_9997 with PID 30634 started at Wed Oct 18 14:00:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 30634 at Wed Oct 18 14:00:56 UTC 2023 kill -USR1 30634 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30634 killed at Wed Oct 18 14:00:56 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:00:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30700 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30700 found at Wed Oct 18 14:00:56 UTC 2023 selfserv_9997 with PID 30700 started at Wed Oct 18 14:00:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 30700 at Wed Oct 18 14:00:56 UTC 2023 kill -USR1 30700 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30700 killed at Wed Oct 18 14:00:56 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:00:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30752 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30752 found at Wed Oct 18 14:00:56 UTC 2023 selfserv_9997 with PID 30752 started at Wed Oct 18 14:00:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 30752 at Wed Oct 18 14:00:56 UTC 2023 kill -USR1 30752 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30752 killed at Wed Oct 18 14:00:56 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:00:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30804 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30804 found at Wed Oct 18 14:00:56 UTC 2023 selfserv_9997 with PID 30804 started at Wed Oct 18 14:00:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 30804 at Wed Oct 18 14:00:56 UTC 2023 kill -USR1 30804 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30804 killed at Wed Oct 18 14:00:56 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30870 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30870 found at Wed Oct 18 14:00:56 UTC 2023 selfserv_9997 with PID 30870 started at Wed Oct 18 14:00:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 30870 at Wed Oct 18 14:00:57 UTC 2023 kill -USR1 30870 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30870 killed at Wed Oct 18 14:00:57 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30922 found at Wed Oct 18 14:00:57 UTC 2023 selfserv_9997 with PID 30922 started at Wed Oct 18 14:00:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30922 at Wed Oct 18 14:00:57 UTC 2023 kill -USR1 30922 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30922 killed at Wed Oct 18 14:00:57 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30974 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30974 found at Wed Oct 18 14:00:57 UTC 2023 selfserv_9997 with PID 30974 started at Wed Oct 18 14:00:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 30974 at Wed Oct 18 14:00:57 UTC 2023 kill -USR1 30974 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30974 killed at Wed Oct 18 14:00:57 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31040 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31040 found at Wed Oct 18 14:00:57 UTC 2023 selfserv_9997 with PID 31040 started at Wed Oct 18 14:00:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31040 at Wed Oct 18 14:00:57 UTC 2023 kill -USR1 31040 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31040 killed at Wed Oct 18 14:00:57 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31092 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31092 found at Wed Oct 18 14:00:57 UTC 2023 selfserv_9997 with PID 31092 started at Wed Oct 18 14:00:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31092 at Wed Oct 18 14:00:58 UTC 2023 kill -USR1 31092 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31092 killed at Wed Oct 18 14:00:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31144 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31144 found at Wed Oct 18 14:00:58 UTC 2023 selfserv_9997 with PID 31144 started at Wed Oct 18 14:00:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31144 at Wed Oct 18 14:00:58 UTC 2023 kill -USR1 31144 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31144 killed at Wed Oct 18 14:00:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:00:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31210 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31210 found at Wed Oct 18 14:00:58 UTC 2023 selfserv_9997 with PID 31210 started at Wed Oct 18 14:00:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31210 at Wed Oct 18 14:00:58 UTC 2023 kill -USR1 31210 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31210 killed at Wed Oct 18 14:00:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:00:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31262 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31262 found at Wed Oct 18 14:00:58 UTC 2023 selfserv_9997 with PID 31262 started at Wed Oct 18 14:00:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31262 at Wed Oct 18 14:00:58 UTC 2023 kill -USR1 31262 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31262 killed at Wed Oct 18 14:00:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:00:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31315 found at Wed Oct 18 14:00:58 UTC 2023 selfserv_9997 with PID 31315 started at Wed Oct 18 14:00:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31315 at Wed Oct 18 14:00:58 UTC 2023 kill -USR1 31315 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31315 killed at Wed Oct 18 14:00:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31381 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31381 found at Wed Oct 18 14:00:58 UTC 2023 selfserv_9997 with PID 31381 started at Wed Oct 18 14:00:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 31381 at Wed Oct 18 14:00:59 UTC 2023 kill -USR1 31381 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31381 killed at Wed Oct 18 14:00:59 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31433 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31433 found at Wed Oct 18 14:00:59 UTC 2023 selfserv_9997 with PID 31433 started at Wed Oct 18 14:00:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31433 at Wed Oct 18 14:00:59 UTC 2023 kill -USR1 31433 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31433 killed at Wed Oct 18 14:00:59 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31485 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31485 found at Wed Oct 18 14:00:59 UTC 2023 selfserv_9997 with PID 31485 started at Wed Oct 18 14:00:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 31485 at Wed Oct 18 14:00:59 UTC 2023 kill -USR1 31485 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31485 killed at Wed Oct 18 14:00:59 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31551 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31551 found at Wed Oct 18 14:00:59 UTC 2023 selfserv_9997 with PID 31551 started at Wed Oct 18 14:00:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 31551 at Wed Oct 18 14:00:59 UTC 2023 kill -USR1 31551 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31551 killed at Wed Oct 18 14:00:59 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31603 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31603 found at Wed Oct 18 14:00:59 UTC 2023 selfserv_9997 with PID 31603 started at Wed Oct 18 14:00:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 31603 at Wed Oct 18 14:00:59 UTC 2023 kill -USR1 31603 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31603 killed at Wed Oct 18 14:00:59 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:00:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:00:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31655 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31655 found at Wed Oct 18 14:00:59 UTC 2023 selfserv_9997 with PID 31655 started at Wed Oct 18 14:00:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 31655 at Wed Oct 18 14:01:00 UTC 2023 kill -USR1 31655 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31655 killed at Wed Oct 18 14:01:00 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31721 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31721 found at Wed Oct 18 14:01:00 UTC 2023 selfserv_9997 with PID 31721 started at Wed Oct 18 14:01:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 31721 at Wed Oct 18 14:01:00 UTC 2023 kill -USR1 31721 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31721 killed at Wed Oct 18 14:01:00 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31773 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31773 found at Wed Oct 18 14:01:00 UTC 2023 selfserv_9997 with PID 31773 started at Wed Oct 18 14:01:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 31773 at Wed Oct 18 14:01:00 UTC 2023 kill -USR1 31773 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31773 killed at Wed Oct 18 14:01:00 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31825 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31825 found at Wed Oct 18 14:01:00 UTC 2023 selfserv_9997 with PID 31825 started at Wed Oct 18 14:01:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 31825 at Wed Oct 18 14:01:00 UTC 2023 kill -USR1 31825 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31825 killed at Wed Oct 18 14:01:00 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31891 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31891 found at Wed Oct 18 14:01:00 UTC 2023 selfserv_9997 with PID 31891 started at Wed Oct 18 14:01:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 31891 at Wed Oct 18 14:01:00 UTC 2023 kill -USR1 31891 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31891 killed at Wed Oct 18 14:01:00 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31943 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31943 found at Wed Oct 18 14:01:00 UTC 2023 selfserv_9997 with PID 31943 started at Wed Oct 18 14:01:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31943 at Wed Oct 18 14:01:00 UTC 2023 kill -USR1 31943 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31943 killed at Wed Oct 18 14:01:00 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31995 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31995 found at Wed Oct 18 14:01:00 UTC 2023 selfserv_9997 with PID 31995 started at Wed Oct 18 14:01:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 31995 at Wed Oct 18 14:01:00 UTC 2023 kill -USR1 31995 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31995 killed at Wed Oct 18 14:01:00 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32062 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32062 found at Wed Oct 18 14:01:00 UTC 2023 selfserv_9997 with PID 32062 started at Wed Oct 18 14:01:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32062 at Wed Oct 18 14:01:01 UTC 2023 kill -USR1 32062 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32062 killed at Wed Oct 18 14:01:01 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32129 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32129 found at Wed Oct 18 14:01:01 UTC 2023 selfserv_9997 with PID 32129 started at Wed Oct 18 14:01:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32129 at Wed Oct 18 14:01:01 UTC 2023 kill -USR1 32129 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32129 killed at Wed Oct 18 14:01:01 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32181 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32181 found at Wed Oct 18 14:01:01 UTC 2023 selfserv_9997 with PID 32181 started at Wed Oct 18 14:01:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32181 at Wed Oct 18 14:01:01 UTC 2023 kill -USR1 32181 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32181 killed at Wed Oct 18 14:01:01 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32247 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32247 found at Wed Oct 18 14:01:01 UTC 2023 selfserv_9997 with PID 32247 started at Wed Oct 18 14:01:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32247 at Wed Oct 18 14:01:02 UTC 2023 kill -USR1 32247 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32247 killed at Wed Oct 18 14:01:02 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32299 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32299 found at Wed Oct 18 14:01:02 UTC 2023 selfserv_9997 with PID 32299 started at Wed Oct 18 14:01:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32299 at Wed Oct 18 14:01:02 UTC 2023 kill -USR1 32299 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32299 killed at Wed Oct 18 14:01:02 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32351 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32351 found at Wed Oct 18 14:01:02 UTC 2023 selfserv_9997 with PID 32351 started at Wed Oct 18 14:01:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32351 at Wed Oct 18 14:01:02 UTC 2023 kill -USR1 32351 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32351 killed at Wed Oct 18 14:01:02 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32417 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32417 found at Wed Oct 18 14:01:02 UTC 2023 selfserv_9997 with PID 32417 started at Wed Oct 18 14:01:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 32417 at Wed Oct 18 14:01:02 UTC 2023 kill -USR1 32417 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32417 killed at Wed Oct 18 14:01:02 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32470 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32470 found at Wed Oct 18 14:01:02 UTC 2023 selfserv_9997 with PID 32470 started at Wed Oct 18 14:01:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32470 at Wed Oct 18 14:01:02 UTC 2023 kill -USR1 32470 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32470 killed at Wed Oct 18 14:01:02 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32522 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32522 found at Wed Oct 18 14:01:02 UTC 2023 selfserv_9997 with PID 32522 started at Wed Oct 18 14:01:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 32522 at Wed Oct 18 14:01:03 UTC 2023 kill -USR1 32522 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32522 killed at Wed Oct 18 14:01:03 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32588 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32588 found at Wed Oct 18 14:01:03 UTC 2023 selfserv_9997 with PID 32588 started at Wed Oct 18 14:01:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 32588 at Wed Oct 18 14:01:03 UTC 2023 kill -USR1 32588 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32588 killed at Wed Oct 18 14:01:03 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32640 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32640 found at Wed Oct 18 14:01:03 UTC 2023 selfserv_9997 with PID 32640 started at Wed Oct 18 14:01:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 32640 at Wed Oct 18 14:01:03 UTC 2023 kill -USR1 32640 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32640 killed at Wed Oct 18 14:01:03 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32692 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32692 found at Wed Oct 18 14:01:03 UTC 2023 selfserv_9997 with PID 32692 started at Wed Oct 18 14:01:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 32692 at Wed Oct 18 14:01:04 UTC 2023 kill -USR1 32692 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32692 killed at Wed Oct 18 14:01:04 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32758 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32758 found at Wed Oct 18 14:01:04 UTC 2023 selfserv_9997 with PID 32758 started at Wed Oct 18 14:01:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 32758 at Wed Oct 18 14:01:04 UTC 2023 kill -USR1 32758 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32758 killed at Wed Oct 18 14:01:04 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 342 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 342 found at Wed Oct 18 14:01:04 UTC 2023 selfserv_9997 with PID 342 started at Wed Oct 18 14:01:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 342 at Wed Oct 18 14:01:04 UTC 2023 kill -USR1 342 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 342 killed at Wed Oct 18 14:01:04 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 394 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 394 found at Wed Oct 18 14:01:04 UTC 2023 selfserv_9997 with PID 394 started at Wed Oct 18 14:01:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 394 at Wed Oct 18 14:01:04 UTC 2023 kill -USR1 394 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 394 killed at Wed Oct 18 14:01:04 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 461 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 461 found at Wed Oct 18 14:01:04 UTC 2023 selfserv_9997 with PID 461 started at Wed Oct 18 14:01:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 461 at Wed Oct 18 14:01:04 UTC 2023 kill -USR1 461 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 461 killed at Wed Oct 18 14:01:04 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 515 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 515 found at Wed Oct 18 14:01:04 UTC 2023 selfserv_9997 with PID 515 started at Wed Oct 18 14:01:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 515 at Wed Oct 18 14:01:05 UTC 2023 kill -USR1 515 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 515 killed at Wed Oct 18 14:01:05 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 574 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 574 found at Wed Oct 18 14:01:05 UTC 2023 selfserv_9997 with PID 574 started at Wed Oct 18 14:01:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 574 at Wed Oct 18 14:01:05 UTC 2023 kill -USR1 574 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 574 killed at Wed Oct 18 14:01:05 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 643 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 643 found at Wed Oct 18 14:01:05 UTC 2023 selfserv_9997 with PID 643 started at Wed Oct 18 14:01:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 643 at Wed Oct 18 14:01:05 UTC 2023 kill -USR1 643 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 643 killed at Wed Oct 18 14:01:05 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 702 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 702 found at Wed Oct 18 14:01:05 UTC 2023 selfserv_9997 with PID 702 started at Wed Oct 18 14:01:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 702 at Wed Oct 18 14:01:06 UTC 2023 kill -USR1 702 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 702 killed at Wed Oct 18 14:01:06 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 765 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 765 found at Wed Oct 18 14:01:06 UTC 2023 selfserv_9997 with PID 765 started at Wed Oct 18 14:01:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 765 at Wed Oct 18 14:01:06 UTC 2023 kill -USR1 765 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 765 killed at Wed Oct 18 14:01:06 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 849 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 849 found at Wed Oct 18 14:01:06 UTC 2023 selfserv_9997 with PID 849 started at Wed Oct 18 14:01:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 849 at Wed Oct 18 14:01:06 UTC 2023 kill -USR1 849 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 849 killed at Wed Oct 18 14:01:06 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 917 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 917 found at Wed Oct 18 14:01:06 UTC 2023 selfserv_9997 with PID 917 started at Wed Oct 18 14:01:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 917 at Wed Oct 18 14:01:06 UTC 2023 kill -USR1 917 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 917 killed at Wed Oct 18 14:01:06 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 972 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 972 found at Wed Oct 18 14:01:06 UTC 2023 selfserv_9997 with PID 972 started at Wed Oct 18 14:01:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 972 at Wed Oct 18 14:01:07 UTC 2023 kill -USR1 972 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 972 killed at Wed Oct 18 14:01:07 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1038 found at Wed Oct 18 14:01:07 UTC 2023 selfserv_9997 with PID 1038 started at Wed Oct 18 14:01:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1038 at Wed Oct 18 14:01:07 UTC 2023 kill -USR1 1038 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1038 killed at Wed Oct 18 14:01:07 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1092 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1092 found at Wed Oct 18 14:01:07 UTC 2023 selfserv_9997 with PID 1092 started at Wed Oct 18 14:01:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1092 at Wed Oct 18 14:01:07 UTC 2023 kill -USR1 1092 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1092 killed at Wed Oct 18 14:01:07 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1144 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1144 found at Wed Oct 18 14:01:07 UTC 2023 selfserv_9997 with PID 1144 started at Wed Oct 18 14:01:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1144 at Wed Oct 18 14:01:07 UTC 2023 kill -USR1 1144 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1144 killed at Wed Oct 18 14:01:07 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1232 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1232 found at Wed Oct 18 14:01:07 UTC 2023 selfserv_9997 with PID 1232 started at Wed Oct 18 14:01:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1232 at Wed Oct 18 14:01:08 UTC 2023 kill -USR1 1232 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1232 killed at Wed Oct 18 14:01:08 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1293 found at Wed Oct 18 14:01:08 UTC 2023 selfserv_9997 with PID 1293 started at Wed Oct 18 14:01:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1293 at Wed Oct 18 14:01:08 UTC 2023 kill -USR1 1293 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1293 killed at Wed Oct 18 14:01:08 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1347 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1347 found at Wed Oct 18 14:01:08 UTC 2023 selfserv_9997 with PID 1347 started at Wed Oct 18 14:01:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1347 at Wed Oct 18 14:01:08 UTC 2023 kill -USR1 1347 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1347 killed at Wed Oct 18 14:01:08 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1414 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1414 found at Wed Oct 18 14:01:08 UTC 2023 selfserv_9997 with PID 1414 started at Wed Oct 18 14:01:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1414 at Wed Oct 18 14:01:09 UTC 2023 kill -USR1 1414 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1414 killed at Wed Oct 18 14:01:09 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1466 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1466 found at Wed Oct 18 14:01:09 UTC 2023 selfserv_9997 with PID 1466 started at Wed Oct 18 14:01:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1466 at Wed Oct 18 14:01:09 UTC 2023 kill -USR1 1466 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1466 killed at Wed Oct 18 14:01:09 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1518 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1518 found at Wed Oct 18 14:01:09 UTC 2023 selfserv_9997 with PID 1518 started at Wed Oct 18 14:01:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1518 at Wed Oct 18 14:01:09 UTC 2023 kill -USR1 1518 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1518 killed at Wed Oct 18 14:01:09 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1584 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1584 found at Wed Oct 18 14:01:09 UTC 2023 selfserv_9997 with PID 1584 started at Wed Oct 18 14:01:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1584 at Wed Oct 18 14:01:09 UTC 2023 kill -USR1 1584 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1584 killed at Wed Oct 18 14:01:09 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1636 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1636 found at Wed Oct 18 14:01:09 UTC 2023 selfserv_9997 with PID 1636 started at Wed Oct 18 14:01:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1636 at Wed Oct 18 14:01:09 UTC 2023 kill -USR1 1636 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1636 killed at Wed Oct 18 14:01:10 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1688 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1688 found at Wed Oct 18 14:01:10 UTC 2023 selfserv_9997 with PID 1688 started at Wed Oct 18 14:01:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1688 at Wed Oct 18 14:01:10 UTC 2023 kill -USR1 1688 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1688 killed at Wed Oct 18 14:01:10 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1754 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1754 found at Wed Oct 18 14:01:10 UTC 2023 selfserv_9997 with PID 1754 started at Wed Oct 18 14:01:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1754 at Wed Oct 18 14:01:10 UTC 2023 kill -USR1 1754 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1754 killed at Wed Oct 18 14:01:10 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1806 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1806 found at Wed Oct 18 14:01:10 UTC 2023 selfserv_9997 with PID 1806 started at Wed Oct 18 14:01:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1806 at Wed Oct 18 14:01:10 UTC 2023 kill -USR1 1806 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1806 killed at Wed Oct 18 14:01:10 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1858 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1858 found at Wed Oct 18 14:01:10 UTC 2023 selfserv_9997 with PID 1858 started at Wed Oct 18 14:01:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1858 at Wed Oct 18 14:01:11 UTC 2023 kill -USR1 1858 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1858 killed at Wed Oct 18 14:01:11 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1924 found at Wed Oct 18 14:01:11 UTC 2023 selfserv_9997 with PID 1924 started at Wed Oct 18 14:01:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1924 at Wed Oct 18 14:01:11 UTC 2023 kill -USR1 1924 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1924 killed at Wed Oct 18 14:01:11 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1976 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1976 found at Wed Oct 18 14:01:11 UTC 2023 selfserv_9997 with PID 1976 started at Wed Oct 18 14:01:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1976 at Wed Oct 18 14:01:11 UTC 2023 kill -USR1 1976 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1976 killed at Wed Oct 18 14:01:11 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2028 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2028 found at Wed Oct 18 14:01:11 UTC 2023 selfserv_9997 with PID 2028 started at Wed Oct 18 14:01:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2028 at Wed Oct 18 14:01:11 UTC 2023 kill -USR1 2028 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2028 killed at Wed Oct 18 14:01:11 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2095 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2095 found at Wed Oct 18 14:01:11 UTC 2023 selfserv_9997 with PID 2095 started at Wed Oct 18 14:01:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2095 at Wed Oct 18 14:01:11 UTC 2023 kill -USR1 2095 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2095 killed at Wed Oct 18 14:01:11 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2148 found at Wed Oct 18 14:01:11 UTC 2023 selfserv_9997 with PID 2148 started at Wed Oct 18 14:01:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2148 at Wed Oct 18 14:01:12 UTC 2023 kill -USR1 2148 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2148 killed at Wed Oct 18 14:01:12 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2200 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2200 found at Wed Oct 18 14:01:12 UTC 2023 selfserv_9997 with PID 2200 started at Wed Oct 18 14:01:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2200 at Wed Oct 18 14:01:12 UTC 2023 kill -USR1 2200 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2200 killed at Wed Oct 18 14:01:12 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2266 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2266 found at Wed Oct 18 14:01:12 UTC 2023 selfserv_9997 with PID 2266 started at Wed Oct 18 14:01:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2266 at Wed Oct 18 14:01:12 UTC 2023 kill -USR1 2266 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2266 killed at Wed Oct 18 14:01:12 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2318 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2318 found at Wed Oct 18 14:01:12 UTC 2023 selfserv_9997 with PID 2318 started at Wed Oct 18 14:01:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2318 at Wed Oct 18 14:01:13 UTC 2023 kill -USR1 2318 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2318 killed at Wed Oct 18 14:01:13 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2370 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2370 found at Wed Oct 18 14:01:13 UTC 2023 selfserv_9997 with PID 2370 started at Wed Oct 18 14:01:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2370 at Wed Oct 18 14:01:13 UTC 2023 kill -USR1 2370 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2370 killed at Wed Oct 18 14:01:13 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2436 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2436 found at Wed Oct 18 14:01:13 UTC 2023 selfserv_9997 with PID 2436 started at Wed Oct 18 14:01:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2436 at Wed Oct 18 14:01:13 UTC 2023 kill -USR1 2436 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2436 killed at Wed Oct 18 14:01:13 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2489 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2489 found at Wed Oct 18 14:01:13 UTC 2023 selfserv_9997 with PID 2489 started at Wed Oct 18 14:01:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2489 at Wed Oct 18 14:01:13 UTC 2023 kill -USR1 2489 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2489 killed at Wed Oct 18 14:01:13 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2541 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2541 found at Wed Oct 18 14:01:13 UTC 2023 selfserv_9997 with PID 2541 started at Wed Oct 18 14:01:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2541 at Wed Oct 18 14:01:13 UTC 2023 kill -USR1 2541 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2541 killed at Wed Oct 18 14:01:13 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2607 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2607 found at Wed Oct 18 14:01:13 UTC 2023 selfserv_9997 with PID 2607 started at Wed Oct 18 14:01:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2607 at Wed Oct 18 14:01:14 UTC 2023 kill -USR1 2607 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2607 killed at Wed Oct 18 14:01:14 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2660 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2660 found at Wed Oct 18 14:01:14 UTC 2023 selfserv_9997 with PID 2660 started at Wed Oct 18 14:01:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2660 at Wed Oct 18 14:01:14 UTC 2023 kill -USR1 2660 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2660 killed at Wed Oct 18 14:01:14 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2712 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2712 found at Wed Oct 18 14:01:14 UTC 2023 selfserv_9997 with PID 2712 started at Wed Oct 18 14:01:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2712 at Wed Oct 18 14:01:14 UTC 2023 kill -USR1 2712 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2712 killed at Wed Oct 18 14:01:14 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2778 found at Wed Oct 18 14:01:14 UTC 2023 selfserv_9997 with PID 2778 started at Wed Oct 18 14:01:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2778 at Wed Oct 18 14:01:14 UTC 2023 kill -USR1 2778 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2778 killed at Wed Oct 18 14:01:14 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2830 found at Wed Oct 18 14:01:14 UTC 2023 selfserv_9997 with PID 2830 started at Wed Oct 18 14:01:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2830 at Wed Oct 18 14:01:14 UTC 2023 kill -USR1 2830 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2830 killed at Wed Oct 18 14:01:14 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2882 found at Wed Oct 18 14:01:14 UTC 2023 selfserv_9997 with PID 2882 started at Wed Oct 18 14:01:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2882 at Wed Oct 18 14:01:15 UTC 2023 kill -USR1 2882 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2882 killed at Wed Oct 18 14:01:15 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2950 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2950 found at Wed Oct 18 14:01:15 UTC 2023 selfserv_9997 with PID 2950 started at Wed Oct 18 14:01:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2950 at Wed Oct 18 14:01:15 UTC 2023 kill -USR1 2950 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2950 killed at Wed Oct 18 14:01:15 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3002 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3002 found at Wed Oct 18 14:01:15 UTC 2023 selfserv_9997 with PID 3002 started at Wed Oct 18 14:01:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3002 at Wed Oct 18 14:01:15 UTC 2023 kill -USR1 3002 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3002 killed at Wed Oct 18 14:01:15 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3054 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3054 found at Wed Oct 18 14:01:15 UTC 2023 selfserv_9997 with PID 3054 started at Wed Oct 18 14:01:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3054 at Wed Oct 18 14:01:15 UTC 2023 kill -USR1 3054 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3054 killed at Wed Oct 18 14:01:15 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3120 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3120 found at Wed Oct 18 14:01:15 UTC 2023 selfserv_9997 with PID 3120 started at Wed Oct 18 14:01:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3120 at Wed Oct 18 14:01:15 UTC 2023 kill -USR1 3120 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3120 killed at Wed Oct 18 14:01:15 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3172 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3172 found at Wed Oct 18 14:01:15 UTC 2023 selfserv_9997 with PID 3172 started at Wed Oct 18 14:01:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3172 at Wed Oct 18 14:01:16 UTC 2023 kill -USR1 3172 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3172 killed at Wed Oct 18 14:01:16 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3224 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3224 found at Wed Oct 18 14:01:16 UTC 2023 selfserv_9997 with PID 3224 started at Wed Oct 18 14:01:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3224 at Wed Oct 18 14:01:16 UTC 2023 kill -USR1 3224 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3224 killed at Wed Oct 18 14:01:16 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3291 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3291 found at Wed Oct 18 14:01:16 UTC 2023 selfserv_9997 with PID 3291 started at Wed Oct 18 14:01:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3291 at Wed Oct 18 14:01:16 UTC 2023 kill -USR1 3291 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3291 killed at Wed Oct 18 14:01:16 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3343 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3343 found at Wed Oct 18 14:01:16 UTC 2023 selfserv_9997 with PID 3343 started at Wed Oct 18 14:01:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3343 at Wed Oct 18 14:01:16 UTC 2023 kill -USR1 3343 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3343 killed at Wed Oct 18 14:01:16 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3395 found at Wed Oct 18 14:01:16 UTC 2023 selfserv_9997 with PID 3395 started at Wed Oct 18 14:01:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3395 at Wed Oct 18 14:01:17 UTC 2023 kill -USR1 3395 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3395 killed at Wed Oct 18 14:01:17 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3461 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3461 found at Wed Oct 18 14:01:17 UTC 2023 selfserv_9997 with PID 3461 started at Wed Oct 18 14:01:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3461 at Wed Oct 18 14:01:17 UTC 2023 kill -USR1 3461 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3461 killed at Wed Oct 18 14:01:17 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3513 found at Wed Oct 18 14:01:17 UTC 2023 selfserv_9997 with PID 3513 started at Wed Oct 18 14:01:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3513 at Wed Oct 18 14:01:17 UTC 2023 kill -USR1 3513 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3513 killed at Wed Oct 18 14:01:17 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3565 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3565 found at Wed Oct 18 14:01:17 UTC 2023 selfserv_9997 with PID 3565 started at Wed Oct 18 14:01:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3565 at Wed Oct 18 14:01:17 UTC 2023 kill -USR1 3565 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3565 killed at Wed Oct 18 14:01:17 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3631 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3631 found at Wed Oct 18 14:01:17 UTC 2023 selfserv_9997 with PID 3631 started at Wed Oct 18 14:01:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3631 at Wed Oct 18 14:01:17 UTC 2023 kill -USR1 3631 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3631 killed at Wed Oct 18 14:01:17 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3683 found at Wed Oct 18 14:01:17 UTC 2023 selfserv_9997 with PID 3683 started at Wed Oct 18 14:01:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3683 at Wed Oct 18 14:01:18 UTC 2023 kill -USR1 3683 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3683 killed at Wed Oct 18 14:01:18 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3735 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3735 found at Wed Oct 18 14:01:18 UTC 2023 selfserv_9997 with PID 3735 started at Wed Oct 18 14:01:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3735 at Wed Oct 18 14:01:18 UTC 2023 kill -USR1 3735 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3735 killed at Wed Oct 18 14:01:18 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3801 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3801 found at Wed Oct 18 14:01:18 UTC 2023 selfserv_9997 with PID 3801 started at Wed Oct 18 14:01:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #109: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3801 at Wed Oct 18 14:01:18 UTC 2023 kill -USR1 3801 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3801 killed at Wed Oct 18 14:01:18 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3854 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3854 found at Wed Oct 18 14:01:18 UTC 2023 selfserv_9997 with PID 3854 started at Wed Oct 18 14:01:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3854 at Wed Oct 18 14:01:18 UTC 2023 kill -USR1 3854 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3854 killed at Wed Oct 18 14:01:18 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3906 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3906 found at Wed Oct 18 14:01:18 UTC 2023 selfserv_9997 with PID 3906 started at Wed Oct 18 14:01:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #111: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3906 at Wed Oct 18 14:01:18 UTC 2023 kill -USR1 3906 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3906 killed at Wed Oct 18 14:01:18 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3972 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3972 found at Wed Oct 18 14:01:18 UTC 2023 selfserv_9997 with PID 3972 started at Wed Oct 18 14:01:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #112: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 3972 at Wed Oct 18 14:01:18 UTC 2023 kill -USR1 3972 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3972 killed at Wed Oct 18 14:01:18 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4024 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4024 found at Wed Oct 18 14:01:18 UTC 2023 selfserv_9997 with PID 4024 started at Wed Oct 18 14:01:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #113: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4024 at Wed Oct 18 14:01:19 UTC 2023 kill -USR1 4024 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4024 killed at Wed Oct 18 14:01:19 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4076 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4076 found at Wed Oct 18 14:01:19 UTC 2023 selfserv_9997 with PID 4076 started at Wed Oct 18 14:01:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #114: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 4076 at Wed Oct 18 14:01:19 UTC 2023 kill -USR1 4076 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4076 killed at Wed Oct 18 14:01:19 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4142 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4142 found at Wed Oct 18 14:01:19 UTC 2023 selfserv_9997 with PID 4142 started at Wed Oct 18 14:01:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #115: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 4142 at Wed Oct 18 14:01:19 UTC 2023 kill -USR1 4142 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4142 killed at Wed Oct 18 14:01:19 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4194 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4194 found at Wed Oct 18 14:01:19 UTC 2023 selfserv_9997 with PID 4194 started at Wed Oct 18 14:01:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #116: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 4194 at Wed Oct 18 14:01:19 UTC 2023 kill -USR1 4194 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4194 killed at Wed Oct 18 14:01:19 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4246 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4246 found at Wed Oct 18 14:01:19 UTC 2023 selfserv_9997 with PID 4246 started at Wed Oct 18 14:01:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #117: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 4246 at Wed Oct 18 14:01:19 UTC 2023 kill -USR1 4246 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4246 killed at Wed Oct 18 14:01:19 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4312 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4312 found at Wed Oct 18 14:01:19 UTC 2023 selfserv_9997 with PID 4312 started at Wed Oct 18 14:01:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #118: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 4312 at Wed Oct 18 14:01:19 UTC 2023 kill -USR1 4312 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4312 killed at Wed Oct 18 14:01:19 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4365 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4365 found at Wed Oct 18 14:01:19 UTC 2023 selfserv_9997 with PID 4365 started at Wed Oct 18 14:01:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4365 at Wed Oct 18 14:01:19 UTC 2023 kill -USR1 4365 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4365 killed at Wed Oct 18 14:01:19 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4417 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4417 found at Wed Oct 18 14:01:19 UTC 2023 selfserv_9997 with PID 4417 started at Wed Oct 18 14:01:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #120: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 4417 at Wed Oct 18 14:01:20 UTC 2023 kill -USR1 4417 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4417 killed at Wed Oct 18 14:01:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4483 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4483 found at Wed Oct 18 14:01:20 UTC 2023 selfserv_9997 with PID 4483 started at Wed Oct 18 14:01:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #121: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4483 at Wed Oct 18 14:01:20 UTC 2023 kill -USR1 4483 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4483 killed at Wed Oct 18 14:01:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4535 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4535 found at Wed Oct 18 14:01:20 UTC 2023 selfserv_9997 with PID 4535 started at Wed Oct 18 14:01:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4535 at Wed Oct 18 14:01:20 UTC 2023 kill -USR1 4535 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4535 killed at Wed Oct 18 14:01:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4587 found at Wed Oct 18 14:01:20 UTC 2023 selfserv_9997 with PID 4587 started at Wed Oct 18 14:01:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #123: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4587 at Wed Oct 18 14:01:20 UTC 2023 kill -USR1 4587 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4587 killed at Wed Oct 18 14:01:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4653 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4653 found at Wed Oct 18 14:01:20 UTC 2023 selfserv_9997 with PID 4653 started at Wed Oct 18 14:01:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #124: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 4653 at Wed Oct 18 14:01:20 UTC 2023 kill -USR1 4653 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4653 killed at Wed Oct 18 14:01:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4705 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4705 found at Wed Oct 18 14:01:20 UTC 2023 selfserv_9997 with PID 4705 started at Wed Oct 18 14:01:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #125: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4705 at Wed Oct 18 14:01:20 UTC 2023 kill -USR1 4705 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4705 killed at Wed Oct 18 14:01:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4757 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4757 found at Wed Oct 18 14:01:20 UTC 2023 selfserv_9997 with PID 4757 started at Wed Oct 18 14:01:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #126: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 4757 at Wed Oct 18 14:01:21 UTC 2023 kill -USR1 4757 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4757 killed at Wed Oct 18 14:01:21 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4823 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4823 found at Wed Oct 18 14:01:21 UTC 2023 selfserv_9997 with PID 4823 started at Wed Oct 18 14:01:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #127: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 4823 at Wed Oct 18 14:01:21 UTC 2023 kill -USR1 4823 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4823 killed at Wed Oct 18 14:01:21 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4875 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4875 found at Wed Oct 18 14:01:21 UTC 2023 selfserv_9997 with PID 4875 started at Wed Oct 18 14:01:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #128: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 4875 at Wed Oct 18 14:01:21 UTC 2023 kill -USR1 4875 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4875 killed at Wed Oct 18 14:01:21 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4927 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4927 found at Wed Oct 18 14:01:21 UTC 2023 selfserv_9997 with PID 4927 started at Wed Oct 18 14:01:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #129: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 4927 at Wed Oct 18 14:01:21 UTC 2023 kill -USR1 4927 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4927 killed at Wed Oct 18 14:01:21 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4993 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4993 found at Wed Oct 18 14:01:21 UTC 2023 selfserv_9997 with PID 4993 started at Wed Oct 18 14:01:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #130: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 4993 at Wed Oct 18 14:01:21 UTC 2023 kill -USR1 4993 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4993 killed at Wed Oct 18 14:01:21 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5045 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5045 found at Wed Oct 18 14:01:21 UTC 2023 selfserv_9997 with PID 5045 started at Wed Oct 18 14:01:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5045 at Wed Oct 18 14:01:21 UTC 2023 kill -USR1 5045 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5045 killed at Wed Oct 18 14:01:21 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5097 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5097 found at Wed Oct 18 14:01:21 UTC 2023 selfserv_9997 with PID 5097 started at Wed Oct 18 14:01:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #132: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 5097 at Wed Oct 18 14:01:21 UTC 2023 kill -USR1 5097 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5097 killed at Wed Oct 18 14:01:21 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5163 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5163 found at Wed Oct 18 14:01:21 UTC 2023 selfserv_9997 with PID 5163 started at Wed Oct 18 14:01:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5163 at Wed Oct 18 14:01:22 UTC 2023 kill -USR1 5163 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5163 killed at Wed Oct 18 14:01:22 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5216 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5216 found at Wed Oct 18 14:01:22 UTC 2023 selfserv_9997 with PID 5216 started at Wed Oct 18 14:01:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5216 at Wed Oct 18 14:01:22 UTC 2023 kill -USR1 5216 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5216 killed at Wed Oct 18 14:01:22 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5268 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5268 found at Wed Oct 18 14:01:22 UTC 2023 selfserv_9997 with PID 5268 started at Wed Oct 18 14:01:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5268 at Wed Oct 18 14:01:22 UTC 2023 kill -USR1 5268 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5268 killed at Wed Oct 18 14:01:22 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5334 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5334 found at Wed Oct 18 14:01:22 UTC 2023 selfserv_9997 with PID 5334 started at Wed Oct 18 14:01:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #136: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5334 at Wed Oct 18 14:01:22 UTC 2023 kill -USR1 5334 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5334 killed at Wed Oct 18 14:01:22 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5386 found at Wed Oct 18 14:01:22 UTC 2023 selfserv_9997 with PID 5386 started at Wed Oct 18 14:01:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #137: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5386 at Wed Oct 18 14:01:23 UTC 2023 kill -USR1 5386 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5386 killed at Wed Oct 18 14:01:23 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5438 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5438 found at Wed Oct 18 14:01:23 UTC 2023 selfserv_9997 with PID 5438 started at Wed Oct 18 14:01:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #138: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5438 at Wed Oct 18 14:01:23 UTC 2023 kill -USR1 5438 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5438 killed at Wed Oct 18 14:01:23 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5504 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5504 found at Wed Oct 18 14:01:23 UTC 2023 selfserv_9997 with PID 5504 started at Wed Oct 18 14:01:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5504 at Wed Oct 18 14:01:23 UTC 2023 kill -USR1 5504 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5504 killed at Wed Oct 18 14:01:23 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5556 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5556 found at Wed Oct 18 14:01:23 UTC 2023 selfserv_9997 with PID 5556 started at Wed Oct 18 14:01:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5556 at Wed Oct 18 14:01:23 UTC 2023 kill -USR1 5556 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5556 killed at Wed Oct 18 14:01:23 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5608 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5608 found at Wed Oct 18 14:01:23 UTC 2023 selfserv_9997 with PID 5608 started at Wed Oct 18 14:01:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5608 at Wed Oct 18 14:01:23 UTC 2023 kill -USR1 5608 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5608 killed at Wed Oct 18 14:01:23 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5674 found at Wed Oct 18 14:01:24 UTC 2023 selfserv_9997 with PID 5674 started at Wed Oct 18 14:01:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #142: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5674 at Wed Oct 18 14:01:24 UTC 2023 kill -USR1 5674 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5674 killed at Wed Oct 18 14:01:24 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5726 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5726 found at Wed Oct 18 14:01:24 UTC 2023 selfserv_9997 with PID 5726 started at Wed Oct 18 14:01:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5726 at Wed Oct 18 14:01:24 UTC 2023 kill -USR1 5726 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5726 killed at Wed Oct 18 14:01:24 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5778 found at Wed Oct 18 14:01:24 UTC 2023 selfserv_9997 with PID 5778 started at Wed Oct 18 14:01:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #144: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5778 at Wed Oct 18 14:01:24 UTC 2023 kill -USR1 5778 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5778 killed at Wed Oct 18 14:01:24 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5844 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5844 found at Wed Oct 18 14:01:24 UTC 2023 selfserv_9997 with PID 5844 started at Wed Oct 18 14:01:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5844 at Wed Oct 18 14:01:24 UTC 2023 kill -USR1 5844 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5844 killed at Wed Oct 18 14:01:24 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5896 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5896 found at Wed Oct 18 14:01:25 UTC 2023 selfserv_9997 with PID 5896 started at Wed Oct 18 14:01:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5896 at Wed Oct 18 14:01:25 UTC 2023 kill -USR1 5896 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5896 killed at Wed Oct 18 14:01:25 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5948 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5948 found at Wed Oct 18 14:01:25 UTC 2023 selfserv_9997 with PID 5948 started at Wed Oct 18 14:01:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5948 at Wed Oct 18 14:01:25 UTC 2023 kill -USR1 5948 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5948 killed at Wed Oct 18 14:01:25 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6014 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6014 found at Wed Oct 18 14:01:25 UTC 2023 selfserv_9997 with PID 6014 started at Wed Oct 18 14:01:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6014 at Wed Oct 18 14:01:25 UTC 2023 kill -USR1 6014 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6014 killed at Wed Oct 18 14:01:25 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6066 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6066 found at Wed Oct 18 14:01:25 UTC 2023 selfserv_9997 with PID 6066 started at Wed Oct 18 14:01:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6066 at Wed Oct 18 14:01:25 UTC 2023 kill -USR1 6066 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6066 killed at Wed Oct 18 14:01:25 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6118 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6118 found at Wed Oct 18 14:01:25 UTC 2023 selfserv_9997 with PID 6118 started at Wed Oct 18 14:01:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6118 at Wed Oct 18 14:01:26 UTC 2023 kill -USR1 6118 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6118 killed at Wed Oct 18 14:01:26 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6184 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6184 found at Wed Oct 18 14:01:26 UTC 2023 selfserv_9997 with PID 6184 started at Wed Oct 18 14:01:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6184 at Wed Oct 18 14:01:26 UTC 2023 kill -USR1 6184 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6184 killed at Wed Oct 18 14:01:26 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6236 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6236 found at Wed Oct 18 14:01:26 UTC 2023 selfserv_9997 with PID 6236 started at Wed Oct 18 14:01:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6236 at Wed Oct 18 14:01:26 UTC 2023 kill -USR1 6236 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6236 killed at Wed Oct 18 14:01:26 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6288 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6288 found at Wed Oct 18 14:01:26 UTC 2023 selfserv_9997 with PID 6288 started at Wed Oct 18 14:01:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6288 at Wed Oct 18 14:01:26 UTC 2023 kill -USR1 6288 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6288 killed at Wed Oct 18 14:01:26 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6354 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6354 found at Wed Oct 18 14:01:26 UTC 2023 selfserv_9997 with PID 6354 started at Wed Oct 18 14:01:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #154: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6354 at Wed Oct 18 14:01:27 UTC 2023 kill -USR1 6354 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6354 killed at Wed Oct 18 14:01:27 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6406 found at Wed Oct 18 14:01:27 UTC 2023 selfserv_9997 with PID 6406 started at Wed Oct 18 14:01:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6406 at Wed Oct 18 14:01:27 UTC 2023 kill -USR1 6406 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6406 killed at Wed Oct 18 14:01:27 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6458 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6458 found at Wed Oct 18 14:01:27 UTC 2023 selfserv_9997 with PID 6458 started at Wed Oct 18 14:01:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6458 at Wed Oct 18 14:01:27 UTC 2023 kill -USR1 6458 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6458 killed at Wed Oct 18 14:01:27 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6524 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6524 found at Wed Oct 18 14:01:27 UTC 2023 selfserv_9997 with PID 6524 started at Wed Oct 18 14:01:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6524 at Wed Oct 18 14:01:27 UTC 2023 kill -USR1 6524 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6524 killed at Wed Oct 18 14:01:27 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6576 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6576 found at Wed Oct 18 14:01:27 UTC 2023 selfserv_9997 with PID 6576 started at Wed Oct 18 14:01:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6576 at Wed Oct 18 14:01:27 UTC 2023 kill -USR1 6576 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6576 killed at Wed Oct 18 14:01:27 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6628 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6628 found at Wed Oct 18 14:01:27 UTC 2023 selfserv_9997 with PID 6628 started at Wed Oct 18 14:01:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6628 at Wed Oct 18 14:01:28 UTC 2023 kill -USR1 6628 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6628 killed at Wed Oct 18 14:01:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6694 found at Wed Oct 18 14:01:28 UTC 2023 selfserv_9997 with PID 6694 started at Wed Oct 18 14:01:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6694 at Wed Oct 18 14:01:28 UTC 2023 kill -USR1 6694 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6694 killed at Wed Oct 18 14:01:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6746 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6746 found at Wed Oct 18 14:01:28 UTC 2023 selfserv_9997 with PID 6746 started at Wed Oct 18 14:01:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6746 at Wed Oct 18 14:01:28 UTC 2023 kill -USR1 6746 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6746 killed at Wed Oct 18 14:01:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6798 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6798 found at Wed Oct 18 14:01:28 UTC 2023 selfserv_9997 with PID 6798 started at Wed Oct 18 14:01:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6798 at Wed Oct 18 14:01:28 UTC 2023 kill -USR1 6798 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6798 killed at Wed Oct 18 14:01:28 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6864 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6864 found at Wed Oct 18 14:01:28 UTC 2023 selfserv_9997 with PID 6864 started at Wed Oct 18 14:01:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6864 at Wed Oct 18 14:01:28 UTC 2023 kill -USR1 6864 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6864 killed at Wed Oct 18 14:01:28 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6916 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6916 found at Wed Oct 18 14:01:28 UTC 2023 selfserv_9997 with PID 6916 started at Wed Oct 18 14:01:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6916 at Wed Oct 18 14:01:29 UTC 2023 kill -USR1 6916 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6916 killed at Wed Oct 18 14:01:29 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:01:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6968 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6968 found at Wed Oct 18 14:01:29 UTC 2023 selfserv_9997 with PID 6968 started at Wed Oct 18 14:01:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6968 at Wed Oct 18 14:01:29 UTC 2023 kill -USR1 6968 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6968 killed at Wed Oct 18 14:01:29 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7034 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7034 found at Wed Oct 18 14:01:29 UTC 2023 selfserv_9997 with PID 7034 started at Wed Oct 18 14:01:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #166: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7034 at Wed Oct 18 14:01:29 UTC 2023 kill -USR1 7034 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7034 killed at Wed Oct 18 14:01:29 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7086 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7086 found at Wed Oct 18 14:01:29 UTC 2023 selfserv_9997 with PID 7086 started at Wed Oct 18 14:01:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #167: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7086 at Wed Oct 18 14:01:29 UTC 2023 kill -USR1 7086 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7086 killed at Wed Oct 18 14:01:29 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7138 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7138 found at Wed Oct 18 14:01:29 UTC 2023 selfserv_9997 with PID 7138 started at Wed Oct 18 14:01:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #168: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7138 at Wed Oct 18 14:01:29 UTC 2023 kill -USR1 7138 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7138 killed at Wed Oct 18 14:01:29 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7204 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7204 found at Wed Oct 18 14:01:29 UTC 2023 selfserv_9997 with PID 7204 started at Wed Oct 18 14:01:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #169: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7204 at Wed Oct 18 14:01:30 UTC 2023 kill -USR1 7204 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7204 killed at Wed Oct 18 14:01:30 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7256 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7256 found at Wed Oct 18 14:01:30 UTC 2023 selfserv_9997 with PID 7256 started at Wed Oct 18 14:01:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #170: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7256 at Wed Oct 18 14:01:30 UTC 2023 kill -USR1 7256 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7256 killed at Wed Oct 18 14:01:30 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7308 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7308 found at Wed Oct 18 14:01:30 UTC 2023 selfserv_9997 with PID 7308 started at Wed Oct 18 14:01:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #171: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7308 at Wed Oct 18 14:01:30 UTC 2023 kill -USR1 7308 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7308 killed at Wed Oct 18 14:01:30 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7374 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7374 found at Wed Oct 18 14:01:30 UTC 2023 selfserv_9997 with PID 7374 started at Wed Oct 18 14:01:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #172: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7374 at Wed Oct 18 14:01:31 UTC 2023 kill -USR1 7374 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7374 killed at Wed Oct 18 14:01:31 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7426 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7426 found at Wed Oct 18 14:01:31 UTC 2023 selfserv_9997 with PID 7426 started at Wed Oct 18 14:01:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #173: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7426 at Wed Oct 18 14:01:31 UTC 2023 kill -USR1 7426 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7426 killed at Wed Oct 18 14:01:31 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7478 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7478 found at Wed Oct 18 14:01:31 UTC 2023 selfserv_9997 with PID 7478 started at Wed Oct 18 14:01:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #174: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7478 at Wed Oct 18 14:01:31 UTC 2023 kill -USR1 7478 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7478 killed at Wed Oct 18 14:01:31 UTC 2023 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/authin.tl.tmp 0 selfserv_9997 starting at Wed Oct 18 14:01:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:31 UTC 2023 selfserv_9997 with PID 7549 started at Wed Oct 18 14:01:31 UTC 2023 Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:31 UTC 2023 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:31 UTC 2023 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:32 UTC 2023 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:32 UTC 2023 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:32 UTC 2023 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:32 UTC 2023 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:32 UTC 2023 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:32 UTC 2023 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:32 UTC 2023 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:32 UTC 2023 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:32 UTC 2023 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:32 UTC 2023 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:33 UTC 2023 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:33 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:33 UTC 2023 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:33 UTC 2023 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:33 UTC 2023 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:33 UTC 2023 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:33 UTC 2023 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:33 UTC 2023 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:33 UTC 2023 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:33 UTC 2023 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:34 UTC 2023 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:34 UTC 2023 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:34 UTC 2023 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:34 UTC 2023 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:34 UTC 2023 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:34 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:34 UTC 2023 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:34 UTC 2023 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:34 UTC 2023 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:34 UTC 2023 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:35 UTC 2023 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:35 UTC 2023 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:35 UTC 2023 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:35 UTC 2023 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:35 UTC 2023 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:35 UTC 2023 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:35 UTC 2023 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:35 UTC 2023 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 7549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7549 found at Wed Oct 18 14:01:35 UTC 2023 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 7549 at Wed Oct 18 14:01:35 UTC 2023 kill -USR1 7549 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7549 killed at Wed Oct 18 14:01:35 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:35 UTC 2023 selfserv_9997 with PID 8810 started at Wed Oct 18 14:01:35 UTC 2023 Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:35 UTC 2023 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:36 UTC 2023 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:36 UTC 2023 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:36 UTC 2023 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:36 UTC 2023 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:36 UTC 2023 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:36 UTC 2023 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:36 UTC 2023 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:36 UTC 2023 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:36 UTC 2023 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:37 UTC 2023 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:37 UTC 2023 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:37 UTC 2023 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:37 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:37 UTC 2023 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:37 UTC 2023 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:37 UTC 2023 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:37 UTC 2023 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:37 UTC 2023 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:37 UTC 2023 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:38 UTC 2023 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:38 UTC 2023 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:38 UTC 2023 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:38 UTC 2023 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:38 UTC 2023 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:38 UTC 2023 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:38 UTC 2023 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:38 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:38 UTC 2023 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:38 UTC 2023 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:38 UTC 2023 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:39 UTC 2023 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:39 UTC 2023 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:39 UTC 2023 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:39 UTC 2023 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:39 UTC 2023 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:39 UTC 2023 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:39 UTC 2023 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:39 UTC 2023 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:39 UTC 2023 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 8810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8810 found at Wed Oct 18 14:01:39 UTC 2023 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 8810 at Wed Oct 18 14:01:39 UTC 2023 kill -USR1 8810 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8810 killed at Wed Oct 18 14:01:39 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:40 UTC 2023 selfserv_9997 with PID 10073 started at Wed Oct 18 14:01:40 UTC 2023 Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:40 UTC 2023 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:40 UTC 2023 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:40 UTC 2023 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:40 UTC 2023 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:40 UTC 2023 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:40 UTC 2023 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:40 UTC 2023 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:40 UTC 2023 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:40 UTC 2023 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:41 UTC 2023 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:41 UTC 2023 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:41 UTC 2023 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:41 UTC 2023 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:41 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:41 UTC 2023 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:41 UTC 2023 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:41 UTC 2023 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:41 UTC 2023 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:41 UTC 2023 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:41 UTC 2023 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:42 UTC 2023 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:42 UTC 2023 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:42 UTC 2023 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:42 UTC 2023 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:42 UTC 2023 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:42 UTC 2023 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:42 UTC 2023 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:42 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:42 UTC 2023 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:42 UTC 2023 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:43 UTC 2023 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:43 UTC 2023 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:43 UTC 2023 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:43 UTC 2023 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:43 UTC 2023 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:43 UTC 2023 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:43 UTC 2023 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:43 UTC 2023 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:43 UTC 2023 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:43 UTC 2023 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10073 found at Wed Oct 18 14:01:43 UTC 2023 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 10073 at Wed Oct 18 14:01:43 UTC 2023 kill -USR1 10073 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10073 killed at Wed Oct 18 14:01:43 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:43 UTC 2023 selfserv_9997 with PID 11348 started at Wed Oct 18 14:01:43 UTC 2023 Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:44 UTC 2023 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:44 UTC 2023 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:44 UTC 2023 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:44 UTC 2023 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:44 UTC 2023 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:44 UTC 2023 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:44 UTC 2023 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:44 UTC 2023 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:44 UTC 2023 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:45 UTC 2023 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:45 UTC 2023 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:45 UTC 2023 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:45 UTC 2023 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:45 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:45 UTC 2023 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:45 UTC 2023 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:45 UTC 2023 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:45 UTC 2023 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:45 UTC 2023 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:46 UTC 2023 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:46 UTC 2023 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:46 UTC 2023 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:46 UTC 2023 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:46 UTC 2023 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:46 UTC 2023 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:46 UTC 2023 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:46 UTC 2023 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:46 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:46 UTC 2023 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:47 UTC 2023 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:47 UTC 2023 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:47 UTC 2023 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:47 UTC 2023 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:47 UTC 2023 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:47 UTC 2023 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:47 UTC 2023 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:47 UTC 2023 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:47 UTC 2023 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:47 UTC 2023 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:47 UTC 2023 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11348 found at Wed Oct 18 14:01:47 UTC 2023 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 11348 at Wed Oct 18 14:01:47 UTC 2023 kill -USR1 11348 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11348 killed at Wed Oct 18 14:01:47 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12607 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12607 found at Wed Oct 18 14:01:48 UTC 2023 selfserv_9997 with PID 12607 started at Wed Oct 18 14:01:48 UTC 2023 trying to kill selfserv_9997 with PID 12607 at Wed Oct 18 14:01:48 UTC 2023 kill -USR1 12607 selfserv: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12607 killed at Wed Oct 18 14:01:48 UTC 2023 selfserv_9997 starting at Wed Oct 18 14:01:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:48 UTC 2023 selfserv_9997 with PID 12649 started at Wed Oct 18 14:01:48 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:48 UTC 2023 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:48 UTC 2023 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:48 UTC 2023 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:48 UTC 2023 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:48 UTC 2023 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:48 UTC 2023 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:49 UTC 2023 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:49 UTC 2023 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:49 UTC 2023 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:49 UTC 2023 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:49 UTC 2023 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:49 UTC 2023 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:50 UTC 2023 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:50 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:50 UTC 2023 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:50 UTC 2023 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:50 UTC 2023 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:50 UTC 2023 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:50 UTC 2023 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:51 UTC 2023 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:51 UTC 2023 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:51 UTC 2023 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:51 UTC 2023 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:51 UTC 2023 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:51 UTC 2023 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:51 UTC 2023 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:52 UTC 2023 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:52 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:52 UTC 2023 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:52 UTC 2023 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:52 UTC 2023 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:52 UTC 2023 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:52 UTC 2023 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:53 UTC 2023 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:53 UTC 2023 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:53 UTC 2023 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:53 UTC 2023 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:53 UTC 2023 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:53 UTC 2023 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:53 UTC 2023 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12649 found at Wed Oct 18 14:01:54 UTC 2023 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12649 at Wed Oct 18 14:01:54 UTC 2023 kill -USR1 12649 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12649 killed at Wed Oct 18 14:01:54 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:01:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:01:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:54 UTC 2023 selfserv_9997 with PID 13907 started at Wed Oct 18 14:01:54 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:54 UTC 2023 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:54 UTC 2023 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:54 UTC 2023 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:54 UTC 2023 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:55 UTC 2023 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:55 UTC 2023 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:55 UTC 2023 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:55 UTC 2023 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:55 UTC 2023 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:55 UTC 2023 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:56 UTC 2023 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:56 UTC 2023 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:56 UTC 2023 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:56 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:56 UTC 2023 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:57 UTC 2023 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:57 UTC 2023 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:57 UTC 2023 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:57 UTC 2023 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:57 UTC 2023 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:57 UTC 2023 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:58 UTC 2023 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:58 UTC 2023 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:58 UTC 2023 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:58 UTC 2023 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:58 UTC 2023 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:59 UTC 2023 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:59 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:59 UTC 2023 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:59 UTC 2023 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:59 UTC 2023 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:01:59 UTC 2023 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:02:00 UTC 2023 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:02:00 UTC 2023 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:02:00 UTC 2023 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:02:00 UTC 2023 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:02:00 UTC 2023 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:02:00 UTC 2023 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:02:01 UTC 2023 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:02:01 UTC 2023 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13907 found at Wed Oct 18 14:02:01 UTC 2023 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13907 at Wed Oct 18 14:02:01 UTC 2023 kill -USR1 13907 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13907 killed at Wed Oct 18 14:02:01 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:02:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:02:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:01 UTC 2023 selfserv_9997 with PID 15171 started at Wed Oct 18 14:02:01 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:01 UTC 2023 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:01 UTC 2023 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:01 UTC 2023 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:02 UTC 2023 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:02 UTC 2023 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:02 UTC 2023 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:02 UTC 2023 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:02 UTC 2023 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:02 UTC 2023 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:02 UTC 2023 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:03 UTC 2023 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:03 UTC 2023 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:03 UTC 2023 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:03 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:03 UTC 2023 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:03 UTC 2023 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:04 UTC 2023 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:04 UTC 2023 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:04 UTC 2023 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:04 UTC 2023 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:04 UTC 2023 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:04 UTC 2023 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:04 UTC 2023 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:05 UTC 2023 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:05 UTC 2023 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:05 UTC 2023 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:05 UTC 2023 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:05 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:05 UTC 2023 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:05 UTC 2023 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:06 UTC 2023 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:06 UTC 2023 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:06 UTC 2023 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:06 UTC 2023 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:06 UTC 2023 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:06 UTC 2023 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:06 UTC 2023 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:07 UTC 2023 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:07 UTC 2023 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:07 UTC 2023 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:02:07 UTC 2023 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15171 at Wed Oct 18 14:02:07 UTC 2023 kill -USR1 15171 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15171 killed at Wed Oct 18 14:02:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:02:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:02:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:07 UTC 2023 selfserv_9997 with PID 16432 started at Wed Oct 18 14:02:07 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:07 UTC 2023 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:07 UTC 2023 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:07 UTC 2023 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:08 UTC 2023 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:08 UTC 2023 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:08 UTC 2023 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:08 UTC 2023 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:08 UTC 2023 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:08 UTC 2023 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:09 UTC 2023 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:09 UTC 2023 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:09 UTC 2023 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:09 UTC 2023 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:09 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:09 UTC 2023 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:09 UTC 2023 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:10 UTC 2023 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:10 UTC 2023 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:10 UTC 2023 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:10 UTC 2023 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:10 UTC 2023 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:10 UTC 2023 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:10 UTC 2023 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:11 UTC 2023 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:11 UTC 2023 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:11 UTC 2023 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:11 UTC 2023 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:11 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:11 UTC 2023 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:11 UTC 2023 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:12 UTC 2023 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:12 UTC 2023 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:12 UTC 2023 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:12 UTC 2023 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:12 UTC 2023 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:12 UTC 2023 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:12 UTC 2023 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:12 UTC 2023 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:13 UTC 2023 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:13 UTC 2023 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16432 found at Wed Oct 18 14:02:13 UTC 2023 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16432 at Wed Oct 18 14:02:13 UTC 2023 kill -USR1 16432 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16432 killed at Wed Oct 18 14:02:13 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:02:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:02:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:13 UTC 2023 selfserv_9997 with PID 17693 started at Wed Oct 18 14:02:13 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:13 UTC 2023 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:13 UTC 2023 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:14 UTC 2023 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:14 UTC 2023 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:14 UTC 2023 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:14 UTC 2023 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:14 UTC 2023 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:14 UTC 2023 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:15 UTC 2023 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:15 UTC 2023 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:15 UTC 2023 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:15 UTC 2023 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:15 UTC 2023 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:16 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:16 UTC 2023 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:16 UTC 2023 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:16 UTC 2023 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:16 UTC 2023 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:16 UTC 2023 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:17 UTC 2023 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:17 UTC 2023 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:17 UTC 2023 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:17 UTC 2023 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:17 UTC 2023 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:17 UTC 2023 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:18 UTC 2023 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:18 UTC 2023 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:18 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:18 UTC 2023 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:18 UTC 2023 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:18 UTC 2023 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:19 UTC 2023 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:19 UTC 2023 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:19 UTC 2023 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:19 UTC 2023 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:19 UTC 2023 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:20 UTC 2023 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:20 UTC 2023 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:20 UTC 2023 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:20 UTC 2023 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 14:02:20 UTC 2023 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17693 at Wed Oct 18 14:02:20 UTC 2023 kill -USR1 17693 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17693 killed at Wed Oct 18 14:02:20 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:02:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:02:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:20 UTC 2023 selfserv_9997 with PID 18956 started at Wed Oct 18 14:02:20 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:21 UTC 2023 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:21 UTC 2023 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:21 UTC 2023 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:21 UTC 2023 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:21 UTC 2023 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:21 UTC 2023 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:21 UTC 2023 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:22 UTC 2023 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:22 UTC 2023 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:22 UTC 2023 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:22 UTC 2023 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:22 UTC 2023 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:22 UTC 2023 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:23 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:23 UTC 2023 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:23 UTC 2023 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:23 UTC 2023 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:23 UTC 2023 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:23 UTC 2023 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:23 UTC 2023 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:24 UTC 2023 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:24 UTC 2023 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:24 UTC 2023 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:24 UTC 2023 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:24 UTC 2023 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:24 UTC 2023 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:24 UTC 2023 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:25 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:25 UTC 2023 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:25 UTC 2023 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:25 UTC 2023 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:25 UTC 2023 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:25 UTC 2023 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:25 UTC 2023 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:25 UTC 2023 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:26 UTC 2023 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:26 UTC 2023 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:26 UTC 2023 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:26 UTC 2023 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:26 UTC 2023 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18956 found at Wed Oct 18 14:02:26 UTC 2023 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18956 at Wed Oct 18 14:02:26 UTC 2023 kill -USR1 18956 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18956 killed at Wed Oct 18 14:02:26 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:02:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:02:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20217 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20217 found at Wed Oct 18 14:02:26 UTC 2023 selfserv_9997 with PID 20217 started at Wed Oct 18 14:02:26 UTC 2023 trying to kill selfserv_9997 with PID 20217 at Wed Oct 18 14:02:26 UTC 2023 kill -USR1 20217 ./ssl.sh: line 228: 20217 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9997 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20217 killed at Wed Oct 18 14:02:26 UTC 2023 selfserv_9997 starting at Wed Oct 18 14:02:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:02:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:26 UTC 2023 selfserv_9997 with PID 20259 started at Wed Oct 18 14:02:26 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:27 UTC 2023 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:27 UTC 2023 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:27 UTC 2023 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:27 UTC 2023 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:27 UTC 2023 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:27 UTC 2023 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:27 UTC 2023 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:28 UTC 2023 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:28 UTC 2023 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:28 UTC 2023 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:28 UTC 2023 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:28 UTC 2023 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:28 UTC 2023 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:28 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:29 UTC 2023 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:29 UTC 2023 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:29 UTC 2023 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:29 UTC 2023 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:29 UTC 2023 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:29 UTC 2023 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:29 UTC 2023 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:30 UTC 2023 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:30 UTC 2023 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:30 UTC 2023 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:30 UTC 2023 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:30 UTC 2023 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:30 UTC 2023 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:30 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:31 UTC 2023 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:31 UTC 2023 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:31 UTC 2023 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:31 UTC 2023 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:31 UTC 2023 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:31 UTC 2023 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:31 UTC 2023 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:32 UTC 2023 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:32 UTC 2023 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:32 UTC 2023 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:32 UTC 2023 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:32 UTC 2023 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20259 found at Wed Oct 18 14:02:32 UTC 2023 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20259 at Wed Oct 18 14:02:32 UTC 2023 kill -USR1 20259 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20259 killed at Wed Oct 18 14:02:32 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:02:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:02:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:32 UTC 2023 selfserv_9997 with PID 21520 started at Wed Oct 18 14:02:32 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:33 UTC 2023 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:33 UTC 2023 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:33 UTC 2023 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:33 UTC 2023 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:33 UTC 2023 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:33 UTC 2023 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:34 UTC 2023 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:34 UTC 2023 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:34 UTC 2023 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:34 UTC 2023 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:34 UTC 2023 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:35 UTC 2023 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:35 UTC 2023 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:35 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:35 UTC 2023 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:35 UTC 2023 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:35 UTC 2023 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:36 UTC 2023 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:36 UTC 2023 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:36 UTC 2023 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:36 UTC 2023 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:36 UTC 2023 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:37 UTC 2023 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:37 UTC 2023 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:37 UTC 2023 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:37 UTC 2023 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:37 UTC 2023 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:37 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:38 UTC 2023 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:38 UTC 2023 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:38 UTC 2023 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:38 UTC 2023 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:38 UTC 2023 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:38 UTC 2023 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:39 UTC 2023 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:39 UTC 2023 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:39 UTC 2023 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:39 UTC 2023 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:39 UTC 2023 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:40 UTC 2023 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21520 found at Wed Oct 18 14:02:40 UTC 2023 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 21520 at Wed Oct 18 14:02:40 UTC 2023 kill -USR1 21520 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21520 killed at Wed Oct 18 14:02:40 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:02:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:02:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:40 UTC 2023 selfserv_9997 with PID 22794 started at Wed Oct 18 14:02:40 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:40 UTC 2023 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:40 UTC 2023 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:40 UTC 2023 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:40 UTC 2023 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:40 UTC 2023 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:41 UTC 2023 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:41 UTC 2023 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:41 UTC 2023 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:41 UTC 2023 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:41 UTC 2023 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:41 UTC 2023 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:42 UTC 2023 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:42 UTC 2023 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:42 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:42 UTC 2023 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:42 UTC 2023 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:42 UTC 2023 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:42 UTC 2023 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:43 UTC 2023 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:43 UTC 2023 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:43 UTC 2023 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:43 UTC 2023 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:43 UTC 2023 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:43 UTC 2023 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:43 UTC 2023 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:44 UTC 2023 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:44 UTC 2023 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:44 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:44 UTC 2023 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:44 UTC 2023 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:44 UTC 2023 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:44 UTC 2023 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:45 UTC 2023 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:45 UTC 2023 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:45 UTC 2023 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:45 UTC 2023 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:45 UTC 2023 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:45 UTC 2023 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:45 UTC 2023 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:46 UTC 2023 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22794 found at Wed Oct 18 14:02:46 UTC 2023 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22794 at Wed Oct 18 14:02:46 UTC 2023 kill -USR1 22794 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22794 killed at Wed Oct 18 14:02:46 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:02:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:02:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:46 UTC 2023 selfserv_9997 with PID 24060 started at Wed Oct 18 14:02:46 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:46 UTC 2023 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:46 UTC 2023 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:46 UTC 2023 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:46 UTC 2023 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:47 UTC 2023 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:47 UTC 2023 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:47 UTC 2023 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:47 UTC 2023 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:47 UTC 2023 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:47 UTC 2023 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:47 UTC 2023 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:48 UTC 2023 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:48 UTC 2023 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:48 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:48 UTC 2023 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:48 UTC 2023 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:48 UTC 2023 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:48 UTC 2023 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:49 UTC 2023 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:49 UTC 2023 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:49 UTC 2023 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:49 UTC 2023 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:49 UTC 2023 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:49 UTC 2023 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:49 UTC 2023 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:50 UTC 2023 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:50 UTC 2023 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:50 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:50 UTC 2023 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:50 UTC 2023 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:50 UTC 2023 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:50 UTC 2023 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:51 UTC 2023 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:51 UTC 2023 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:51 UTC 2023 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:51 UTC 2023 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:51 UTC 2023 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:51 UTC 2023 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:51 UTC 2023 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:52 UTC 2023 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24060 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24060 found at Wed Oct 18 14:02:52 UTC 2023 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24060 at Wed Oct 18 14:02:52 UTC 2023 kill -USR1 24060 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24060 killed at Wed Oct 18 14:02:52 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:02:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:02:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:52 UTC 2023 selfserv_9997 with PID 25325 started at Wed Oct 18 14:02:52 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:52 UTC 2023 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:52 UTC 2023 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:52 UTC 2023 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:52 UTC 2023 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:53 UTC 2023 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:53 UTC 2023 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:53 UTC 2023 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:53 UTC 2023 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:53 UTC 2023 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:54 UTC 2023 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:54 UTC 2023 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:54 UTC 2023 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:54 UTC 2023 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:54 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:55 UTC 2023 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:55 UTC 2023 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:55 UTC 2023 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:55 UTC 2023 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:55 UTC 2023 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:55 UTC 2023 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:56 UTC 2023 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:56 UTC 2023 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:56 UTC 2023 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:56 UTC 2023 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:56 UTC 2023 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:56 UTC 2023 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:57 UTC 2023 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:57 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:57 UTC 2023 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:57 UTC 2023 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:57 UTC 2023 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:57 UTC 2023 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:58 UTC 2023 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:58 UTC 2023 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:58 UTC 2023 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:58 UTC 2023 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:58 UTC 2023 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:58 UTC 2023 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:59 UTC 2023 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:59 UTC 2023 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25325 found at Wed Oct 18 14:02:59 UTC 2023 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25325 at Wed Oct 18 14:02:59 UTC 2023 kill -USR1 25325 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25325 killed at Wed Oct 18 14:02:59 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:02:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:02:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:02:59 UTC 2023 selfserv_9997 with PID 26587 started at Wed Oct 18 14:02:59 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:02:59 UTC 2023 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:02:59 UTC 2023 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:00 UTC 2023 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:00 UTC 2023 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:00 UTC 2023 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:00 UTC 2023 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:00 UTC 2023 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:00 UTC 2023 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:00 UTC 2023 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:01 UTC 2023 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:01 UTC 2023 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:01 UTC 2023 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:01 UTC 2023 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:01 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:01 UTC 2023 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:01 UTC 2023 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:02 UTC 2023 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:02 UTC 2023 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:02 UTC 2023 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:02 UTC 2023 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:02 UTC 2023 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:02 UTC 2023 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:02 UTC 2023 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:03 UTC 2023 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:03 UTC 2023 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:03 UTC 2023 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:03 UTC 2023 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:03 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:03 UTC 2023 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:03 UTC 2023 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:04 UTC 2023 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:04 UTC 2023 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:04 UTC 2023 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:04 UTC 2023 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:04 UTC 2023 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:04 UTC 2023 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:04 UTC 2023 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:05 UTC 2023 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:05 UTC 2023 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:05 UTC 2023 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26587 found at Wed Oct 18 14:03:05 UTC 2023 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 26587 at Wed Oct 18 14:03:05 UTC 2023 kill -USR1 26587 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26587 killed at Wed Oct 18 14:03:05 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27848 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27848 found at Wed Oct 18 14:03:05 UTC 2023 selfserv_9997 with PID 27848 started at Wed Oct 18 14:03:05 UTC 2023 trying to kill selfserv_9997 with PID 27848 at Wed Oct 18 14:03:05 UTC 2023 kill -USR1 27848 ./ssl.sh: line 228: 27848 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9997 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27848 killed at Wed Oct 18 14:03:05 UTC 2023 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9997 starting at Wed Oct 18 14:03:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 27893 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27893 found at Wed Oct 18 14:03:05 UTC 2023 selfserv_9997 with PID 27893 started at Wed Oct 18 14:03:05 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #657: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #658: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #659: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #660: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #661: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #662: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #663: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 27893 at Wed Oct 18 14:03:07 UTC 2023 kill -USR1 27893 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27893 killed at Wed Oct 18 14:03:07 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 14:03:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 28445 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28445 found at Wed Oct 18 14:03:07 UTC 2023 selfserv_9997 with PID 28445 started at Wed Oct 18 14:03:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28445 at Wed Oct 18 14:03:11 UTC 2023 kill -USR1 28445 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28445 killed at Wed Oct 18 14:03:11 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9997 starting at Wed Oct 18 14:03:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29245 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29245 found at Wed Oct 18 14:03:11 UTC 2023 selfserv_9997 with PID 29245 started at Wed Oct 18 14:03:11 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29245 at Wed Oct 18 14:03:11 UTC 2023 kill -USR1 29245 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29245 killed at Wed Oct 18 14:03:11 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29311 found at Wed Oct 18 14:03:11 UTC 2023 selfserv_9997 with PID 29311 started at Wed Oct 18 14:03:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29311 at Wed Oct 18 14:03:11 UTC 2023 kill -USR1 29311 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29311 killed at Wed Oct 18 14:03:11 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29363 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29363 found at Wed Oct 18 14:03:11 UTC 2023 selfserv_9997 with PID 29363 started at Wed Oct 18 14:03:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29363 at Wed Oct 18 14:03:12 UTC 2023 kill -USR1 29363 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29363 killed at Wed Oct 18 14:03:12 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29416 found at Wed Oct 18 14:03:12 UTC 2023 selfserv_9997 with PID 29416 started at Wed Oct 18 14:03:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #786: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29416 at Wed Oct 18 14:03:12 UTC 2023 kill -USR1 29416 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29416 killed at Wed Oct 18 14:03:12 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29468 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29468 found at Wed Oct 18 14:03:12 UTC 2023 selfserv_9997 with PID 29468 started at Wed Oct 18 14:03:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #787: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 29468 at Wed Oct 18 14:03:12 UTC 2023 kill -USR1 29468 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29468 killed at Wed Oct 18 14:03:12 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29520 found at Wed Oct 18 14:03:12 UTC 2023 selfserv_9997 with PID 29520 started at Wed Oct 18 14:03:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #788: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 29520 at Wed Oct 18 14:03:12 UTC 2023 kill -USR1 29520 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29520 killed at Wed Oct 18 14:03:12 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29572 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29572 found at Wed Oct 18 14:03:12 UTC 2023 selfserv_9997 with PID 29572 started at Wed Oct 18 14:03:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #789: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29572 at Wed Oct 18 14:03:12 UTC 2023 kill -USR1 29572 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29572 killed at Wed Oct 18 14:03:12 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29624 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29624 found at Wed Oct 18 14:03:12 UTC 2023 selfserv_9997 with PID 29624 started at Wed Oct 18 14:03:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29624 at Wed Oct 18 14:03:13 UTC 2023 kill -USR1 29624 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29624 killed at Wed Oct 18 14:03:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29676 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29676 found at Wed Oct 18 14:03:13 UTC 2023 selfserv_9997 with PID 29676 started at Wed Oct 18 14:03:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29676 at Wed Oct 18 14:03:13 UTC 2023 kill -USR1 29676 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29676 killed at Wed Oct 18 14:03:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29728 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29728 found at Wed Oct 18 14:03:13 UTC 2023 selfserv_9997 with PID 29728 started at Wed Oct 18 14:03:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29728 at Wed Oct 18 14:03:13 UTC 2023 kill -USR1 29728 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29728 killed at Wed Oct 18 14:03:13 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29780 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29780 found at Wed Oct 18 14:03:13 UTC 2023 selfserv_9997 with PID 29780 started at Wed Oct 18 14:03:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #793: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 29780 at Wed Oct 18 14:03:13 UTC 2023 kill -USR1 29780 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29780 killed at Wed Oct 18 14:03:13 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29832 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29832 found at Wed Oct 18 14:03:13 UTC 2023 selfserv_9997 with PID 29832 started at Wed Oct 18 14:03:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 29832 at Wed Oct 18 14:03:13 UTC 2023 kill -USR1 29832 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29832 killed at Wed Oct 18 14:03:13 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29884 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29884 found at Wed Oct 18 14:03:13 UTC 2023 selfserv_9997 with PID 29884 started at Wed Oct 18 14:03:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29884 at Wed Oct 18 14:03:13 UTC 2023 kill -USR1 29884 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29884 killed at Wed Oct 18 14:03:13 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29936 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29936 found at Wed Oct 18 14:03:13 UTC 2023 selfserv_9997 with PID 29936 started at Wed Oct 18 14:03:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29936 at Wed Oct 18 14:03:14 UTC 2023 kill -USR1 29936 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29936 killed at Wed Oct 18 14:03:14 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29990 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29990 found at Wed Oct 18 14:03:14 UTC 2023 selfserv_9997 with PID 29990 started at Wed Oct 18 14:03:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29990 at Wed Oct 18 14:03:14 UTC 2023 kill -USR1 29990 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29990 killed at Wed Oct 18 14:03:14 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30044 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30044 found at Wed Oct 18 14:03:14 UTC 2023 selfserv_9997 with PID 30044 started at Wed Oct 18 14:03:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30044 at Wed Oct 18 14:03:14 UTC 2023 kill -USR1 30044 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30044 killed at Wed Oct 18 14:03:14 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30096 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30096 found at Wed Oct 18 14:03:14 UTC 2023 selfserv_9997 with PID 30096 started at Wed Oct 18 14:03:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 30096 at Wed Oct 18 14:03:15 UTC 2023 kill -USR1 30096 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30096 killed at Wed Oct 18 14:03:15 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30148 found at Wed Oct 18 14:03:15 UTC 2023 selfserv_9997 with PID 30148 started at Wed Oct 18 14:03:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 30148 at Wed Oct 18 14:03:15 UTC 2023 kill -USR1 30148 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30148 killed at Wed Oct 18 14:03:15 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30200 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30200 found at Wed Oct 18 14:03:15 UTC 2023 selfserv_9997 with PID 30200 started at Wed Oct 18 14:03:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30200 at Wed Oct 18 14:03:15 UTC 2023 kill -USR1 30200 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30200 killed at Wed Oct 18 14:03:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30252 found at Wed Oct 18 14:03:15 UTC 2023 selfserv_9997 with PID 30252 started at Wed Oct 18 14:03:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30252 at Wed Oct 18 14:03:15 UTC 2023 kill -USR1 30252 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30252 killed at Wed Oct 18 14:03:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30304 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30304 found at Wed Oct 18 14:03:15 UTC 2023 selfserv_9997 with PID 30304 started at Wed Oct 18 14:03:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30304 at Wed Oct 18 14:03:16 UTC 2023 kill -USR1 30304 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30304 killed at Wed Oct 18 14:03:16 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30356 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30356 found at Wed Oct 18 14:03:16 UTC 2023 selfserv_9997 with PID 30356 started at Wed Oct 18 14:03:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30356 at Wed Oct 18 14:03:16 UTC 2023 kill -USR1 30356 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30356 killed at Wed Oct 18 14:03:16 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30408 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30408 found at Wed Oct 18 14:03:16 UTC 2023 selfserv_9997 with PID 30408 started at Wed Oct 18 14:03:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 30408 at Wed Oct 18 14:03:16 UTC 2023 kill -USR1 30408 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30408 killed at Wed Oct 18 14:03:16 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30461 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30461 found at Wed Oct 18 14:03:16 UTC 2023 selfserv_9997 with PID 30461 started at Wed Oct 18 14:03:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 30461 at Wed Oct 18 14:03:16 UTC 2023 kill -USR1 30461 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30461 killed at Wed Oct 18 14:03:16 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30513 found at Wed Oct 18 14:03:16 UTC 2023 selfserv_9997 with PID 30513 started at Wed Oct 18 14:03:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30513 at Wed Oct 18 14:03:17 UTC 2023 kill -USR1 30513 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30513 killed at Wed Oct 18 14:03:17 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30565 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30565 found at Wed Oct 18 14:03:17 UTC 2023 selfserv_9997 with PID 30565 started at Wed Oct 18 14:03:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30565 at Wed Oct 18 14:03:17 UTC 2023 kill -USR1 30565 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30565 killed at Wed Oct 18 14:03:17 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30618 found at Wed Oct 18 14:03:17 UTC 2023 selfserv_9997 with PID 30618 started at Wed Oct 18 14:03:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30618 at Wed Oct 18 14:03:17 UTC 2023 kill -USR1 30618 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30618 killed at Wed Oct 18 14:03:17 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30670 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30670 found at Wed Oct 18 14:03:17 UTC 2023 selfserv_9997 with PID 30670 started at Wed Oct 18 14:03:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30670 at Wed Oct 18 14:03:17 UTC 2023 kill -USR1 30670 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30670 killed at Wed Oct 18 14:03:17 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30722 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30722 found at Wed Oct 18 14:03:17 UTC 2023 selfserv_9997 with PID 30722 started at Wed Oct 18 14:03:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #811: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 30722 at Wed Oct 18 14:03:18 UTC 2023 kill -USR1 30722 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30722 killed at Wed Oct 18 14:03:18 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30774 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30774 found at Wed Oct 18 14:03:18 UTC 2023 selfserv_9997 with PID 30774 started at Wed Oct 18 14:03:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 30774 at Wed Oct 18 14:03:18 UTC 2023 kill -USR1 30774 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30774 killed at Wed Oct 18 14:03:18 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30826 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30826 found at Wed Oct 18 14:03:18 UTC 2023 selfserv_9997 with PID 30826 started at Wed Oct 18 14:03:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30826 at Wed Oct 18 14:03:18 UTC 2023 kill -USR1 30826 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30826 killed at Wed Oct 18 14:03:18 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30878 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30878 found at Wed Oct 18 14:03:18 UTC 2023 selfserv_9997 with PID 30878 started at Wed Oct 18 14:03:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30878 at Wed Oct 18 14:03:18 UTC 2023 kill -USR1 30878 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30878 killed at Wed Oct 18 14:03:18 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30930 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30930 found at Wed Oct 18 14:03:18 UTC 2023 selfserv_9997 with PID 30930 started at Wed Oct 18 14:03:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30930 at Wed Oct 18 14:03:18 UTC 2023 kill -USR1 30930 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30930 killed at Wed Oct 18 14:03:18 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30982 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30982 found at Wed Oct 18 14:03:18 UTC 2023 selfserv_9997 with PID 30982 started at Wed Oct 18 14:03:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30982 at Wed Oct 18 14:03:19 UTC 2023 kill -USR1 30982 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30982 killed at Wed Oct 18 14:03:19 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31034 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31034 found at Wed Oct 18 14:03:19 UTC 2023 selfserv_9997 with PID 31034 started at Wed Oct 18 14:03:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #817: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 31034 at Wed Oct 18 14:03:19 UTC 2023 kill -USR1 31034 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31034 killed at Wed Oct 18 14:03:19 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31086 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31086 found at Wed Oct 18 14:03:19 UTC 2023 selfserv_9997 with PID 31086 started at Wed Oct 18 14:03:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #818: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31086 at Wed Oct 18 14:03:19 UTC 2023 kill -USR1 31086 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31086 killed at Wed Oct 18 14:03:19 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31138 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31138 found at Wed Oct 18 14:03:19 UTC 2023 selfserv_9997 with PID 31138 started at Wed Oct 18 14:03:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31138 at Wed Oct 18 14:03:19 UTC 2023 kill -USR1 31138 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31138 killed at Wed Oct 18 14:03:19 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31190 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31190 found at Wed Oct 18 14:03:19 UTC 2023 selfserv_9997 with PID 31190 started at Wed Oct 18 14:03:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31190 at Wed Oct 18 14:03:19 UTC 2023 kill -USR1 31190 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31190 killed at Wed Oct 18 14:03:19 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31242 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31242 found at Wed Oct 18 14:03:19 UTC 2023 selfserv_9997 with PID 31242 started at Wed Oct 18 14:03:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #821: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31242 at Wed Oct 18 14:03:20 UTC 2023 kill -USR1 31242 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31242 killed at Wed Oct 18 14:03:20 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31294 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31294 found at Wed Oct 18 14:03:20 UTC 2023 selfserv_9997 with PID 31294 started at Wed Oct 18 14:03:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #822: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 31294 at Wed Oct 18 14:03:20 UTC 2023 kill -USR1 31294 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31294 killed at Wed Oct 18 14:03:20 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31347 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31347 found at Wed Oct 18 14:03:20 UTC 2023 selfserv_9997 with PID 31347 started at Wed Oct 18 14:03:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #823: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31347 at Wed Oct 18 14:03:20 UTC 2023 kill -USR1 31347 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31347 killed at Wed Oct 18 14:03:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31399 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31399 found at Wed Oct 18 14:03:20 UTC 2023 selfserv_9997 with PID 31399 started at Wed Oct 18 14:03:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31399 at Wed Oct 18 14:03:20 UTC 2023 kill -USR1 31399 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31399 killed at Wed Oct 18 14:03:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31451 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31451 found at Wed Oct 18 14:03:20 UTC 2023 selfserv_9997 with PID 31451 started at Wed Oct 18 14:03:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31451 at Wed Oct 18 14:03:20 UTC 2023 kill -USR1 31451 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31451 killed at Wed Oct 18 14:03:20 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31503 found at Wed Oct 18 14:03:20 UTC 2023 selfserv_9997 with PID 31503 started at Wed Oct 18 14:03:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #826: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 31503 at Wed Oct 18 14:03:20 UTC 2023 kill -USR1 31503 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31503 killed at Wed Oct 18 14:03:20 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31555 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31555 found at Wed Oct 18 14:03:20 UTC 2023 selfserv_9997 with PID 31555 started at Wed Oct 18 14:03:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31555 at Wed Oct 18 14:03:21 UTC 2023 kill -USR1 31555 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31555 killed at Wed Oct 18 14:03:21 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31607 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31607 found at Wed Oct 18 14:03:21 UTC 2023 selfserv_9997 with PID 31607 started at Wed Oct 18 14:03:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #828: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31607 at Wed Oct 18 14:03:21 UTC 2023 kill -USR1 31607 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31607 killed at Wed Oct 18 14:03:21 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31659 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31659 found at Wed Oct 18 14:03:21 UTC 2023 selfserv_9997 with PID 31659 started at Wed Oct 18 14:03:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31659 at Wed Oct 18 14:03:21 UTC 2023 kill -USR1 31659 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31659 killed at Wed Oct 18 14:03:21 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31711 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31711 found at Wed Oct 18 14:03:21 UTC 2023 selfserv_9997 with PID 31711 started at Wed Oct 18 14:03:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #830: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 31711 at Wed Oct 18 14:03:21 UTC 2023 kill -USR1 31711 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31711 killed at Wed Oct 18 14:03:21 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31763 found at Wed Oct 18 14:03:21 UTC 2023 selfserv_9997 with PID 31763 started at Wed Oct 18 14:03:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31763 at Wed Oct 18 14:03:21 UTC 2023 kill -USR1 31763 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31763 killed at Wed Oct 18 14:03:21 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31815 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31815 found at Wed Oct 18 14:03:21 UTC 2023 selfserv_9997 with PID 31815 started at Wed Oct 18 14:03:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #832: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31815 at Wed Oct 18 14:03:22 UTC 2023 kill -USR1 31815 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31815 killed at Wed Oct 18 14:03:22 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31867 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31867 found at Wed Oct 18 14:03:22 UTC 2023 selfserv_9997 with PID 31867 started at Wed Oct 18 14:03:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #833: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31867 at Wed Oct 18 14:03:22 UTC 2023 kill -USR1 31867 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31867 killed at Wed Oct 18 14:03:22 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31919 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31919 found at Wed Oct 18 14:03:22 UTC 2023 selfserv_9997 with PID 31919 started at Wed Oct 18 14:03:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #834: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 31919 at Wed Oct 18 14:03:22 UTC 2023 kill -USR1 31919 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31919 killed at Wed Oct 18 14:03:22 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31971 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31971 found at Wed Oct 18 14:03:22 UTC 2023 selfserv_9997 with PID 31971 started at Wed Oct 18 14:03:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31971 at Wed Oct 18 14:03:22 UTC 2023 kill -USR1 31971 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31971 killed at Wed Oct 18 14:03:22 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32024 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32024 found at Wed Oct 18 14:03:23 UTC 2023 selfserv_9997 with PID 32024 started at Wed Oct 18 14:03:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #836: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32024 at Wed Oct 18 14:03:23 UTC 2023 kill -USR1 32024 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32024 killed at Wed Oct 18 14:03:23 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32076 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32076 found at Wed Oct 18 14:03:23 UTC 2023 selfserv_9997 with PID 32076 started at Wed Oct 18 14:03:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32076 at Wed Oct 18 14:03:23 UTC 2023 kill -USR1 32076 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32076 killed at Wed Oct 18 14:03:23 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32128 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32128 found at Wed Oct 18 14:03:23 UTC 2023 selfserv_9997 with PID 32128 started at Wed Oct 18 14:03:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #838: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 32128 at Wed Oct 18 14:03:23 UTC 2023 kill -USR1 32128 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32128 killed at Wed Oct 18 14:03:23 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32180 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32180 found at Wed Oct 18 14:03:23 UTC 2023 selfserv_9997 with PID 32180 started at Wed Oct 18 14:03:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32180 at Wed Oct 18 14:03:23 UTC 2023 kill -USR1 32180 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32180 killed at Wed Oct 18 14:03:23 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32232 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32232 found at Wed Oct 18 14:03:23 UTC 2023 selfserv_9997 with PID 32232 started at Wed Oct 18 14:03:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #840: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32232 at Wed Oct 18 14:03:24 UTC 2023 kill -USR1 32232 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32232 killed at Wed Oct 18 14:03:24 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32284 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32284 found at Wed Oct 18 14:03:24 UTC 2023 selfserv_9997 with PID 32284 started at Wed Oct 18 14:03:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32284 at Wed Oct 18 14:03:24 UTC 2023 kill -USR1 32284 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32284 killed at Wed Oct 18 14:03:24 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 14:03:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32342 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32342 found at Wed Oct 18 14:03:24 UTC 2023 selfserv_9997 with PID 32342 started at Wed Oct 18 14:03:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32342 at Wed Oct 18 14:03:24 UTC 2023 kill -USR1 32342 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32342 killed at Wed Oct 18 14:03:24 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 14:03:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32400 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32400 found at Wed Oct 18 14:03:24 UTC 2023 selfserv_9997 with PID 32400 started at Wed Oct 18 14:03:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32400 at Wed Oct 18 14:03:24 UTC 2023 kill -USR1 32400 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32400 killed at Wed Oct 18 14:03:24 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 14:03:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32459 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32459 found at Wed Oct 18 14:03:24 UTC 2023 selfserv_9997 with PID 32459 started at Wed Oct 18 14:03:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #844: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 32459 at Wed Oct 18 14:03:24 UTC 2023 kill -USR1 32459 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32459 killed at Wed Oct 18 14:03:24 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 14:03:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32517 found at Wed Oct 18 14:03:24 UTC 2023 selfserv_9997 with PID 32517 started at Wed Oct 18 14:03:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #845: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32517 at Wed Oct 18 14:03:24 UTC 2023 kill -USR1 32517 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32517 killed at Wed Oct 18 14:03:24 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9997 starting at Wed Oct 18 14:03:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32575 found at Wed Oct 18 14:03:24 UTC 2023 selfserv_9997 with PID 32575 started at Wed Oct 18 14:03:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #846: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 32575 at Wed Oct 18 14:03:25 UTC 2023 kill -USR1 32575 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32575 killed at Wed Oct 18 14:03:25 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32633 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32633 found at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 with PID 32633 started at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32633 at Wed Oct 18 14:03:25 UTC 2023 kill -USR1 32633 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32633 killed at Wed Oct 18 14:03:25 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32691 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32691 found at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 with PID 32691 started at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #848: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32691 at Wed Oct 18 14:03:25 UTC 2023 kill -USR1 32691 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32691 killed at Wed Oct 18 14:03:25 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9997 starting at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32749 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32749 found at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 with PID 32749 started at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #849: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 32749 at Wed Oct 18 14:03:25 UTC 2023 kill -USR1 32749 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32749 killed at Wed Oct 18 14:03:25 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9997 starting at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 339 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 339 found at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 with PID 339 started at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #850: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 339 at Wed Oct 18 14:03:25 UTC 2023 kill -USR1 339 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 339 killed at Wed Oct 18 14:03:25 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 397 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 397 found at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 with PID 397 started at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #851: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 397 at Wed Oct 18 14:03:25 UTC 2023 kill -USR1 397 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 397 killed at Wed Oct 18 14:03:25 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9997 starting at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 440 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 440 found at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 with PID 440 started at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #784: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 440 at Wed Oct 18 14:03:25 UTC 2023 kill -USR1 440 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 440 killed at Wed Oct 18 14:03:25 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9997 starting at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 482 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 482 found at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 with PID 482 started at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #785: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9997 with PID 482 at Wed Oct 18 14:03:25 UTC 2023 kill -USR1 482 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 482 killed at Wed Oct 18 14:03:25 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9997 starting at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 528 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 528 found at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 with PID 528 started at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #786: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 528 at Wed Oct 18 14:03:25 UTC 2023 kill -USR1 528 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 528 killed at Wed Oct 18 14:03:25 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9997 starting at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 575 found at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 with PID 575 started at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #787: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 575 at Wed Oct 18 14:03:25 UTC 2023 kill -USR1 575 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 575 killed at Wed Oct 18 14:03:25 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9997 starting at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 617 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 617 found at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 with PID 617 started at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #788: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 617 at Wed Oct 18 14:03:25 UTC 2023 kill -USR1 617 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 617 killed at Wed Oct 18 14:03:25 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9997 starting at Wed Oct 18 14:03:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 666 found at Wed Oct 18 14:03:26 UTC 2023 selfserv_9997 with PID 666 started at Wed Oct 18 14:03:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #789: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 666 at Wed Oct 18 14:03:26 UTC 2023 kill -USR1 666 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 666 killed at Wed Oct 18 14:03:26 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9997 starting at Wed Oct 18 14:03:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 712 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 712 found at Wed Oct 18 14:03:26 UTC 2023 selfserv_9997 with PID 712 started at Wed Oct 18 14:03:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #790: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 712 at Wed Oct 18 14:03:26 UTC 2023 kill -USR1 712 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 712 killed at Wed Oct 18 14:03:26 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9997 starting at Wed Oct 18 14:03:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 764 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 764 found at Wed Oct 18 14:03:26 UTC 2023 selfserv_9997 with PID 764 started at Wed Oct 18 14:03:26 UTC 2023 strsclnt -q -p 9997 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 14:03:26 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 14:03:40 UTC 2023 ssl.sh: #791: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9997 with PID 764 at Wed Oct 18 14:03:40 UTC 2023 kill -USR1 764 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 764 killed at Wed Oct 18 14:03:40 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 14:03:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 843 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 843 found at Wed Oct 18 14:03:40 UTC 2023 selfserv_9997 with PID 843 started at Wed Oct 18 14:03:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 843 at Wed Oct 18 14:03:41 UTC 2023 kill -USR1 843 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 843 killed at Wed Oct 18 14:03:41 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 901 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 901 found at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 with PID 901 started at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #793: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 901 at Wed Oct 18 14:03:41 UTC 2023 kill -USR1 901 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 901 killed at Wed Oct 18 14:03:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 943 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 943 found at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 with PID 943 started at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #794: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 943 at Wed Oct 18 14:03:41 UTC 2023 kill -USR1 943 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 943 killed at Wed Oct 18 14:03:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 982 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 982 found at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 with PID 982 started at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 982 at Wed Oct 18 14:03:41 UTC 2023 kill -USR1 982 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 982 killed at Wed Oct 18 14:03:41 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1021 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1021 found at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 with PID 1021 started at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #796: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1021 at Wed Oct 18 14:03:41 UTC 2023 kill -USR1 1021 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1021 killed at Wed Oct 18 14:03:41 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1065 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1065 found at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 with PID 1065 started at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1065 at Wed Oct 18 14:03:41 UTC 2023 kill -USR1 1065 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1065 killed at Wed Oct 18 14:03:41 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1104 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1104 found at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 with PID 1104 started at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1104 at Wed Oct 18 14:03:41 UTC 2023 kill -USR1 1104 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1104 killed at Wed Oct 18 14:03:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1143 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1143 found at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 with PID 1143 started at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1143 at Wed Oct 18 14:03:41 UTC 2023 kill -USR1 1143 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1143 killed at Wed Oct 18 14:03:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1203 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1203 found at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 with PID 1203 started at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1203 at Wed Oct 18 14:03:41 UTC 2023 kill -USR1 1203 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1203 killed at Wed Oct 18 14:03:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1244 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1244 found at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 with PID 1244 started at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1244 at Wed Oct 18 14:03:41 UTC 2023 kill -USR1 1244 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1244 killed at Wed Oct 18 14:03:41 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1289 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1289 found at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 with PID 1289 started at Wed Oct 18 14:03:41 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #802: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1289 at Wed Oct 18 14:03:41 UTC 2023 kill -USR1 1289 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1289 killed at Wed Oct 18 14:03:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1333 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1333 found at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 with PID 1333 started at Wed Oct 18 14:03:41 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #803: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1333 at Wed Oct 18 14:03:41 UTC 2023 kill -USR1 1333 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1333 killed at Wed Oct 18 14:03:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1373 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1373 found at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 with PID 1373 started at Wed Oct 18 14:03:41 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #804: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1373 at Wed Oct 18 14:03:41 UTC 2023 kill -USR1 1373 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1373 killed at Wed Oct 18 14:03:41 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1414 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1414 found at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 with PID 1414 started at Wed Oct 18 14:03:41 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #805: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1414 at Wed Oct 18 14:03:41 UTC 2023 kill -USR1 1414 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1414 killed at Wed Oct 18 14:03:41 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1454 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1454 found at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 with PID 1454 started at Wed Oct 18 14:03:41 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #806: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1454 at Wed Oct 18 14:03:41 UTC 2023 kill -USR1 1454 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1454 killed at Wed Oct 18 14:03:41 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1494 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1494 found at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 with PID 1494 started at Wed Oct 18 14:03:41 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #807: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1494 at Wed Oct 18 14:03:41 UTC 2023 kill -USR1 1494 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1494 killed at Wed Oct 18 14:03:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1534 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1534 found at Wed Oct 18 14:03:41 UTC 2023 selfserv_9997 with PID 1534 started at Wed Oct 18 14:03:41 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1534 at Wed Oct 18 14:03:42 UTC 2023 kill -USR1 1534 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1534 killed at Wed Oct 18 14:03:42 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1574 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1574 found at Wed Oct 18 14:03:42 UTC 2023 selfserv_9997 with PID 1574 started at Wed Oct 18 14:03:42 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1574 at Wed Oct 18 14:03:42 UTC 2023 kill -USR1 1574 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1574 killed at Wed Oct 18 14:03:42 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1614 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1614 found at Wed Oct 18 14:03:42 UTC 2023 selfserv_9997 with PID 1614 started at Wed Oct 18 14:03:42 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1614 at Wed Oct 18 14:03:42 UTC 2023 kill -USR1 1614 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1614 killed at Wed Oct 18 14:03:42 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9997 starting at Wed Oct 18 14:03:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 1654 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1654 found at Wed Oct 18 14:03:42 UTC 2023 selfserv_9997 with PID 1654 started at Wed Oct 18 14:03:42 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #811: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #812: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #813: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #814: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #815: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #816: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 1654 at Wed Oct 18 14:03:44 UTC 2023 kill -USR1 1654 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1654 killed at Wed Oct 18 14:03:44 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 14:03:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 2207 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2207 found at Wed Oct 18 14:03:44 UTC 2023 selfserv_9997 with PID 2207 started at Wed Oct 18 14:03:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2207 at Wed Oct 18 14:03:47 UTC 2023 kill -USR1 2207 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2207 killed at Wed Oct 18 14:03:47 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3021 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3021 found at Wed Oct 18 14:03:47 UTC 2023 selfserv_9997 with PID 3021 started at Wed Oct 18 14:03:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3021 at Wed Oct 18 14:03:47 UTC 2023 kill -USR1 3021 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3021 killed at Wed Oct 18 14:03:47 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3073 found at Wed Oct 18 14:03:47 UTC 2023 selfserv_9997 with PID 3073 started at Wed Oct 18 14:03:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3073 at Wed Oct 18 14:03:48 UTC 2023 kill -USR1 3073 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3073 killed at Wed Oct 18 14:03:48 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3125 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3125 found at Wed Oct 18 14:03:48 UTC 2023 selfserv_9997 with PID 3125 started at Wed Oct 18 14:03:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #940: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3125 at Wed Oct 18 14:03:48 UTC 2023 kill -USR1 3125 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3125 killed at Wed Oct 18 14:03:48 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3177 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3177 found at Wed Oct 18 14:03:48 UTC 2023 selfserv_9997 with PID 3177 started at Wed Oct 18 14:03:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #941: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3177 at Wed Oct 18 14:03:48 UTC 2023 kill -USR1 3177 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3177 killed at Wed Oct 18 14:03:48 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3229 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3229 found at Wed Oct 18 14:03:48 UTC 2023 selfserv_9997 with PID 3229 started at Wed Oct 18 14:03:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #942: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3229 at Wed Oct 18 14:03:48 UTC 2023 kill -USR1 3229 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3229 killed at Wed Oct 18 14:03:48 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3281 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3281 found at Wed Oct 18 14:03:48 UTC 2023 selfserv_9997 with PID 3281 started at Wed Oct 18 14:03:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3281 at Wed Oct 18 14:03:48 UTC 2023 kill -USR1 3281 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3281 killed at Wed Oct 18 14:03:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3334 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3334 found at Wed Oct 18 14:03:48 UTC 2023 selfserv_9997 with PID 3334 started at Wed Oct 18 14:03:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3334 at Wed Oct 18 14:03:48 UTC 2023 kill -USR1 3334 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3334 killed at Wed Oct 18 14:03:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3386 found at Wed Oct 18 14:03:48 UTC 2023 selfserv_9997 with PID 3386 started at Wed Oct 18 14:03:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3386 at Wed Oct 18 14:03:48 UTC 2023 kill -USR1 3386 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3386 killed at Wed Oct 18 14:03:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3438 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3438 found at Wed Oct 18 14:03:48 UTC 2023 selfserv_9997 with PID 3438 started at Wed Oct 18 14:03:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3438 at Wed Oct 18 14:03:49 UTC 2023 kill -USR1 3438 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3438 killed at Wed Oct 18 14:03:49 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3490 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3490 found at Wed Oct 18 14:03:49 UTC 2023 selfserv_9997 with PID 3490 started at Wed Oct 18 14:03:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #947: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3490 at Wed Oct 18 14:03:49 UTC 2023 kill -USR1 3490 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3490 killed at Wed Oct 18 14:03:49 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3542 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3542 found at Wed Oct 18 14:03:49 UTC 2023 selfserv_9997 with PID 3542 started at Wed Oct 18 14:03:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3542 at Wed Oct 18 14:03:49 UTC 2023 kill -USR1 3542 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3542 killed at Wed Oct 18 14:03:49 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3594 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3594 found at Wed Oct 18 14:03:49 UTC 2023 selfserv_9997 with PID 3594 started at Wed Oct 18 14:03:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3594 at Wed Oct 18 14:03:49 UTC 2023 kill -USR1 3594 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3594 killed at Wed Oct 18 14:03:49 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3646 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3646 found at Wed Oct 18 14:03:49 UTC 2023 selfserv_9997 with PID 3646 started at Wed Oct 18 14:03:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3646 at Wed Oct 18 14:03:49 UTC 2023 kill -USR1 3646 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3646 killed at Wed Oct 18 14:03:49 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3698 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3698 found at Wed Oct 18 14:03:49 UTC 2023 selfserv_9997 with PID 3698 started at Wed Oct 18 14:03:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3698 at Wed Oct 18 14:03:49 UTC 2023 kill -USR1 3698 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3698 killed at Wed Oct 18 14:03:49 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3750 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3750 found at Wed Oct 18 14:03:49 UTC 2023 selfserv_9997 with PID 3750 started at Wed Oct 18 14:03:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3750 at Wed Oct 18 14:03:50 UTC 2023 kill -USR1 3750 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3750 killed at Wed Oct 18 14:03:50 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3802 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3802 found at Wed Oct 18 14:03:50 UTC 2023 selfserv_9997 with PID 3802 started at Wed Oct 18 14:03:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #953: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3802 at Wed Oct 18 14:03:50 UTC 2023 kill -USR1 3802 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3802 killed at Wed Oct 18 14:03:50 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3855 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3855 found at Wed Oct 18 14:03:50 UTC 2023 selfserv_9997 with PID 3855 started at Wed Oct 18 14:03:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3855 at Wed Oct 18 14:03:50 UTC 2023 kill -USR1 3855 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3855 killed at Wed Oct 18 14:03:50 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3907 found at Wed Oct 18 14:03:50 UTC 2023 selfserv_9997 with PID 3907 started at Wed Oct 18 14:03:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #955: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3907 at Wed Oct 18 14:03:50 UTC 2023 kill -USR1 3907 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3907 killed at Wed Oct 18 14:03:50 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3959 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3959 found at Wed Oct 18 14:03:50 UTC 2023 selfserv_9997 with PID 3959 started at Wed Oct 18 14:03:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3959 at Wed Oct 18 14:03:50 UTC 2023 kill -USR1 3959 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3959 killed at Wed Oct 18 14:03:50 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4011 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4011 found at Wed Oct 18 14:03:50 UTC 2023 selfserv_9997 with PID 4011 started at Wed Oct 18 14:03:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4011 at Wed Oct 18 14:03:50 UTC 2023 kill -USR1 4011 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4011 killed at Wed Oct 18 14:03:50 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4063 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4063 found at Wed Oct 18 14:03:50 UTC 2023 selfserv_9997 with PID 4063 started at Wed Oct 18 14:03:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4063 at Wed Oct 18 14:03:51 UTC 2023 kill -USR1 4063 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4063 killed at Wed Oct 18 14:03:51 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4115 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4115 found at Wed Oct 18 14:03:51 UTC 2023 selfserv_9997 with PID 4115 started at Wed Oct 18 14:03:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #959: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4115 at Wed Oct 18 14:03:51 UTC 2023 kill -USR1 4115 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4115 killed at Wed Oct 18 14:03:51 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4167 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4167 found at Wed Oct 18 14:03:51 UTC 2023 selfserv_9997 with PID 4167 started at Wed Oct 18 14:03:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4167 at Wed Oct 18 14:03:51 UTC 2023 kill -USR1 4167 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4167 killed at Wed Oct 18 14:03:51 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4219 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4219 found at Wed Oct 18 14:03:51 UTC 2023 selfserv_9997 with PID 4219 started at Wed Oct 18 14:03:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #961: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4219 at Wed Oct 18 14:03:51 UTC 2023 kill -USR1 4219 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4219 killed at Wed Oct 18 14:03:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4271 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4271 found at Wed Oct 18 14:03:51 UTC 2023 selfserv_9997 with PID 4271 started at Wed Oct 18 14:03:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4271 at Wed Oct 18 14:03:51 UTC 2023 kill -USR1 4271 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4271 killed at Wed Oct 18 14:03:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4324 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4324 found at Wed Oct 18 14:03:51 UTC 2023 selfserv_9997 with PID 4324 started at Wed Oct 18 14:03:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4324 at Wed Oct 18 14:03:52 UTC 2023 kill -USR1 4324 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4324 killed at Wed Oct 18 14:03:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4376 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4376 found at Wed Oct 18 14:03:52 UTC 2023 selfserv_9997 with PID 4376 started at Wed Oct 18 14:03:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4376 at Wed Oct 18 14:03:52 UTC 2023 kill -USR1 4376 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4376 killed at Wed Oct 18 14:03:52 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4428 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4428 found at Wed Oct 18 14:03:52 UTC 2023 selfserv_9997 with PID 4428 started at Wed Oct 18 14:03:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #965: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4428 at Wed Oct 18 14:03:52 UTC 2023 kill -USR1 4428 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4428 killed at Wed Oct 18 14:03:52 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4480 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4480 found at Wed Oct 18 14:03:52 UTC 2023 selfserv_9997 with PID 4480 started at Wed Oct 18 14:03:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4480 at Wed Oct 18 14:03:52 UTC 2023 kill -USR1 4480 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4480 killed at Wed Oct 18 14:03:52 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4532 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4532 found at Wed Oct 18 14:03:52 UTC 2023 selfserv_9997 with PID 4532 started at Wed Oct 18 14:03:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #967: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4532 at Wed Oct 18 14:03:52 UTC 2023 kill -USR1 4532 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4532 killed at Wed Oct 18 14:03:52 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4584 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4584 found at Wed Oct 18 14:03:52 UTC 2023 selfserv_9997 with PID 4584 started at Wed Oct 18 14:03:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4584 at Wed Oct 18 14:03:52 UTC 2023 kill -USR1 4584 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4584 killed at Wed Oct 18 14:03:53 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4636 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4636 found at Wed Oct 18 14:03:53 UTC 2023 selfserv_9997 with PID 4636 started at Wed Oct 18 14:03:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4636 at Wed Oct 18 14:03:53 UTC 2023 kill -USR1 4636 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4636 killed at Wed Oct 18 14:03:53 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4688 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4688 found at Wed Oct 18 14:03:53 UTC 2023 selfserv_9997 with PID 4688 started at Wed Oct 18 14:03:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4688 at Wed Oct 18 14:03:53 UTC 2023 kill -USR1 4688 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4688 killed at Wed Oct 18 14:03:53 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4740 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4740 found at Wed Oct 18 14:03:53 UTC 2023 selfserv_9997 with PID 4740 started at Wed Oct 18 14:03:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #971: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4740 at Wed Oct 18 14:03:53 UTC 2023 kill -USR1 4740 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4740 killed at Wed Oct 18 14:03:53 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4792 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4792 found at Wed Oct 18 14:03:53 UTC 2023 selfserv_9997 with PID 4792 started at Wed Oct 18 14:03:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #972: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4792 at Wed Oct 18 14:03:53 UTC 2023 kill -USR1 4792 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4792 killed at Wed Oct 18 14:03:53 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4844 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4844 found at Wed Oct 18 14:03:53 UTC 2023 selfserv_9997 with PID 4844 started at Wed Oct 18 14:03:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #973: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4844 at Wed Oct 18 14:03:53 UTC 2023 kill -USR1 4844 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4844 killed at Wed Oct 18 14:03:53 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4896 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4896 found at Wed Oct 18 14:03:53 UTC 2023 selfserv_9997 with PID 4896 started at Wed Oct 18 14:03:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4896 at Wed Oct 18 14:03:53 UTC 2023 kill -USR1 4896 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4896 killed at Wed Oct 18 14:03:53 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4948 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4948 found at Wed Oct 18 14:03:53 UTC 2023 selfserv_9997 with PID 4948 started at Wed Oct 18 14:03:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #975: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4948 at Wed Oct 18 14:03:54 UTC 2023 kill -USR1 4948 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4948 killed at Wed Oct 18 14:03:54 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5000 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5000 found at Wed Oct 18 14:03:54 UTC 2023 selfserv_9997 with PID 5000 started at Wed Oct 18 14:03:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #976: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5000 at Wed Oct 18 14:03:54 UTC 2023 kill -USR1 5000 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5000 killed at Wed Oct 18 14:03:54 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5052 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5052 found at Wed Oct 18 14:03:54 UTC 2023 selfserv_9997 with PID 5052 started at Wed Oct 18 14:03:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #977: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5052 at Wed Oct 18 14:03:54 UTC 2023 kill -USR1 5052 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5052 killed at Wed Oct 18 14:03:54 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5104 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5104 found at Wed Oct 18 14:03:54 UTC 2023 selfserv_9997 with PID 5104 started at Wed Oct 18 14:03:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #978: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5104 at Wed Oct 18 14:03:54 UTC 2023 kill -USR1 5104 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5104 killed at Wed Oct 18 14:03:54 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5156 found at Wed Oct 18 14:03:54 UTC 2023 selfserv_9997 with PID 5156 started at Wed Oct 18 14:03:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #979: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5156 at Wed Oct 18 14:03:54 UTC 2023 kill -USR1 5156 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5156 killed at Wed Oct 18 14:03:54 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5209 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5209 found at Wed Oct 18 14:03:54 UTC 2023 selfserv_9997 with PID 5209 started at Wed Oct 18 14:03:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #980: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5209 at Wed Oct 18 14:03:54 UTC 2023 kill -USR1 5209 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5209 killed at Wed Oct 18 14:03:54 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5261 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5261 found at Wed Oct 18 14:03:54 UTC 2023 selfserv_9997 with PID 5261 started at Wed Oct 18 14:03:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5261 at Wed Oct 18 14:03:55 UTC 2023 kill -USR1 5261 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5261 killed at Wed Oct 18 14:03:55 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5313 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5313 found at Wed Oct 18 14:03:55 UTC 2023 selfserv_9997 with PID 5313 started at Wed Oct 18 14:03:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #982: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5313 at Wed Oct 18 14:03:55 UTC 2023 kill -USR1 5313 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5313 killed at Wed Oct 18 14:03:55 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5365 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5365 found at Wed Oct 18 14:03:55 UTC 2023 selfserv_9997 with PID 5365 started at Wed Oct 18 14:03:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #983: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5365 at Wed Oct 18 14:03:55 UTC 2023 kill -USR1 5365 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5365 killed at Wed Oct 18 14:03:55 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5417 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5417 found at Wed Oct 18 14:03:55 UTC 2023 selfserv_9997 with PID 5417 started at Wed Oct 18 14:03:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #984: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5417 at Wed Oct 18 14:03:55 UTC 2023 kill -USR1 5417 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5417 killed at Wed Oct 18 14:03:55 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5469 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5469 found at Wed Oct 18 14:03:55 UTC 2023 selfserv_9997 with PID 5469 started at Wed Oct 18 14:03:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5469 at Wed Oct 18 14:03:55 UTC 2023 kill -USR1 5469 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5469 killed at Wed Oct 18 14:03:55 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5521 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5521 found at Wed Oct 18 14:03:55 UTC 2023 selfserv_9997 with PID 5521 started at Wed Oct 18 14:03:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #986: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5521 at Wed Oct 18 14:03:55 UTC 2023 kill -USR1 5521 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5521 killed at Wed Oct 18 14:03:55 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5573 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5573 found at Wed Oct 18 14:03:55 UTC 2023 selfserv_9997 with PID 5573 started at Wed Oct 18 14:03:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #987: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5573 at Wed Oct 18 14:03:55 UTC 2023 kill -USR1 5573 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5573 killed at Wed Oct 18 14:03:55 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5625 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5625 found at Wed Oct 18 14:03:55 UTC 2023 selfserv_9997 with PID 5625 started at Wed Oct 18 14:03:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #988: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5625 at Wed Oct 18 14:03:56 UTC 2023 kill -USR1 5625 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5625 killed at Wed Oct 18 14:03:56 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5677 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5677 found at Wed Oct 18 14:03:56 UTC 2023 selfserv_9997 with PID 5677 started at Wed Oct 18 14:03:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5677 at Wed Oct 18 14:03:56 UTC 2023 kill -USR1 5677 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5677 killed at Wed Oct 18 14:03:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5729 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5729 found at Wed Oct 18 14:03:56 UTC 2023 selfserv_9997 with PID 5729 started at Wed Oct 18 14:03:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5729 at Wed Oct 18 14:03:56 UTC 2023 kill -USR1 5729 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5729 killed at Wed Oct 18 14:03:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5781 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5781 found at Wed Oct 18 14:03:56 UTC 2023 selfserv_9997 with PID 5781 started at Wed Oct 18 14:03:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5781 at Wed Oct 18 14:03:56 UTC 2023 kill -USR1 5781 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5781 killed at Wed Oct 18 14:03:56 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:03:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5833 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5833 found at Wed Oct 18 14:03:56 UTC 2023 selfserv_9997 with PID 5833 started at Wed Oct 18 14:03:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #992: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5833 at Wed Oct 18 14:03:56 UTC 2023 kill -USR1 5833 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5833 killed at Wed Oct 18 14:03:56 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5885 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5885 found at Wed Oct 18 14:03:56 UTC 2023 selfserv_9997 with PID 5885 started at Wed Oct 18 14:03:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #993: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5885 at Wed Oct 18 14:03:57 UTC 2023 kill -USR1 5885 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5885 killed at Wed Oct 18 14:03:57 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5937 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5937 found at Wed Oct 18 14:03:57 UTC 2023 selfserv_9997 with PID 5937 started at Wed Oct 18 14:03:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #994: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5937 at Wed Oct 18 14:03:57 UTC 2023 kill -USR1 5937 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5937 killed at Wed Oct 18 14:03:57 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:03:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5989 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5989 found at Wed Oct 18 14:03:57 UTC 2023 selfserv_9997 with PID 5989 started at Wed Oct 18 14:03:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #995: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5989 at Wed Oct 18 14:03:57 UTC 2023 kill -USR1 5989 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5989 killed at Wed Oct 18 14:03:57 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 14:03:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6071 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6071 found at Wed Oct 18 14:03:57 UTC 2023 selfserv_9997 with PID 6071 started at Wed Oct 18 14:03:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6071 at Wed Oct 18 14:03:57 UTC 2023 kill -USR1 6071 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6071 killed at Wed Oct 18 14:03:57 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6113 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6113 found at Wed Oct 18 14:03:57 UTC 2023 selfserv_9997 with PID 6113 started at Wed Oct 18 14:03:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6113 at Wed Oct 18 14:03:57 UTC 2023 kill -USR1 6113 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6113 killed at Wed Oct 18 14:03:57 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6152 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6152 found at Wed Oct 18 14:03:57 UTC 2023 selfserv_9997 with PID 6152 started at Wed Oct 18 14:03:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #940: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 6152 at Wed Oct 18 14:03:57 UTC 2023 kill -USR1 6152 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6152 killed at Wed Oct 18 14:03:57 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6191 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6191 found at Wed Oct 18 14:03:57 UTC 2023 selfserv_9997 with PID 6191 started at Wed Oct 18 14:03:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #941: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6191 at Wed Oct 18 14:03:57 UTC 2023 kill -USR1 6191 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6191 killed at Wed Oct 18 14:03:57 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6230 found at Wed Oct 18 14:03:57 UTC 2023 selfserv_9997 with PID 6230 started at Wed Oct 18 14:03:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #942: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 6230 at Wed Oct 18 14:03:57 UTC 2023 kill -USR1 6230 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6230 killed at Wed Oct 18 14:03:57 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6269 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6269 found at Wed Oct 18 14:03:57 UTC 2023 selfserv_9997 with PID 6269 started at Wed Oct 18 14:03:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6269 at Wed Oct 18 14:03:57 UTC 2023 kill -USR1 6269 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6269 killed at Wed Oct 18 14:03:57 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6308 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6308 found at Wed Oct 18 14:03:57 UTC 2023 selfserv_9997 with PID 6308 started at Wed Oct 18 14:03:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6308 at Wed Oct 18 14:03:57 UTC 2023 kill -USR1 6308 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6308 killed at Wed Oct 18 14:03:57 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6347 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6347 found at Wed Oct 18 14:03:57 UTC 2023 selfserv_9997 with PID 6347 started at Wed Oct 18 14:03:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6347 at Wed Oct 18 14:03:57 UTC 2023 kill -USR1 6347 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6347 killed at Wed Oct 18 14:03:57 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6386 found at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 with PID 6386 started at Wed Oct 18 14:03:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6386 at Wed Oct 18 14:03:58 UTC 2023 kill -USR1 6386 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6386 killed at Wed Oct 18 14:03:58 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6425 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6425 found at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 with PID 6425 started at Wed Oct 18 14:03:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6425 at Wed Oct 18 14:03:58 UTC 2023 kill -USR1 6425 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6425 killed at Wed Oct 18 14:03:58 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6464 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6464 found at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 with PID 6464 started at Wed Oct 18 14:03:58 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #948: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6464 at Wed Oct 18 14:03:58 UTC 2023 kill -USR1 6464 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6464 killed at Wed Oct 18 14:03:58 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6504 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6504 found at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 with PID 6504 started at Wed Oct 18 14:03:58 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #949: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6504 at Wed Oct 18 14:03:58 UTC 2023 kill -USR1 6504 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6504 killed at Wed Oct 18 14:03:58 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6544 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6544 found at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 with PID 6544 started at Wed Oct 18 14:03:58 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #950: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6544 at Wed Oct 18 14:03:58 UTC 2023 kill -USR1 6544 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6544 killed at Wed Oct 18 14:03:58 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6584 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6584 found at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 with PID 6584 started at Wed Oct 18 14:03:58 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #951: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6584 at Wed Oct 18 14:03:58 UTC 2023 kill -USR1 6584 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6584 killed at Wed Oct 18 14:03:58 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6624 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6624 found at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 with PID 6624 started at Wed Oct 18 14:03:58 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #952: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6624 at Wed Oct 18 14:03:58 UTC 2023 kill -USR1 6624 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6624 killed at Wed Oct 18 14:03:58 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6664 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6664 found at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 with PID 6664 started at Wed Oct 18 14:03:58 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #953: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6664 at Wed Oct 18 14:03:58 UTC 2023 kill -USR1 6664 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6664 killed at Wed Oct 18 14:03:58 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6704 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6704 found at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 with PID 6704 started at Wed Oct 18 14:03:58 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6704 at Wed Oct 18 14:03:58 UTC 2023 kill -USR1 6704 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6704 killed at Wed Oct 18 14:03:58 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6744 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6744 found at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 with PID 6744 started at Wed Oct 18 14:03:58 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6744 at Wed Oct 18 14:03:58 UTC 2023 kill -USR1 6744 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6744 killed at Wed Oct 18 14:03:58 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6784 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6784 found at Wed Oct 18 14:03:58 UTC 2023 selfserv_9997 with PID 6784 started at Wed Oct 18 14:03:58 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6784 at Wed Oct 18 14:03:58 UTC 2023 kill -USR1 6784 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6784 killed at Wed Oct 18 14:03:58 UTC 2023 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -fips true -force FIPS mode enabled. ssl.sh: #957: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -list ssl.sh: #958: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #959: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -fips true -force FIPS mode enabled. ssl.sh: #960: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -list ssl.sh: #961: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #962: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9997 starting at Wed Oct 18 14:03:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:03:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 6868 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6868 found at Wed Oct 18 14:03:59 UTC 2023 selfserv_9997 with PID 6868 started at Wed Oct 18 14:03:59 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #963: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #964: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #965: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #966: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #967: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #968: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #974: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #975: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #980: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #981: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #986: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #987: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #992: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #993: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #997: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #999: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1002: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1003: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1004: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1005: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1006: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1007: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1008: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1009: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1010: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1011: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1012: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1013: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 6868 at Wed Oct 18 14:04:01 UTC 2023 kill -USR1 6868 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6868 killed at Wed Oct 18 14:04:01 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 14:04:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 7417 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7417 found at Wed Oct 18 14:04:01 UTC 2023 selfserv_9997 with PID 7417 started at Wed Oct 18 14:04:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1014: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1015: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1016: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1017: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1018: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1019: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1020: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1021: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1022: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1023: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1055: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1056: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1061: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1062: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1067: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1068: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1073: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1074: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1076: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1077: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1078: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1079: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1080: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1081: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1082: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1083: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1084: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1085: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1086: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1087: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1088: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1089: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7417 at Wed Oct 18 14:04:05 UTC 2023 kill -USR1 7417 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7417 killed at Wed Oct 18 14:04:05 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9997 starting at Wed Oct 18 14:04:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8216 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8216 found at Wed Oct 18 14:04:06 UTC 2023 selfserv_9997 with PID 8216 started at Wed Oct 18 14:04:06 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8216 at Wed Oct 18 14:04:06 UTC 2023 kill -USR1 8216 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8216 killed at Wed Oct 18 14:04:06 UTC 2023 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8282 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8282 found at Wed Oct 18 14:04:06 UTC 2023 selfserv_9997 with PID 8282 started at Wed Oct 18 14:04:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8282 at Wed Oct 18 14:04:06 UTC 2023 kill -USR1 8282 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8282 killed at Wed Oct 18 14:04:06 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8334 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8334 found at Wed Oct 18 14:04:06 UTC 2023 selfserv_9997 with PID 8334 started at Wed Oct 18 14:04:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8334 at Wed Oct 18 14:04:06 UTC 2023 kill -USR1 8334 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8334 killed at Wed Oct 18 14:04:06 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8386 found at Wed Oct 18 14:04:06 UTC 2023 selfserv_9997 with PID 8386 started at Wed Oct 18 14:04:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1092: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8386 at Wed Oct 18 14:04:07 UTC 2023 kill -USR1 8386 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8386 killed at Wed Oct 18 14:04:07 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8438 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8438 found at Wed Oct 18 14:04:07 UTC 2023 selfserv_9997 with PID 8438 started at Wed Oct 18 14:04:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1093: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8438 at Wed Oct 18 14:04:07 UTC 2023 kill -USR1 8438 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8438 killed at Wed Oct 18 14:04:07 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8490 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8490 found at Wed Oct 18 14:04:07 UTC 2023 selfserv_9997 with PID 8490 started at Wed Oct 18 14:04:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1094: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8490 at Wed Oct 18 14:04:07 UTC 2023 kill -USR1 8490 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8490 killed at Wed Oct 18 14:04:07 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8542 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8542 found at Wed Oct 18 14:04:07 UTC 2023 selfserv_9997 with PID 8542 started at Wed Oct 18 14:04:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1095: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8542 at Wed Oct 18 14:04:07 UTC 2023 kill -USR1 8542 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8542 killed at Wed Oct 18 14:04:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8594 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8594 found at Wed Oct 18 14:04:08 UTC 2023 selfserv_9997 with PID 8594 started at Wed Oct 18 14:04:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8594 at Wed Oct 18 14:04:08 UTC 2023 kill -USR1 8594 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8594 killed at Wed Oct 18 14:04:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8646 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8646 found at Wed Oct 18 14:04:08 UTC 2023 selfserv_9997 with PID 8646 started at Wed Oct 18 14:04:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8646 at Wed Oct 18 14:04:08 UTC 2023 kill -USR1 8646 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8646 killed at Wed Oct 18 14:04:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8698 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8698 found at Wed Oct 18 14:04:08 UTC 2023 selfserv_9997 with PID 8698 started at Wed Oct 18 14:04:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8698 at Wed Oct 18 14:04:08 UTC 2023 kill -USR1 8698 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8698 killed at Wed Oct 18 14:04:08 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8751 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8751 found at Wed Oct 18 14:04:08 UTC 2023 selfserv_9997 with PID 8751 started at Wed Oct 18 14:04:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1099: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8751 at Wed Oct 18 14:04:09 UTC 2023 kill -USR1 8751 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8751 killed at Wed Oct 18 14:04:09 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8803 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8803 found at Wed Oct 18 14:04:09 UTC 2023 selfserv_9997 with PID 8803 started at Wed Oct 18 14:04:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1100: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8803 at Wed Oct 18 14:04:09 UTC 2023 kill -USR1 8803 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8803 killed at Wed Oct 18 14:04:09 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8856 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8856 found at Wed Oct 18 14:04:09 UTC 2023 selfserv_9997 with PID 8856 started at Wed Oct 18 14:04:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8856 at Wed Oct 18 14:04:09 UTC 2023 kill -USR1 8856 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8856 killed at Wed Oct 18 14:04:09 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8909 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8909 found at Wed Oct 18 14:04:09 UTC 2023 selfserv_9997 with PID 8909 started at Wed Oct 18 14:04:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1102: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8909 at Wed Oct 18 14:04:10 UTC 2023 kill -USR1 8909 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8909 killed at Wed Oct 18 14:04:10 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8961 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8961 found at Wed Oct 18 14:04:10 UTC 2023 selfserv_9997 with PID 8961 started at Wed Oct 18 14:04:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8961 at Wed Oct 18 14:04:10 UTC 2023 kill -USR1 8961 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8961 killed at Wed Oct 18 14:04:10 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9013 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9013 found at Wed Oct 18 14:04:10 UTC 2023 selfserv_9997 with PID 9013 started at Wed Oct 18 14:04:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9013 at Wed Oct 18 14:04:10 UTC 2023 kill -USR1 9013 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9013 killed at Wed Oct 18 14:04:10 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9065 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9065 found at Wed Oct 18 14:04:10 UTC 2023 selfserv_9997 with PID 9065 started at Wed Oct 18 14:04:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1105: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9065 at Wed Oct 18 14:04:11 UTC 2023 kill -USR1 9065 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9065 killed at Wed Oct 18 14:04:11 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9117 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9117 found at Wed Oct 18 14:04:11 UTC 2023 selfserv_9997 with PID 9117 started at Wed Oct 18 14:04:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1106: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9117 at Wed Oct 18 14:04:11 UTC 2023 kill -USR1 9117 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9117 killed at Wed Oct 18 14:04:11 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9169 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9169 found at Wed Oct 18 14:04:11 UTC 2023 selfserv_9997 with PID 9169 started at Wed Oct 18 14:04:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9169 at Wed Oct 18 14:04:11 UTC 2023 kill -USR1 9169 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9169 killed at Wed Oct 18 14:04:11 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9221 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9221 found at Wed Oct 18 14:04:12 UTC 2023 selfserv_9997 with PID 9221 started at Wed Oct 18 14:04:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9221 at Wed Oct 18 14:04:12 UTC 2023 kill -USR1 9221 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9221 killed at Wed Oct 18 14:04:12 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9274 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9274 found at Wed Oct 18 14:04:12 UTC 2023 selfserv_9997 with PID 9274 started at Wed Oct 18 14:04:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9274 at Wed Oct 18 14:04:12 UTC 2023 kill -USR1 9274 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9274 killed at Wed Oct 18 14:04:12 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9326 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9326 found at Wed Oct 18 14:04:12 UTC 2023 selfserv_9997 with PID 9326 started at Wed Oct 18 14:04:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9326 at Wed Oct 18 14:04:13 UTC 2023 kill -USR1 9326 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9326 killed at Wed Oct 18 14:04:13 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9378 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9378 found at Wed Oct 18 14:04:13 UTC 2023 selfserv_9997 with PID 9378 started at Wed Oct 18 14:04:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1111: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9378 at Wed Oct 18 14:04:13 UTC 2023 kill -USR1 9378 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9378 killed at Wed Oct 18 14:04:13 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9431 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9431 found at Wed Oct 18 14:04:13 UTC 2023 selfserv_9997 with PID 9431 started at Wed Oct 18 14:04:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1112: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9431 at Wed Oct 18 14:04:13 UTC 2023 kill -USR1 9431 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9431 killed at Wed Oct 18 14:04:13 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9483 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9483 found at Wed Oct 18 14:04:13 UTC 2023 selfserv_9997 with PID 9483 started at Wed Oct 18 14:04:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9483 at Wed Oct 18 14:04:14 UTC 2023 kill -USR1 9483 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9483 killed at Wed Oct 18 14:04:14 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9535 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9535 found at Wed Oct 18 14:04:14 UTC 2023 selfserv_9997 with PID 9535 started at Wed Oct 18 14:04:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9535 at Wed Oct 18 14:04:14 UTC 2023 kill -USR1 9535 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9535 killed at Wed Oct 18 14:04:14 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9587 found at Wed Oct 18 14:04:14 UTC 2023 selfserv_9997 with PID 9587 started at Wed Oct 18 14:04:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1115: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9587 at Wed Oct 18 14:04:14 UTC 2023 kill -USR1 9587 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9587 killed at Wed Oct 18 14:04:14 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9639 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9639 found at Wed Oct 18 14:04:15 UTC 2023 selfserv_9997 with PID 9639 started at Wed Oct 18 14:04:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1116: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9639 at Wed Oct 18 14:04:15 UTC 2023 kill -USR1 9639 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9639 killed at Wed Oct 18 14:04:15 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9692 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9692 found at Wed Oct 18 14:04:15 UTC 2023 selfserv_9997 with PID 9692 started at Wed Oct 18 14:04:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1117: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9692 at Wed Oct 18 14:04:15 UTC 2023 kill -USR1 9692 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9692 killed at Wed Oct 18 14:04:15 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9744 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9744 found at Wed Oct 18 14:04:15 UTC 2023 selfserv_9997 with PID 9744 started at Wed Oct 18 14:04:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1118: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9744 at Wed Oct 18 14:04:16 UTC 2023 kill -USR1 9744 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9744 killed at Wed Oct 18 14:04:16 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9796 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9796 found at Wed Oct 18 14:04:16 UTC 2023 selfserv_9997 with PID 9796 started at Wed Oct 18 14:04:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1119: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9796 at Wed Oct 18 14:04:16 UTC 2023 kill -USR1 9796 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9796 killed at Wed Oct 18 14:04:16 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9848 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9848 found at Wed Oct 18 14:04:16 UTC 2023 selfserv_9997 with PID 9848 started at Wed Oct 18 14:04:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1120: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9848 at Wed Oct 18 14:04:16 UTC 2023 kill -USR1 9848 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9848 killed at Wed Oct 18 14:04:16 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9900 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9900 found at Wed Oct 18 14:04:16 UTC 2023 selfserv_9997 with PID 9900 started at Wed Oct 18 14:04:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1121: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9900 at Wed Oct 18 14:04:16 UTC 2023 kill -USR1 9900 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9900 killed at Wed Oct 18 14:04:16 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9952 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9952 found at Wed Oct 18 14:04:17 UTC 2023 selfserv_9997 with PID 9952 started at Wed Oct 18 14:04:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1122: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9952 at Wed Oct 18 14:04:17 UTC 2023 kill -USR1 9952 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9952 killed at Wed Oct 18 14:04:17 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10004 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10004 found at Wed Oct 18 14:04:17 UTC 2023 selfserv_9997 with PID 10004 started at Wed Oct 18 14:04:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1123: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10004 at Wed Oct 18 14:04:17 UTC 2023 kill -USR1 10004 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10004 killed at Wed Oct 18 14:04:17 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10056 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10056 found at Wed Oct 18 14:04:17 UTC 2023 selfserv_9997 with PID 10056 started at Wed Oct 18 14:04:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1124: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10056 at Wed Oct 18 14:04:17 UTC 2023 kill -USR1 10056 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10056 killed at Wed Oct 18 14:04:17 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10108 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10108 found at Wed Oct 18 14:04:18 UTC 2023 selfserv_9997 with PID 10108 started at Wed Oct 18 14:04:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1125: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10108 at Wed Oct 18 14:04:18 UTC 2023 kill -USR1 10108 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10108 killed at Wed Oct 18 14:04:18 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10160 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10160 found at Wed Oct 18 14:04:18 UTC 2023 selfserv_9997 with PID 10160 started at Wed Oct 18 14:04:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1126: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10160 at Wed Oct 18 14:04:18 UTC 2023 kill -USR1 10160 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10160 killed at Wed Oct 18 14:04:18 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10212 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10212 found at Wed Oct 18 14:04:18 UTC 2023 selfserv_9997 with PID 10212 started at Wed Oct 18 14:04:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1127: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10212 at Wed Oct 18 14:04:18 UTC 2023 kill -USR1 10212 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10212 killed at Wed Oct 18 14:04:18 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10264 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10264 found at Wed Oct 18 14:04:18 UTC 2023 selfserv_9997 with PID 10264 started at Wed Oct 18 14:04:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1128: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10264 at Wed Oct 18 14:04:19 UTC 2023 kill -USR1 10264 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10264 killed at Wed Oct 18 14:04:19 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10316 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10316 found at Wed Oct 18 14:04:19 UTC 2023 selfserv_9997 with PID 10316 started at Wed Oct 18 14:04:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1129: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10316 at Wed Oct 18 14:04:19 UTC 2023 kill -USR1 10316 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10316 killed at Wed Oct 18 14:04:19 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10368 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10368 found at Wed Oct 18 14:04:19 UTC 2023 selfserv_9997 with PID 10368 started at Wed Oct 18 14:04:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1130: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10368 at Wed Oct 18 14:04:19 UTC 2023 kill -USR1 10368 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10368 killed at Wed Oct 18 14:04:19 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10420 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10420 found at Wed Oct 18 14:04:19 UTC 2023 selfserv_9997 with PID 10420 started at Wed Oct 18 14:04:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1131: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10420 at Wed Oct 18 14:04:19 UTC 2023 kill -USR1 10420 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10420 killed at Wed Oct 18 14:04:19 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10472 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10472 found at Wed Oct 18 14:04:20 UTC 2023 selfserv_9997 with PID 10472 started at Wed Oct 18 14:04:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1132: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10472 at Wed Oct 18 14:04:20 UTC 2023 kill -USR1 10472 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10472 killed at Wed Oct 18 14:04:20 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10524 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10524 found at Wed Oct 18 14:04:20 UTC 2023 selfserv_9997 with PID 10524 started at Wed Oct 18 14:04:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1133: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10524 at Wed Oct 18 14:04:20 UTC 2023 kill -USR1 10524 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10524 killed at Wed Oct 18 14:04:20 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10576 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10576 found at Wed Oct 18 14:04:20 UTC 2023 selfserv_9997 with PID 10576 started at Wed Oct 18 14:04:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1134: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10576 at Wed Oct 18 14:04:20 UTC 2023 kill -USR1 10576 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10576 killed at Wed Oct 18 14:04:20 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10628 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10628 found at Wed Oct 18 14:04:20 UTC 2023 selfserv_9997 with PID 10628 started at Wed Oct 18 14:04:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1135: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10628 at Wed Oct 18 14:04:21 UTC 2023 kill -USR1 10628 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10628 killed at Wed Oct 18 14:04:21 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10680 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10680 found at Wed Oct 18 14:04:21 UTC 2023 selfserv_9997 with PID 10680 started at Wed Oct 18 14:04:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1136: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10680 at Wed Oct 18 14:04:21 UTC 2023 kill -USR1 10680 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10680 killed at Wed Oct 18 14:04:21 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10732 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10732 found at Wed Oct 18 14:04:21 UTC 2023 selfserv_9997 with PID 10732 started at Wed Oct 18 14:04:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1137: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10732 at Wed Oct 18 14:04:21 UTC 2023 kill -USR1 10732 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10732 killed at Wed Oct 18 14:04:21 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10784 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10784 found at Wed Oct 18 14:04:21 UTC 2023 selfserv_9997 with PID 10784 started at Wed Oct 18 14:04:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1138: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10784 at Wed Oct 18 14:04:22 UTC 2023 kill -USR1 10784 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10784 killed at Wed Oct 18 14:04:22 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10836 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10836 found at Wed Oct 18 14:04:22 UTC 2023 selfserv_9997 with PID 10836 started at Wed Oct 18 14:04:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1139: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10836 at Wed Oct 18 14:04:22 UTC 2023 kill -USR1 10836 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10836 killed at Wed Oct 18 14:04:22 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10888 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10888 found at Wed Oct 18 14:04:22 UTC 2023 selfserv_9997 with PID 10888 started at Wed Oct 18 14:04:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1140: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10888 at Wed Oct 18 14:04:22 UTC 2023 kill -USR1 10888 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10888 killed at Wed Oct 18 14:04:22 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10940 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10940 found at Wed Oct 18 14:04:22 UTC 2023 selfserv_9997 with PID 10940 started at Wed Oct 18 14:04:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1141: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10940 at Wed Oct 18 14:04:23 UTC 2023 kill -USR1 10940 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10940 killed at Wed Oct 18 14:04:23 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10992 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10992 found at Wed Oct 18 14:04:23 UTC 2023 selfserv_9997 with PID 10992 started at Wed Oct 18 14:04:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1142: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10992 at Wed Oct 18 14:04:23 UTC 2023 kill -USR1 10992 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10992 killed at Wed Oct 18 14:04:23 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11044 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11044 found at Wed Oct 18 14:04:23 UTC 2023 selfserv_9997 with PID 11044 started at Wed Oct 18 14:04:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1143: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11044 at Wed Oct 18 14:04:23 UTC 2023 kill -USR1 11044 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11044 killed at Wed Oct 18 14:04:23 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11097 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11097 found at Wed Oct 18 14:04:23 UTC 2023 selfserv_9997 with PID 11097 started at Wed Oct 18 14:04:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1144: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11097 at Wed Oct 18 14:04:24 UTC 2023 kill -USR1 11097 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11097 killed at Wed Oct 18 14:04:24 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11149 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11149 found at Wed Oct 18 14:04:24 UTC 2023 selfserv_9997 with PID 11149 started at Wed Oct 18 14:04:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1145: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11149 at Wed Oct 18 14:04:24 UTC 2023 kill -USR1 11149 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11149 killed at Wed Oct 18 14:04:24 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11201 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11201 found at Wed Oct 18 14:04:24 UTC 2023 selfserv_9997 with PID 11201 started at Wed Oct 18 14:04:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1146: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11201 at Wed Oct 18 14:04:24 UTC 2023 kill -USR1 11201 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11201 killed at Wed Oct 18 14:04:24 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11254 found at Wed Oct 18 14:04:25 UTC 2023 selfserv_9997 with PID 11254 started at Wed Oct 18 14:04:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1147: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11254 at Wed Oct 18 14:04:25 UTC 2023 kill -USR1 11254 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11254 killed at Wed Oct 18 14:04:25 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 14:04:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11312 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11312 found at Wed Oct 18 14:04:25 UTC 2023 selfserv_9997 with PID 11312 started at Wed Oct 18 14:04:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1148: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11312 at Wed Oct 18 14:04:25 UTC 2023 kill -USR1 11312 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11312 killed at Wed Oct 18 14:04:25 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 14:04:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11370 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11370 found at Wed Oct 18 14:04:25 UTC 2023 selfserv_9997 with PID 11370 started at Wed Oct 18 14:04:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1149: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11370 at Wed Oct 18 14:04:25 UTC 2023 kill -USR1 11370 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11370 killed at Wed Oct 18 14:04:25 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 14:04:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11429 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11429 found at Wed Oct 18 14:04:25 UTC 2023 selfserv_9997 with PID 11429 started at Wed Oct 18 14:04:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1150: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11429 at Wed Oct 18 14:04:25 UTC 2023 kill -USR1 11429 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11429 killed at Wed Oct 18 14:04:25 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 14:04:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11487 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11487 found at Wed Oct 18 14:04:26 UTC 2023 selfserv_9997 with PID 11487 started at Wed Oct 18 14:04:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1151: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11487 at Wed Oct 18 14:04:26 UTC 2023 kill -USR1 11487 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11487 killed at Wed Oct 18 14:04:26 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9997 starting at Wed Oct 18 14:04:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11545 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11545 found at Wed Oct 18 14:04:26 UTC 2023 selfserv_9997 with PID 11545 started at Wed Oct 18 14:04:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1152: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11545 at Wed Oct 18 14:04:26 UTC 2023 kill -USR1 11545 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11545 killed at Wed Oct 18 14:04:26 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 14:04:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11603 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11603 found at Wed Oct 18 14:04:26 UTC 2023 selfserv_9997 with PID 11603 started at Wed Oct 18 14:04:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1153: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11603 at Wed Oct 18 14:04:26 UTC 2023 kill -USR1 11603 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11603 killed at Wed Oct 18 14:04:26 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 14:04:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11661 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11661 found at Wed Oct 18 14:04:26 UTC 2023 selfserv_9997 with PID 11661 started at Wed Oct 18 14:04:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1154: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11661 at Wed Oct 18 14:04:26 UTC 2023 kill -USR1 11661 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11661 killed at Wed Oct 18 14:04:26 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9997 starting at Wed Oct 18 14:04:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11719 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11719 found at Wed Oct 18 14:04:26 UTC 2023 selfserv_9997 with PID 11719 started at Wed Oct 18 14:04:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1155: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11719 at Wed Oct 18 14:04:27 UTC 2023 kill -USR1 11719 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11719 killed at Wed Oct 18 14:04:27 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9997 starting at Wed Oct 18 14:04:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11777 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11777 found at Wed Oct 18 14:04:27 UTC 2023 selfserv_9997 with PID 11777 started at Wed Oct 18 14:04:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1156: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11777 at Wed Oct 18 14:04:27 UTC 2023 kill -USR1 11777 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11777 killed at Wed Oct 18 14:04:27 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 14:04:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11835 found at Wed Oct 18 14:04:27 UTC 2023 selfserv_9997 with PID 11835 started at Wed Oct 18 14:04:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1157: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11835 at Wed Oct 18 14:04:27 UTC 2023 kill -USR1 11835 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11835 killed at Wed Oct 18 14:04:27 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9997 starting at Wed Oct 18 14:04:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11877 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11877 found at Wed Oct 18 14:04:27 UTC 2023 selfserv_9997 with PID 11877 started at Wed Oct 18 14:04:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1090: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11877 at Wed Oct 18 14:04:27 UTC 2023 kill -USR1 11877 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11877 killed at Wed Oct 18 14:04:27 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9997 starting at Wed Oct 18 14:04:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11919 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11919 found at Wed Oct 18 14:04:27 UTC 2023 selfserv_9997 with PID 11919 started at Wed Oct 18 14:04:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1091: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9997 with PID 11919 at Wed Oct 18 14:04:27 UTC 2023 kill -USR1 11919 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11919 killed at Wed Oct 18 14:04:27 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9997 starting at Wed Oct 18 14:04:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11961 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11961 found at Wed Oct 18 14:04:27 UTC 2023 selfserv_9997 with PID 11961 started at Wed Oct 18 14:04:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1092: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 11961 at Wed Oct 18 14:04:27 UTC 2023 kill -USR1 11961 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11961 killed at Wed Oct 18 14:04:27 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9997 starting at Wed Oct 18 14:04:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12003 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12003 found at Wed Oct 18 14:04:27 UTC 2023 selfserv_9997 with PID 12003 started at Wed Oct 18 14:04:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1093: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 12003 at Wed Oct 18 14:04:27 UTC 2023 kill -USR1 12003 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12003 killed at Wed Oct 18 14:04:27 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9997 starting at Wed Oct 18 14:04:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12045 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12045 found at Wed Oct 18 14:04:27 UTC 2023 selfserv_9997 with PID 12045 started at Wed Oct 18 14:04:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1094: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 12045 at Wed Oct 18 14:04:27 UTC 2023 kill -USR1 12045 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12045 killed at Wed Oct 18 14:04:27 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9997 starting at Wed Oct 18 14:04:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12087 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12087 found at Wed Oct 18 14:04:27 UTC 2023 selfserv_9997 with PID 12087 started at Wed Oct 18 14:04:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1095: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 12087 at Wed Oct 18 14:04:27 UTC 2023 kill -USR1 12087 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12087 killed at Wed Oct 18 14:04:27 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9997 starting at Wed Oct 18 14:04:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12129 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12129 found at Wed Oct 18 14:04:27 UTC 2023 selfserv_9997 with PID 12129 started at Wed Oct 18 14:04:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1096: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 12129 at Wed Oct 18 14:04:27 UTC 2023 kill -USR1 12129 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12129 killed at Wed Oct 18 14:04:27 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9997 starting at Wed Oct 18 14:04:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12171 found at Wed Oct 18 14:04:27 UTC 2023 selfserv_9997 with PID 12171 started at Wed Oct 18 14:04:27 UTC 2023 strsclnt -q -p 9997 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 14:04:27 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 14:04:42 UTC 2023 ssl.sh: #1097: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9997 with PID 12171 at Wed Oct 18 14:04:42 UTC 2023 kill -USR1 12171 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12171 killed at Wed Oct 18 14:04:42 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 14:04:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12237 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12237 found at Wed Oct 18 14:04:43 UTC 2023 selfserv_9997 with PID 12237 started at Wed Oct 18 14:04:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12237 at Wed Oct 18 14:04:43 UTC 2023 kill -USR1 12237 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12237 killed at Wed Oct 18 14:04:43 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:04:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12279 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12279 found at Wed Oct 18 14:04:43 UTC 2023 selfserv_9997 with PID 12279 started at Wed Oct 18 14:04:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1099: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12279 at Wed Oct 18 14:04:43 UTC 2023 kill -USR1 12279 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12279 killed at Wed Oct 18 14:04:43 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:04:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12318 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12318 found at Wed Oct 18 14:04:43 UTC 2023 selfserv_9997 with PID 12318 started at Wed Oct 18 14:04:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1100: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 12318 at Wed Oct 18 14:04:43 UTC 2023 kill -USR1 12318 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12318 killed at Wed Oct 18 14:04:43 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:04:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12357 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12357 found at Wed Oct 18 14:04:43 UTC 2023 selfserv_9997 with PID 12357 started at Wed Oct 18 14:04:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12357 at Wed Oct 18 14:04:43 UTC 2023 kill -USR1 12357 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12357 killed at Wed Oct 18 14:04:43 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:04:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12396 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12396 found at Wed Oct 18 14:04:43 UTC 2023 selfserv_9997 with PID 12396 started at Wed Oct 18 14:04:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1102: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 12396 at Wed Oct 18 14:04:43 UTC 2023 kill -USR1 12396 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12396 killed at Wed Oct 18 14:04:43 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:04:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12435 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12435 found at Wed Oct 18 14:04:43 UTC 2023 selfserv_9997 with PID 12435 started at Wed Oct 18 14:04:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12435 at Wed Oct 18 14:04:43 UTC 2023 kill -USR1 12435 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12435 killed at Wed Oct 18 14:04:43 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:04:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12474 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12474 found at Wed Oct 18 14:04:44 UTC 2023 selfserv_9997 with PID 12474 started at Wed Oct 18 14:04:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12474 at Wed Oct 18 14:04:44 UTC 2023 kill -USR1 12474 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12474 killed at Wed Oct 18 14:04:44 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:04:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12513 found at Wed Oct 18 14:04:44 UTC 2023 selfserv_9997 with PID 12513 started at Wed Oct 18 14:04:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12513 at Wed Oct 18 14:04:44 UTC 2023 kill -USR1 12513 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12513 killed at Wed Oct 18 14:04:44 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:04:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12552 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12552 found at Wed Oct 18 14:04:44 UTC 2023 selfserv_9997 with PID 12552 started at Wed Oct 18 14:04:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1106: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12552 at Wed Oct 18 14:04:44 UTC 2023 kill -USR1 12552 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12552 killed at Wed Oct 18 14:04:44 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:04:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12591 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12591 found at Wed Oct 18 14:04:44 UTC 2023 selfserv_9997 with PID 12591 started at Wed Oct 18 14:04:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12591 at Wed Oct 18 14:04:44 UTC 2023 kill -USR1 12591 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12591 killed at Wed Oct 18 14:04:44 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:04:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12630 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12630 found at Wed Oct 18 14:04:44 UTC 2023 selfserv_9997 with PID 12630 started at Wed Oct 18 14:04:44 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1108: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12630 at Wed Oct 18 14:04:44 UTC 2023 kill -USR1 12630 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12630 killed at Wed Oct 18 14:04:44 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:04:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12670 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12670 found at Wed Oct 18 14:04:44 UTC 2023 selfserv_9997 with PID 12670 started at Wed Oct 18 14:04:44 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1109: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12670 at Wed Oct 18 14:04:44 UTC 2023 kill -USR1 12670 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12670 killed at Wed Oct 18 14:04:44 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:04:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12710 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12710 found at Wed Oct 18 14:04:45 UTC 2023 selfserv_9997 with PID 12710 started at Wed Oct 18 14:04:45 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1110: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12710 at Wed Oct 18 14:04:45 UTC 2023 kill -USR1 12710 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12710 killed at Wed Oct 18 14:04:45 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:04:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12750 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12750 found at Wed Oct 18 14:04:45 UTC 2023 selfserv_9997 with PID 12750 started at Wed Oct 18 14:04:45 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1111: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12750 at Wed Oct 18 14:04:45 UTC 2023 kill -USR1 12750 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12750 killed at Wed Oct 18 14:04:45 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:04:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12790 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12790 found at Wed Oct 18 14:04:45 UTC 2023 selfserv_9997 with PID 12790 started at Wed Oct 18 14:04:45 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1112: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12790 at Wed Oct 18 14:04:45 UTC 2023 kill -USR1 12790 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12790 killed at Wed Oct 18 14:04:45 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:04:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12830 found at Wed Oct 18 14:04:45 UTC 2023 selfserv_9997 with PID 12830 started at Wed Oct 18 14:04:45 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1113: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12830 at Wed Oct 18 14:04:45 UTC 2023 kill -USR1 12830 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12830 killed at Wed Oct 18 14:04:45 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:04:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12870 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12870 found at Wed Oct 18 14:04:45 UTC 2023 selfserv_9997 with PID 12870 started at Wed Oct 18 14:04:45 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1114: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12870 at Wed Oct 18 14:04:45 UTC 2023 kill -USR1 12870 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12870 killed at Wed Oct 18 14:04:45 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:04:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12910 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12910 found at Wed Oct 18 14:04:45 UTC 2023 selfserv_9997 with PID 12910 started at Wed Oct 18 14:04:45 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1115: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12910 at Wed Oct 18 14:04:45 UTC 2023 kill -USR1 12910 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12910 killed at Wed Oct 18 14:04:45 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:04:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12950 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12950 found at Wed Oct 18 14:04:46 UTC 2023 selfserv_9997 with PID 12950 started at Wed Oct 18 14:04:46 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1116: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12950 at Wed Oct 18 14:04:46 UTC 2023 kill -USR1 12950 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12950 killed at Wed Oct 18 14:04:46 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9997 starting at Wed Oct 18 14:04:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 12990 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12990 found at Wed Oct 18 14:04:46 UTC 2023 selfserv_9997 with PID 12990 started at Wed Oct 18 14:04:46 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1117: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1118: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1119: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1120: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1121: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1122: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1123: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1125: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1126: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1131: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1132: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1137: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1138: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1142: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1144: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1147: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1148: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1149: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1150: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1151: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1152: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1153: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1154: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1155: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1156: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1157: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1158: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1159: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1160: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1161: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1162: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1163: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1164: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1165: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1166: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 12990 at Wed Oct 18 14:04:48 UTC 2023 kill -USR1 12990 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12990 killed at Wed Oct 18 14:04:48 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 14:04:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 13539 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13539 found at Wed Oct 18 14:04:48 UTC 2023 selfserv_9997 with PID 13539 started at Wed Oct 18 14:04:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1190: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1191: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1196: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1197: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1202: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1203: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1208: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1209: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1211: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1212: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1213: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1214: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1215: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1216: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1217: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1218: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1219: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1220: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1221: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1222: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1223: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1224: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1225: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1226: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1227: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1228: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1229: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1230: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1231: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1232: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1233: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13539 at Wed Oct 18 14:04:52 UTC 2023 kill -USR1 13539 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13539 killed at Wed Oct 18 14:04:52 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14351 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14351 found at Wed Oct 18 14:04:52 UTC 2023 selfserv_9997 with PID 14351 started at Wed Oct 18 14:04:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14351 at Wed Oct 18 14:04:52 UTC 2023 kill -USR1 14351 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14351 killed at Wed Oct 18 14:04:52 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14403 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14403 found at Wed Oct 18 14:04:52 UTC 2023 selfserv_9997 with PID 14403 started at Wed Oct 18 14:04:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14403 at Wed Oct 18 14:04:52 UTC 2023 kill -USR1 14403 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14403 killed at Wed Oct 18 14:04:52 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14455 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14455 found at Wed Oct 18 14:04:53 UTC 2023 selfserv_9997 with PID 14455 started at Wed Oct 18 14:04:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1246: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14455 at Wed Oct 18 14:04:53 UTC 2023 kill -USR1 14455 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14455 killed at Wed Oct 18 14:04:53 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14508 found at Wed Oct 18 14:04:53 UTC 2023 selfserv_9997 with PID 14508 started at Wed Oct 18 14:04:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1247: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14508 at Wed Oct 18 14:04:53 UTC 2023 kill -USR1 14508 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14508 killed at Wed Oct 18 14:04:53 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14560 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14560 found at Wed Oct 18 14:04:53 UTC 2023 selfserv_9997 with PID 14560 started at Wed Oct 18 14:04:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1248: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14560 at Wed Oct 18 14:04:53 UTC 2023 kill -USR1 14560 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14560 killed at Wed Oct 18 14:04:53 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14612 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14612 found at Wed Oct 18 14:04:53 UTC 2023 selfserv_9997 with PID 14612 started at Wed Oct 18 14:04:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14612 at Wed Oct 18 14:04:53 UTC 2023 kill -USR1 14612 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14612 killed at Wed Oct 18 14:04:53 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14664 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14664 found at Wed Oct 18 14:04:53 UTC 2023 selfserv_9997 with PID 14664 started at Wed Oct 18 14:04:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14664 at Wed Oct 18 14:04:54 UTC 2023 kill -USR1 14664 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14664 killed at Wed Oct 18 14:04:54 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14717 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14717 found at Wed Oct 18 14:04:54 UTC 2023 selfserv_9997 with PID 14717 started at Wed Oct 18 14:04:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14717 at Wed Oct 18 14:04:54 UTC 2023 kill -USR1 14717 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14717 killed at Wed Oct 18 14:04:54 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14769 found at Wed Oct 18 14:04:54 UTC 2023 selfserv_9997 with PID 14769 started at Wed Oct 18 14:04:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14769 at Wed Oct 18 14:04:54 UTC 2023 kill -USR1 14769 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14769 killed at Wed Oct 18 14:04:54 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14821 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14821 found at Wed Oct 18 14:04:54 UTC 2023 selfserv_9997 with PID 14821 started at Wed Oct 18 14:04:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1253: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14821 at Wed Oct 18 14:04:54 UTC 2023 kill -USR1 14821 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14821 killed at Wed Oct 18 14:04:54 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14873 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14873 found at Wed Oct 18 14:04:55 UTC 2023 selfserv_9997 with PID 14873 started at Wed Oct 18 14:04:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1254: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14873 at Wed Oct 18 14:04:55 UTC 2023 kill -USR1 14873 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14873 killed at Wed Oct 18 14:04:55 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14925 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14925 found at Wed Oct 18 14:04:55 UTC 2023 selfserv_9997 with PID 14925 started at Wed Oct 18 14:04:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14925 at Wed Oct 18 14:04:55 UTC 2023 kill -USR1 14925 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14925 killed at Wed Oct 18 14:04:55 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 14:04:55 UTC 2023 selfserv_9997 with PID 14978 started at Wed Oct 18 14:04:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14978 at Wed Oct 18 14:04:55 UTC 2023 kill -USR1 14978 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14978 killed at Wed Oct 18 14:04:55 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15030 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15030 found at Wed Oct 18 14:04:55 UTC 2023 selfserv_9997 with PID 15030 started at Wed Oct 18 14:04:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15030 at Wed Oct 18 14:04:56 UTC 2023 kill -USR1 15030 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15030 killed at Wed Oct 18 14:04:56 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15082 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15082 found at Wed Oct 18 14:04:56 UTC 2023 selfserv_9997 with PID 15082 started at Wed Oct 18 14:04:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15082 at Wed Oct 18 14:04:56 UTC 2023 kill -USR1 15082 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15082 killed at Wed Oct 18 14:04:56 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15135 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15135 found at Wed Oct 18 14:04:56 UTC 2023 selfserv_9997 with PID 15135 started at Wed Oct 18 14:04:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1259: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15135 at Wed Oct 18 14:04:56 UTC 2023 kill -USR1 15135 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15135 killed at Wed Oct 18 14:04:56 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15188 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15188 found at Wed Oct 18 14:04:56 UTC 2023 selfserv_9997 with PID 15188 started at Wed Oct 18 14:04:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1260: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15188 at Wed Oct 18 14:04:56 UTC 2023 kill -USR1 15188 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15188 killed at Wed Oct 18 14:04:56 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15240 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15240 found at Wed Oct 18 14:04:56 UTC 2023 selfserv_9997 with PID 15240 started at Wed Oct 18 14:04:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1261: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15240 at Wed Oct 18 14:04:57 UTC 2023 kill -USR1 15240 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15240 killed at Wed Oct 18 14:04:57 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15292 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15292 found at Wed Oct 18 14:04:57 UTC 2023 selfserv_9997 with PID 15292 started at Wed Oct 18 14:04:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1262: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15292 at Wed Oct 18 14:04:57 UTC 2023 kill -USR1 15292 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15292 killed at Wed Oct 18 14:04:57 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15344 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15344 found at Wed Oct 18 14:04:57 UTC 2023 selfserv_9997 with PID 15344 started at Wed Oct 18 14:04:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1263: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15344 at Wed Oct 18 14:04:57 UTC 2023 kill -USR1 15344 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15344 killed at Wed Oct 18 14:04:57 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15396 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15396 found at Wed Oct 18 14:04:57 UTC 2023 selfserv_9997 with PID 15396 started at Wed Oct 18 14:04:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1264: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15396 at Wed Oct 18 14:04:57 UTC 2023 kill -USR1 15396 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15396 killed at Wed Oct 18 14:04:57 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15448 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15448 found at Wed Oct 18 14:04:58 UTC 2023 selfserv_9997 with PID 15448 started at Wed Oct 18 14:04:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1265: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15448 at Wed Oct 18 14:04:58 UTC 2023 kill -USR1 15448 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15448 killed at Wed Oct 18 14:04:58 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15500 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15500 found at Wed Oct 18 14:04:58 UTC 2023 selfserv_9997 with PID 15500 started at Wed Oct 18 14:04:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1266: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15500 at Wed Oct 18 14:04:58 UTC 2023 kill -USR1 15500 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15500 killed at Wed Oct 18 14:04:58 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15552 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15552 found at Wed Oct 18 14:04:58 UTC 2023 selfserv_9997 with PID 15552 started at Wed Oct 18 14:04:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1267: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15552 at Wed Oct 18 14:04:58 UTC 2023 kill -USR1 15552 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15552 killed at Wed Oct 18 14:04:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15604 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15604 found at Wed Oct 18 14:04:58 UTC 2023 selfserv_9997 with PID 15604 started at Wed Oct 18 14:04:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1268: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15604 at Wed Oct 18 14:04:59 UTC 2023 kill -USR1 15604 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15604 killed at Wed Oct 18 14:04:59 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:04:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15656 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15656 found at Wed Oct 18 14:04:59 UTC 2023 selfserv_9997 with PID 15656 started at Wed Oct 18 14:04:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1269: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15656 at Wed Oct 18 14:04:59 UTC 2023 kill -USR1 15656 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15656 killed at Wed Oct 18 14:04:59 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15708 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15708 found at Wed Oct 18 14:04:59 UTC 2023 selfserv_9997 with PID 15708 started at Wed Oct 18 14:04:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1270: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15708 at Wed Oct 18 14:04:59 UTC 2023 kill -USR1 15708 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15708 killed at Wed Oct 18 14:04:59 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:04:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:04:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15760 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15760 found at Wed Oct 18 14:04:59 UTC 2023 selfserv_9997 with PID 15760 started at Wed Oct 18 14:04:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1271: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15760 at Wed Oct 18 14:05:00 UTC 2023 kill -USR1 15760 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15760 killed at Wed Oct 18 14:05:00 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:05:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15812 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15812 found at Wed Oct 18 14:05:00 UTC 2023 selfserv_9997 with PID 15812 started at Wed Oct 18 14:05:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1272: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15812 at Wed Oct 18 14:05:00 UTC 2023 kill -USR1 15812 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15812 killed at Wed Oct 18 14:05:00 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15864 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15864 found at Wed Oct 18 14:05:00 UTC 2023 selfserv_9997 with PID 15864 started at Wed Oct 18 14:05:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1273: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15864 at Wed Oct 18 14:05:00 UTC 2023 kill -USR1 15864 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15864 killed at Wed Oct 18 14:05:00 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15916 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15916 found at Wed Oct 18 14:05:01 UTC 2023 selfserv_9997 with PID 15916 started at Wed Oct 18 14:05:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1274: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15916 at Wed Oct 18 14:05:01 UTC 2023 kill -USR1 15916 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15916 killed at Wed Oct 18 14:05:01 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15968 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15968 found at Wed Oct 18 14:05:01 UTC 2023 selfserv_9997 with PID 15968 started at Wed Oct 18 14:05:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1275: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15968 at Wed Oct 18 14:05:01 UTC 2023 kill -USR1 15968 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15968 killed at Wed Oct 18 14:05:01 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16020 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16020 found at Wed Oct 18 14:05:01 UTC 2023 selfserv_9997 with PID 16020 started at Wed Oct 18 14:05:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1276: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16020 at Wed Oct 18 14:05:01 UTC 2023 kill -USR1 16020 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16020 killed at Wed Oct 18 14:05:01 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16072 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16072 found at Wed Oct 18 14:05:01 UTC 2023 selfserv_9997 with PID 16072 started at Wed Oct 18 14:05:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1277: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16072 at Wed Oct 18 14:05:01 UTC 2023 kill -USR1 16072 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16072 killed at Wed Oct 18 14:05:01 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16124 found at Wed Oct 18 14:05:02 UTC 2023 selfserv_9997 with PID 16124 started at Wed Oct 18 14:05:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1278: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16124 at Wed Oct 18 14:05:02 UTC 2023 kill -USR1 16124 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16124 killed at Wed Oct 18 14:05:02 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16176 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16176 found at Wed Oct 18 14:05:02 UTC 2023 selfserv_9997 with PID 16176 started at Wed Oct 18 14:05:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1279: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16176 at Wed Oct 18 14:05:02 UTC 2023 kill -USR1 16176 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16176 killed at Wed Oct 18 14:05:02 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:05:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16229 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16229 found at Wed Oct 18 14:05:02 UTC 2023 selfserv_9997 with PID 16229 started at Wed Oct 18 14:05:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1280: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16229 at Wed Oct 18 14:05:02 UTC 2023 kill -USR1 16229 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16229 killed at Wed Oct 18 14:05:02 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16281 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16281 found at Wed Oct 18 14:05:02 UTC 2023 selfserv_9997 with PID 16281 started at Wed Oct 18 14:05:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1281: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16281 at Wed Oct 18 14:05:02 UTC 2023 kill -USR1 16281 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16281 killed at Wed Oct 18 14:05:02 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:05:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16333 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16333 found at Wed Oct 18 14:05:03 UTC 2023 selfserv_9997 with PID 16333 started at Wed Oct 18 14:05:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1282: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16333 at Wed Oct 18 14:05:03 UTC 2023 kill -USR1 16333 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16333 killed at Wed Oct 18 14:05:03 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16385 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16385 found at Wed Oct 18 14:05:03 UTC 2023 selfserv_9997 with PID 16385 started at Wed Oct 18 14:05:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1283: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16385 at Wed Oct 18 14:05:03 UTC 2023 kill -USR1 16385 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16385 killed at Wed Oct 18 14:05:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:05:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16438 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16438 found at Wed Oct 18 14:05:03 UTC 2023 selfserv_9997 with PID 16438 started at Wed Oct 18 14:05:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1284: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16438 at Wed Oct 18 14:05:03 UTC 2023 kill -USR1 16438 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16438 killed at Wed Oct 18 14:05:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16490 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16490 found at Wed Oct 18 14:05:03 UTC 2023 selfserv_9997 with PID 16490 started at Wed Oct 18 14:05:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1285: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16490 at Wed Oct 18 14:05:03 UTC 2023 kill -USR1 16490 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16490 killed at Wed Oct 18 14:05:03 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:05:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16542 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16542 found at Wed Oct 18 14:05:04 UTC 2023 selfserv_9997 with PID 16542 started at Wed Oct 18 14:05:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1286: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16542 at Wed Oct 18 14:05:04 UTC 2023 kill -USR1 16542 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16542 killed at Wed Oct 18 14:05:04 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16594 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16594 found at Wed Oct 18 14:05:04 UTC 2023 selfserv_9997 with PID 16594 started at Wed Oct 18 14:05:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1287: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16594 at Wed Oct 18 14:05:04 UTC 2023 kill -USR1 16594 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16594 killed at Wed Oct 18 14:05:04 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:05:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16646 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16646 found at Wed Oct 18 14:05:04 UTC 2023 selfserv_9997 with PID 16646 started at Wed Oct 18 14:05:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1288: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16646 at Wed Oct 18 14:05:04 UTC 2023 kill -USR1 16646 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16646 killed at Wed Oct 18 14:05:04 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16698 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16698 found at Wed Oct 18 14:05:04 UTC 2023 selfserv_9997 with PID 16698 started at Wed Oct 18 14:05:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1289: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16698 at Wed Oct 18 14:05:04 UTC 2023 kill -USR1 16698 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16698 killed at Wed Oct 18 14:05:04 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:05:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16750 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16750 found at Wed Oct 18 14:05:05 UTC 2023 selfserv_9997 with PID 16750 started at Wed Oct 18 14:05:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1290: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16750 at Wed Oct 18 14:05:05 UTC 2023 kill -USR1 16750 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16750 killed at Wed Oct 18 14:05:05 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16802 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16802 found at Wed Oct 18 14:05:05 UTC 2023 selfserv_9997 with PID 16802 started at Wed Oct 18 14:05:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1291: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16802 at Wed Oct 18 14:05:05 UTC 2023 kill -USR1 16802 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16802 killed at Wed Oct 18 14:05:05 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:05:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16854 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16854 found at Wed Oct 18 14:05:05 UTC 2023 selfserv_9997 with PID 16854 started at Wed Oct 18 14:05:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1292: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16854 at Wed Oct 18 14:05:05 UTC 2023 kill -USR1 16854 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16854 killed at Wed Oct 18 14:05:05 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16906 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16906 found at Wed Oct 18 14:05:05 UTC 2023 selfserv_9997 with PID 16906 started at Wed Oct 18 14:05:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1293: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16906 at Wed Oct 18 14:05:06 UTC 2023 kill -USR1 16906 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16906 killed at Wed Oct 18 14:05:06 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:05:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16958 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16958 found at Wed Oct 18 14:05:06 UTC 2023 selfserv_9997 with PID 16958 started at Wed Oct 18 14:05:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1294: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16958 at Wed Oct 18 14:05:06 UTC 2023 kill -USR1 16958 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16958 killed at Wed Oct 18 14:05:06 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17010 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17010 found at Wed Oct 18 14:05:06 UTC 2023 selfserv_9997 with PID 17010 started at Wed Oct 18 14:05:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1295: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17010 at Wed Oct 18 14:05:06 UTC 2023 kill -USR1 17010 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17010 killed at Wed Oct 18 14:05:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:05:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17062 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17062 found at Wed Oct 18 14:05:06 UTC 2023 selfserv_9997 with PID 17062 started at Wed Oct 18 14:05:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1296: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17062 at Wed Oct 18 14:05:06 UTC 2023 kill -USR1 17062 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17062 killed at Wed Oct 18 14:05:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17114 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17114 found at Wed Oct 18 14:05:07 UTC 2023 selfserv_9997 with PID 17114 started at Wed Oct 18 14:05:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1297: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17114 at Wed Oct 18 14:05:07 UTC 2023 kill -USR1 17114 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17114 killed at Wed Oct 18 14:05:07 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:05:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17166 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17166 found at Wed Oct 18 14:05:07 UTC 2023 selfserv_9997 with PID 17166 started at Wed Oct 18 14:05:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1298: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17166 at Wed Oct 18 14:05:07 UTC 2023 kill -USR1 17166 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17166 killed at Wed Oct 18 14:05:07 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17218 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17218 found at Wed Oct 18 14:05:07 UTC 2023 selfserv_9997 with PID 17218 started at Wed Oct 18 14:05:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1299: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17218 at Wed Oct 18 14:05:07 UTC 2023 kill -USR1 17218 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17218 killed at Wed Oct 18 14:05:08 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17270 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17270 found at Wed Oct 18 14:05:08 UTC 2023 selfserv_9997 with PID 17270 started at Wed Oct 18 14:05:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1300: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17270 at Wed Oct 18 14:05:08 UTC 2023 kill -USR1 17270 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17270 killed at Wed Oct 18 14:05:08 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17322 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17322 found at Wed Oct 18 14:05:08 UTC 2023 selfserv_9997 with PID 17322 started at Wed Oct 18 14:05:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1301: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17322 at Wed Oct 18 14:05:08 UTC 2023 kill -USR1 17322 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17322 killed at Wed Oct 18 14:05:08 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 14:05:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17404 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17404 found at Wed Oct 18 14:05:08 UTC 2023 selfserv_9997 with PID 17404 started at Wed Oct 18 14:05:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17404 at Wed Oct 18 14:05:08 UTC 2023 kill -USR1 17404 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17404 killed at Wed Oct 18 14:05:08 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:05:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17446 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17446 found at Wed Oct 18 14:05:08 UTC 2023 selfserv_9997 with PID 17446 started at Wed Oct 18 14:05:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17446 at Wed Oct 18 14:05:08 UTC 2023 kill -USR1 17446 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17446 killed at Wed Oct 18 14:05:08 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:05:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17485 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17485 found at Wed Oct 18 14:05:09 UTC 2023 selfserv_9997 with PID 17485 started at Wed Oct 18 14:05:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1246: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 17485 at Wed Oct 18 14:05:09 UTC 2023 kill -USR1 17485 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17485 killed at Wed Oct 18 14:05:09 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:05:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17524 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17524 found at Wed Oct 18 14:05:09 UTC 2023 selfserv_9997 with PID 17524 started at Wed Oct 18 14:05:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1247: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17524 at Wed Oct 18 14:05:09 UTC 2023 kill -USR1 17524 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17524 killed at Wed Oct 18 14:05:09 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:05:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17563 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17563 found at Wed Oct 18 14:05:09 UTC 2023 selfserv_9997 with PID 17563 started at Wed Oct 18 14:05:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1248: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 17563 at Wed Oct 18 14:05:09 UTC 2023 kill -USR1 17563 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17563 killed at Wed Oct 18 14:05:09 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:05:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17602 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17602 found at Wed Oct 18 14:05:09 UTC 2023 selfserv_9997 with PID 17602 started at Wed Oct 18 14:05:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17602 at Wed Oct 18 14:05:09 UTC 2023 kill -USR1 17602 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17602 killed at Wed Oct 18 14:05:09 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:05:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17641 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17641 found at Wed Oct 18 14:05:09 UTC 2023 selfserv_9997 with PID 17641 started at Wed Oct 18 14:05:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17641 at Wed Oct 18 14:05:09 UTC 2023 kill -USR1 17641 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17641 killed at Wed Oct 18 14:05:09 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:05:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17681 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17681 found at Wed Oct 18 14:05:09 UTC 2023 selfserv_9997 with PID 17681 started at Wed Oct 18 14:05:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17681 at Wed Oct 18 14:05:09 UTC 2023 kill -USR1 17681 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17681 killed at Wed Oct 18 14:05:09 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:05:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17722 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17722 found at Wed Oct 18 14:05:09 UTC 2023 selfserv_9997 with PID 17722 started at Wed Oct 18 14:05:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17722 at Wed Oct 18 14:05:10 UTC 2023 kill -USR1 17722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17722 killed at Wed Oct 18 14:05:10 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:05:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17761 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17761 found at Wed Oct 18 14:05:10 UTC 2023 selfserv_9997 with PID 17761 started at Wed Oct 18 14:05:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1253: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17761 at Wed Oct 18 14:05:10 UTC 2023 kill -USR1 17761 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17761 killed at Wed Oct 18 14:05:10 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:05:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17800 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17800 found at Wed Oct 18 14:05:10 UTC 2023 selfserv_9997 with PID 17800 started at Wed Oct 18 14:05:10 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1254: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17800 at Wed Oct 18 14:05:10 UTC 2023 kill -USR1 17800 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17800 killed at Wed Oct 18 14:05:10 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:05:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17842 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17842 found at Wed Oct 18 14:05:10 UTC 2023 selfserv_9997 with PID 17842 started at Wed Oct 18 14:05:10 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1255: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17842 at Wed Oct 18 14:05:10 UTC 2023 kill -USR1 17842 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17842 killed at Wed Oct 18 14:05:10 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:05:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17882 found at Wed Oct 18 14:05:10 UTC 2023 selfserv_9997 with PID 17882 started at Wed Oct 18 14:05:10 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1256: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17882 at Wed Oct 18 14:05:10 UTC 2023 kill -USR1 17882 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17882 killed at Wed Oct 18 14:05:10 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:05:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17922 found at Wed Oct 18 14:05:10 UTC 2023 selfserv_9997 with PID 17922 started at Wed Oct 18 14:05:10 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1257: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17922 at Wed Oct 18 14:05:10 UTC 2023 kill -USR1 17922 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17922 killed at Wed Oct 18 14:05:10 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:05:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17962 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17962 found at Wed Oct 18 14:05:10 UTC 2023 selfserv_9997 with PID 17962 started at Wed Oct 18 14:05:10 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1258: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17962 at Wed Oct 18 14:05:11 UTC 2023 kill -USR1 17962 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17962 killed at Wed Oct 18 14:05:11 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:05:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18002 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18002 found at Wed Oct 18 14:05:11 UTC 2023 selfserv_9997 with PID 18002 started at Wed Oct 18 14:05:11 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1259: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18002 at Wed Oct 18 14:05:11 UTC 2023 kill -USR1 18002 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18002 killed at Wed Oct 18 14:05:11 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:05:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18042 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18042 found at Wed Oct 18 14:05:11 UTC 2023 selfserv_9997 with PID 18042 started at Wed Oct 18 14:05:11 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1260: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18042 at Wed Oct 18 14:05:11 UTC 2023 kill -USR1 18042 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18042 killed at Wed Oct 18 14:05:11 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:05:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18082 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18082 found at Wed Oct 18 14:05:11 UTC 2023 selfserv_9997 with PID 18082 started at Wed Oct 18 14:05:11 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1261: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18082 at Wed Oct 18 14:05:11 UTC 2023 kill -USR1 18082 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18082 killed at Wed Oct 18 14:05:11 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:05:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18122 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18122 found at Wed Oct 18 14:05:11 UTC 2023 selfserv_9997 with PID 18122 started at Wed Oct 18 14:05:11 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1262: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18122 at Wed Oct 18 14:05:11 UTC 2023 kill -USR1 18122 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18122 killed at Wed Oct 18 14:05:11 UTC 2023 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -fips false -force FIPS mode disabled. ssl.sh: #1263: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/server -list ssl.sh: #1264: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1265: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1266: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_server -list ssl.sh: #1267: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1268: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -fips true -force FIPS mode enabled. ssl.sh: #1269: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -list ssl.sh: #1270: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1271: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1272: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -list ssl.sh: #1273: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1274: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9997 starting at Wed Oct 18 14:05:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 18244 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18244 found at Wed Oct 18 14:05:12 UTC 2023 selfserv_9997 with PID 18244 started at Wed Oct 18 14:05:12 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1275: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1276: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1277: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1278: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1279: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1280: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1281: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1282: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1283: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1284: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1305: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1306: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1308: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1309: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1311: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1312: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1314: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1315: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1317: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1318: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1319: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1320: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1321: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1322: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1323: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1324: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1325: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 18244 at Wed Oct 18 14:05:17 UTC 2023 kill -USR1 18244 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18244 killed at Wed Oct 18 14:05:17 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 14:05:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 18795 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18795 found at Wed Oct 18 14:05:17 UTC 2023 selfserv_9997 with PID 18795 started at Wed Oct 18 14:05:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1326: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1327: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1328: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1329: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1330: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1331: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1332: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1333: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1334: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1335: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1336: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1337: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1338: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1339: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1340: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1341: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1342: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1343: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1344: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1345: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1346: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1347: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1348: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1349: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1350: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1351: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1352: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1353: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1354: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1355: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1356: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1357: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1358: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1359: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1360: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1361: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1362: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1363: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1364: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1365: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1366: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1367: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1368: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1369: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1370: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1371: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1372: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18795 at Wed Oct 18 14:05:26 UTC 2023 kill -USR1 18795 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18795 killed at Wed Oct 18 14:05:26 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9997 starting at Wed Oct 18 14:05:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19593 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19593 found at Wed Oct 18 14:05:26 UTC 2023 selfserv_9997 with PID 19593 started at Wed Oct 18 14:05:26 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1402: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1403: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19593 at Wed Oct 18 14:05:26 UTC 2023 kill -USR1 19593 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19593 killed at Wed Oct 18 14:05:26 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19671 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19671 found at Wed Oct 18 14:05:26 UTC 2023 selfserv_9997 with PID 19671 started at Wed Oct 18 14:05:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1402: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19671 at Wed Oct 18 14:05:26 UTC 2023 kill -USR1 19671 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19671 killed at Wed Oct 18 14:05:26 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:05:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19723 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19723 found at Wed Oct 18 14:05:26 UTC 2023 selfserv_9997 with PID 19723 started at Wed Oct 18 14:05:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1403: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19723 at Wed Oct 18 14:05:51 UTC 2023 kill -USR1 19723 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19723 killed at Wed Oct 18 14:05:51 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19790 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19790 found at Wed Oct 18 14:05:51 UTC 2023 selfserv_9997 with PID 19790 started at Wed Oct 18 14:05:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1404: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19790 at Wed Oct 18 14:05:51 UTC 2023 kill -USR1 19790 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19790 killed at Wed Oct 18 14:05:51 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:05:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19855 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19855 found at Wed Oct 18 14:05:51 UTC 2023 selfserv_9997 with PID 19855 started at Wed Oct 18 14:05:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1405: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19855 at Wed Oct 18 14:05:51 UTC 2023 kill -USR1 19855 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19855 killed at Wed Oct 18 14:05:51 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:05:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:05:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19907 found at Wed Oct 18 14:05:51 UTC 2023 selfserv_9997 with PID 19907 started at Wed Oct 18 14:05:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1406: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19907 at Wed Oct 18 14:06:14 UTC 2023 kill -USR1 19907 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19907 killed at Wed Oct 18 14:06:14 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:06:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:06:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19959 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19959 found at Wed Oct 18 14:06:14 UTC 2023 selfserv_9997 with PID 19959 started at Wed Oct 18 14:06:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1407: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19959 at Wed Oct 18 14:06:15 UTC 2023 kill -USR1 19959 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19959 killed at Wed Oct 18 14:06:15 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:06:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:06:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20024 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20024 found at Wed Oct 18 14:06:15 UTC 2023 selfserv_9997 with PID 20024 started at Wed Oct 18 14:06:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1408: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20024 at Wed Oct 18 14:06:15 UTC 2023 kill -USR1 20024 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20024 killed at Wed Oct 18 14:06:15 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:06:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:06:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20076 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20076 found at Wed Oct 18 14:06:15 UTC 2023 selfserv_9997 with PID 20076 started at Wed Oct 18 14:06:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1409: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20076 at Wed Oct 18 14:06:39 UTC 2023 kill -USR1 20076 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20076 killed at Wed Oct 18 14:06:39 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:06:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:06:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20128 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20128 found at Wed Oct 18 14:06:39 UTC 2023 selfserv_9997 with PID 20128 started at Wed Oct 18 14:06:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20128 at Wed Oct 18 14:06:39 UTC 2023 kill -USR1 20128 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20128 killed at Wed Oct 18 14:06:39 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:06:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:06:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20192 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20192 found at Wed Oct 18 14:06:39 UTC 2023 selfserv_9997 with PID 20192 started at Wed Oct 18 14:06:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1411: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20192 at Wed Oct 18 14:06:40 UTC 2023 kill -USR1 20192 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20192 killed at Wed Oct 18 14:06:40 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:06:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:06:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20245 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20245 found at Wed Oct 18 14:06:40 UTC 2023 selfserv_9997 with PID 20245 started at Wed Oct 18 14:06:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20245 at Wed Oct 18 14:07:04 UTC 2023 kill -USR1 20245 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20245 killed at Wed Oct 18 14:07:04 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:07:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:07:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20312 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20312 found at Wed Oct 18 14:07:04 UTC 2023 selfserv_9997 with PID 20312 started at Wed Oct 18 14:07:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20312 at Wed Oct 18 14:07:04 UTC 2023 kill -USR1 20312 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20312 killed at Wed Oct 18 14:07:04 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:07:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:07:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20377 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20377 found at Wed Oct 18 14:07:04 UTC 2023 selfserv_9997 with PID 20377 started at Wed Oct 18 14:07:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1414: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20377 at Wed Oct 18 14:07:05 UTC 2023 kill -USR1 20377 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20377 killed at Wed Oct 18 14:07:05 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:07:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:07:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20429 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20429 found at Wed Oct 18 14:07:05 UTC 2023 selfserv_9997 with PID 20429 started at Wed Oct 18 14:07:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1415: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20429 at Wed Oct 18 14:07:28 UTC 2023 kill -USR1 20429 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20429 killed at Wed Oct 18 14:07:28 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:07:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:07:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20481 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20481 found at Wed Oct 18 14:07:28 UTC 2023 selfserv_9997 with PID 20481 started at Wed Oct 18 14:07:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20481 at Wed Oct 18 14:07:28 UTC 2023 kill -USR1 20481 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20481 killed at Wed Oct 18 14:07:28 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:07:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:07:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20537 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20537 found at Wed Oct 18 14:07:28 UTC 2023 selfserv_9997 with PID 20537 started at Wed Oct 18 14:07:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20537 at Wed Oct 18 14:07:28 UTC 2023 kill -USR1 20537 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20537 killed at Wed Oct 18 14:07:28 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:07:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:07:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20593 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20593 found at Wed Oct 18 14:07:28 UTC 2023 selfserv_9997 with PID 20593 started at Wed Oct 18 14:07:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1418: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20593 at Wed Oct 18 14:07:29 UTC 2023 kill -USR1 20593 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20593 killed at Wed Oct 18 14:07:29 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:07:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:07:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20649 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20649 found at Wed Oct 18 14:07:29 UTC 2023 selfserv_9997 with PID 20649 started at Wed Oct 18 14:07:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20649 at Wed Oct 18 14:07:29 UTC 2023 kill -USR1 20649 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20649 killed at Wed Oct 18 14:07:29 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:07:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:07:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20709 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20709 found at Wed Oct 18 14:07:29 UTC 2023 selfserv_9997 with PID 20709 started at Wed Oct 18 14:07:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1420: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20709 at Wed Oct 18 14:07:53 UTC 2023 kill -USR1 20709 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20709 killed at Wed Oct 18 14:07:53 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:07:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:07:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20776 found at Wed Oct 18 14:07:53 UTC 2023 selfserv_9997 with PID 20776 started at Wed Oct 18 14:07:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1421: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20776 at Wed Oct 18 14:07:53 UTC 2023 kill -USR1 20776 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20776 killed at Wed Oct 18 14:07:53 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:07:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:07:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20836 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20836 found at Wed Oct 18 14:07:54 UTC 2023 selfserv_9997 with PID 20836 started at Wed Oct 18 14:07:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1422: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20836 at Wed Oct 18 14:08:17 UTC 2023 kill -USR1 20836 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20836 killed at Wed Oct 18 14:08:17 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:08:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:08:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20888 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20888 found at Wed Oct 18 14:08:17 UTC 2023 selfserv_9997 with PID 20888 started at Wed Oct 18 14:08:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20888 at Wed Oct 18 14:08:17 UTC 2023 kill -USR1 20888 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20888 killed at Wed Oct 18 14:08:17 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:08:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:08:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20948 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20948 found at Wed Oct 18 14:08:17 UTC 2023 selfserv_9997 with PID 20948 started at Wed Oct 18 14:08:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1424: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20948 at Wed Oct 18 14:08:41 UTC 2023 kill -USR1 20948 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20948 killed at Wed Oct 18 14:08:41 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:08:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:08:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21010 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21010 found at Wed Oct 18 14:08:41 UTC 2023 selfserv_9997 with PID 21010 started at Wed Oct 18 14:08:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21010 at Wed Oct 18 14:08:41 UTC 2023 kill -USR1 21010 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21010 killed at Wed Oct 18 14:08:41 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:08:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:08:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21073 found at Wed Oct 18 14:08:41 UTC 2023 selfserv_9997 with PID 21073 started at Wed Oct 18 14:08:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1426: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 21073 at Wed Oct 18 14:09:06 UTC 2023 kill -USR1 21073 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21073 killed at Wed Oct 18 14:09:06 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:09:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21127 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21127 found at Wed Oct 18 14:09:06 UTC 2023 selfserv_9997 with PID 21127 started at Wed Oct 18 14:09:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1427: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21127 at Wed Oct 18 14:09:06 UTC 2023 kill -USR1 21127 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21127 killed at Wed Oct 18 14:09:06 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:09:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21187 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21187 found at Wed Oct 18 14:09:06 UTC 2023 selfserv_9997 with PID 21187 started at Wed Oct 18 14:09:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1428: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 21187 at Wed Oct 18 14:09:29 UTC 2023 kill -USR1 21187 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21187 killed at Wed Oct 18 14:09:29 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:09:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21239 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21239 found at Wed Oct 18 14:09:29 UTC 2023 selfserv_9997 with PID 21239 started at Wed Oct 18 14:09:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1429: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21239 at Wed Oct 18 14:09:29 UTC 2023 kill -USR1 21239 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21239 killed at Wed Oct 18 14:09:29 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:09:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21291 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21291 found at Wed Oct 18 14:09:29 UTC 2023 selfserv_9997 with PID 21291 started at Wed Oct 18 14:09:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1430: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21291 at Wed Oct 18 14:09:30 UTC 2023 kill -USR1 21291 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21291 killed at Wed Oct 18 14:09:30 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:09:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21344 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21344 found at Wed Oct 18 14:09:30 UTC 2023 selfserv_9997 with PID 21344 started at Wed Oct 18 14:09:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1431: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21344 at Wed Oct 18 14:09:30 UTC 2023 kill -USR1 21344 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21344 killed at Wed Oct 18 14:09:30 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 14:09:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21402 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21402 found at Wed Oct 18 14:09:30 UTC 2023 selfserv_9997 with PID 21402 started at Wed Oct 18 14:09:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1432: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21402 at Wed Oct 18 14:09:30 UTC 2023 kill -USR1 21402 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21402 killed at Wed Oct 18 14:09:30 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 14:09:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21461 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21461 found at Wed Oct 18 14:09:30 UTC 2023 selfserv_9997 with PID 21461 started at Wed Oct 18 14:09:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1433: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21461 at Wed Oct 18 14:09:30 UTC 2023 kill -USR1 21461 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21461 killed at Wed Oct 18 14:09:30 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 14:09:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21519 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21519 found at Wed Oct 18 14:09:30 UTC 2023 selfserv_9997 with PID 21519 started at Wed Oct 18 14:09:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1434: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 21519 at Wed Oct 18 14:09:31 UTC 2023 kill -USR1 21519 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21519 killed at Wed Oct 18 14:09:31 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 14:09:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21577 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21577 found at Wed Oct 18 14:09:31 UTC 2023 selfserv_9997 with PID 21577 started at Wed Oct 18 14:09:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1435: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21577 at Wed Oct 18 14:09:31 UTC 2023 kill -USR1 21577 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21577 killed at Wed Oct 18 14:09:31 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9997 starting at Wed Oct 18 14:09:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21635 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21635 found at Wed Oct 18 14:09:31 UTC 2023 selfserv_9997 with PID 21635 started at Wed Oct 18 14:09:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1436: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 21635 at Wed Oct 18 14:09:31 UTC 2023 kill -USR1 21635 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21635 killed at Wed Oct 18 14:09:31 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 14:09:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21693 found at Wed Oct 18 14:09:31 UTC 2023 selfserv_9997 with PID 21693 started at Wed Oct 18 14:09:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1437: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21693 at Wed Oct 18 14:09:31 UTC 2023 kill -USR1 21693 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21693 killed at Wed Oct 18 14:09:31 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 14:09:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21751 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21751 found at Wed Oct 18 14:09:31 UTC 2023 selfserv_9997 with PID 21751 started at Wed Oct 18 14:09:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1438: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21751 at Wed Oct 18 14:09:31 UTC 2023 kill -USR1 21751 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21751 killed at Wed Oct 18 14:09:31 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9997 starting at Wed Oct 18 14:09:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21809 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21809 found at Wed Oct 18 14:09:31 UTC 2023 selfserv_9997 with PID 21809 started at Wed Oct 18 14:09:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1439: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 21809 at Wed Oct 18 14:09:31 UTC 2023 kill -USR1 21809 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21809 killed at Wed Oct 18 14:09:31 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9997 starting at Wed Oct 18 14:09:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21867 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21867 found at Wed Oct 18 14:09:31 UTC 2023 selfserv_9997 with PID 21867 started at Wed Oct 18 14:09:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1440: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 21867 at Wed Oct 18 14:09:32 UTC 2023 kill -USR1 21867 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21867 killed at Wed Oct 18 14:09:32 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 14:09:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21925 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21925 found at Wed Oct 18 14:09:32 UTC 2023 selfserv_9997 with PID 21925 started at Wed Oct 18 14:09:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1441: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 21925 at Wed Oct 18 14:09:32 UTC 2023 kill -USR1 21925 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21925 killed at Wed Oct 18 14:09:32 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9997 starting at Wed Oct 18 14:09:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21967 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21967 found at Wed Oct 18 14:09:32 UTC 2023 selfserv_9997 with PID 21967 started at Wed Oct 18 14:09:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1402: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21967 at Wed Oct 18 14:09:32 UTC 2023 kill -USR1 21967 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21967 killed at Wed Oct 18 14:09:32 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9997 starting at Wed Oct 18 14:09:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22009 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22009 found at Wed Oct 18 14:09:32 UTC 2023 selfserv_9997 with PID 22009 started at Wed Oct 18 14:09:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1403: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9997 with PID 22009 at Wed Oct 18 14:09:32 UTC 2023 kill -USR1 22009 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22009 killed at Wed Oct 18 14:09:32 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9997 starting at Wed Oct 18 14:09:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22051 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22051 found at Wed Oct 18 14:09:32 UTC 2023 selfserv_9997 with PID 22051 started at Wed Oct 18 14:09:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1404: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 22051 at Wed Oct 18 14:09:32 UTC 2023 kill -USR1 22051 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22051 killed at Wed Oct 18 14:09:32 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9997 starting at Wed Oct 18 14:09:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22095 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22095 found at Wed Oct 18 14:09:32 UTC 2023 selfserv_9997 with PID 22095 started at Wed Oct 18 14:09:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1405: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 22095 at Wed Oct 18 14:09:32 UTC 2023 kill -USR1 22095 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22095 killed at Wed Oct 18 14:09:32 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9997 starting at Wed Oct 18 14:09:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22137 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22137 found at Wed Oct 18 14:09:32 UTC 2023 selfserv_9997 with PID 22137 started at Wed Oct 18 14:09:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1406: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 22137 at Wed Oct 18 14:09:32 UTC 2023 kill -USR1 22137 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22137 killed at Wed Oct 18 14:09:32 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9997 starting at Wed Oct 18 14:09:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22179 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22179 found at Wed Oct 18 14:09:32 UTC 2023 selfserv_9997 with PID 22179 started at Wed Oct 18 14:09:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1407: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 22179 at Wed Oct 18 14:09:32 UTC 2023 kill -USR1 22179 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22179 killed at Wed Oct 18 14:09:32 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9997 starting at Wed Oct 18 14:09:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22221 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22221 found at Wed Oct 18 14:09:32 UTC 2023 selfserv_9997 with PID 22221 started at Wed Oct 18 14:09:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1408: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 22221 at Wed Oct 18 14:09:33 UTC 2023 kill -USR1 22221 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22221 killed at Wed Oct 18 14:09:33 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9997 starting at Wed Oct 18 14:09:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22263 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22263 found at Wed Oct 18 14:09:33 UTC 2023 selfserv_9997 with PID 22263 started at Wed Oct 18 14:09:33 UTC 2023 strsclnt -q -p 9997 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 14:09:33 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 14:09:48 UTC 2023 ssl.sh: #1409: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9997 with PID 22263 at Wed Oct 18 14:09:48 UTC 2023 kill -USR1 22263 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22263 killed at Wed Oct 18 14:09:48 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 14:09:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22329 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22329 found at Wed Oct 18 14:09:48 UTC 2023 selfserv_9997 with PID 22329 started at Wed Oct 18 14:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22329 at Wed Oct 18 14:09:48 UTC 2023 kill -USR1 22329 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22329 killed at Wed Oct 18 14:09:48 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:09:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22371 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22371 found at Wed Oct 18 14:09:48 UTC 2023 selfserv_9997 with PID 22371 started at Wed Oct 18 14:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1411: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22371 at Wed Oct 18 14:09:48 UTC 2023 kill -USR1 22371 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22371 killed at Wed Oct 18 14:09:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:09:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22410 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22410 found at Wed Oct 18 14:09:48 UTC 2023 selfserv_9997 with PID 22410 started at Wed Oct 18 14:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 22410 at Wed Oct 18 14:09:48 UTC 2023 kill -USR1 22410 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22410 killed at Wed Oct 18 14:09:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:09:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22450 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22450 found at Wed Oct 18 14:09:48 UTC 2023 selfserv_9997 with PID 22450 started at Wed Oct 18 14:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22450 at Wed Oct 18 14:09:48 UTC 2023 kill -USR1 22450 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22450 killed at Wed Oct 18 14:09:48 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:09:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22489 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22489 found at Wed Oct 18 14:09:48 UTC 2023 selfserv_9997 with PID 22489 started at Wed Oct 18 14:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1414: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 22489 at Wed Oct 18 14:09:48 UTC 2023 kill -USR1 22489 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22489 killed at Wed Oct 18 14:09:48 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:09:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22528 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22528 found at Wed Oct 18 14:09:48 UTC 2023 selfserv_9997 with PID 22528 started at Wed Oct 18 14:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1415: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22528 at Wed Oct 18 14:09:48 UTC 2023 kill -USR1 22528 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22528 killed at Wed Oct 18 14:09:48 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:09:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22567 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22567 found at Wed Oct 18 14:09:48 UTC 2023 selfserv_9997 with PID 22567 started at Wed Oct 18 14:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22567 at Wed Oct 18 14:09:48 UTC 2023 kill -USR1 22567 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22567 killed at Wed Oct 18 14:09:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:09:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22606 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22606 found at Wed Oct 18 14:09:48 UTC 2023 selfserv_9997 with PID 22606 started at Wed Oct 18 14:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22606 at Wed Oct 18 14:09:49 UTC 2023 kill -USR1 22606 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22606 killed at Wed Oct 18 14:09:49 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:09:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22645 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22645 found at Wed Oct 18 14:09:49 UTC 2023 selfserv_9997 with PID 22645 started at Wed Oct 18 14:09:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1418: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22645 at Wed Oct 18 14:09:49 UTC 2023 kill -USR1 22645 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22645 killed at Wed Oct 18 14:09:49 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:09:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22686 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22686 found at Wed Oct 18 14:09:49 UTC 2023 selfserv_9997 with PID 22686 started at Wed Oct 18 14:09:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22686 at Wed Oct 18 14:09:49 UTC 2023 kill -USR1 22686 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22686 killed at Wed Oct 18 14:09:49 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:09:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22726 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22726 found at Wed Oct 18 14:09:49 UTC 2023 selfserv_9997 with PID 22726 started at Wed Oct 18 14:09:49 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1420: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22726 at Wed Oct 18 14:09:49 UTC 2023 kill -USR1 22726 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22726 killed at Wed Oct 18 14:09:49 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:09:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22766 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22766 found at Wed Oct 18 14:09:49 UTC 2023 selfserv_9997 with PID 22766 started at Wed Oct 18 14:09:49 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1421: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22766 at Wed Oct 18 14:09:49 UTC 2023 kill -USR1 22766 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22766 killed at Wed Oct 18 14:09:49 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:09:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22806 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22806 found at Wed Oct 18 14:09:49 UTC 2023 selfserv_9997 with PID 22806 started at Wed Oct 18 14:09:49 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1422: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22806 at Wed Oct 18 14:09:49 UTC 2023 kill -USR1 22806 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22806 killed at Wed Oct 18 14:09:49 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:09:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22846 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22846 found at Wed Oct 18 14:09:49 UTC 2023 selfserv_9997 with PID 22846 started at Wed Oct 18 14:09:49 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1423: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22846 at Wed Oct 18 14:09:49 UTC 2023 kill -USR1 22846 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22846 killed at Wed Oct 18 14:09:49 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:09:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22886 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22886 found at Wed Oct 18 14:09:49 UTC 2023 selfserv_9997 with PID 22886 started at Wed Oct 18 14:09:49 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1424: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22886 at Wed Oct 18 14:09:49 UTC 2023 kill -USR1 22886 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22886 killed at Wed Oct 18 14:09:49 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:09:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22926 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22926 found at Wed Oct 18 14:09:49 UTC 2023 selfserv_9997 with PID 22926 started at Wed Oct 18 14:09:49 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1425: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22926 at Wed Oct 18 14:09:50 UTC 2023 kill -USR1 22926 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22926 killed at Wed Oct 18 14:09:50 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:09:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22966 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22966 found at Wed Oct 18 14:09:50 UTC 2023 selfserv_9997 with PID 22966 started at Wed Oct 18 14:09:50 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1426: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22966 at Wed Oct 18 14:09:50 UTC 2023 kill -USR1 22966 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22966 killed at Wed Oct 18 14:09:50 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:09:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23006 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23006 found at Wed Oct 18 14:09:50 UTC 2023 selfserv_9997 with PID 23006 started at Wed Oct 18 14:09:50 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1427: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23006 at Wed Oct 18 14:09:50 UTC 2023 kill -USR1 23006 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23006 killed at Wed Oct 18 14:09:50 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:09:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23046 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23046 found at Wed Oct 18 14:09:50 UTC 2023 selfserv_9997 with PID 23046 started at Wed Oct 18 14:09:50 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1428: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23046 at Wed Oct 18 14:09:50 UTC 2023 kill -USR1 23046 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23046 killed at Wed Oct 18 14:09:50 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9997 starting at Wed Oct 18 14:09:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 23086 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23086 found at Wed Oct 18 14:09:50 UTC 2023 selfserv_9997 with PID 23086 started at Wed Oct 18 14:09:50 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1429: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1430: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1431: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1432: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1433: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1434: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 23086 at Wed Oct 18 14:09:55 UTC 2023 kill -USR1 23086 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23086 killed at Wed Oct 18 14:09:56 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 14:09:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:09:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 23637 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23637 found at Wed Oct 18 14:09:56 UTC 2023 selfserv_9997 with PID 23637 started at Wed Oct 18 14:09:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1502: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1503: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1504: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1505: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1506: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1507: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1508: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1509: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1510: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1511: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1512: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1513: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1514: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1515: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1516: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1517: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1518: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1519: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1520: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1521: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1522: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1523: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1524: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1525: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1526: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23637 at Wed Oct 18 14:10:04 UTC 2023 kill -USR1 23637 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23637 killed at Wed Oct 18 14:10:04 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:10:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:10:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24461 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24461 found at Wed Oct 18 14:10:04 UTC 2023 selfserv_9997 with PID 24461 started at Wed Oct 18 14:10:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1556: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24461 at Wed Oct 18 14:10:04 UTC 2023 kill -USR1 24461 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24461 killed at Wed Oct 18 14:10:04 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:10:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:10:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24513 found at Wed Oct 18 14:10:04 UTC 2023 selfserv_9997 with PID 24513 started at Wed Oct 18 14:10:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1557: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24513 at Wed Oct 18 14:10:29 UTC 2023 kill -USR1 24513 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24513 killed at Wed Oct 18 14:10:29 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:10:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:10:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24567 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24567 found at Wed Oct 18 14:10:29 UTC 2023 selfserv_9997 with PID 24567 started at Wed Oct 18 14:10:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1558: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24567 at Wed Oct 18 14:10:29 UTC 2023 kill -USR1 24567 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24567 killed at Wed Oct 18 14:10:29 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:10:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:10:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24631 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24631 found at Wed Oct 18 14:10:29 UTC 2023 selfserv_9997 with PID 24631 started at Wed Oct 18 14:10:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1559: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24631 at Wed Oct 18 14:10:30 UTC 2023 kill -USR1 24631 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24631 killed at Wed Oct 18 14:10:30 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:10:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:10:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24683 found at Wed Oct 18 14:10:30 UTC 2023 selfserv_9997 with PID 24683 started at Wed Oct 18 14:10:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1560: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24683 at Wed Oct 18 14:10:53 UTC 2023 kill -USR1 24683 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24683 killed at Wed Oct 18 14:10:53 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:10:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:10:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24750 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24750 found at Wed Oct 18 14:10:53 UTC 2023 selfserv_9997 with PID 24750 started at Wed Oct 18 14:10:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24750 at Wed Oct 18 14:10:53 UTC 2023 kill -USR1 24750 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24750 killed at Wed Oct 18 14:10:53 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:10:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:10:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24815 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24815 found at Wed Oct 18 14:10:53 UTC 2023 selfserv_9997 with PID 24815 started at Wed Oct 18 14:10:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1562: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24815 at Wed Oct 18 14:10:53 UTC 2023 kill -USR1 24815 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24815 killed at Wed Oct 18 14:10:53 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:10:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:10:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24867 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24867 found at Wed Oct 18 14:10:53 UTC 2023 selfserv_9997 with PID 24867 started at Wed Oct 18 14:10:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1563: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24867 at Wed Oct 18 14:11:18 UTC 2023 kill -USR1 24867 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24867 killed at Wed Oct 18 14:11:18 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:11:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:11:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24919 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24919 found at Wed Oct 18 14:11:18 UTC 2023 selfserv_9997 with PID 24919 started at Wed Oct 18 14:11:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24919 at Wed Oct 18 14:11:19 UTC 2023 kill -USR1 24919 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24919 killed at Wed Oct 18 14:11:19 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:11:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:11:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24983 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24983 found at Wed Oct 18 14:11:19 UTC 2023 selfserv_9997 with PID 24983 started at Wed Oct 18 14:11:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1565: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24983 at Wed Oct 18 14:11:19 UTC 2023 kill -USR1 24983 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24983 killed at Wed Oct 18 14:11:19 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:11:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:11:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25035 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25035 found at Wed Oct 18 14:11:19 UTC 2023 selfserv_9997 with PID 25035 started at Wed Oct 18 14:11:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1566: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25035 at Wed Oct 18 14:11:44 UTC 2023 kill -USR1 25035 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25035 killed at Wed Oct 18 14:11:44 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:11:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:11:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25103 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25103 found at Wed Oct 18 14:11:44 UTC 2023 selfserv_9997 with PID 25103 started at Wed Oct 18 14:11:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25103 at Wed Oct 18 14:11:44 UTC 2023 kill -USR1 25103 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25103 killed at Wed Oct 18 14:11:44 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:11:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:11:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25168 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25168 found at Wed Oct 18 14:11:44 UTC 2023 selfserv_9997 with PID 25168 started at Wed Oct 18 14:11:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1568: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25168 at Wed Oct 18 14:11:45 UTC 2023 kill -USR1 25168 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25168 killed at Wed Oct 18 14:11:45 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:11:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:11:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25220 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25220 found at Wed Oct 18 14:11:45 UTC 2023 selfserv_9997 with PID 25220 started at Wed Oct 18 14:11:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1569: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25220 at Wed Oct 18 14:12:08 UTC 2023 kill -USR1 25220 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25220 killed at Wed Oct 18 14:12:08 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:12:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:12:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25272 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25272 found at Wed Oct 18 14:12:08 UTC 2023 selfserv_9997 with PID 25272 started at Wed Oct 18 14:12:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25272 at Wed Oct 18 14:12:08 UTC 2023 kill -USR1 25272 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25272 killed at Wed Oct 18 14:12:08 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:12:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:12:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25328 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25328 found at Wed Oct 18 14:12:08 UTC 2023 selfserv_9997 with PID 25328 started at Wed Oct 18 14:12:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25328 at Wed Oct 18 14:12:08 UTC 2023 kill -USR1 25328 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25328 killed at Wed Oct 18 14:12:08 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:12:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:12:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25385 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25385 found at Wed Oct 18 14:12:08 UTC 2023 selfserv_9997 with PID 25385 started at Wed Oct 18 14:12:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1572: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25385 at Wed Oct 18 14:12:09 UTC 2023 kill -USR1 25385 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25385 killed at Wed Oct 18 14:12:09 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:12:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:12:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25441 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25441 found at Wed Oct 18 14:12:09 UTC 2023 selfserv_9997 with PID 25441 started at Wed Oct 18 14:12:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1573: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25441 at Wed Oct 18 14:12:09 UTC 2023 kill -USR1 25441 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25441 killed at Wed Oct 18 14:12:09 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:12:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:12:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25501 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25501 found at Wed Oct 18 14:12:09 UTC 2023 selfserv_9997 with PID 25501 started at Wed Oct 18 14:12:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1574: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25501 at Wed Oct 18 14:12:34 UTC 2023 kill -USR1 25501 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25501 killed at Wed Oct 18 14:12:34 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:12:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:12:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25553 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25553 found at Wed Oct 18 14:12:34 UTC 2023 selfserv_9997 with PID 25553 started at Wed Oct 18 14:12:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1575: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25553 at Wed Oct 18 14:12:34 UTC 2023 kill -USR1 25553 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25553 killed at Wed Oct 18 14:12:34 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:12:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:12:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25613 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25613 found at Wed Oct 18 14:12:34 UTC 2023 selfserv_9997 with PID 25613 started at Wed Oct 18 14:12:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1576: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25613 at Wed Oct 18 14:12:57 UTC 2023 kill -USR1 25613 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25613 killed at Wed Oct 18 14:12:57 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:12:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:12:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25680 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25680 found at Wed Oct 18 14:12:57 UTC 2023 selfserv_9997 with PID 25680 started at Wed Oct 18 14:12:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1577: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25680 at Wed Oct 18 14:12:58 UTC 2023 kill -USR1 25680 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25680 killed at Wed Oct 18 14:12:58 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:12:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:12:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25740 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25740 found at Wed Oct 18 14:12:58 UTC 2023 selfserv_9997 with PID 25740 started at Wed Oct 18 14:12:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1578: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25740 at Wed Oct 18 14:13:23 UTC 2023 kill -USR1 25740 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25740 killed at Wed Oct 18 14:13:23 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:13:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:13:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25792 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25792 found at Wed Oct 18 14:13:23 UTC 2023 selfserv_9997 with PID 25792 started at Wed Oct 18 14:13:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1579: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25792 at Wed Oct 18 14:13:23 UTC 2023 kill -USR1 25792 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25792 killed at Wed Oct 18 14:13:23 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:13:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:13:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25852 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25852 found at Wed Oct 18 14:13:23 UTC 2023 selfserv_9997 with PID 25852 started at Wed Oct 18 14:13:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1580: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25852 at Wed Oct 18 14:13:48 UTC 2023 kill -USR1 25852 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25852 killed at Wed Oct 18 14:13:48 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:13:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:13:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25919 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25919 found at Wed Oct 18 14:13:48 UTC 2023 selfserv_9997 with PID 25919 started at Wed Oct 18 14:13:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25919 at Wed Oct 18 14:13:48 UTC 2023 kill -USR1 25919 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25919 killed at Wed Oct 18 14:13:48 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:13:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:13:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25980 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25980 found at Wed Oct 18 14:13:48 UTC 2023 selfserv_9997 with PID 25980 started at Wed Oct 18 14:13:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1582: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25980 at Wed Oct 18 14:14:12 UTC 2023 kill -USR1 25980 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25980 killed at Wed Oct 18 14:14:12 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:14:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26032 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26032 found at Wed Oct 18 14:14:12 UTC 2023 selfserv_9997 with PID 26032 started at Wed Oct 18 14:14:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1583: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26032 at Wed Oct 18 14:14:12 UTC 2023 kill -USR1 26032 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26032 killed at Wed Oct 18 14:14:12 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:14:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26084 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26084 found at Wed Oct 18 14:14:12 UTC 2023 selfserv_9997 with PID 26084 started at Wed Oct 18 14:14:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1584: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26084 at Wed Oct 18 14:14:12 UTC 2023 kill -USR1 26084 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26084 killed at Wed Oct 18 14:14:12 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:14:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26136 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26136 found at Wed Oct 18 14:14:12 UTC 2023 selfserv_9997 with PID 26136 started at Wed Oct 18 14:14:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1585: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26136 at Wed Oct 18 14:14:12 UTC 2023 kill -USR1 26136 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26136 killed at Wed Oct 18 14:14:12 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 14:14:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26218 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26218 found at Wed Oct 18 14:14:12 UTC 2023 selfserv_9997 with PID 26218 started at Wed Oct 18 14:14:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1556: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26218 at Wed Oct 18 14:14:13 UTC 2023 kill -USR1 26218 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26218 killed at Wed Oct 18 14:14:13 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:14:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26261 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26261 found at Wed Oct 18 14:14:13 UTC 2023 selfserv_9997 with PID 26261 started at Wed Oct 18 14:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1557: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26261 at Wed Oct 18 14:14:13 UTC 2023 kill -USR1 26261 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26261 killed at Wed Oct 18 14:14:13 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:14:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26300 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26300 found at Wed Oct 18 14:14:13 UTC 2023 selfserv_9997 with PID 26300 started at Wed Oct 18 14:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1558: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 26300 at Wed Oct 18 14:14:13 UTC 2023 kill -USR1 26300 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26300 killed at Wed Oct 18 14:14:13 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:14:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26339 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26339 found at Wed Oct 18 14:14:13 UTC 2023 selfserv_9997 with PID 26339 started at Wed Oct 18 14:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1559: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26339 at Wed Oct 18 14:14:13 UTC 2023 kill -USR1 26339 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26339 killed at Wed Oct 18 14:14:13 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:14:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26378 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26378 found at Wed Oct 18 14:14:13 UTC 2023 selfserv_9997 with PID 26378 started at Wed Oct 18 14:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1560: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 26378 at Wed Oct 18 14:14:13 UTC 2023 kill -USR1 26378 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26378 killed at Wed Oct 18 14:14:13 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:14:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26417 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26417 found at Wed Oct 18 14:14:13 UTC 2023 selfserv_9997 with PID 26417 started at Wed Oct 18 14:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26417 at Wed Oct 18 14:14:13 UTC 2023 kill -USR1 26417 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26417 killed at Wed Oct 18 14:14:13 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:14:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26456 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26456 found at Wed Oct 18 14:14:13 UTC 2023 selfserv_9997 with PID 26456 started at Wed Oct 18 14:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1562: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26456 at Wed Oct 18 14:14:13 UTC 2023 kill -USR1 26456 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26456 killed at Wed Oct 18 14:14:13 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:14:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26495 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26495 found at Wed Oct 18 14:14:13 UTC 2023 selfserv_9997 with PID 26495 started at Wed Oct 18 14:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26495 at Wed Oct 18 14:14:13 UTC 2023 kill -USR1 26495 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26495 killed at Wed Oct 18 14:14:13 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:14:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26534 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26534 found at Wed Oct 18 14:14:13 UTC 2023 selfserv_9997 with PID 26534 started at Wed Oct 18 14:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26534 at Wed Oct 18 14:14:13 UTC 2023 kill -USR1 26534 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26534 killed at Wed Oct 18 14:14:14 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:14:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26574 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26574 found at Wed Oct 18 14:14:14 UTC 2023 selfserv_9997 with PID 26574 started at Wed Oct 18 14:14:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26574 at Wed Oct 18 14:14:14 UTC 2023 kill -USR1 26574 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26574 killed at Wed Oct 18 14:14:14 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:14:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26613 found at Wed Oct 18 14:14:14 UTC 2023 selfserv_9997 with PID 26613 started at Wed Oct 18 14:14:14 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1566: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26613 at Wed Oct 18 14:14:14 UTC 2023 kill -USR1 26613 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26613 killed at Wed Oct 18 14:14:14 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:14:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26653 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26653 found at Wed Oct 18 14:14:14 UTC 2023 selfserv_9997 with PID 26653 started at Wed Oct 18 14:14:14 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1567: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 26653 at Wed Oct 18 14:14:14 UTC 2023 kill -USR1 26653 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26653 killed at Wed Oct 18 14:14:14 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:14:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26693 found at Wed Oct 18 14:14:14 UTC 2023 selfserv_9997 with PID 26693 started at Wed Oct 18 14:14:14 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1568: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26693 at Wed Oct 18 14:14:14 UTC 2023 kill -USR1 26693 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26693 killed at Wed Oct 18 14:14:14 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:14:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26733 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26733 found at Wed Oct 18 14:14:14 UTC 2023 selfserv_9997 with PID 26733 started at Wed Oct 18 14:14:14 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1569: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 26733 at Wed Oct 18 14:14:14 UTC 2023 kill -USR1 26733 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26733 killed at Wed Oct 18 14:14:14 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:14:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26773 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26773 found at Wed Oct 18 14:14:14 UTC 2023 selfserv_9997 with PID 26773 started at Wed Oct 18 14:14:14 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1570: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26773 at Wed Oct 18 14:14:14 UTC 2023 kill -USR1 26773 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26773 killed at Wed Oct 18 14:14:14 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:14:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26813 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26813 found at Wed Oct 18 14:14:14 UTC 2023 selfserv_9997 with PID 26813 started at Wed Oct 18 14:14:14 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1571: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26813 at Wed Oct 18 14:14:14 UTC 2023 kill -USR1 26813 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26813 killed at Wed Oct 18 14:14:14 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:14:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26853 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26853 found at Wed Oct 18 14:14:14 UTC 2023 selfserv_9997 with PID 26853 started at Wed Oct 18 14:14:14 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1572: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26853 at Wed Oct 18 14:14:14 UTC 2023 kill -USR1 26853 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26853 killed at Wed Oct 18 14:14:14 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:14:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26893 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26893 found at Wed Oct 18 14:14:14 UTC 2023 selfserv_9997 with PID 26893 started at Wed Oct 18 14:14:15 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1573: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26893 at Wed Oct 18 14:14:15 UTC 2023 kill -USR1 26893 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26893 killed at Wed Oct 18 14:14:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:14:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:14:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26933 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26933 found at Wed Oct 18 14:14:15 UTC 2023 selfserv_9997 with PID 26933 started at Wed Oct 18 14:14:15 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1574: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26933 at Wed Oct 18 14:14:15 UTC 2023 kill -USR1 26933 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26933 killed at Wed Oct 18 14:14:15 UTC 2023 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -fips false -force FIPS mode disabled. ssl.sh: #1575: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/client -list ssl.sh: #1576: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1577: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1578: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/ext_client -list ssl.sh: #1579: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1580: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Wed Oct 18 14:14:15 UTC 2023 Running tests for ocsp TIMESTAMP ocsp BEGIN: Wed Oct 18 14:14:15 UTC 2023 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Wed Oct 18 14:14:15 UTC 2023 Running tests for merge TIMESTAMP merge BEGIN: Wed Oct 18 14:14:15 UTC 2023 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests.v3.17687 -t Test2 -f ../tests.pw merge.sh: #1: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #3: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #6: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:43:11 2023 Not After : Wed Oct 18 13:43:11 2028 Subject: "CN=TestUser45,E=TestUser45@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:99:e1:df:29:33:7a:0f:55:74:7b:72:a7:03:e0:93: 57:74:5e:b7:af:9e:eb:d3:ca:ed:af:27:7d:a4:b2:5e: 13:96:d1:91:f5:71:b3:62:6a:17:c6:7e:19:b6:5a:e9: 07:fb:68:e3:24:71:7a:15:d8:70:b4:44:a4:76:2e:96: 6e:aa:87:cb:fb:68:db:b9:96:61:e7:12:13:46:a7:f5: 03:5b:d9:73:75:a6:3a:20:e2:7a:50:2e:fe:28:53:42: 48:49:c8:b5:f7:71:fb:2d:04:40:c7:57:2d:f6:c2:62: 0d:86:90:30:4e:b9:1b:d4:9f:67:ed:d2:d3:89:5b:8b: 34:19:e7:4d:89:7d:7f:44:ce:af:7a:c8:65:19:d9:d8: 37:08:5a:e3:9a:ec:99:92:d9:ea:a6:d3:ae:56:cc:13: e7:18:ae:c0:a7:f7:61:af:b2:4a:cc:8a:12:b4:1c:65: 64:2d:66:f9:1f:5a:cd:67:f1:68:1a:ac:cd:2f:a8:a4: 63:d6:c3:f6:87:1a:c7:60:f6:6e:7e:cc:93:cf:8d:51: e7:26:ed:2d:14:a4:02:39:46:00:a8:60:3d:9b:f9:3d: 4a:4b:f3:d4:30:7e:81:47:1a:88:3f:3d:d7:c1:06:4b: 1e:a3:a9:8a:1c:7e:4b:42:bf:d9:e6:1d:68:c3:e9:ef Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:38:49:85:e8:78:26:e8:25:87:cb:20:ca:5d:8d:83: c9:19:e4:2f:a7:26:9a:44:fb:f2:1e:e9:a0:e5:49:16: 4a:5f:be:a8:7c:8b:b0:76:6a:7f:14:27:b4:8b:46:d3: 4a:b6:b5:12:84:1e:f2:75:9f:b4:90:25:2d:8a:88:20: 6a:c5:e2:64:99:d6:fe:30:2a:aa:22:fa:c1:05:40:42: 50:e6:09:eb:6a:0d:1a:43:f0:9b:f1:53:ea:4d:e0:8d: d4:ba:90:b3:06:33:68:25:d0:43:41:9d:cb:16:15:35: 4c:4b:24:5a:f0:bb:11:95:36:0b:3f:8e:ae:12:46:b9: ab:41:b8:1b:5c:c7:fe:74:43:13:ea:c7:0f:e7:41:9b: 17:f4:09:07:ea:eb:29:e4:3d:0f:02:2c:6b:17:59:e3: 5d:b4:de:3d:ed:da:f0:ba:fe:b6:f5:a3:a9:34:83:44: 9a:2b:0d:f9:2d:4d:1f:86:a3:a0:2d:6a:61:c5:1e:ea: bc:fe:01:e2:83:ad:c2:54:35:a2:9a:12:fd:bf:6f:04: 36:7b:c4:ab:bf:c5:1b:f8:14:fa:2b:df:a8:95:45:1e: e6:c6:d9:2d:d5:7f:94:ba:dd:89:52:86:e2:54:94:d3: f0:63:15:06:83:d0:bc:18:c3:ba:d7:23:12:ba:d8:bf Fingerprint (SHA-256): DD:81:7F:68:40:15:6E:5F:71:87:7F:81:55:46:3C:8D:06:86:06:0E:43:04:FF:8C:D7:C4:9E:DA:E9:84:1B:04 Fingerprint (SHA1): 96:BD:D9:43:CF:F5:84:0D:1B:F3:85:BA:F8:B9:24:32:1B:06:58:D1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #7: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:43:12 2023 Not After : Wed Oct 18 13:43:12 2028 Subject: "CN=TestUser46,E=TestUser46@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:22:64:1f:83:0c:b3:17:63:04:09:cd:9e:bc:9f:92: 0a:2b:f5:c7:0e:c7:27:20:e6:9e:72:c9:e7:e0:5b:36: e1:a0:f1:4b:1c:f4:a6:9c:ce:ff:8b:3a:a3:82:98:e3: fe:0c:26:81:c1:67:ad:fa:06:6d:01:56:67:a0:08:ce: ea:5f:05:47:85:34:53:f9:80:ac:02:ea:52:fe:3c:e8: db:39:63:ef:65:67:2e:7b:b1:51:c0:eb:52:32:b8:05: f1:18:1c:41:fb:34:47:06:25:fc:67:f7:af:06:e4:b5: 1d:db:c4:01:62:52:ff:93:13:a4:16:33:60:80:4e:4f: 30:30:f5:69:ac:7c:16:e7:e4:d5:db:ed:d4:f5:0b:0c: 1d:6e:ab:f6:db:a8:fd:6a:e0:03:c2:31:70:c2:cc:cd: de:f8:d0:42:26:44:fd:df:ed:e4:f4:50:fc:a5:63:ce: f2:98:ec:c9:b4:9f:86:86:6e:1b:3c:90:03:8f:be:c4: ca:f8:45:4d:7e:a6:66:c2:3b:22:12:10:2e:fc:80:5c: 0b:25:cf:01:18:e9:89:74:c5:39:10:c0:af:b1:4b:13: 97:86:8c:71:1c:bc:a4:ef:44:9e:5a:11:7e:03:f4:9d: fe:b1:f7:be:80:3a:bf:32:24:e7:99:e6:32:09:05:5d Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:86:52:51:4d:af:ad:dc:f4:be:07:2e:65:10:fd:38: 37:31:10:f6:27:89:c0:43:fd:93:bc:4a:1d:2d:21:90: 97:b3:e4:a7:78:91:60:04:03:25:94:0e:6d:64:78:60: cc:00:a6:ef:87:3d:b4:a4:f7:15:d6:66:26:1a:5a:4d: ad:30:2e:05:35:42:b4:c4:ca:ac:be:e9:dc:77:6a:a3: 4a:69:fe:3f:d6:32:55:7c:a2:37:90:c8:92:80:7d:2a: 81:82:e7:25:ac:28:b6:ac:76:c6:c6:d2:44:96:32:a9: 94:1a:f3:9f:a8:9c:a5:29:1b:b4:e8:14:af:88:07:01: d7:94:71:81:5e:ef:ba:92:63:18:b3:9d:2b:9e:27:a9: ad:49:ab:3c:72:d9:49:7a:bc:b4:94:9f:f2:a3:2d:65: 25:a9:ed:0f:b3:90:96:25:52:e9:83:a1:0e:36:f9:80: 7f:a7:d4:98:e1:7f:2f:7c:3c:b2:a3:70:38:8b:78:b1: d4:e5:dd:de:24:42:27:47:fc:15:82:05:96:12:41:61: ea:3d:e0:75:43:1b:f4:1c:67:13:6d:44:67:46:38:87: b1:da:32:17:76:55:1a:33:1d:c3:af:52:9f:f0:ea:a4: ff:f4:2d:f8:23:aa:b7:be:c5:ef:e8:12:10:42:7b:72 Fingerprint (SHA-256): 87:10:76:9C:27:D7:22:1C:F5:88:DB:F2:82:A9:E0:60:DA:30:B7:B4:55:A0:F0:2C:F3:41:74:8C:F6:D2:4D:FC Fingerprint (SHA1): EB:21:16:94:F0:F6:B0:97:1B:9C:DA:2F:1C:30:70:3E:1D:D5:4D:2C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #8: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #9: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA-dsa CT,C,C Alice-ec u,u,u Dave u,u,u localhost.localdomain-dsamixed ,, localhost-sni.localdomain-rsa-pss u,u,u serverCA-dsa C,C,C chain-2-clientCA-ec ,, Alice #1 ,, Alice-rsa-pss u,u,u Dave-dsa ,, localhost.localdomain-ecmixed ,, localhost-sni.localdomain-dsamixed ,, Alice #99 ,, Alice-dsamixed u,u,u eve@example.com ,, bob-ec@example.com ,, localhost.localdomain u,u,u localhost-sni.localdomain-ecmixed ,, clientCA T,C,C Alice #3 ,, TestCA CT,C,C TestCA-ec CT,C,C Alice-ecmixed u,u,u TestUser-rsa-pss-interop u,u,u Dave-ecmixed ,, localhost.localdomain-dsa ,, localhost.localdomain-rsa-pss u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-ec ,, ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-ec ,, serverCA-ec C,C,C clientCA-dsa T,C,C chain-1-clientCA ,, chain-1-clientCA-ec ,, Alice #2 ,, Alice #4 ,, Alice u,u,u Dave-ec ,, localhost-sni.localdomain-dsa ,, ExtendedSSLUser-dsa ,, ExtendedSSLUser-ecmixed ,, chain-2-clientCA ,, chain-1-clientCA-dsa ,, Alice #100 ,, Alice-dsa u,u,u Dave-rsa-pss u,u,u ExtendedSSLUser-dsamixed ,, chain-2-clientCA-dsa ,, bob@example.com ,, Dave-dsamixed ,, localhost.localdomain-ec ,, clientCA-ec T,C,C CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests.v3.17687 -t Test2 -f ../tests.pw merge.sh: #10: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests.v1.17687 -t Test1 -f ../tests.pw merge.sh: #11: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #12: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . This is a test message from Alice to Bob. merge.sh: #13: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #14: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Wed Oct 18 13:43:25 2023 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Wed Oct 18 13:42:30 2023 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Wed Oct 18 13:43:21 2023 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #15: Verifying TestCA CRL - PASSED TEST_MODE=STANDARD NSS_DEFAULT_DB_TYPE=dbm TIMESTAMP merge END: Wed Oct 18 14:14:15 UTC 2023 Running tests for chains TIMESTAMP chains BEGIN: Wed Oct 18 14:14:15 UTC 2023 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #1: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141416 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #3: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #5: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #9: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #10: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #14: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #15: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #16: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10008 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #17: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #18: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #19: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #20: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -2 -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #21: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #22: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #23: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #24: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -2 -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #25: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #26: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #27: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #28: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -2 -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #29: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #30: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #31: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #32: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -2 -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #33: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #34: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #35: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #36: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -2 -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #37: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10008 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #38: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #39: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #40: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -2 -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #41: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #42: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #43: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #44: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -2 -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #45: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #46: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #47: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #48: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -2 -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #49: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10008 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #50: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #51: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #52: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -2 -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #53: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #54: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #55: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #56: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -2 -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #57: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #58: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #59: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #60: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -2 -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #61: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10008 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #62: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #63: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20231018141432Z nextupdate=20241018141432Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Wed Oct 18 14:14:32 2023 Next Update: Fri Oct 18 14:14:32 2024 CRL Extensions: chains.sh: #64: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20231018141433Z addcert 2 20231018141433Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Wed Oct 18 14:14:33 2023 Next Update: Fri Oct 18 14:14:32 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:14:33 2023 CRL Extensions: chains.sh: #65: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20231018141433Z nextupdate=20241018141433Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Oct 18 14:14:33 2023 Next Update: Fri Oct 18 14:14:33 2024 CRL Extensions: chains.sh: #66: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20231018141434Z addcert 2 20231018141434Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Oct 18 14:14:34 2023 Next Update: Fri Oct 18 14:14:33 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:14:34 2023 CRL Extensions: chains.sh: #67: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20231018141435Z addcert 4 20231018141435Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Oct 18 14:14:35 2023 Next Update: Fri Oct 18 14:14:33 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:14:34 2023 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Wed Oct 18 14:14:35 2023 CRL Extensions: chains.sh: #68: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20231018141436Z nextupdate=20241018141436Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Oct 18 14:14:36 2023 Next Update: Fri Oct 18 14:14:36 2024 CRL Extensions: chains.sh: #69: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20231018141437Z addcert 2 20231018141437Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Oct 18 14:14:37 2023 Next Update: Fri Oct 18 14:14:36 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:14:37 2023 CRL Extensions: chains.sh: #70: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20231018141438Z addcert 3 20231018141438Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Oct 18 14:14:38 2023 Next Update: Fri Oct 18 14:14:36 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:14:37 2023 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Wed Oct 18 14:14:38 2023 CRL Extensions: chains.sh: #71: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20231018141438Z nextupdate=20241018141438Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Oct 18 14:14:38 2023 Next Update: Fri Oct 18 14:14:38 2024 CRL Extensions: chains.sh: #72: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20231018141439Z addcert 2 20231018141439Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Oct 18 14:14:39 2023 Next Update: Fri Oct 18 14:14:38 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:14:39 2023 CRL Extensions: chains.sh: #73: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20231018141440Z addcert 3 20231018141440Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Oct 18 14:14:40 2023 Next Update: Fri Oct 18 14:14:38 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:14:39 2023 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Wed Oct 18 14:14:40 2023 CRL Extensions: chains.sh: #74: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #75: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #76: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #77: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #78: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #79: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #80: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #81: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #82: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #83: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #84: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #85: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #86: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #87: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #88: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #89: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #90: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #91: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #92: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #93: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #94: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #95: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #96: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #97: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #98: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #99: IPsec: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141417 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #100: IPsec: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #101: IPsec: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #102: IPsec: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #103: IPsec: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018141418 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #104: IPsec: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #105: IPsec: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB NoKUDB certutil -N -d NoKUDB -f NoKUDB/dbpasswd chains.sh: #106: IPsec: Creating DB NoKUDB - PASSED chains.sh: Creating EE certifiate request NoKUReq.der certutil -s "CN=NoKU EE, O=NoKU, C=US" -R -2 -d NoKUDB -f NoKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o NoKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #107: IPsec: Creating EE certifiate request NoKUReq.der - PASSED chains.sh: Creating certficate NoKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoKUReq.der -o NoKUCA1.der -f CA1DB/dbpasswd -m 1018141419 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #108: IPsec: Creating certficate NoKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoKUCA1.der to NoKUDB database certutil -A -n NoKU -t u,u,u -d NoKUDB -f NoKUDB/dbpasswd -i NoKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #109: IPsec: Importing certificate NoKUCA1.der to NoKUDB database - PASSED chains.sh: Creating DB DigSigDB certutil -N -d DigSigDB -f DigSigDB/dbpasswd chains.sh: #110: IPsec: Creating DB DigSigDB - PASSED chains.sh: Creating EE certifiate request DigSigReq.der certutil -s "CN=DigSig EE, O=DigSig, C=US" -R -2 -d DigSigDB -f DigSigDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o DigSigReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #111: IPsec: Creating EE certifiate request DigSigReq.der - PASSED chains.sh: Creating certficate DigSigCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigReq.der -o DigSigCA1.der -f CA1DB/dbpasswd -m 1018141420 --keyUsage digitalSignature < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #112: IPsec: Creating certficate DigSigCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigCA1.der to DigSigDB database certutil -A -n DigSig -t u,u,u -d DigSigDB -f DigSigDB/dbpasswd -i DigSigCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #113: IPsec: Importing certificate DigSigCA1.der to DigSigDB database - PASSED chains.sh: Creating DB NonRepDB certutil -N -d NonRepDB -f NonRepDB/dbpasswd chains.sh: #114: IPsec: Creating DB NonRepDB - PASSED chains.sh: Creating EE certifiate request NonRepReq.der certutil -s "CN=NonRep EE, O=NonRep, C=US" -R -2 -d NonRepDB -f NonRepDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o NonRepReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #115: IPsec: Creating EE certifiate request NonRepReq.der - PASSED chains.sh: Creating certficate NonRepCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonRepReq.der -o NonRepCA1.der -f CA1DB/dbpasswd -m 1018141421 --keyUsage nonRepudiation < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #116: IPsec: Creating certficate NonRepCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonRepCA1.der to NonRepDB database certutil -A -n NonRep -t u,u,u -d NonRepDB -f NonRepDB/dbpasswd -i NonRepCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #117: IPsec: Importing certificate NonRepCA1.der to NonRepDB database - PASSED chains.sh: Creating DB DigSigNonRepAndExtraDB certutil -N -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd chains.sh: #118: IPsec: Creating DB DigSigNonRepAndExtraDB - PASSED chains.sh: Creating EE certifiate request DigSigNonRepAndExtraReq.der certutil -s "CN=DigSigNonRepAndExtra EE, O=DigSigNonRepAndExtra, C=US" -R -2 -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o DigSigNonRepAndExtraReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #119: IPsec: Creating EE certifiate request DigSigNonRepAndExtraReq.der - PASSED chains.sh: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigNonRepAndExtraReq.der -o DigSigNonRepAndExtraCA1.der -f CA1DB/dbpasswd -m 1018141422 --keyUsage digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #120: IPsec: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database certutil -A -n DigSigNonRepAndExtra -t u,u,u -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -i DigSigNonRepAndExtraCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #121: IPsec: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database - PASSED chains.sh: Creating DB NoMatchDB certutil -N -d NoMatchDB -f NoMatchDB/dbpasswd chains.sh: #122: IPsec: Creating DB NoMatchDB - PASSED chains.sh: Creating EE certifiate request NoMatchReq.der certutil -s "CN=NoMatch EE, O=NoMatch, C=US" -R -2 -d NoMatchDB -f NoMatchDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o NoMatchReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #123: IPsec: Creating EE certifiate request NoMatchReq.der - PASSED chains.sh: Creating certficate NoMatchCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoMatchReq.der -o NoMatchCA1.der -f CA1DB/dbpasswd -m 1018141423 --keyUsage keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #124: IPsec: Creating certficate NoMatchCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoMatchCA1.der to NoMatchDB database certutil -A -n NoMatch -t u,u,u -d NoMatchDB -f NoMatchDB/dbpasswd -i NoMatchCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #125: IPsec: Importing certificate NoMatchCA1.der to NoMatchDB database - PASSED chains.sh: Creating DB NonCriticalServerAuthEKUDB certutil -N -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd chains.sh: #126: IPsec: Creating DB NonCriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request NonCriticalServerAuthEKUReq.der certutil -s "CN=NonCriticalServerAuthEKU EE, O=NonCriticalServerAuthEKU, C=US" -R -2 -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o NonCriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #127: IPsec: Creating EE certifiate request NonCriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonCriticalServerAuthEKUReq.der -o NonCriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 1018141424 --extKeyUsage serverAuth < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #128: IPsec: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database certutil -A -n NonCriticalServerAuthEKU -t u,u,u -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -i NonCriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #129: IPsec: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB NonIPSECEKUDB certutil -N -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd chains.sh: #130: IPsec: Creating DB NonIPSECEKUDB - PASSED chains.sh: Creating EE certifiate request NonIPSECEKUReq.der certutil -s "CN=NonIPSECEKU EE, O=NonIPSECEKU, C=US" -R -2 -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o NonIPSECEKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #131: IPsec: Creating EE certifiate request NonIPSECEKUReq.der - PASSED chains.sh: Creating certficate NonIPSECEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonIPSECEKUReq.der -o NonIPSECEKUCA1.der -f CA1DB/dbpasswd -m 1018141425 --extKeyUsage codeSigning < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #132: IPsec: Creating certficate NonIPSECEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database certutil -A -n NonIPSECEKU -t u,u,u -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -i NonIPSECEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #133: IPsec: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database - PASSED chains.sh: Creating DB CriticalServerAuthEKUDB certutil -N -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd chains.sh: #134: IPsec: Creating DB CriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request CriticalServerAuthEKUReq.der certutil -s "CN=CriticalServerAuthEKU EE, O=CriticalServerAuthEKU, C=US" -R -2 -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #135: IPsec: Creating EE certifiate request CriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CriticalServerAuthEKUReq.der -o CriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 1018141426 --keyUsage digitalSignature --extKeyUsage critical,serverAuth < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #136: IPsec: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database certutil -A -n CriticalServerAuthEKU -t u,u,u -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -i CriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #137: IPsec: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB EKUIPsecIKEDB certutil -N -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd chains.sh: #138: IPsec: Creating DB EKUIPsecIKEDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEReq.der certutil -s "CN=EKUIPsecIKE EE, O=EKUIPsecIKE, C=US" -R -2 -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EKUIPsecIKEReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #139: IPsec: Creating EE certifiate request EKUIPsecIKEReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKECA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEReq.der -o EKUIPsecIKECA1.der -f CA1DB/dbpasswd -m 1018141427 --keyUsage digitalSignature --extKeyUsage critical,ipsecIKE < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #140: IPsec: Creating certficate EKUIPsecIKECA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database certutil -A -n EKUIPsecIKE -t u,u,u -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -i EKUIPsecIKECA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #141: IPsec: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database - PASSED chains.sh: Creating DB EKUIPsecIKEEndDB certutil -N -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd chains.sh: #142: IPsec: Creating DB EKUIPsecIKEEndDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEEndReq.der certutil -s "CN=EKUIPsecIKEEnd EE, O=EKUIPsecIKEEnd, C=US" -R -2 -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EKUIPsecIKEEndReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #143: IPsec: Creating EE certifiate request EKUIPsecIKEEndReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEEndReq.der -o EKUIPsecIKEEndCA1.der -f CA1DB/dbpasswd -m 1018141428 --keyUsage digitalSignature --extKeyUsage ipsecIKEEnd < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #144: IPsec: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database certutil -A -n EKUIPsecIKEEnd -t u,u,u -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -i EKUIPsecIKEEndCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #145: IPsec: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database - PASSED chains.sh: Creating DB EKUIPsecIKEIntermediateDB certutil -N -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd chains.sh: #146: IPsec: Creating DB EKUIPsecIKEIntermediateDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der certutil -s "CN=EKUIPsecIKEIntermediate EE, O=EKUIPsecIKEIntermediate, C=US" -R -2 -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EKUIPsecIKEIntermediateReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #147: IPsec: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEIntermediateReq.der -o EKUIPsecIKEIntermediateCA1.der -f CA1DB/dbpasswd -m 1018141429 --keyUsage digitalSignature --extKeyUsage codeSigning,serverAuth,ipsecIKEIntermediate < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #148: IPsec: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database certutil -A -n EKUIPsecIKEIntermediate -t u,u,u -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -i EKUIPsecIKEIntermediateCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #149: IPsec: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database - PASSED chains.sh: Creating DB EKUAnyDB certutil -N -d EKUAnyDB -f EKUAnyDB/dbpasswd chains.sh: #150: IPsec: Creating DB EKUAnyDB - PASSED chains.sh: Creating EE certifiate request EKUAnyReq.der certutil -s "CN=EKUAny EE, O=EKUAny, C=US" -R -2 -d EKUAnyDB -f EKUAnyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EKUAnyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #151: IPsec: Creating EE certifiate request EKUAnyReq.der - PASSED chains.sh: Creating certficate EKUAnyCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUAnyReq.der -o EKUAnyCA1.der -f CA1DB/dbpasswd -m 1018141430 --keyUsage digitalSignature --extKeyUsage x509Any < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #152: IPsec: Creating certficate EKUAnyCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUAnyCA1.der to EKUAnyDB database certutil -A -n EKUAny -t u,u,u -d EKUAnyDB -f EKUAnyDB/dbpasswd -i EKUAnyCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #153: IPsec: Importing certificate EKUAnyCA1.der to EKUAnyDB database - PASSED chains.sh: Creating DB EKUEmailDB certutil -N -d EKUEmailDB -f EKUEmailDB/dbpasswd chains.sh: #154: IPsec: Creating DB EKUEmailDB - PASSED chains.sh: Creating EE certifiate request EKUEmailReq.der certutil -s "CN=EKUEmail EE, O=EKUEmail, C=US" -R -2 -d EKUEmailDB -f EKUEmailDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EKUEmailReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #155: IPsec: Creating EE certifiate request EKUEmailReq.der - PASSED chains.sh: Creating certficate EKUEmailCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUEmailReq.der -o EKUEmailCA1.der -f CA1DB/dbpasswd -m 1018141431 --keyUsage digitalSignature --extKeyUsage emailProtection < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #156: IPsec: Creating certficate EKUEmailCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUEmailCA1.der to EKUEmailDB database certutil -A -n EKUEmail -t u,u,u -d EKUEmailDB -f EKUEmailDB/dbpasswd -i EKUEmailCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #157: IPsec: Importing certificate EKUEmailCA1.der to EKUEmailDB database - PASSED chains.sh: Creating DB EKUIPsecUserDB certutil -N -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd chains.sh: #158: IPsec: Creating DB EKUIPsecUserDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecUserReq.der certutil -s "CN=EKUIPsecUser EE, O=EKUIPsecUser, C=US" -R -2 -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EKUIPsecUserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #159: IPsec: Creating EE certifiate request EKUIPsecUserReq.der - PASSED chains.sh: Creating certficate EKUIPsecUserCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecUserReq.der -o EKUIPsecUserCA1.der -f CA1DB/dbpasswd -m 1018141432 --keyUsage digitalSignature --extKeyUsage ipsecUser < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #160: IPsec: Creating certficate EKUIPsecUserCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database certutil -A -n EKUIPsecUser -t u,u,u -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -i EKUIPsecUserCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #161: IPsec: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #162: IPsec: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,," -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #163: IPsec: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #164: IPsec: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141417 (0x3caf9ae9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:14:52 2023 Not After : Wed Oct 18 14:14:52 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:a6:a4:99:85:7c:56:cf:54:e2:f5:8e:49:12:44:7f: 20:f9:35:34:c0:b8:75:e5:aa:4a:68:32:09:43:94:ad: 87:9b:48:14:d2:05:35:50:49:6d:57:a1:23:5d:c3:c7: 37:13:2d:86:00:88:03:e8:e9:46:00:ff:3e:d1:ef:5a: 67:e1:c5:f3:2b:3e:4c:96:c3:48:3e:91:4b:a4:8d:4f: 0f:06:3d:86:55:69:c5:f1:1d:7c:1b:b3:e0:93:b3:6f: 76:f9:eb:56:c0:64:18:d3:da:dd:43:c7:1b:49:39:ef: da:83:a7:d6:44:19:3b:2a:29:39:33:ef:3a:7c:9e:65: 0a:dd:6d:da:12:14:34:9b:90:b6:42:f0:8e:d8:c3:16: 03:1b:d2:84:a4:26:c0:58:7b:05:05:d3:74:eb:e5:11: 8f:ea:05:ec:e5:0e:f0:6a:3c:e5:53:3e:0e:8e:3f:4d: 81:3a:f6:78:3c:75:a8:7f:b0:fa:f8:2a:40:7b:0e:c2: c7:06:a3:0a:a3:ea:3a:28:6f:52:d9:50:55:61:34:c6: f1:57:d7:7e:3f:9d:cf:76:6a:e2:ce:b8:f8:e5:09:93: 60:35:dd:fe:4f:d8:21:ae:9f:2c:32:37:4f:4b:22:1a: 49:ae:d4:b0:7e:f6:66:f3:b6:15:12:50:05:f5:e9:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:0c:12:19:07:a8:f3:9b:b4:f8:41:1b:97:0f:85:14: 3b:aa:07:66:a6:69:a0:97:96:84:84:77:ce:bf:ce:57: 7d:5e:3c:25:8a:c2:99:6e:a6:49:e1:c6:39:42:0f:f0: d7:37:0a:d6:1f:46:81:79:5f:ad:62:dc:4f:d7:e9:f4: 0a:59:10:3f:2d:85:70:f6:db:cf:da:cf:40:6a:29:e2: 3e:5c:b7:90:fd:80:0f:38:80:22:a1:07:d1:c6:f5:d4: 43:ae:33:36:e9:f5:47:69:f1:d0:8f:45:76:3f:e9:d7: 29:38:98:a5:d1:28:6c:2e:1b:e2:f6:59:78:a6:e0:85: 7c:8a:e2:b6:cf:6e:e8:82:1a:6a:7f:79:ca:5f:f4:53: ce:12:71:4a:89:4a:bb:aa:6a:b9:1e:12:04:61:b8:7a: b2:4e:4a:02:ba:25:74:a7:ff:ce:21:aa:95:cc:5e:b1: cd:e6:d6:fd:5b:ac:17:a3:2f:66:d5:f5:f2:58:76:69: c1:b6:43:78:4d:9f:dd:ff:5f:a3:26:19:ea:d4:1e:8c: 48:de:f3:9d:05:27:df:d2:fb:a8:b2:5d:ea:ae:58:64: 88:8f:56:57:18:e0:02:fc:35:8f:8f:21:8c:04:55:d9: 87:54:f4:1a:8b:3e:55:bc:be:6b:5e:e4:b1:6c:9f:ef Fingerprint (SHA-256): 65:56:E2:76:E0:92:C6:21:29:69:99:5F:CF:AB:00:BC:EA:4C:C8:29:40:33:A0:73:11:E2:EF:13:F8:CC:C9:E6 Fingerprint (SHA1): 1B:BB:FD:13:69:5A:63:2C:F2:1C:39:45:B6:C1:BB:36:6A:3C:28:81 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NoKU EE,O=NoKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #165: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #166: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #167: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141417 (0x3caf9ae9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:14:52 2023 Not After : Wed Oct 18 14:14:52 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:a6:a4:99:85:7c:56:cf:54:e2:f5:8e:49:12:44:7f: 20:f9:35:34:c0:b8:75:e5:aa:4a:68:32:09:43:94:ad: 87:9b:48:14:d2:05:35:50:49:6d:57:a1:23:5d:c3:c7: 37:13:2d:86:00:88:03:e8:e9:46:00:ff:3e:d1:ef:5a: 67:e1:c5:f3:2b:3e:4c:96:c3:48:3e:91:4b:a4:8d:4f: 0f:06:3d:86:55:69:c5:f1:1d:7c:1b:b3:e0:93:b3:6f: 76:f9:eb:56:c0:64:18:d3:da:dd:43:c7:1b:49:39:ef: da:83:a7:d6:44:19:3b:2a:29:39:33:ef:3a:7c:9e:65: 0a:dd:6d:da:12:14:34:9b:90:b6:42:f0:8e:d8:c3:16: 03:1b:d2:84:a4:26:c0:58:7b:05:05:d3:74:eb:e5:11: 8f:ea:05:ec:e5:0e:f0:6a:3c:e5:53:3e:0e:8e:3f:4d: 81:3a:f6:78:3c:75:a8:7f:b0:fa:f8:2a:40:7b:0e:c2: c7:06:a3:0a:a3:ea:3a:28:6f:52:d9:50:55:61:34:c6: f1:57:d7:7e:3f:9d:cf:76:6a:e2:ce:b8:f8:e5:09:93: 60:35:dd:fe:4f:d8:21:ae:9f:2c:32:37:4f:4b:22:1a: 49:ae:d4:b0:7e:f6:66:f3:b6:15:12:50:05:f5:e9:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:0c:12:19:07:a8:f3:9b:b4:f8:41:1b:97:0f:85:14: 3b:aa:07:66:a6:69:a0:97:96:84:84:77:ce:bf:ce:57: 7d:5e:3c:25:8a:c2:99:6e:a6:49:e1:c6:39:42:0f:f0: d7:37:0a:d6:1f:46:81:79:5f:ad:62:dc:4f:d7:e9:f4: 0a:59:10:3f:2d:85:70:f6:db:cf:da:cf:40:6a:29:e2: 3e:5c:b7:90:fd:80:0f:38:80:22:a1:07:d1:c6:f5:d4: 43:ae:33:36:e9:f5:47:69:f1:d0:8f:45:76:3f:e9:d7: 29:38:98:a5:d1:28:6c:2e:1b:e2:f6:59:78:a6:e0:85: 7c:8a:e2:b6:cf:6e:e8:82:1a:6a:7f:79:ca:5f:f4:53: ce:12:71:4a:89:4a:bb:aa:6a:b9:1e:12:04:61:b8:7a: b2:4e:4a:02:ba:25:74:a7:ff:ce:21:aa:95:cc:5e:b1: cd:e6:d6:fd:5b:ac:17:a3:2f:66:d5:f5:f2:58:76:69: c1:b6:43:78:4d:9f:dd:ff:5f:a3:26:19:ea:d4:1e:8c: 48:de:f3:9d:05:27:df:d2:fb:a8:b2:5d:ea:ae:58:64: 88:8f:56:57:18:e0:02:fc:35:8f:8f:21:8c:04:55:d9: 87:54:f4:1a:8b:3e:55:bc:be:6b:5e:e4:b1:6c:9f:ef Fingerprint (SHA-256): 65:56:E2:76:E0:92:C6:21:29:69:99:5F:CF:AB:00:BC:EA:4C:C8:29:40:33:A0:73:11:E2:EF:13:F8:CC:C9:E6 Fingerprint (SHA1): 1B:BB:FD:13:69:5A:63:2C:F2:1C:39:45:B6:C1:BB:36:6A:3C:28:81 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSig EE,O=DigSig,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #168: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #169: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #170: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonRepCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141417 (0x3caf9ae9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:14:52 2023 Not After : Wed Oct 18 14:14:52 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:a6:a4:99:85:7c:56:cf:54:e2:f5:8e:49:12:44:7f: 20:f9:35:34:c0:b8:75:e5:aa:4a:68:32:09:43:94:ad: 87:9b:48:14:d2:05:35:50:49:6d:57:a1:23:5d:c3:c7: 37:13:2d:86:00:88:03:e8:e9:46:00:ff:3e:d1:ef:5a: 67:e1:c5:f3:2b:3e:4c:96:c3:48:3e:91:4b:a4:8d:4f: 0f:06:3d:86:55:69:c5:f1:1d:7c:1b:b3:e0:93:b3:6f: 76:f9:eb:56:c0:64:18:d3:da:dd:43:c7:1b:49:39:ef: da:83:a7:d6:44:19:3b:2a:29:39:33:ef:3a:7c:9e:65: 0a:dd:6d:da:12:14:34:9b:90:b6:42:f0:8e:d8:c3:16: 03:1b:d2:84:a4:26:c0:58:7b:05:05:d3:74:eb:e5:11: 8f:ea:05:ec:e5:0e:f0:6a:3c:e5:53:3e:0e:8e:3f:4d: 81:3a:f6:78:3c:75:a8:7f:b0:fa:f8:2a:40:7b:0e:c2: c7:06:a3:0a:a3:ea:3a:28:6f:52:d9:50:55:61:34:c6: f1:57:d7:7e:3f:9d:cf:76:6a:e2:ce:b8:f8:e5:09:93: 60:35:dd:fe:4f:d8:21:ae:9f:2c:32:37:4f:4b:22:1a: 49:ae:d4:b0:7e:f6:66:f3:b6:15:12:50:05:f5:e9:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:0c:12:19:07:a8:f3:9b:b4:f8:41:1b:97:0f:85:14: 3b:aa:07:66:a6:69:a0:97:96:84:84:77:ce:bf:ce:57: 7d:5e:3c:25:8a:c2:99:6e:a6:49:e1:c6:39:42:0f:f0: d7:37:0a:d6:1f:46:81:79:5f:ad:62:dc:4f:d7:e9:f4: 0a:59:10:3f:2d:85:70:f6:db:cf:da:cf:40:6a:29:e2: 3e:5c:b7:90:fd:80:0f:38:80:22:a1:07:d1:c6:f5:d4: 43:ae:33:36:e9:f5:47:69:f1:d0:8f:45:76:3f:e9:d7: 29:38:98:a5:d1:28:6c:2e:1b:e2:f6:59:78:a6:e0:85: 7c:8a:e2:b6:cf:6e:e8:82:1a:6a:7f:79:ca:5f:f4:53: ce:12:71:4a:89:4a:bb:aa:6a:b9:1e:12:04:61:b8:7a: b2:4e:4a:02:ba:25:74:a7:ff:ce:21:aa:95:cc:5e:b1: cd:e6:d6:fd:5b:ac:17:a3:2f:66:d5:f5:f2:58:76:69: c1:b6:43:78:4d:9f:dd:ff:5f:a3:26:19:ea:d4:1e:8c: 48:de:f3:9d:05:27:df:d2:fb:a8:b2:5d:ea:ae:58:64: 88:8f:56:57:18:e0:02:fc:35:8f:8f:21:8c:04:55:d9: 87:54:f4:1a:8b:3e:55:bc:be:6b:5e:e4:b1:6c:9f:ef Fingerprint (SHA-256): 65:56:E2:76:E0:92:C6:21:29:69:99:5F:CF:AB:00:BC:EA:4C:C8:29:40:33:A0:73:11:E2:EF:13:F8:CC:C9:E6 Fingerprint (SHA1): 1B:BB:FD:13:69:5A:63:2C:F2:1C:39:45:B6:C1:BB:36:6A:3C:28:81 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonRep EE,O=NonRep,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #171: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #172: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #173: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141417 (0x3caf9ae9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:14:52 2023 Not After : Wed Oct 18 14:14:52 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:a6:a4:99:85:7c:56:cf:54:e2:f5:8e:49:12:44:7f: 20:f9:35:34:c0:b8:75:e5:aa:4a:68:32:09:43:94:ad: 87:9b:48:14:d2:05:35:50:49:6d:57:a1:23:5d:c3:c7: 37:13:2d:86:00:88:03:e8:e9:46:00:ff:3e:d1:ef:5a: 67:e1:c5:f3:2b:3e:4c:96:c3:48:3e:91:4b:a4:8d:4f: 0f:06:3d:86:55:69:c5:f1:1d:7c:1b:b3:e0:93:b3:6f: 76:f9:eb:56:c0:64:18:d3:da:dd:43:c7:1b:49:39:ef: da:83:a7:d6:44:19:3b:2a:29:39:33:ef:3a:7c:9e:65: 0a:dd:6d:da:12:14:34:9b:90:b6:42:f0:8e:d8:c3:16: 03:1b:d2:84:a4:26:c0:58:7b:05:05:d3:74:eb:e5:11: 8f:ea:05:ec:e5:0e:f0:6a:3c:e5:53:3e:0e:8e:3f:4d: 81:3a:f6:78:3c:75:a8:7f:b0:fa:f8:2a:40:7b:0e:c2: c7:06:a3:0a:a3:ea:3a:28:6f:52:d9:50:55:61:34:c6: f1:57:d7:7e:3f:9d:cf:76:6a:e2:ce:b8:f8:e5:09:93: 60:35:dd:fe:4f:d8:21:ae:9f:2c:32:37:4f:4b:22:1a: 49:ae:d4:b0:7e:f6:66:f3:b6:15:12:50:05:f5:e9:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:0c:12:19:07:a8:f3:9b:b4:f8:41:1b:97:0f:85:14: 3b:aa:07:66:a6:69:a0:97:96:84:84:77:ce:bf:ce:57: 7d:5e:3c:25:8a:c2:99:6e:a6:49:e1:c6:39:42:0f:f0: d7:37:0a:d6:1f:46:81:79:5f:ad:62:dc:4f:d7:e9:f4: 0a:59:10:3f:2d:85:70:f6:db:cf:da:cf:40:6a:29:e2: 3e:5c:b7:90:fd:80:0f:38:80:22:a1:07:d1:c6:f5:d4: 43:ae:33:36:e9:f5:47:69:f1:d0:8f:45:76:3f:e9:d7: 29:38:98:a5:d1:28:6c:2e:1b:e2:f6:59:78:a6:e0:85: 7c:8a:e2:b6:cf:6e:e8:82:1a:6a:7f:79:ca:5f:f4:53: ce:12:71:4a:89:4a:bb:aa:6a:b9:1e:12:04:61:b8:7a: b2:4e:4a:02:ba:25:74:a7:ff:ce:21:aa:95:cc:5e:b1: cd:e6:d6:fd:5b:ac:17:a3:2f:66:d5:f5:f2:58:76:69: c1:b6:43:78:4d:9f:dd:ff:5f:a3:26:19:ea:d4:1e:8c: 48:de:f3:9d:05:27:df:d2:fb:a8:b2:5d:ea:ae:58:64: 88:8f:56:57:18:e0:02:fc:35:8f:8f:21:8c:04:55:d9: 87:54:f4:1a:8b:3e:55:bc:be:6b:5e:e4:b1:6c:9f:ef Fingerprint (SHA-256): 65:56:E2:76:E0:92:C6:21:29:69:99:5F:CF:AB:00:BC:EA:4C:C8:29:40:33:A0:73:11:E2:EF:13:F8:CC:C9:E6 Fingerprint (SHA1): 1B:BB:FD:13:69:5A:63:2C:F2:1C:39:45:B6:C1:BB:36:6A:3C:28:81 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSigNonRepAndExtra EE,O=DigSigNonRepAndExtra,C=U S" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #174: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #175: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #176: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #177: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #178: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #179: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #180: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #181: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #182: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141417 (0x3caf9ae9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:14:52 2023 Not After : Wed Oct 18 14:14:52 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:a6:a4:99:85:7c:56:cf:54:e2:f5:8e:49:12:44:7f: 20:f9:35:34:c0:b8:75:e5:aa:4a:68:32:09:43:94:ad: 87:9b:48:14:d2:05:35:50:49:6d:57:a1:23:5d:c3:c7: 37:13:2d:86:00:88:03:e8:e9:46:00:ff:3e:d1:ef:5a: 67:e1:c5:f3:2b:3e:4c:96:c3:48:3e:91:4b:a4:8d:4f: 0f:06:3d:86:55:69:c5:f1:1d:7c:1b:b3:e0:93:b3:6f: 76:f9:eb:56:c0:64:18:d3:da:dd:43:c7:1b:49:39:ef: da:83:a7:d6:44:19:3b:2a:29:39:33:ef:3a:7c:9e:65: 0a:dd:6d:da:12:14:34:9b:90:b6:42:f0:8e:d8:c3:16: 03:1b:d2:84:a4:26:c0:58:7b:05:05:d3:74:eb:e5:11: 8f:ea:05:ec:e5:0e:f0:6a:3c:e5:53:3e:0e:8e:3f:4d: 81:3a:f6:78:3c:75:a8:7f:b0:fa:f8:2a:40:7b:0e:c2: c7:06:a3:0a:a3:ea:3a:28:6f:52:d9:50:55:61:34:c6: f1:57:d7:7e:3f:9d:cf:76:6a:e2:ce:b8:f8:e5:09:93: 60:35:dd:fe:4f:d8:21:ae:9f:2c:32:37:4f:4b:22:1a: 49:ae:d4:b0:7e:f6:66:f3:b6:15:12:50:05:f5:e9:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:0c:12:19:07:a8:f3:9b:b4:f8:41:1b:97:0f:85:14: 3b:aa:07:66:a6:69:a0:97:96:84:84:77:ce:bf:ce:57: 7d:5e:3c:25:8a:c2:99:6e:a6:49:e1:c6:39:42:0f:f0: d7:37:0a:d6:1f:46:81:79:5f:ad:62:dc:4f:d7:e9:f4: 0a:59:10:3f:2d:85:70:f6:db:cf:da:cf:40:6a:29:e2: 3e:5c:b7:90:fd:80:0f:38:80:22:a1:07:d1:c6:f5:d4: 43:ae:33:36:e9:f5:47:69:f1:d0:8f:45:76:3f:e9:d7: 29:38:98:a5:d1:28:6c:2e:1b:e2:f6:59:78:a6:e0:85: 7c:8a:e2:b6:cf:6e:e8:82:1a:6a:7f:79:ca:5f:f4:53: ce:12:71:4a:89:4a:bb:aa:6a:b9:1e:12:04:61:b8:7a: b2:4e:4a:02:ba:25:74:a7:ff:ce:21:aa:95:cc:5e:b1: cd:e6:d6:fd:5b:ac:17:a3:2f:66:d5:f5:f2:58:76:69: c1:b6:43:78:4d:9f:dd:ff:5f:a3:26:19:ea:d4:1e:8c: 48:de:f3:9d:05:27:df:d2:fb:a8:b2:5d:ea:ae:58:64: 88:8f:56:57:18:e0:02:fc:35:8f:8f:21:8c:04:55:d9: 87:54:f4:1a:8b:3e:55:bc:be:6b:5e:e4:b1:6c:9f:ef Fingerprint (SHA-256): 65:56:E2:76:E0:92:C6:21:29:69:99:5F:CF:AB:00:BC:EA:4C:C8:29:40:33:A0:73:11:E2:EF:13:F8:CC:C9:E6 Fingerprint (SHA1): 1B:BB:FD:13:69:5A:63:2C:F2:1C:39:45:B6:C1:BB:36:6A:3C:28:81 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonCriticalServerAuthEKU EE,O=NonCriticalServerAut hEKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #183: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #184: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #185: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141417 (0x3caf9ae9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:14:52 2023 Not After : Wed Oct 18 14:14:52 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:a6:a4:99:85:7c:56:cf:54:e2:f5:8e:49:12:44:7f: 20:f9:35:34:c0:b8:75:e5:aa:4a:68:32:09:43:94:ad: 87:9b:48:14:d2:05:35:50:49:6d:57:a1:23:5d:c3:c7: 37:13:2d:86:00:88:03:e8:e9:46:00:ff:3e:d1:ef:5a: 67:e1:c5:f3:2b:3e:4c:96:c3:48:3e:91:4b:a4:8d:4f: 0f:06:3d:86:55:69:c5:f1:1d:7c:1b:b3:e0:93:b3:6f: 76:f9:eb:56:c0:64:18:d3:da:dd:43:c7:1b:49:39:ef: da:83:a7:d6:44:19:3b:2a:29:39:33:ef:3a:7c:9e:65: 0a:dd:6d:da:12:14:34:9b:90:b6:42:f0:8e:d8:c3:16: 03:1b:d2:84:a4:26:c0:58:7b:05:05:d3:74:eb:e5:11: 8f:ea:05:ec:e5:0e:f0:6a:3c:e5:53:3e:0e:8e:3f:4d: 81:3a:f6:78:3c:75:a8:7f:b0:fa:f8:2a:40:7b:0e:c2: c7:06:a3:0a:a3:ea:3a:28:6f:52:d9:50:55:61:34:c6: f1:57:d7:7e:3f:9d:cf:76:6a:e2:ce:b8:f8:e5:09:93: 60:35:dd:fe:4f:d8:21:ae:9f:2c:32:37:4f:4b:22:1a: 49:ae:d4:b0:7e:f6:66:f3:b6:15:12:50:05:f5:e9:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:0c:12:19:07:a8:f3:9b:b4:f8:41:1b:97:0f:85:14: 3b:aa:07:66:a6:69:a0:97:96:84:84:77:ce:bf:ce:57: 7d:5e:3c:25:8a:c2:99:6e:a6:49:e1:c6:39:42:0f:f0: d7:37:0a:d6:1f:46:81:79:5f:ad:62:dc:4f:d7:e9:f4: 0a:59:10:3f:2d:85:70:f6:db:cf:da:cf:40:6a:29:e2: 3e:5c:b7:90:fd:80:0f:38:80:22:a1:07:d1:c6:f5:d4: 43:ae:33:36:e9:f5:47:69:f1:d0:8f:45:76:3f:e9:d7: 29:38:98:a5:d1:28:6c:2e:1b:e2:f6:59:78:a6:e0:85: 7c:8a:e2:b6:cf:6e:e8:82:1a:6a:7f:79:ca:5f:f4:53: ce:12:71:4a:89:4a:bb:aa:6a:b9:1e:12:04:61:b8:7a: b2:4e:4a:02:ba:25:74:a7:ff:ce:21:aa:95:cc:5e:b1: cd:e6:d6:fd:5b:ac:17:a3:2f:66:d5:f5:f2:58:76:69: c1:b6:43:78:4d:9f:dd:ff:5f:a3:26:19:ea:d4:1e:8c: 48:de:f3:9d:05:27:df:d2:fb:a8:b2:5d:ea:ae:58:64: 88:8f:56:57:18:e0:02:fc:35:8f:8f:21:8c:04:55:d9: 87:54:f4:1a:8b:3e:55:bc:be:6b:5e:e4:b1:6c:9f:ef Fingerprint (SHA-256): 65:56:E2:76:E0:92:C6:21:29:69:99:5F:CF:AB:00:BC:EA:4C:C8:29:40:33:A0:73:11:E2:EF:13:F8:CC:C9:E6 Fingerprint (SHA1): 1B:BB:FD:13:69:5A:63:2C:F2:1C:39:45:B6:C1:BB:36:6A:3C:28:81 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=CriticalServerAuthEKU EE,O=CriticalServerAuthEKU,C =US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #186: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #187: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #188: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKECA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141417 (0x3caf9ae9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:14:52 2023 Not After : Wed Oct 18 14:14:52 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:a6:a4:99:85:7c:56:cf:54:e2:f5:8e:49:12:44:7f: 20:f9:35:34:c0:b8:75:e5:aa:4a:68:32:09:43:94:ad: 87:9b:48:14:d2:05:35:50:49:6d:57:a1:23:5d:c3:c7: 37:13:2d:86:00:88:03:e8:e9:46:00:ff:3e:d1:ef:5a: 67:e1:c5:f3:2b:3e:4c:96:c3:48:3e:91:4b:a4:8d:4f: 0f:06:3d:86:55:69:c5:f1:1d:7c:1b:b3:e0:93:b3:6f: 76:f9:eb:56:c0:64:18:d3:da:dd:43:c7:1b:49:39:ef: da:83:a7:d6:44:19:3b:2a:29:39:33:ef:3a:7c:9e:65: 0a:dd:6d:da:12:14:34:9b:90:b6:42:f0:8e:d8:c3:16: 03:1b:d2:84:a4:26:c0:58:7b:05:05:d3:74:eb:e5:11: 8f:ea:05:ec:e5:0e:f0:6a:3c:e5:53:3e:0e:8e:3f:4d: 81:3a:f6:78:3c:75:a8:7f:b0:fa:f8:2a:40:7b:0e:c2: c7:06:a3:0a:a3:ea:3a:28:6f:52:d9:50:55:61:34:c6: f1:57:d7:7e:3f:9d:cf:76:6a:e2:ce:b8:f8:e5:09:93: 60:35:dd:fe:4f:d8:21:ae:9f:2c:32:37:4f:4b:22:1a: 49:ae:d4:b0:7e:f6:66:f3:b6:15:12:50:05:f5:e9:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:0c:12:19:07:a8:f3:9b:b4:f8:41:1b:97:0f:85:14: 3b:aa:07:66:a6:69:a0:97:96:84:84:77:ce:bf:ce:57: 7d:5e:3c:25:8a:c2:99:6e:a6:49:e1:c6:39:42:0f:f0: d7:37:0a:d6:1f:46:81:79:5f:ad:62:dc:4f:d7:e9:f4: 0a:59:10:3f:2d:85:70:f6:db:cf:da:cf:40:6a:29:e2: 3e:5c:b7:90:fd:80:0f:38:80:22:a1:07:d1:c6:f5:d4: 43:ae:33:36:e9:f5:47:69:f1:d0:8f:45:76:3f:e9:d7: 29:38:98:a5:d1:28:6c:2e:1b:e2:f6:59:78:a6:e0:85: 7c:8a:e2:b6:cf:6e:e8:82:1a:6a:7f:79:ca:5f:f4:53: ce:12:71:4a:89:4a:bb:aa:6a:b9:1e:12:04:61:b8:7a: b2:4e:4a:02:ba:25:74:a7:ff:ce:21:aa:95:cc:5e:b1: cd:e6:d6:fd:5b:ac:17:a3:2f:66:d5:f5:f2:58:76:69: c1:b6:43:78:4d:9f:dd:ff:5f:a3:26:19:ea:d4:1e:8c: 48:de:f3:9d:05:27:df:d2:fb:a8:b2:5d:ea:ae:58:64: 88:8f:56:57:18:e0:02:fc:35:8f:8f:21:8c:04:55:d9: 87:54:f4:1a:8b:3e:55:bc:be:6b:5e:e4:b1:6c:9f:ef Fingerprint (SHA-256): 65:56:E2:76:E0:92:C6:21:29:69:99:5F:CF:AB:00:BC:EA:4C:C8:29:40:33:A0:73:11:E2:EF:13:F8:CC:C9:E6 Fingerprint (SHA1): 1B:BB:FD:13:69:5A:63:2C:F2:1C:39:45:B6:C1:BB:36:6A:3C:28:81 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKE EE,O=EKUIPsecIKE,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #189: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #190: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #191: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141417 (0x3caf9ae9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:14:52 2023 Not After : Wed Oct 18 14:14:52 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:a6:a4:99:85:7c:56:cf:54:e2:f5:8e:49:12:44:7f: 20:f9:35:34:c0:b8:75:e5:aa:4a:68:32:09:43:94:ad: 87:9b:48:14:d2:05:35:50:49:6d:57:a1:23:5d:c3:c7: 37:13:2d:86:00:88:03:e8:e9:46:00:ff:3e:d1:ef:5a: 67:e1:c5:f3:2b:3e:4c:96:c3:48:3e:91:4b:a4:8d:4f: 0f:06:3d:86:55:69:c5:f1:1d:7c:1b:b3:e0:93:b3:6f: 76:f9:eb:56:c0:64:18:d3:da:dd:43:c7:1b:49:39:ef: da:83:a7:d6:44:19:3b:2a:29:39:33:ef:3a:7c:9e:65: 0a:dd:6d:da:12:14:34:9b:90:b6:42:f0:8e:d8:c3:16: 03:1b:d2:84:a4:26:c0:58:7b:05:05:d3:74:eb:e5:11: 8f:ea:05:ec:e5:0e:f0:6a:3c:e5:53:3e:0e:8e:3f:4d: 81:3a:f6:78:3c:75:a8:7f:b0:fa:f8:2a:40:7b:0e:c2: c7:06:a3:0a:a3:ea:3a:28:6f:52:d9:50:55:61:34:c6: f1:57:d7:7e:3f:9d:cf:76:6a:e2:ce:b8:f8:e5:09:93: 60:35:dd:fe:4f:d8:21:ae:9f:2c:32:37:4f:4b:22:1a: 49:ae:d4:b0:7e:f6:66:f3:b6:15:12:50:05:f5:e9:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:0c:12:19:07:a8:f3:9b:b4:f8:41:1b:97:0f:85:14: 3b:aa:07:66:a6:69:a0:97:96:84:84:77:ce:bf:ce:57: 7d:5e:3c:25:8a:c2:99:6e:a6:49:e1:c6:39:42:0f:f0: d7:37:0a:d6:1f:46:81:79:5f:ad:62:dc:4f:d7:e9:f4: 0a:59:10:3f:2d:85:70:f6:db:cf:da:cf:40:6a:29:e2: 3e:5c:b7:90:fd:80:0f:38:80:22:a1:07:d1:c6:f5:d4: 43:ae:33:36:e9:f5:47:69:f1:d0:8f:45:76:3f:e9:d7: 29:38:98:a5:d1:28:6c:2e:1b:e2:f6:59:78:a6:e0:85: 7c:8a:e2:b6:cf:6e:e8:82:1a:6a:7f:79:ca:5f:f4:53: ce:12:71:4a:89:4a:bb:aa:6a:b9:1e:12:04:61:b8:7a: b2:4e:4a:02:ba:25:74:a7:ff:ce:21:aa:95:cc:5e:b1: cd:e6:d6:fd:5b:ac:17:a3:2f:66:d5:f5:f2:58:76:69: c1:b6:43:78:4d:9f:dd:ff:5f:a3:26:19:ea:d4:1e:8c: 48:de:f3:9d:05:27:df:d2:fb:a8:b2:5d:ea:ae:58:64: 88:8f:56:57:18:e0:02:fc:35:8f:8f:21:8c:04:55:d9: 87:54:f4:1a:8b:3e:55:bc:be:6b:5e:e4:b1:6c:9f:ef Fingerprint (SHA-256): 65:56:E2:76:E0:92:C6:21:29:69:99:5F:CF:AB:00:BC:EA:4C:C8:29:40:33:A0:73:11:E2:EF:13:F8:CC:C9:E6 Fingerprint (SHA1): 1B:BB:FD:13:69:5A:63:2C:F2:1C:39:45:B6:C1:BB:36:6A:3C:28:81 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEEnd EE,O=EKUIPsecIKEEnd,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #192: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #193: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #194: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141417 (0x3caf9ae9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:14:52 2023 Not After : Wed Oct 18 14:14:52 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:a6:a4:99:85:7c:56:cf:54:e2:f5:8e:49:12:44:7f: 20:f9:35:34:c0:b8:75:e5:aa:4a:68:32:09:43:94:ad: 87:9b:48:14:d2:05:35:50:49:6d:57:a1:23:5d:c3:c7: 37:13:2d:86:00:88:03:e8:e9:46:00:ff:3e:d1:ef:5a: 67:e1:c5:f3:2b:3e:4c:96:c3:48:3e:91:4b:a4:8d:4f: 0f:06:3d:86:55:69:c5:f1:1d:7c:1b:b3:e0:93:b3:6f: 76:f9:eb:56:c0:64:18:d3:da:dd:43:c7:1b:49:39:ef: da:83:a7:d6:44:19:3b:2a:29:39:33:ef:3a:7c:9e:65: 0a:dd:6d:da:12:14:34:9b:90:b6:42:f0:8e:d8:c3:16: 03:1b:d2:84:a4:26:c0:58:7b:05:05:d3:74:eb:e5:11: 8f:ea:05:ec:e5:0e:f0:6a:3c:e5:53:3e:0e:8e:3f:4d: 81:3a:f6:78:3c:75:a8:7f:b0:fa:f8:2a:40:7b:0e:c2: c7:06:a3:0a:a3:ea:3a:28:6f:52:d9:50:55:61:34:c6: f1:57:d7:7e:3f:9d:cf:76:6a:e2:ce:b8:f8:e5:09:93: 60:35:dd:fe:4f:d8:21:ae:9f:2c:32:37:4f:4b:22:1a: 49:ae:d4:b0:7e:f6:66:f3:b6:15:12:50:05:f5:e9:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:0c:12:19:07:a8:f3:9b:b4:f8:41:1b:97:0f:85:14: 3b:aa:07:66:a6:69:a0:97:96:84:84:77:ce:bf:ce:57: 7d:5e:3c:25:8a:c2:99:6e:a6:49:e1:c6:39:42:0f:f0: d7:37:0a:d6:1f:46:81:79:5f:ad:62:dc:4f:d7:e9:f4: 0a:59:10:3f:2d:85:70:f6:db:cf:da:cf:40:6a:29:e2: 3e:5c:b7:90:fd:80:0f:38:80:22:a1:07:d1:c6:f5:d4: 43:ae:33:36:e9:f5:47:69:f1:d0:8f:45:76:3f:e9:d7: 29:38:98:a5:d1:28:6c:2e:1b:e2:f6:59:78:a6:e0:85: 7c:8a:e2:b6:cf:6e:e8:82:1a:6a:7f:79:ca:5f:f4:53: ce:12:71:4a:89:4a:bb:aa:6a:b9:1e:12:04:61:b8:7a: b2:4e:4a:02:ba:25:74:a7:ff:ce:21:aa:95:cc:5e:b1: cd:e6:d6:fd:5b:ac:17:a3:2f:66:d5:f5:f2:58:76:69: c1:b6:43:78:4d:9f:dd:ff:5f:a3:26:19:ea:d4:1e:8c: 48:de:f3:9d:05:27:df:d2:fb:a8:b2:5d:ea:ae:58:64: 88:8f:56:57:18:e0:02:fc:35:8f:8f:21:8c:04:55:d9: 87:54:f4:1a:8b:3e:55:bc:be:6b:5e:e4:b1:6c:9f:ef Fingerprint (SHA-256): 65:56:E2:76:E0:92:C6:21:29:69:99:5F:CF:AB:00:BC:EA:4C:C8:29:40:33:A0:73:11:E2:EF:13:F8:CC:C9:E6 Fingerprint (SHA1): 1B:BB:FD:13:69:5A:63:2C:F2:1C:39:45:B6:C1:BB:36:6A:3C:28:81 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEIntermediate EE,O=EKUIPsecIKEIntermedia te,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #195: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #196: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #197: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUAnyCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141417 (0x3caf9ae9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:14:52 2023 Not After : Wed Oct 18 14:14:52 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:a6:a4:99:85:7c:56:cf:54:e2:f5:8e:49:12:44:7f: 20:f9:35:34:c0:b8:75:e5:aa:4a:68:32:09:43:94:ad: 87:9b:48:14:d2:05:35:50:49:6d:57:a1:23:5d:c3:c7: 37:13:2d:86:00:88:03:e8:e9:46:00:ff:3e:d1:ef:5a: 67:e1:c5:f3:2b:3e:4c:96:c3:48:3e:91:4b:a4:8d:4f: 0f:06:3d:86:55:69:c5:f1:1d:7c:1b:b3:e0:93:b3:6f: 76:f9:eb:56:c0:64:18:d3:da:dd:43:c7:1b:49:39:ef: da:83:a7:d6:44:19:3b:2a:29:39:33:ef:3a:7c:9e:65: 0a:dd:6d:da:12:14:34:9b:90:b6:42:f0:8e:d8:c3:16: 03:1b:d2:84:a4:26:c0:58:7b:05:05:d3:74:eb:e5:11: 8f:ea:05:ec:e5:0e:f0:6a:3c:e5:53:3e:0e:8e:3f:4d: 81:3a:f6:78:3c:75:a8:7f:b0:fa:f8:2a:40:7b:0e:c2: c7:06:a3:0a:a3:ea:3a:28:6f:52:d9:50:55:61:34:c6: f1:57:d7:7e:3f:9d:cf:76:6a:e2:ce:b8:f8:e5:09:93: 60:35:dd:fe:4f:d8:21:ae:9f:2c:32:37:4f:4b:22:1a: 49:ae:d4:b0:7e:f6:66:f3:b6:15:12:50:05:f5:e9:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:0c:12:19:07:a8:f3:9b:b4:f8:41:1b:97:0f:85:14: 3b:aa:07:66:a6:69:a0:97:96:84:84:77:ce:bf:ce:57: 7d:5e:3c:25:8a:c2:99:6e:a6:49:e1:c6:39:42:0f:f0: d7:37:0a:d6:1f:46:81:79:5f:ad:62:dc:4f:d7:e9:f4: 0a:59:10:3f:2d:85:70:f6:db:cf:da:cf:40:6a:29:e2: 3e:5c:b7:90:fd:80:0f:38:80:22:a1:07:d1:c6:f5:d4: 43:ae:33:36:e9:f5:47:69:f1:d0:8f:45:76:3f:e9:d7: 29:38:98:a5:d1:28:6c:2e:1b:e2:f6:59:78:a6:e0:85: 7c:8a:e2:b6:cf:6e:e8:82:1a:6a:7f:79:ca:5f:f4:53: ce:12:71:4a:89:4a:bb:aa:6a:b9:1e:12:04:61:b8:7a: b2:4e:4a:02:ba:25:74:a7:ff:ce:21:aa:95:cc:5e:b1: cd:e6:d6:fd:5b:ac:17:a3:2f:66:d5:f5:f2:58:76:69: c1:b6:43:78:4d:9f:dd:ff:5f:a3:26:19:ea:d4:1e:8c: 48:de:f3:9d:05:27:df:d2:fb:a8:b2:5d:ea:ae:58:64: 88:8f:56:57:18:e0:02:fc:35:8f:8f:21:8c:04:55:d9: 87:54:f4:1a:8b:3e:55:bc:be:6b:5e:e4:b1:6c:9f:ef Fingerprint (SHA-256): 65:56:E2:76:E0:92:C6:21:29:69:99:5F:CF:AB:00:BC:EA:4C:C8:29:40:33:A0:73:11:E2:EF:13:F8:CC:C9:E6 Fingerprint (SHA1): 1B:BB:FD:13:69:5A:63:2C:F2:1C:39:45:B6:C1:BB:36:6A:3C:28:81 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUAny EE,O=EKUAny,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #198: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #199: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #200: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUEmailCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141417 (0x3caf9ae9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:14:52 2023 Not After : Wed Oct 18 14:14:52 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:a6:a4:99:85:7c:56:cf:54:e2:f5:8e:49:12:44:7f: 20:f9:35:34:c0:b8:75:e5:aa:4a:68:32:09:43:94:ad: 87:9b:48:14:d2:05:35:50:49:6d:57:a1:23:5d:c3:c7: 37:13:2d:86:00:88:03:e8:e9:46:00:ff:3e:d1:ef:5a: 67:e1:c5:f3:2b:3e:4c:96:c3:48:3e:91:4b:a4:8d:4f: 0f:06:3d:86:55:69:c5:f1:1d:7c:1b:b3:e0:93:b3:6f: 76:f9:eb:56:c0:64:18:d3:da:dd:43:c7:1b:49:39:ef: da:83:a7:d6:44:19:3b:2a:29:39:33:ef:3a:7c:9e:65: 0a:dd:6d:da:12:14:34:9b:90:b6:42:f0:8e:d8:c3:16: 03:1b:d2:84:a4:26:c0:58:7b:05:05:d3:74:eb:e5:11: 8f:ea:05:ec:e5:0e:f0:6a:3c:e5:53:3e:0e:8e:3f:4d: 81:3a:f6:78:3c:75:a8:7f:b0:fa:f8:2a:40:7b:0e:c2: c7:06:a3:0a:a3:ea:3a:28:6f:52:d9:50:55:61:34:c6: f1:57:d7:7e:3f:9d:cf:76:6a:e2:ce:b8:f8:e5:09:93: 60:35:dd:fe:4f:d8:21:ae:9f:2c:32:37:4f:4b:22:1a: 49:ae:d4:b0:7e:f6:66:f3:b6:15:12:50:05:f5:e9:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:0c:12:19:07:a8:f3:9b:b4:f8:41:1b:97:0f:85:14: 3b:aa:07:66:a6:69:a0:97:96:84:84:77:ce:bf:ce:57: 7d:5e:3c:25:8a:c2:99:6e:a6:49:e1:c6:39:42:0f:f0: d7:37:0a:d6:1f:46:81:79:5f:ad:62:dc:4f:d7:e9:f4: 0a:59:10:3f:2d:85:70:f6:db:cf:da:cf:40:6a:29:e2: 3e:5c:b7:90:fd:80:0f:38:80:22:a1:07:d1:c6:f5:d4: 43:ae:33:36:e9:f5:47:69:f1:d0:8f:45:76:3f:e9:d7: 29:38:98:a5:d1:28:6c:2e:1b:e2:f6:59:78:a6:e0:85: 7c:8a:e2:b6:cf:6e:e8:82:1a:6a:7f:79:ca:5f:f4:53: ce:12:71:4a:89:4a:bb:aa:6a:b9:1e:12:04:61:b8:7a: b2:4e:4a:02:ba:25:74:a7:ff:ce:21:aa:95:cc:5e:b1: cd:e6:d6:fd:5b:ac:17:a3:2f:66:d5:f5:f2:58:76:69: c1:b6:43:78:4d:9f:dd:ff:5f:a3:26:19:ea:d4:1e:8c: 48:de:f3:9d:05:27:df:d2:fb:a8:b2:5d:ea:ae:58:64: 88:8f:56:57:18:e0:02:fc:35:8f:8f:21:8c:04:55:d9: 87:54:f4:1a:8b:3e:55:bc:be:6b:5e:e4:b1:6c:9f:ef Fingerprint (SHA-256): 65:56:E2:76:E0:92:C6:21:29:69:99:5F:CF:AB:00:BC:EA:4C:C8:29:40:33:A0:73:11:E2:EF:13:F8:CC:C9:E6 Fingerprint (SHA1): 1B:BB:FD:13:69:5A:63:2C:F2:1C:39:45:B6:C1:BB:36:6A:3C:28:81 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUEmail EE,O=EKUEmail,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #201: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #202: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #203: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 - PASSED httpserv starting at Wed Oct 18 14:14:58 UTC 2023 httpserv -D -p 10007 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/aiahttp/http_pid.17687 & trying to connect to httpserv at Wed Oct 18 14:14:58 UTC 2023 tstclnt -4 -p 10007 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:10007 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 29328 >/dev/null 2>/dev/null httpserv with PID 29328 found at Wed Oct 18 14:14:58 UTC 2023 httpserv with PID 29328 started at Wed Oct 18 14:14:58 UTC 2023 chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecUserCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141417 (0x3caf9ae9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:14:52 2023 Not After : Wed Oct 18 14:14:52 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:a6:a4:99:85:7c:56:cf:54:e2:f5:8e:49:12:44:7f: 20:f9:35:34:c0:b8:75:e5:aa:4a:68:32:09:43:94:ad: 87:9b:48:14:d2:05:35:50:49:6d:57:a1:23:5d:c3:c7: 37:13:2d:86:00:88:03:e8:e9:46:00:ff:3e:d1:ef:5a: 67:e1:c5:f3:2b:3e:4c:96:c3:48:3e:91:4b:a4:8d:4f: 0f:06:3d:86:55:69:c5:f1:1d:7c:1b:b3:e0:93:b3:6f: 76:f9:eb:56:c0:64:18:d3:da:dd:43:c7:1b:49:39:ef: da:83:a7:d6:44:19:3b:2a:29:39:33:ef:3a:7c:9e:65: 0a:dd:6d:da:12:14:34:9b:90:b6:42:f0:8e:d8:c3:16: 03:1b:d2:84:a4:26:c0:58:7b:05:05:d3:74:eb:e5:11: 8f:ea:05:ec:e5:0e:f0:6a:3c:e5:53:3e:0e:8e:3f:4d: 81:3a:f6:78:3c:75:a8:7f:b0:fa:f8:2a:40:7b:0e:c2: c7:06:a3:0a:a3:ea:3a:28:6f:52:d9:50:55:61:34:c6: f1:57:d7:7e:3f:9d:cf:76:6a:e2:ce:b8:f8:e5:09:93: 60:35:dd:fe:4f:d8:21:ae:9f:2c:32:37:4f:4b:22:1a: 49:ae:d4:b0:7e:f6:66:f3:b6:15:12:50:05:f5:e9:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:0c:12:19:07:a8:f3:9b:b4:f8:41:1b:97:0f:85:14: 3b:aa:07:66:a6:69:a0:97:96:84:84:77:ce:bf:ce:57: 7d:5e:3c:25:8a:c2:99:6e:a6:49:e1:c6:39:42:0f:f0: d7:37:0a:d6:1f:46:81:79:5f:ad:62:dc:4f:d7:e9:f4: 0a:59:10:3f:2d:85:70:f6:db:cf:da:cf:40:6a:29:e2: 3e:5c:b7:90:fd:80:0f:38:80:22:a1:07:d1:c6:f5:d4: 43:ae:33:36:e9:f5:47:69:f1:d0:8f:45:76:3f:e9:d7: 29:38:98:a5:d1:28:6c:2e:1b:e2:f6:59:78:a6:e0:85: 7c:8a:e2:b6:cf:6e:e8:82:1a:6a:7f:79:ca:5f:f4:53: ce:12:71:4a:89:4a:bb:aa:6a:b9:1e:12:04:61:b8:7a: b2:4e:4a:02:ba:25:74:a7:ff:ce:21:aa:95:cc:5e:b1: cd:e6:d6:fd:5b:ac:17:a3:2f:66:d5:f5:f2:58:76:69: c1:b6:43:78:4d:9f:dd:ff:5f:a3:26:19:ea:d4:1e:8c: 48:de:f3:9d:05:27:df:d2:fb:a8:b2:5d:ea:ae:58:64: 88:8f:56:57:18:e0:02:fc:35:8f:8f:21:8c:04:55:d9: 87:54:f4:1a:8b:3e:55:bc:be:6b:5e:e4:b1:6c:9f:ef Fingerprint (SHA-256): 65:56:E2:76:E0:92:C6:21:29:69:99:5F:CF:AB:00:BC:EA:4C:C8:29:40:33:A0:73:11:E2:EF:13:F8:CC:C9:E6 Fingerprint (SHA1): 1B:BB:FD:13:69:5A:63:2C:F2:1C:39:45:B6:C1:BB:36:6A:3C:28:81 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecUser EE,O=EKUIPsecUser,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #204: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #205: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #206: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 - PASSED tstclnt -4 -h localhost.localdomain -p 10007 -q -t 20 chains.sh: #207: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141416 (0x3caf9ae8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Wed Oct 18 14:14:16 2023 Not After : Wed Oct 18 14:14:16 2073 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:e7:e5:27:d3:e3:e5:1b:58:09:b6:5f:88:c0:56:3a: d0:24:74:af:f1:ed:33:7b:9c:25:c7:24:c1:0a:8b:3a: 7c:41:aa:d1:e9:fd:5b:3a:72:51:18:6c:b2:9d:3f:1d: 1e:24:1e:c1:f5:cd:74:8e:c4:e2:86:24:65:c3:93:1b: 70:3d:ba:a2:49:25:5b:68:2c:a4:74:da:e2:20:17:91: ab:33:02:d3:a1:72:cf:fe:5c:d8:64:85:c2:7b:54:90: 76:a8:49:e6:54:b0:f1:0d:ae:1e:15:2c:b1:9b:ee:c6: e2:96:a3:0d:c0:08:d3:1e:83:9f:f0:f0:8a:f8:ce:9c: ab:1f:76:79:32:81:ba:f5:88:02:bf:00:af:59:0f:51: 4f:cd:2c:6b:d4:7c:04:02:b1:85:08:7c:9c:75:33:3c: b2:64:9d:c2:b2:02:23:28:c2:67:0c:80:53:ae:26:fd: f2:b3:96:93:e6:ba:23:04:9e:7a:5d:d5:fd:41:79:7a: c9:37:17:a5:0f:0a:0b:ad:2e:25:a8:b1:08:70:7a:3c: 4b:68:25:2f:70:4d:d7:f4:1c:65:0c:08:bc:d2:5e:43: 6b:4a:fb:67:e0:eb:6f:57:f5:21:79:06:6d:58:b4:30: 0b:c3:7a:23:d6:19:f7:d9:f1:a7:45:60:73:ce:bf:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:b3:19:67:88:9f:d5:3a:09:85:6b:c8:91:70:62:05: 30:97:76:5e:fd:66:72:5c:19:d5:3b:5d:e5:18:76:93: d0:18:a5:a1:16:f1:4f:69:e9:c4:cf:c2:31:59:94:3a: ee:2c:37:17:45:9f:5b:10:40:fe:98:72:e4:7c:6e:c5: cf:23:c2:7c:16:65:fc:db:0e:36:8f:49:41:9a:d6:40: be:22:33:b2:ad:c7:d2:44:7a:93:fa:0d:22:3e:5b:95: 26:db:c1:b6:ab:5b:67:ce:2f:ae:e6:b4:d8:fb:11:f4: 4a:ad:23:61:c7:ea:74:f8:e2:f3:b3:66:01:c6:03:62: 24:38:ae:1c:59:c7:7c:11:f0:27:b0:95:b4:9f:f7:b5: 13:79:f3:46:2f:89:26:71:bf:32:97:e9:0e:6b:64:fb: 2e:da:b7:c6:a6:25:8d:aa:48:b4:3e:2c:97:f3:21:1e: bf:4b:5f:5b:a3:5a:6e:df:89:7e:a5:0a:8b:d1:a3:ed: 57:8b:c7:d5:b2:75:d3:4d:df:2b:3b:0d:63:4b:73:50: f7:77:94:6d:03:8f:7b:11:ab:c6:e2:ce:90:1b:65:c4: 20:cc:cc:ce:7f:64:ac:28:ac:5f:a6:11:66:d8:8c:74: b4:5a:2c:9b:3c:c2:4b:fb:66:4b:e6:41:01:b5:68:42 Fingerprint (SHA-256): B6:5B:9D:3C:19:C3:A5:75:71:3F:00:DE:83:C5:2B:55:5D:CF:61:76:D4:52:E7:5C:FC:EE:05:42:0F:30:04:01 Fingerprint (SHA1): E6:58:DA:89:7C:25:BB:39:71:70:92:57:1D:10:B9:7A:6A:E1:12:84 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #208: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #209: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #210: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 29328 at Wed Oct 18 14:14:59 UTC 2023 kill -USR1 29328 httpserv: normal termination httpserv -b -p 10007 2>/dev/null; httpserv with PID 29328 killed at Wed Oct 18 14:14:59 UTC 2023 httpserv starting at Wed Oct 18 14:14:59 UTC 2023 httpserv -D -p 10007 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/aiahttp/http_pid.17687 & trying to connect to httpserv at Wed Oct 18 14:14:59 UTC 2023 tstclnt -4 -p 10007 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:10007 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 29530 >/dev/null 2>/dev/null httpserv with PID 29530 found at Wed Oct 18 14:14:59 UTC 2023 httpserv with PID 29530 started at Wed Oct 18 14:14:59 UTC 2023 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #211: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. OCSPEE12OCSPCA1 : ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #212: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #213: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -4 -h localhost.localdomain -p 10007 -q -t 20 chains.sh: #214: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141416 (0x3caf9ae8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Wed Oct 18 14:14:16 2023 Not After : Wed Oct 18 14:14:16 2073 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:e7:e5:27:d3:e3:e5:1b:58:09:b6:5f:88:c0:56:3a: d0:24:74:af:f1:ed:33:7b:9c:25:c7:24:c1:0a:8b:3a: 7c:41:aa:d1:e9:fd:5b:3a:72:51:18:6c:b2:9d:3f:1d: 1e:24:1e:c1:f5:cd:74:8e:c4:e2:86:24:65:c3:93:1b: 70:3d:ba:a2:49:25:5b:68:2c:a4:74:da:e2:20:17:91: ab:33:02:d3:a1:72:cf:fe:5c:d8:64:85:c2:7b:54:90: 76:a8:49:e6:54:b0:f1:0d:ae:1e:15:2c:b1:9b:ee:c6: e2:96:a3:0d:c0:08:d3:1e:83:9f:f0:f0:8a:f8:ce:9c: ab:1f:76:79:32:81:ba:f5:88:02:bf:00:af:59:0f:51: 4f:cd:2c:6b:d4:7c:04:02:b1:85:08:7c:9c:75:33:3c: b2:64:9d:c2:b2:02:23:28:c2:67:0c:80:53:ae:26:fd: f2:b3:96:93:e6:ba:23:04:9e:7a:5d:d5:fd:41:79:7a: c9:37:17:a5:0f:0a:0b:ad:2e:25:a8:b1:08:70:7a:3c: 4b:68:25:2f:70:4d:d7:f4:1c:65:0c:08:bc:d2:5e:43: 6b:4a:fb:67:e0:eb:6f:57:f5:21:79:06:6d:58:b4:30: 0b:c3:7a:23:d6:19:f7:d9:f1:a7:45:60:73:ce:bf:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:b3:19:67:88:9f:d5:3a:09:85:6b:c8:91:70:62:05: 30:97:76:5e:fd:66:72:5c:19:d5:3b:5d:e5:18:76:93: d0:18:a5:a1:16:f1:4f:69:e9:c4:cf:c2:31:59:94:3a: ee:2c:37:17:45:9f:5b:10:40:fe:98:72:e4:7c:6e:c5: cf:23:c2:7c:16:65:fc:db:0e:36:8f:49:41:9a:d6:40: be:22:33:b2:ad:c7:d2:44:7a:93:fa:0d:22:3e:5b:95: 26:db:c1:b6:ab:5b:67:ce:2f:ae:e6:b4:d8:fb:11:f4: 4a:ad:23:61:c7:ea:74:f8:e2:f3:b3:66:01:c6:03:62: 24:38:ae:1c:59:c7:7c:11:f0:27:b0:95:b4:9f:f7:b5: 13:79:f3:46:2f:89:26:71:bf:32:97:e9:0e:6b:64:fb: 2e:da:b7:c6:a6:25:8d:aa:48:b4:3e:2c:97:f3:21:1e: bf:4b:5f:5b:a3:5a:6e:df:89:7e:a5:0a:8b:d1:a3:ed: 57:8b:c7:d5:b2:75:d3:4d:df:2b:3b:0d:63:4b:73:50: f7:77:94:6d:03:8f:7b:11:ab:c6:e2:ce:90:1b:65:c4: 20:cc:cc:ce:7f:64:ac:28:ac:5f:a6:11:66:d8:8c:74: b4:5a:2c:9b:3c:c2:4b:fb:66:4b:e6:41:01:b5:68:42 Fingerprint (SHA-256): B6:5B:9D:3C:19:C3:A5:75:71:3F:00:DE:83:C5:2B:55:5D:CF:61:76:D4:52:E7:5C:FC:EE:05:42:0F:30:04:01 Fingerprint (SHA1): E6:58:DA:89:7C:25:BB:39:71:70:92:57:1D:10:B9:7A:6A:E1:12:84 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #215: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #216: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #217: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 29530 at Wed Oct 18 14:14:59 UTC 2023 kill -USR1 29530 httpserv: normal termination httpserv -b -p 10007 2>/dev/null; httpserv with PID 29530 killed at Wed Oct 18 14:14:59 UTC 2023 httpserv starting at Wed Oct 18 14:14:59 UTC 2023 httpserv -D -p 10007 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/aiahttp/http_pid.17687 & trying to connect to httpserv at Wed Oct 18 14:14:59 UTC 2023 tstclnt -4 -p 10007 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:10007 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 29749 >/dev/null 2>/dev/null httpserv with PID 29749 found at Wed Oct 18 14:14:59 UTC 2023 httpserv with PID 29749 started at Wed Oct 18 14:14:59 UTC 2023 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #218: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #219: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141433 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #220: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #221: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #222: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141434 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #223: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #224: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #225: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #226: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018141435 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #227: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #228: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018141436 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #229: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #230: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #231: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #232: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #233: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1018141437 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #234: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #235: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #236: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #237: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #238: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141434 (0x3caf9afa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:15:00 2023 Not After : Wed Oct 18 14:15:00 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:b8:fd:ba:d7:7e:a3:74:c1:5b:b5:57:5d:39:76:92: 71:97:65:48:27:4e:8c:dd:15:89:ed:0a:38:4f:d3:2a: 33:38:92:c3:dd:89:94:eb:12:51:d7:ba:f5:6b:30:75: 4a:04:9e:38:46:ee:42:5b:1e:bd:1b:a3:0f:97:30:28: ab:43:7f:ba:3e:f8:92:33:a1:d3:e6:d2:59:a3:aa:3d: 1e:66:b1:4e:46:19:14:53:9e:9c:f2:0d:37:76:8e:7e: c1:4b:42:f2:00:9d:8a:f9:64:ac:f4:4d:83:d1:5d:e9: 67:78:7e:5f:2e:87:27:fe:49:ab:87:9f:e1:7f:bd:63: d9:0e:bc:f0:84:1c:e6:bc:ef:49:4d:94:a7:7f:69:8b: b6:b7:fc:73:57:68:3c:cc:5f:52:83:e2:a3:74:87:c2: b9:be:28:60:e2:d7:7b:c8:89:22:b3:63:52:57:cb:bf: f4:d8:ec:a1:6a:8d:e6:31:52:88:0e:da:33:17:08:61: c0:93:fb:7f:44:5c:8c:99:25:59:94:2e:3e:6f:06:7c: 18:57:1d:97:71:89:16:f6:a7:96:b3:ae:35:45:7a:87: 35:37:66:f9:0a:20:17:0d:57:74:cf:36:3d:9d:e1:63: 8b:9d:d0:09:83:87:7d:6f:0d:1c:5b:0a:0b:39:2a:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:39:c1:68:3b:0a:d8:ee:4c:8e:c6:81:9a:fd:ae:77: 44:b0:ac:98:d6:6c:ff:c1:40:00:f0:17:55:80:a3:3c: 86:2b:95:b2:0e:fb:7b:f9:d2:25:2d:c0:3f:ff:4a:2f: c7:5f:39:57:31:da:a5:4a:e0:95:44:28:6b:f0:ca:8e: 2f:ce:0d:10:a9:bb:be:24:9e:21:e9:b6:ed:b7:88:18: 4e:71:78:10:28:ac:98:87:ec:ad:cf:cd:b7:0b:42:1a: 52:b1:7a:00:c5:19:4d:9c:c1:d7:91:62:6b:eb:73:3c: 5a:78:69:ab:36:9c:e2:c1:41:c5:b0:f6:23:0d:87:47: 6c:55:56:8d:a4:6e:d1:b0:a8:79:de:bc:c1:44:72:4e: 67:c3:fd:94:c5:64:78:5a:c2:53:a0:d6:71:80:7c:4c: 3c:f8:9a:36:36:2e:70:5b:dd:3a:5d:29:dc:c0:35:c0: 42:3f:bb:82:0f:24:45:e6:d5:9c:e1:47:11:14:4c:6d: 14:2e:59:60:09:4e:a8:63:57:37:1b:35:2f:eb:7e:c2: 8b:ee:c6:d9:a0:a7:1e:cd:19:c7:2a:ef:22:cd:26:0f: b9:8b:25:11:47:bd:6a:07:cb:02:00:56:fb:c2:c4:04: e5:53:f4:56:83:1b:23:2f:37:7c:be:2c:d5:0c:6e:77 Fingerprint (SHA-256): 7D:40:97:E7:13:F3:67:D3:09:40:BB:47:EF:A9:75:4B:94:D1:E9:3B:D3:C0:16:9C:8B:F7:21:E5:A1:F1:36:88 Fingerprint (SHA1): 45:D8:1C:31:8C:08:3F:33:45:05:A1:AA:50:34:A5:3A:06:8C:D6:F9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #239: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141433 (0x3caf9af9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:15:00 2023 Not After : Wed Oct 18 14:15:00 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:97:6b:98:72:3c:59:ed:6f:cc:b3:74:ee:93:60:de: 97:19:10:9b:8b:1b:2f:ce:40:66:ec:fd:ae:71:6e:2f: 30:55:41:aa:da:d7:49:cb:b0:d4:de:9d:c3:16:bf:00: f7:c1:a7:d1:e1:f8:63:b6:ce:cd:97:ef:b9:9c:e5:78: 5f:55:65:99:e1:52:bc:57:8b:5e:89:29:23:7d:f2:2a: a1:4a:42:9e:60:8c:44:84:4f:e3:eb:a0:41:4f:ef:1c: c7:87:de:c5:8b:d1:00:a3:e6:58:ea:dc:ad:9c:15:e3: c3:07:80:77:81:d5:f2:cd:ea:85:ba:bc:8e:3f:bb:4c: 55:37:64:cc:eb:60:ca:17:f6:ce:f8:d7:af:75:b1:11: dc:95:81:b8:76:7d:3d:e5:60:a5:97:28:86:59:36:6b: 61:94:1b:71:de:8e:15:10:dd:c7:72:83:1f:9c:12:19: ec:92:99:77:44:7b:c5:49:d9:60:7c:fc:74:1d:16:d7: d6:f0:42:ed:c4:ba:eb:8f:66:c7:42:a3:38:06:b0:92: 68:16:fa:98:9f:06:46:24:d0:96:50:bf:bd:d7:1e:83: e9:7c:67:fc:6c:6b:13:8d:88:f3:6b:9e:a9:38:57:d2: 98:93:3b:02:f6:1a:e2:d5:cc:90:3e:25:fc:82:4d:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:f8:03:b9:28:d4:b1:9b:cf:d3:8b:ba:cd:0e:d0:02: c8:82:1f:03:4c:d3:f3:b6:5f:a1:b7:b2:8a:02:8f:1e: 0c:bd:de:ab:8e:d5:41:2e:5b:2f:63:69:83:63:7a:48: 25:77:48:d5:9b:2f:b3:14:94:26:0b:e6:9c:a6:84:03: 77:51:87:4e:b6:7f:47:48:f7:7a:c8:f5:4d:95:e4:60: b6:28:57:53:b1:f1:7f:11:05:63:2f:3b:3b:a4:a8:6b: 27:e6:3a:bb:28:a4:f7:f1:22:3f:13:27:28:26:c3:38: 0e:2c:57:2f:23:b7:b7:2d:78:11:69:3e:15:f8:ab:b8: 3c:fe:df:8b:93:4b:da:1e:1c:7c:79:49:90:e5:30:8c: f9:1f:6d:b7:d1:09:1a:24:fe:c4:28:6b:3f:e9:2b:27: b2:81:77:4b:ca:8c:ae:87:ce:02:18:99:9b:5e:6a:a6: 9a:5f:7d:39:43:40:8f:ad:9c:22:70:c3:8d:c5:56:61: 92:10:1f:70:4e:ed:59:dc:17:4a:b1:d3:49:46:3f:5b: e4:f3:27:2c:5e:47:14:3d:65:a0:31:01:6a:51:03:c6: b7:3e:f1:69:78:0a:02:68:f0:de:10:cb:9e:63:c4:c7: 3a:f1:ce:09:7e:4e:63:5d:e9:90:db:89:48:e5:7d:5c Fingerprint (SHA-256): 6D:ED:4D:8F:13:B5:13:F2:06:D9:EC:1D:20:17:4F:71:F8:3A:87:7C:0C:52:77:00:FE:B8:98:25:61:75:D1:00 Fingerprint (SHA1): 81:0B:02:CE:2F:01:F0:48:06:B2:83:7C:94:54:12:61:EF:F9:5C:A1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #240: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #241: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #242: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #243: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141433 (0x3caf9af9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:15:00 2023 Not After : Wed Oct 18 14:15:00 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:97:6b:98:72:3c:59:ed:6f:cc:b3:74:ee:93:60:de: 97:19:10:9b:8b:1b:2f:ce:40:66:ec:fd:ae:71:6e:2f: 30:55:41:aa:da:d7:49:cb:b0:d4:de:9d:c3:16:bf:00: f7:c1:a7:d1:e1:f8:63:b6:ce:cd:97:ef:b9:9c:e5:78: 5f:55:65:99:e1:52:bc:57:8b:5e:89:29:23:7d:f2:2a: a1:4a:42:9e:60:8c:44:84:4f:e3:eb:a0:41:4f:ef:1c: c7:87:de:c5:8b:d1:00:a3:e6:58:ea:dc:ad:9c:15:e3: c3:07:80:77:81:d5:f2:cd:ea:85:ba:bc:8e:3f:bb:4c: 55:37:64:cc:eb:60:ca:17:f6:ce:f8:d7:af:75:b1:11: dc:95:81:b8:76:7d:3d:e5:60:a5:97:28:86:59:36:6b: 61:94:1b:71:de:8e:15:10:dd:c7:72:83:1f:9c:12:19: ec:92:99:77:44:7b:c5:49:d9:60:7c:fc:74:1d:16:d7: d6:f0:42:ed:c4:ba:eb:8f:66:c7:42:a3:38:06:b0:92: 68:16:fa:98:9f:06:46:24:d0:96:50:bf:bd:d7:1e:83: e9:7c:67:fc:6c:6b:13:8d:88:f3:6b:9e:a9:38:57:d2: 98:93:3b:02:f6:1a:e2:d5:cc:90:3e:25:fc:82:4d:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:f8:03:b9:28:d4:b1:9b:cf:d3:8b:ba:cd:0e:d0:02: c8:82:1f:03:4c:d3:f3:b6:5f:a1:b7:b2:8a:02:8f:1e: 0c:bd:de:ab:8e:d5:41:2e:5b:2f:63:69:83:63:7a:48: 25:77:48:d5:9b:2f:b3:14:94:26:0b:e6:9c:a6:84:03: 77:51:87:4e:b6:7f:47:48:f7:7a:c8:f5:4d:95:e4:60: b6:28:57:53:b1:f1:7f:11:05:63:2f:3b:3b:a4:a8:6b: 27:e6:3a:bb:28:a4:f7:f1:22:3f:13:27:28:26:c3:38: 0e:2c:57:2f:23:b7:b7:2d:78:11:69:3e:15:f8:ab:b8: 3c:fe:df:8b:93:4b:da:1e:1c:7c:79:49:90:e5:30:8c: f9:1f:6d:b7:d1:09:1a:24:fe:c4:28:6b:3f:e9:2b:27: b2:81:77:4b:ca:8c:ae:87:ce:02:18:99:9b:5e:6a:a6: 9a:5f:7d:39:43:40:8f:ad:9c:22:70:c3:8d:c5:56:61: 92:10:1f:70:4e:ed:59:dc:17:4a:b1:d3:49:46:3f:5b: e4:f3:27:2c:5e:47:14:3d:65:a0:31:01:6a:51:03:c6: b7:3e:f1:69:78:0a:02:68:f0:de:10:cb:9e:63:c4:c7: 3a:f1:ce:09:7e:4e:63:5d:e9:90:db:89:48:e5:7d:5c Fingerprint (SHA-256): 6D:ED:4D:8F:13:B5:13:F2:06:D9:EC:1D:20:17:4F:71:F8:3A:87:7C:0C:52:77:00:FE:B8:98:25:61:75:D1:00 Fingerprint (SHA1): 81:0B:02:CE:2F:01:F0:48:06:B2:83:7C:94:54:12:61:EF:F9:5C:A1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #244: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141434 (0x3caf9afa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:15:00 2023 Not After : Wed Oct 18 14:15:00 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:b8:fd:ba:d7:7e:a3:74:c1:5b:b5:57:5d:39:76:92: 71:97:65:48:27:4e:8c:dd:15:89:ed:0a:38:4f:d3:2a: 33:38:92:c3:dd:89:94:eb:12:51:d7:ba:f5:6b:30:75: 4a:04:9e:38:46:ee:42:5b:1e:bd:1b:a3:0f:97:30:28: ab:43:7f:ba:3e:f8:92:33:a1:d3:e6:d2:59:a3:aa:3d: 1e:66:b1:4e:46:19:14:53:9e:9c:f2:0d:37:76:8e:7e: c1:4b:42:f2:00:9d:8a:f9:64:ac:f4:4d:83:d1:5d:e9: 67:78:7e:5f:2e:87:27:fe:49:ab:87:9f:e1:7f:bd:63: d9:0e:bc:f0:84:1c:e6:bc:ef:49:4d:94:a7:7f:69:8b: b6:b7:fc:73:57:68:3c:cc:5f:52:83:e2:a3:74:87:c2: b9:be:28:60:e2:d7:7b:c8:89:22:b3:63:52:57:cb:bf: f4:d8:ec:a1:6a:8d:e6:31:52:88:0e:da:33:17:08:61: c0:93:fb:7f:44:5c:8c:99:25:59:94:2e:3e:6f:06:7c: 18:57:1d:97:71:89:16:f6:a7:96:b3:ae:35:45:7a:87: 35:37:66:f9:0a:20:17:0d:57:74:cf:36:3d:9d:e1:63: 8b:9d:d0:09:83:87:7d:6f:0d:1c:5b:0a:0b:39:2a:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:39:c1:68:3b:0a:d8:ee:4c:8e:c6:81:9a:fd:ae:77: 44:b0:ac:98:d6:6c:ff:c1:40:00:f0:17:55:80:a3:3c: 86:2b:95:b2:0e:fb:7b:f9:d2:25:2d:c0:3f:ff:4a:2f: c7:5f:39:57:31:da:a5:4a:e0:95:44:28:6b:f0:ca:8e: 2f:ce:0d:10:a9:bb:be:24:9e:21:e9:b6:ed:b7:88:18: 4e:71:78:10:28:ac:98:87:ec:ad:cf:cd:b7:0b:42:1a: 52:b1:7a:00:c5:19:4d:9c:c1:d7:91:62:6b:eb:73:3c: 5a:78:69:ab:36:9c:e2:c1:41:c5:b0:f6:23:0d:87:47: 6c:55:56:8d:a4:6e:d1:b0:a8:79:de:bc:c1:44:72:4e: 67:c3:fd:94:c5:64:78:5a:c2:53:a0:d6:71:80:7c:4c: 3c:f8:9a:36:36:2e:70:5b:dd:3a:5d:29:dc:c0:35:c0: 42:3f:bb:82:0f:24:45:e6:d5:9c:e1:47:11:14:4c:6d: 14:2e:59:60:09:4e:a8:63:57:37:1b:35:2f:eb:7e:c2: 8b:ee:c6:d9:a0:a7:1e:cd:19:c7:2a:ef:22:cd:26:0f: b9:8b:25:11:47:bd:6a:07:cb:02:00:56:fb:c2:c4:04: e5:53:f4:56:83:1b:23:2f:37:7c:be:2c:d5:0c:6e:77 Fingerprint (SHA-256): 7D:40:97:E7:13:F3:67:D3:09:40:BB:47:EF:A9:75:4B:94:D1:E9:3B:D3:C0:16:9C:8B:F7:21:E5:A1:F1:36:88 Fingerprint (SHA1): 45:D8:1C:31:8C:08:3F:33:45:05:A1:AA:50:34:A5:3A:06:8C:D6:F9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #245: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #246: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #247: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #248: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #249: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #250: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141434 (0x3caf9afa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:15:00 2023 Not After : Wed Oct 18 14:15:00 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:b8:fd:ba:d7:7e:a3:74:c1:5b:b5:57:5d:39:76:92: 71:97:65:48:27:4e:8c:dd:15:89:ed:0a:38:4f:d3:2a: 33:38:92:c3:dd:89:94:eb:12:51:d7:ba:f5:6b:30:75: 4a:04:9e:38:46:ee:42:5b:1e:bd:1b:a3:0f:97:30:28: ab:43:7f:ba:3e:f8:92:33:a1:d3:e6:d2:59:a3:aa:3d: 1e:66:b1:4e:46:19:14:53:9e:9c:f2:0d:37:76:8e:7e: c1:4b:42:f2:00:9d:8a:f9:64:ac:f4:4d:83:d1:5d:e9: 67:78:7e:5f:2e:87:27:fe:49:ab:87:9f:e1:7f:bd:63: d9:0e:bc:f0:84:1c:e6:bc:ef:49:4d:94:a7:7f:69:8b: b6:b7:fc:73:57:68:3c:cc:5f:52:83:e2:a3:74:87:c2: b9:be:28:60:e2:d7:7b:c8:89:22:b3:63:52:57:cb:bf: f4:d8:ec:a1:6a:8d:e6:31:52:88:0e:da:33:17:08:61: c0:93:fb:7f:44:5c:8c:99:25:59:94:2e:3e:6f:06:7c: 18:57:1d:97:71:89:16:f6:a7:96:b3:ae:35:45:7a:87: 35:37:66:f9:0a:20:17:0d:57:74:cf:36:3d:9d:e1:63: 8b:9d:d0:09:83:87:7d:6f:0d:1c:5b:0a:0b:39:2a:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:39:c1:68:3b:0a:d8:ee:4c:8e:c6:81:9a:fd:ae:77: 44:b0:ac:98:d6:6c:ff:c1:40:00:f0:17:55:80:a3:3c: 86:2b:95:b2:0e:fb:7b:f9:d2:25:2d:c0:3f:ff:4a:2f: c7:5f:39:57:31:da:a5:4a:e0:95:44:28:6b:f0:ca:8e: 2f:ce:0d:10:a9:bb:be:24:9e:21:e9:b6:ed:b7:88:18: 4e:71:78:10:28:ac:98:87:ec:ad:cf:cd:b7:0b:42:1a: 52:b1:7a:00:c5:19:4d:9c:c1:d7:91:62:6b:eb:73:3c: 5a:78:69:ab:36:9c:e2:c1:41:c5:b0:f6:23:0d:87:47: 6c:55:56:8d:a4:6e:d1:b0:a8:79:de:bc:c1:44:72:4e: 67:c3:fd:94:c5:64:78:5a:c2:53:a0:d6:71:80:7c:4c: 3c:f8:9a:36:36:2e:70:5b:dd:3a:5d:29:dc:c0:35:c0: 42:3f:bb:82:0f:24:45:e6:d5:9c:e1:47:11:14:4c:6d: 14:2e:59:60:09:4e:a8:63:57:37:1b:35:2f:eb:7e:c2: 8b:ee:c6:d9:a0:a7:1e:cd:19:c7:2a:ef:22:cd:26:0f: b9:8b:25:11:47:bd:6a:07:cb:02:00:56:fb:c2:c4:04: e5:53:f4:56:83:1b:23:2f:37:7c:be:2c:d5:0c:6e:77 Fingerprint (SHA-256): 7D:40:97:E7:13:F3:67:D3:09:40:BB:47:EF:A9:75:4B:94:D1:E9:3B:D3:C0:16:9C:8B:F7:21:E5:A1:F1:36:88 Fingerprint (SHA1): 45:D8:1C:31:8C:08:3F:33:45:05:A1:AA:50:34:A5:3A:06:8C:D6:F9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #251: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141434 (0x3caf9afa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:15:00 2023 Not After : Wed Oct 18 14:15:00 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:b8:fd:ba:d7:7e:a3:74:c1:5b:b5:57:5d:39:76:92: 71:97:65:48:27:4e:8c:dd:15:89:ed:0a:38:4f:d3:2a: 33:38:92:c3:dd:89:94:eb:12:51:d7:ba:f5:6b:30:75: 4a:04:9e:38:46:ee:42:5b:1e:bd:1b:a3:0f:97:30:28: ab:43:7f:ba:3e:f8:92:33:a1:d3:e6:d2:59:a3:aa:3d: 1e:66:b1:4e:46:19:14:53:9e:9c:f2:0d:37:76:8e:7e: c1:4b:42:f2:00:9d:8a:f9:64:ac:f4:4d:83:d1:5d:e9: 67:78:7e:5f:2e:87:27:fe:49:ab:87:9f:e1:7f:bd:63: d9:0e:bc:f0:84:1c:e6:bc:ef:49:4d:94:a7:7f:69:8b: b6:b7:fc:73:57:68:3c:cc:5f:52:83:e2:a3:74:87:c2: b9:be:28:60:e2:d7:7b:c8:89:22:b3:63:52:57:cb:bf: f4:d8:ec:a1:6a:8d:e6:31:52:88:0e:da:33:17:08:61: c0:93:fb:7f:44:5c:8c:99:25:59:94:2e:3e:6f:06:7c: 18:57:1d:97:71:89:16:f6:a7:96:b3:ae:35:45:7a:87: 35:37:66:f9:0a:20:17:0d:57:74:cf:36:3d:9d:e1:63: 8b:9d:d0:09:83:87:7d:6f:0d:1c:5b:0a:0b:39:2a:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:39:c1:68:3b:0a:d8:ee:4c:8e:c6:81:9a:fd:ae:77: 44:b0:ac:98:d6:6c:ff:c1:40:00:f0:17:55:80:a3:3c: 86:2b:95:b2:0e:fb:7b:f9:d2:25:2d:c0:3f:ff:4a:2f: c7:5f:39:57:31:da:a5:4a:e0:95:44:28:6b:f0:ca:8e: 2f:ce:0d:10:a9:bb:be:24:9e:21:e9:b6:ed:b7:88:18: 4e:71:78:10:28:ac:98:87:ec:ad:cf:cd:b7:0b:42:1a: 52:b1:7a:00:c5:19:4d:9c:c1:d7:91:62:6b:eb:73:3c: 5a:78:69:ab:36:9c:e2:c1:41:c5:b0:f6:23:0d:87:47: 6c:55:56:8d:a4:6e:d1:b0:a8:79:de:bc:c1:44:72:4e: 67:c3:fd:94:c5:64:78:5a:c2:53:a0:d6:71:80:7c:4c: 3c:f8:9a:36:36:2e:70:5b:dd:3a:5d:29:dc:c0:35:c0: 42:3f:bb:82:0f:24:45:e6:d5:9c:e1:47:11:14:4c:6d: 14:2e:59:60:09:4e:a8:63:57:37:1b:35:2f:eb:7e:c2: 8b:ee:c6:d9:a0:a7:1e:cd:19:c7:2a:ef:22:cd:26:0f: b9:8b:25:11:47:bd:6a:07:cb:02:00:56:fb:c2:c4:04: e5:53:f4:56:83:1b:23:2f:37:7c:be:2c:d5:0c:6e:77 Fingerprint (SHA-256): 7D:40:97:E7:13:F3:67:D3:09:40:BB:47:EF:A9:75:4B:94:D1:E9:3B:D3:C0:16:9C:8B:F7:21:E5:A1:F1:36:88 Fingerprint (SHA1): 45:D8:1C:31:8C:08:3F:33:45:05:A1:AA:50:34:A5:3A:06:8C:D6:F9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #252: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #253: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #254: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #255: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #256: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #257: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141433 (0x3caf9af9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:15:00 2023 Not After : Wed Oct 18 14:15:00 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:97:6b:98:72:3c:59:ed:6f:cc:b3:74:ee:93:60:de: 97:19:10:9b:8b:1b:2f:ce:40:66:ec:fd:ae:71:6e:2f: 30:55:41:aa:da:d7:49:cb:b0:d4:de:9d:c3:16:bf:00: f7:c1:a7:d1:e1:f8:63:b6:ce:cd:97:ef:b9:9c:e5:78: 5f:55:65:99:e1:52:bc:57:8b:5e:89:29:23:7d:f2:2a: a1:4a:42:9e:60:8c:44:84:4f:e3:eb:a0:41:4f:ef:1c: c7:87:de:c5:8b:d1:00:a3:e6:58:ea:dc:ad:9c:15:e3: c3:07:80:77:81:d5:f2:cd:ea:85:ba:bc:8e:3f:bb:4c: 55:37:64:cc:eb:60:ca:17:f6:ce:f8:d7:af:75:b1:11: dc:95:81:b8:76:7d:3d:e5:60:a5:97:28:86:59:36:6b: 61:94:1b:71:de:8e:15:10:dd:c7:72:83:1f:9c:12:19: ec:92:99:77:44:7b:c5:49:d9:60:7c:fc:74:1d:16:d7: d6:f0:42:ed:c4:ba:eb:8f:66:c7:42:a3:38:06:b0:92: 68:16:fa:98:9f:06:46:24:d0:96:50:bf:bd:d7:1e:83: e9:7c:67:fc:6c:6b:13:8d:88:f3:6b:9e:a9:38:57:d2: 98:93:3b:02:f6:1a:e2:d5:cc:90:3e:25:fc:82:4d:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:f8:03:b9:28:d4:b1:9b:cf:d3:8b:ba:cd:0e:d0:02: c8:82:1f:03:4c:d3:f3:b6:5f:a1:b7:b2:8a:02:8f:1e: 0c:bd:de:ab:8e:d5:41:2e:5b:2f:63:69:83:63:7a:48: 25:77:48:d5:9b:2f:b3:14:94:26:0b:e6:9c:a6:84:03: 77:51:87:4e:b6:7f:47:48:f7:7a:c8:f5:4d:95:e4:60: b6:28:57:53:b1:f1:7f:11:05:63:2f:3b:3b:a4:a8:6b: 27:e6:3a:bb:28:a4:f7:f1:22:3f:13:27:28:26:c3:38: 0e:2c:57:2f:23:b7:b7:2d:78:11:69:3e:15:f8:ab:b8: 3c:fe:df:8b:93:4b:da:1e:1c:7c:79:49:90:e5:30:8c: f9:1f:6d:b7:d1:09:1a:24:fe:c4:28:6b:3f:e9:2b:27: b2:81:77:4b:ca:8c:ae:87:ce:02:18:99:9b:5e:6a:a6: 9a:5f:7d:39:43:40:8f:ad:9c:22:70:c3:8d:c5:56:61: 92:10:1f:70:4e:ed:59:dc:17:4a:b1:d3:49:46:3f:5b: e4:f3:27:2c:5e:47:14:3d:65:a0:31:01:6a:51:03:c6: b7:3e:f1:69:78:0a:02:68:f0:de:10:cb:9e:63:c4:c7: 3a:f1:ce:09:7e:4e:63:5d:e9:90:db:89:48:e5:7d:5c Fingerprint (SHA-256): 6D:ED:4D:8F:13:B5:13:F2:06:D9:EC:1D:20:17:4F:71:F8:3A:87:7C:0C:52:77:00:FE:B8:98:25:61:75:D1:00 Fingerprint (SHA1): 81:0B:02:CE:2F:01:F0:48:06:B2:83:7C:94:54:12:61:EF:F9:5C:A1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #258: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141433 (0x3caf9af9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:15:00 2023 Not After : Wed Oct 18 14:15:00 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:97:6b:98:72:3c:59:ed:6f:cc:b3:74:ee:93:60:de: 97:19:10:9b:8b:1b:2f:ce:40:66:ec:fd:ae:71:6e:2f: 30:55:41:aa:da:d7:49:cb:b0:d4:de:9d:c3:16:bf:00: f7:c1:a7:d1:e1:f8:63:b6:ce:cd:97:ef:b9:9c:e5:78: 5f:55:65:99:e1:52:bc:57:8b:5e:89:29:23:7d:f2:2a: a1:4a:42:9e:60:8c:44:84:4f:e3:eb:a0:41:4f:ef:1c: c7:87:de:c5:8b:d1:00:a3:e6:58:ea:dc:ad:9c:15:e3: c3:07:80:77:81:d5:f2:cd:ea:85:ba:bc:8e:3f:bb:4c: 55:37:64:cc:eb:60:ca:17:f6:ce:f8:d7:af:75:b1:11: dc:95:81:b8:76:7d:3d:e5:60:a5:97:28:86:59:36:6b: 61:94:1b:71:de:8e:15:10:dd:c7:72:83:1f:9c:12:19: ec:92:99:77:44:7b:c5:49:d9:60:7c:fc:74:1d:16:d7: d6:f0:42:ed:c4:ba:eb:8f:66:c7:42:a3:38:06:b0:92: 68:16:fa:98:9f:06:46:24:d0:96:50:bf:bd:d7:1e:83: e9:7c:67:fc:6c:6b:13:8d:88:f3:6b:9e:a9:38:57:d2: 98:93:3b:02:f6:1a:e2:d5:cc:90:3e:25:fc:82:4d:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:f8:03:b9:28:d4:b1:9b:cf:d3:8b:ba:cd:0e:d0:02: c8:82:1f:03:4c:d3:f3:b6:5f:a1:b7:b2:8a:02:8f:1e: 0c:bd:de:ab:8e:d5:41:2e:5b:2f:63:69:83:63:7a:48: 25:77:48:d5:9b:2f:b3:14:94:26:0b:e6:9c:a6:84:03: 77:51:87:4e:b6:7f:47:48:f7:7a:c8:f5:4d:95:e4:60: b6:28:57:53:b1:f1:7f:11:05:63:2f:3b:3b:a4:a8:6b: 27:e6:3a:bb:28:a4:f7:f1:22:3f:13:27:28:26:c3:38: 0e:2c:57:2f:23:b7:b7:2d:78:11:69:3e:15:f8:ab:b8: 3c:fe:df:8b:93:4b:da:1e:1c:7c:79:49:90:e5:30:8c: f9:1f:6d:b7:d1:09:1a:24:fe:c4:28:6b:3f:e9:2b:27: b2:81:77:4b:ca:8c:ae:87:ce:02:18:99:9b:5e:6a:a6: 9a:5f:7d:39:43:40:8f:ad:9c:22:70:c3:8d:c5:56:61: 92:10:1f:70:4e:ed:59:dc:17:4a:b1:d3:49:46:3f:5b: e4:f3:27:2c:5e:47:14:3d:65:a0:31:01:6a:51:03:c6: b7:3e:f1:69:78:0a:02:68:f0:de:10:cb:9e:63:c4:c7: 3a:f1:ce:09:7e:4e:63:5d:e9:90:db:89:48:e5:7d:5c Fingerprint (SHA-256): 6D:ED:4D:8F:13:B5:13:F2:06:D9:EC:1D:20:17:4F:71:F8:3A:87:7C:0C:52:77:00:FE:B8:98:25:61:75:D1:00 Fingerprint (SHA1): 81:0B:02:CE:2F:01:F0:48:06:B2:83:7C:94:54:12:61:EF:F9:5C:A1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #259: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #260: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141438 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #261: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #262: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #263: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141439 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #264: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #265: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #266: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141440 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #267: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #268: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #269: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141441 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #270: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #271: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #272: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141442 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #273: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #274: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #275: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141443 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #276: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #277: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #278: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141444 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #279: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #280: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #281: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141445 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #282: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #283: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #284: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141446 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #285: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #286: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #287: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #288: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1018141447 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #289: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #290: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1018141448 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #291: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #292: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1018141449 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #293: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #294: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #295: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #296: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #297: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1018141450 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #298: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #299: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1018141451 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #300: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #301: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1018141452 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #302: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #303: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #304: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #305: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #306: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1018141453 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #307: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #308: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1018141454 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #309: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #310: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1018141455 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #311: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #312: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #313: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #314: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #315: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1018141456 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #316: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #317: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1018141457 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #318: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #319: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1018141458 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #320: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #321: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #322: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #323: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #324: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1018141459 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #325: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #326: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #327: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #328: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018141460 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #329: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #330: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141438 (0x3caf9afe) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Wed Oct 18 14:15:02 2023 Not After : Wed Oct 18 14:15:02 2073 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:34:1d:f2:41:b2:7b:eb:06:94:6c:ba:c1:d2:41:da: 2a:8c:68:4f:d1:2f:0c:34:2b:ed:b3:70:96:89:46:45: 78:ac:bc:c8:d4:50:7c:3f:14:6d:1c:7d:43:ab:50:48: a5:89:a6:fc:20:f4:18:a0:d4:95:5a:c2:df:a5:2f:86: d0:cc:ae:f7:63:f4:83:b5:ba:d0:1a:22:1a:61:f2:f3: a1:3c:77:f8:ff:e9:0b:bc:92:0e:f8:de:af:c2:92:a8: 53:c7:d6:b3:2d:5e:84:cd:19:07:64:7a:49:aa:2e:1a: 0d:b6:9d:2b:45:98:87:47:cb:d9:d7:6b:4b:76:07:4a: 81:13:c4:e2:48:1d:2e:ab:10:cf:82:fe:3a:f6:ce:ed: 95:b8:3b:da:a3:8a:53:7f:14:ab:fd:67:b6:1f:3f:07: 99:ed:6b:fb:3c:0b:6f:17:95:15:1f:03:f3:9b:c2:0f: 7e:a8:31:fe:9a:03:49:6a:b8:f4:68:ae:3b:5f:db:69: 13:7a:1f:96:72:9e:50:ae:a2:27:5f:8f:cb:1b:b5:91: fe:a9:53:97:5a:c5:04:5d:b3:e2:8e:4e:9c:f1:6c:3b: 56:55:94:6a:14:58:18:2f:b5:d9:13:e5:52:e1:70:a4: c6:72:e5:71:09:3d:f0:a7:95:65:6a:2f:4b:2c:24:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:22:ce:59:8f:34:72:ba:35:b0:01:28:0a:1d:57:f0: e1:c0:ee:92:7d:6f:9c:06:53:c1:b7:8f:d4:fe:bb:0f: 01:ef:96:60:03:22:f4:f7:da:56:9f:3c:39:ec:d6:9a: 2b:f4:10:34:87:7b:bd:c2:dc:c1:de:7a:2b:a9:c9:79: d0:91:77:00:ae:d7:72:40:85:22:66:2a:94:bc:4f:df: 2c:95:52:96:b5:a2:2c:d0:2c:80:04:1f:62:58:16:70: 85:ed:a1:86:0f:e8:9b:64:46:a3:69:69:4a:76:9c:73: f7:11:54:cd:9a:72:bf:d9:43:60:64:06:cc:c7:b9:da: 94:f0:94:96:2b:8b:31:22:c6:6a:81:65:29:b1:83:7d: f3:7e:60:0a:2e:c7:92:ef:e6:38:f7:ec:c8:f7:f4:39: de:66:5d:f9:0a:ce:47:ac:58:97:8c:54:db:e7:be:c4: aa:a1:29:01:59:04:d3:50:50:f1:fe:8c:2c:db:0d:b7: 67:1e:91:a2:77:88:8a:0e:38:6f:bf:6f:84:0c:fd:4d: 7c:5e:4f:7d:68:4b:e9:02:ca:da:d6:c9:10:26:6a:7a: 5a:1d:d1:f7:a4:b7:09:33:8e:0c:14:dd:cd:be:72:4b: 08:a2:3d:b9:7b:bf:74:70:53:73:d9:bc:0f:5c:4b:07 Fingerprint (SHA-256): D6:E2:82:1A:7A:F9:D8:A8:F6:7C:4D:A7:EC:28:08:9A:F7:E4:BC:6F:CA:09:AC:F9:25:E5:ED:1D:EB:96:2B:4A Fingerprint (SHA1): 98:FC:D7:CD:6F:7F:1A:11:99:EF:8C:F3:A9:A3:FC:76:B6:9A:7E:01 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #331: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141439 (0x3caf9aff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Wed Oct 18 14:15:02 2023 Not After : Wed Oct 18 14:15:02 2073 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:55:15:e7:f4:f5:9c:37:96:86:4e:dd:e6:da:d5:09: 42:dd:67:03:54:19:5f:d3:e8:77:39:c8:92:04:64:d6: 6b:6e:5c:18:c6:bc:0c:b1:b6:c3:fe:45:64:60:aa:c6: b8:bd:85:f3:19:76:e3:f7:67:4b:06:26:31:94:9f:aa: ee:1b:38:52:f7:10:2c:09:e1:52:4d:f9:ad:ef:bd:c3: ac:a6:f5:c9:70:02:03:58:c0:66:85:b0:14:14:0b:3e: 6c:cd:0b:a2:2f:b6:3e:ba:cf:60:f8:25:2a:5c:16:dd: d0:25:16:7c:4e:d6:d4:a3:e7:7e:63:18:bd:cb:ab:5a: 6a:bb:b9:ef:a2:bb:d3:9d:85:0d:cf:81:e5:18:a5:2f: 36:73:a8:cb:68:f3:43:f6:7d:3f:dc:6e:bc:40:65:92: 97:f6:6c:f1:9c:7f:ce:9c:99:85:fc:2f:29:22:38:7b: 4a:79:3e:81:69:7e:19:35:6d:dc:0d:4a:91:a2:12:07: b5:8a:8b:ba:b0:50:61:88:08:8b:0c:46:b8:7a:66:cf: a3:f9:d3:5c:e9:7b:e7:f4:92:de:2d:c8:6c:bc:4c:e3: c2:73:43:38:f9:76:12:5a:be:1c:db:c2:e5:87:14:ec: f7:f6:31:b8:b9:29:27:ca:75:42:81:e6:1b:f0:d1:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:6f:36:a9:3d:1a:3c:c8:fa:78:e2:17:3e:8e:83:d3: af:89:35:68:75:89:a5:77:49:0b:09:7c:fa:aa:9f:ab: 81:14:23:93:8b:f2:e2:4a:ed:e7:cd:1b:b8:b9:66:79: cf:ee:0a:03:2e:60:59:11:f3:e3:e3:8f:da:be:ef:8b: f6:f7:11:28:91:bc:91:76:8e:91:cf:de:a6:29:44:38: 35:58:5b:58:f6:67:18:c9:36:ed:36:0d:4a:dd:2d:62: 0f:69:34:5f:74:e5:8a:41:ab:f2:3e:12:97:20:3f:26: e8:1e:59:90:59:16:28:70:62:b0:a1:bd:cf:82:df:c0: b3:9a:09:44:fc:ff:1f:e2:87:d8:4f:88:8d:03:4e:9e: c3:89:73:e8:1d:cd:eb:06:ff:8b:fb:fd:02:38:f1:d4: e6:fd:61:e6:2d:44:82:06:b5:08:7d:99:12:30:59:36: 59:ac:ce:91:2b:aa:e9:84:4d:9f:e6:3a:e2:d6:21:48: 35:8e:f4:65:71:28:ca:43:98:3f:54:69:8b:e4:18:1d: 38:d0:0a:4a:ae:a7:2c:94:75:ba:4a:ee:4c:93:37:a5: 57:1f:7e:18:54:63:61:64:b9:b7:27:07:0d:4c:94:46: cf:3a:b5:1d:31:34:b1:74:66:de:57:b2:6f:48:a1:51 Fingerprint (SHA-256): EB:19:49:BC:5B:14:1D:82:EA:DE:0F:A0:86:7B:1D:E5:C2:98:5A:BA:B9:19:A4:4C:AE:8B:EC:DE:2C:05:19:25 Fingerprint (SHA1): 45:B5:3E:B9:5E:1D:6F:D7:57:8E:6D:E0:03:99:2E:62:58:7B:93:00 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #332: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141440 (0x3caf9b00) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Wed Oct 18 14:15:02 2023 Not After : Wed Oct 18 14:15:02 2073 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:32:9b:60:ff:ec:57:4d:e9:a7:f1:69:ad:d3:21:af: cc:69:08:64:75:b1:3d:99:ef:46:0e:5a:17:f0:a5:25: 42:d3:e3:9b:52:aa:6c:55:d1:4c:99:a9:9a:ee:3e:37: 78:0d:e0:5d:4d:e2:c7:2c:59:ac:50:8d:d6:44:db:28: 82:cc:f5:df:49:8e:2c:fb:b9:c3:89:f3:7d:46:c5:df: 94:50:fb:fb:71:2e:5a:dd:62:6c:ed:07:f1:c9:1c:de: ba:32:ce:9a:4f:33:0b:c8:14:76:72:41:50:2f:7d:0d: b7:bb:9e:bb:d8:04:9a:69:4d:05:86:ad:92:fa:1e:d3: 4a:40:56:e0:f7:67:86:81:82:b8:16:9a:fb:a3:50:b3: 62:9f:4d:07:83:ec:e0:08:ef:d3:34:f1:16:2e:5f:ec: e5:44:55:ac:ee:6e:f5:6f:06:1a:0a:85:0e:ee:7b:93: 4c:42:b4:ba:c4:94:5b:66:19:68:2e:d9:5a:81:83:97: 48:1d:95:f3:13:b4:1c:25:5a:87:4d:ba:ae:c0:4d:f6: b1:00:cc:5f:04:b1:8b:15:ed:7a:98:b1:42:5f:cf:ba: 13:58:a6:84:6e:54:77:62:2f:19:86:b1:40:56:9a:b9: 31:06:f6:0b:d3:b5:82:bc:97:04:2b:88:0a:47:8d:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:b0:e9:3e:fa:87:4a:85:e2:4b:59:d5:8c:65:f4:b0: e5:69:0e:78:65:ac:36:5d:71:aa:b0:36:f5:a6:48:0e: 59:d3:5c:14:95:40:9a:c4:cb:b6:04:f6:52:75:4e:83: 9b:be:61:f1:d6:54:91:69:50:24:7a:38:76:32:86:e4: ff:28:0c:6b:56:dc:b3:79:82:73:f9:5a:3c:d4:68:b1: 86:ad:1b:f5:22:24:24:e8:09:38:48:58:14:86:7b:ab: 63:87:15:89:1d:19:9d:9c:e5:4a:c9:b8:d6:5b:ac:55: bb:ec:ec:d7:a1:db:13:30:f1:05:84:47:e9:c0:77:ad: a4:b2:5c:1f:22:b7:95:ff:a0:2c:65:c2:5c:b4:76:b9: 2b:d1:97:64:09:a9:0e:33:d5:9e:75:31:a5:d5:f9:e9: b5:70:b4:1b:9f:1b:8f:fc:de:de:00:5e:61:31:09:17: 49:2a:18:60:95:42:f5:56:e2:32:3a:f6:25:29:1c:44: 59:7b:e2:79:91:4c:2e:5f:46:06:d3:e8:a8:4e:c9:16: df:db:65:ba:49:95:84:46:a5:8e:26:31:c0:f8:1a:67: d1:fb:5f:85:52:c8:ff:0c:7e:ca:96:c8:81:57:f7:31: d4:62:26:c4:7a:96:5b:e1:b7:76:99:5f:d3:d5:e1:d5 Fingerprint (SHA-256): 80:24:43:66:40:29:24:66:F5:60:08:CD:E1:52:8E:B6:88:08:24:79:A5:55:C6:8F:C6:CC:0B:83:EA:31:F9:86 Fingerprint (SHA1): 15:B5:79:15:C2:BB:9F:A5:62:40:3F:7F:57:69:9B:9A:A9:6E:CA:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #333: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141441 (0x3caf9b01) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Wed Oct 18 14:15:03 2023 Not After : Wed Oct 18 14:15:03 2073 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:62:92:af:91:cf:24:a5:31:fa:47:1d:46:16:92:33: 40:8f:45:0e:d6:dc:fa:e8:cf:99:f9:6c:85:85:3e:c4: 6c:f0:16:af:fa:a0:0a:9d:2e:0a:93:a6:f9:0a:e5:1e: 24:65:3b:36:5c:57:d8:e9:7f:7b:44:8a:90:1e:ba:dc: d9:26:3c:b3:58:eb:6e:94:46:c9:fb:5a:73:e3:33:46: 9b:f9:45:74:30:27:f9:c5:25:52:dd:eb:aa:ac:00:08: ef:75:4f:aa:d4:61:4e:08:62:5d:56:2a:1c:bd:d3:2e: 9a:9c:ad:24:d3:49:57:17:c9:9c:88:bd:9c:0a:80:9d: 84:87:e6:f1:54:bc:9f:b0:f3:26:30:90:a7:16:6d:a1: c6:34:67:27:a3:b8:ee:b5:84:e8:f6:8b:c8:24:03:64: 26:b0:a5:f0:43:78:c7:35:2a:ee:e4:3b:78:ce:e5:d5: 43:40:b0:73:4b:74:9f:13:65:19:4a:cb:57:19:4c:77: ac:b8:3f:26:02:00:f0:a1:fa:7f:88:8c:4b:b8:d8:b1: db:f1:3d:52:15:af:3e:30:6e:f0:a1:a2:16:5d:aa:dd: d2:06:17:b5:b7:45:ae:57:55:c3:93:9e:6f:eb:6e:20: 63:71:7c:85:bd:b4:2c:55:8d:c3:09:af:5b:3a:ba:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:49:2c:27:75:14:8c:af:95:4d:fd:1a:a4:14:8d:f9: eb:ed:a9:49:e1:0b:e0:47:be:64:eb:5f:49:3a:2c:de: 92:f4:99:d6:3c:78:79:73:54:c1:c0:8a:9d:91:18:f9: 47:8d:7d:c4:a4:df:fe:0f:d5:f1:dd:b4:61:fa:96:9d: 60:3e:8d:99:09:60:28:87:d6:82:fd:d7:43:0d:d7:05: f8:a3:3e:50:26:43:bf:4d:d3:9b:a9:a5:b2:9e:0b:cd: 3b:15:14:30:ce:d5:33:8e:7a:d4:48:b5:2e:ef:12:23: 7f:32:35:ea:b6:50:f8:68:e3:f7:0a:7a:7e:13:f8:5d: 90:2b:68:a9:f2:90:3e:a5:31:f9:ed:db:f9:be:19:c7: 51:33:4c:6f:0b:8a:41:cc:95:f2:57:80:22:9f:f0:4e: 9f:15:5a:ac:18:18:e5:90:ae:85:fe:ce:b3:d8:ce:69: 6f:df:fc:f0:c9:5d:68:f1:84:ea:92:d5:17:f1:ec:11: 1f:3f:54:ed:ac:59:02:fc:ca:4b:82:d9:82:bc:10:c5: 58:28:cd:80:11:b6:31:92:7f:5b:7e:39:06:31:e2:2d: 4b:dd:c2:53:c3:c8:2e:74:70:35:ac:cb:c6:a3:5a:67: 03:dd:4d:5d:82:01:84:fa:5a:6a:0d:90:73:85:8a:0a Fingerprint (SHA-256): C8:3D:5F:F8:AB:AA:67:89:CF:27:BF:7D:42:EE:95:43:B6:CB:83:67:6B:F9:0B:32:68:44:35:93:90:5A:BD:74 Fingerprint (SHA1): 6D:BC:A2:D7:E5:26:DB:6D:A6:19:A8:37:B1:46:A6:00:1C:C0:54:B8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #334: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141442 (0x3caf9b02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Wed Oct 18 14:15:03 2023 Not After : Wed Oct 18 14:15:03 2073 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:76:88:51:f5:98:77:d4:7d:d3:b1:90:4d:80:e6:8e: 9d:3d:73:7d:75:18:e9:f5:1d:f3:bf:44:ca:31:15:da: 35:3c:8e:21:60:33:a4:77:bf:88:8f:e2:27:5a:da:33: 27:21:ef:64:e6:aa:82:f9:e2:8d:df:c6:47:ed:69:7d: b8:94:ea:ef:8b:86:19:82:fb:eb:d2:09:60:a5:1a:7f: 58:d4:3b:71:dd:b3:8c:68:85:cc:f5:32:bc:98:f8:7b: b5:97:b0:4b:c2:1e:08:61:4a:8c:7e:da:71:b4:52:e5: d8:41:f2:32:ee:81:9a:6b:7e:05:4e:57:59:9c:df:ac: a8:df:95:d2:af:3f:fe:d2:ec:7a:d5:a1:23:38:87:75: fc:88:b3:97:ef:84:87:a4:ea:b1:55:50:75:50:2d:0d: 9d:48:a7:46:02:95:ea:ab:20:95:93:d7:83:35:c5:35: 57:35:36:a8:43:1a:6e:e3:71:d7:3b:17:4b:b0:71:7d: dd:21:54:e4:c7:a7:e7:02:bc:3c:c2:f3:ae:29:10:63: 19:6d:cc:c8:7d:77:10:26:55:d2:3a:07:0a:85:bf:66: d5:87:3a:e5:e2:78:01:c4:61:68:f8:7a:eb:ed:95:f9: 43:c4:82:eb:01:46:44:d0:2a:1c:ac:77:c1:b1:ad:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:88:70:1e:50:58:07:b0:4c:47:e7:01:45:27:fb:08: 7d:dd:22:ed:eb:0f:cb:72:ec:fc:cf:6d:92:0e:0d:b2: 2a:6d:37:e6:63:d5:db:f5:f1:39:be:98:88:31:ba:5b: 8d:0a:d3:43:cd:fc:d0:81:78:d9:3b:e2:a7:8c:cc:07: 63:9e:30:02:67:ab:50:4f:1d:bc:6b:a8:d9:e8:d2:5b: f8:f5:43:18:62:16:19:7c:51:12:2b:1b:5a:ef:c8:de: 63:03:3e:c9:08:b3:91:8c:f0:6c:01:06:b2:55:44:66: c8:c4:1f:30:b2:79:fb:38:43:b6:3b:8c:03:d4:a8:4b: de:88:35:34:8f:95:6a:d1:af:38:3c:6a:d3:5d:62:be: 45:49:8b:1a:f1:ae:ba:a1:8b:08:ec:0c:f4:fe:97:23: 8a:6e:73:15:6a:e3:eb:c6:f0:d9:62:85:94:c2:2b:fc: 41:95:2d:65:fe:31:a9:84:33:80:d0:ce:8a:2e:41:19: ce:cd:1b:25:54:46:94:fa:8d:61:3c:f5:3e:c6:ed:74: 48:42:90:09:01:87:b3:4f:3d:af:16:c5:94:4e:ba:ae: ac:5e:01:bb:36:26:05:46:33:6f:f3:db:d2:62:ae:2d: 22:df:a3:b3:6b:3d:0f:68:50:07:b0:43:56:95:23:2f Fingerprint (SHA-256): 41:77:44:88:9E:75:F6:7E:47:F4:3E:FC:B0:6F:AC:A2:91:BC:FF:B4:33:F4:41:13:FA:94:A5:70:49:14:30:24 Fingerprint (SHA1): 6D:F1:EC:96:26:3C:59:36:77:03:58:AE:82:FB:D5:73:B8:91:11:6B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #335: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141443 (0x3caf9b03) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Wed Oct 18 14:15:04 2023 Not After : Wed Oct 18 14:15:04 2073 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:88:60:d7:25:c9:98:b3:d5:28:c3:e2:cf:4e:8c:c2: aa:42:af:a9:0f:d6:02:df:53:56:2b:f6:36:47:c4:fd: 21:fb:37:5e:e4:02:d1:be:02:0b:91:ef:ea:54:11:42: 29:76:04:1f:e5:ea:d6:b4:bb:56:d2:ec:64:db:9a:2d: bd:0c:ca:e0:61:23:3d:1f:6e:8c:a3:bd:f8:78:45:85: c0:8c:c3:ba:8e:82:5c:9c:76:3e:74:1a:8d:cf:f5:ae: 0a:f8:50:0b:18:cc:14:58:35:f4:55:ad:16:12:2f:41: c7:a5:a2:87:66:a9:a3:1b:80:0e:90:ff:5d:54:01:8e: 2f:e4:25:e3:02:7b:e1:13:3d:28:7b:72:fa:1b:55:00: a9:f8:03:0e:fa:f2:a4:f5:c7:00:22:43:1d:1f:35:f7: ae:6a:da:2a:8f:b3:54:ff:94:ce:89:f3:09:20:be:6e: 8d:27:7e:c1:f0:59:5e:89:6d:f5:e7:81:ef:1f:8c:e0: b0:8e:5b:b1:cf:70:d1:7b:42:15:1f:78:79:03:2f:21: ea:88:5f:f3:45:3d:e6:c5:71:50:e7:59:28:f1:7f:a3: c8:e2:60:8b:a0:6e:f4:59:5a:4a:c6:62:a0:d8:c4:6b: cd:c8:0f:0a:ef:19:4c:16:fa:eb:67:b4:4e:f7:ed:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:48:6a:fb:11:60:a9:9b:de:e8:a2:05:8a:4d:32:63: 1d:11:6b:0e:a1:20:1a:54:b9:7e:9a:3e:37:80:41:da: e2:94:e2:28:44:18:83:83:21:93:87:73:eb:6e:37:a8: a9:32:1b:02:a0:60:cd:5a:da:d6:f6:22:7e:b6:dd:2f: 62:23:b1:07:54:d9:9c:9e:3f:41:4c:0b:d7:c1:16:45: a5:19:9c:4d:a3:4a:67:64:54:4f:fe:0c:d7:85:22:67: fa:a2:9f:80:00:81:6a:a5:15:27:83:c6:34:bd:a1:8c: 42:43:5e:43:e0:53:f6:f1:84:1f:7b:46:26:c8:82:36: 52:f4:db:a9:0c:c1:a0:e1:62:28:db:b2:fe:6e:29:e1: a6:4f:88:c0:23:3c:f0:f0:4b:40:bd:2e:1f:e9:a9:67: e3:54:7e:b0:3c:07:55:41:fd:78:ff:af:02:62:03:52: 0e:49:dd:88:2d:22:99:bf:09:ea:a5:99:e0:d2:0f:de: aa:23:c6:39:c7:3f:f2:17:a6:61:d3:0a:ac:3c:ac:71: 83:85:48:62:97:2b:c4:34:a5:aa:f3:b2:f3:ab:53:5c: c7:f4:5e:6e:f1:b6:64:99:dc:a5:94:d8:e3:a9:6a:fc: 53:c9:a7:32:cf:5a:39:d2:60:b4:f6:c9:32:d3:48:ee Fingerprint (SHA-256): 6C:FB:97:BB:E0:2E:9A:36:94:35:9B:6C:98:6F:02:F0:79:4D:4E:E9:68:9B:BD:86:65:86:06:67:6C:8C:24:02 Fingerprint (SHA1): 77:2D:7D:12:AA:8F:E4:FD:0B:F5:10:37:00:29:D6:A2:41:DF:28:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #336: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141444 (0x3caf9b04) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Wed Oct 18 14:15:04 2023 Not After : Wed Oct 18 14:15:04 2073 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b3:0b:e9:28:20:3e:ac:56:12:65:fb:ea:02:71:2c:89: e8:26:8b:37:67:77:6c:2b:6e:7d:87:57:34:37:f3:c0: d6:d0:a7:36:69:b8:09:7e:80:76:58:d5:89:af:a4:74: a6:8f:d4:3f:40:29:39:aa:d3:5e:c3:2a:40:67:3e:1c: e4:26:75:a3:23:e2:78:e3:98:c6:f7:d4:b0:66:29:3e: 3b:9e:62:14:5f:2b:c6:3f:b3:c8:c8:ba:33:e9:64:74: 49:19:95:c3:d3:08:af:88:2c:59:4f:27:df:03:2a:45: 6b:2f:0d:5f:8a:b8:8d:f9:36:f9:e1:de:83:56:1b:72: 89:89:12:ea:cb:4c:d7:33:50:e9:a6:1f:e2:8a:49:04: e8:e6:b1:0b:75:16:f1:95:5f:9e:1b:a6:41:2b:66:f9: 9c:09:46:94:5b:af:27:f7:1a:99:33:52:2c:8d:32:7c: 66:a0:77:54:48:89:41:99:cc:4e:89:e3:d6:8a:3b:1f: d2:00:7f:0b:bb:1e:03:ed:2e:61:8c:c4:38:37:99:09: af:e0:05:6e:ed:b6:6c:83:89:7a:85:0c:9d:b9:25:df: fd:58:ac:55:59:8a:43:dd:60:fe:e8:3a:b2:94:0c:54: 8a:bf:ee:f2:bc:0b:06:59:c6:d0:61:75:8a:6f:28:7d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:84:90:c3:dd:58:d1:bb:79:30:52:4b:be:2e:a4:c0: 5b:3b:4a:26:3a:a1:0e:16:cc:e4:4e:35:05:4f:c4:d2: 80:ce:c2:bb:c3:ea:52:53:15:5d:49:16:61:d6:f9:bb: c7:7f:b5:40:6f:f7:f9:d0:8a:7d:95:85:1a:df:e6:87: c5:54:bf:b8:2e:29:a9:1f:49:ea:25:04:71:6b:8b:e2: cd:22:1f:3f:84:fd:82:16:a6:ea:e9:1a:d7:94:8c:24: 1d:40:f0:a7:38:cf:f1:bb:00:77:0b:d8:73:e0:0c:79: 67:a6:c3:4e:f3:43:35:f5:8c:2c:0f:0a:ae:18:71:fc: 52:8a:73:42:18:04:82:0e:71:c9:a0:01:87:6f:ba:d0: 27:76:05:64:06:12:58:7d:f2:c7:bc:cf:a5:b2:3b:c6: d1:85:20:de:4a:3f:89:09:2b:fa:eb:93:16:4d:8b:45: e5:bb:3c:62:4f:11:f3:54:e2:9f:cf:29:d4:9d:9b:3d: a4:af:f3:81:f5:ed:97:69:19:07:75:d8:42:23:36:5d: 14:ad:26:5f:ff:12:5c:7f:ec:e0:73:90:9f:29:de:42: 2d:42:da:a6:bd:31:81:66:cd:f6:75:0e:79:29:23:7a: d6:89:b8:90:13:2e:66:24:9e:1d:b6:d5:12:27:4c:c2 Fingerprint (SHA-256): 41:40:14:12:D9:CA:3D:83:FF:1F:FE:71:CF:62:AF:27:39:DD:8A:77:95:14:82:0A:C7:A0:B9:23:D5:BB:3B:CE Fingerprint (SHA1): 51:EE:3A:AD:63:C0:2A:6D:F5:84:E9:2A:1C:82:E7:72:2C:9B:39:23 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #337: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141445 (0x3caf9b05) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Wed Oct 18 14:15:05 2023 Not After : Wed Oct 18 14:15:05 2073 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:e5:f9:27:a1:d1:dd:6b:3c:78:5b:0b:a5:47:41:ca: 44:ca:0a:90:06:b4:dc:ec:72:2a:29:3e:92:e7:fe:ee: 75:99:bd:17:c3:68:cb:97:ff:3f:1a:f4:87:78:40:4a: 05:98:25:da:1b:d9:b8:26:65:8d:21:31:64:8b:c4:31: 57:c6:69:3b:1a:a9:ca:d4:d7:97:99:e5:5e:d4:fd:05: 47:74:60:fa:f3:5c:92:e6:02:c5:03:8d:f1:c1:be:bc: 2c:b5:e1:b4:0b:80:0f:49:51:c0:a9:25:fc:8b:7c:58: 52:e5:81:79:1c:23:d1:36:5f:04:28:50:94:43:3e:9e: 4b:fe:f2:71:b6:2b:0d:41:29:8a:95:29:92:2d:f7:9e: 21:0f:67:73:62:4b:1e:a5:49:d1:af:1d:a3:5a:73:f8: f0:b3:1b:a9:85:60:ee:a9:c5:f1:e1:57:3e:c0:d6:9b: ff:f3:9a:33:23:a3:4a:41:03:f4:9f:b5:e7:99:e5:10: 3a:68:d8:22:28:6f:89:ad:eb:19:3f:a2:75:2c:cc:42: 9a:c8:87:3b:cf:b0:7e:29:81:8d:13:6e:13:8e:4d:16: 59:e9:ba:86:ac:31:bf:1b:cc:c0:b1:ff:54:8c:8e:6a: 1b:09:f5:94:f0:3a:fe:2f:a4:75:9c:66:7f:af:f9:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:3c:b3:8b:a0:46:0e:6e:29:37:ef:c6:67:7d:8a:e3: 4d:19:22:4d:d1:78:01:45:7e:91:05:2c:cd:e0:47:ed: 36:05:ac:0e:46:bc:41:44:1d:64:9b:43:00:55:f6:e1: b1:e2:4f:91:f6:a7:b9:66:4e:26:33:3e:4f:34:16:a7: 5f:e4:d6:ff:b1:17:4d:20:c8:f4:b6:7f:39:f3:b4:b7: 23:c7:8c:64:dc:a2:07:0c:b4:ba:ec:74:d6:7f:52:92: 4d:33:23:af:06:37:97:8d:52:38:de:27:99:bc:45:ca: d5:6a:7a:eb:22:3c:e8:4f:33:57:8c:a9:84:79:a1:02: dc:cf:18:e3:b9:29:be:c9:5d:a1:e8:83:01:53:26:70: 54:7e:e5:95:00:f9:ca:c6:f7:45:fc:cd:dc:41:5d:1f: ef:7c:1f:c2:59:f0:48:66:8e:79:ba:8e:58:4f:b0:50: 3d:c5:8b:cf:0e:84:31:f1:89:46:9a:2c:0e:2c:30:69: b0:45:4a:5a:1b:c6:ea:eb:fe:75:e2:08:c9:aa:41:f3: 64:10:e1:e1:b8:76:78:14:e4:c4:31:18:47:9b:cb:db: a3:04:f4:9c:73:5b:1e:ad:fa:93:16:b7:90:55:29:82: e6:ec:ac:29:aa:db:2a:e3:1e:d1:b3:94:be:45:47:e1 Fingerprint (SHA-256): 82:DA:08:8E:71:48:45:14:9A:AF:A5:DC:CC:55:81:A1:10:F0:40:C6:4B:42:37:D9:B2:09:23:A9:91:A8:AA:61 Fingerprint (SHA1): 45:23:03:AC:5C:4E:8E:78:9B:4B:88:1E:44:7D:DB:64:28:0B:B4:F0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #338: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141446 (0x3caf9b06) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Wed Oct 18 14:15:05 2023 Not After : Wed Oct 18 14:15:05 2073 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f6:bc:72:83:6d:92:a0:dd:44:a1:a9:9c:80:8d:22:9c: ba:50:64:ea:b7:4e:8d:66:85:31:81:77:62:0f:ef:99: 99:6c:67:f7:be:47:19:8d:a2:56:d2:80:32:a3:22:7c: 0a:2f:b7:6c:bc:af:3d:41:54:bb:b1:3c:f8:8d:d4:f2: aa:4a:9e:b9:74:7c:51:1e:eb:18:cf:8d:87:35:f9:fb: d8:93:94:65:de:95:a1:a6:b3:d7:d7:60:cb:60:6b:33: c4:ea:98:a5:55:0c:26:9a:9d:33:d3:be:0c:b8:0b:d9: 10:ab:c0:c1:fa:fc:1c:59:bb:11:62:ff:ad:c5:de:85: 65:47:2c:63:00:ec:bf:68:18:25:65:f5:88:48:da:e4: be:04:37:24:a9:85:c7:ef:5e:8f:65:a4:fc:27:45:55: 8d:6f:92:f1:20:50:b7:a9:c8:fe:6b:32:da:8a:f4:dd: b8:f5:31:7b:3f:33:3b:43:af:43:11:96:1e:1d:9d:5c: 34:0d:4c:a8:9d:46:a4:b0:49:0e:c8:a1:7f:8c:98:e3: 9f:01:57:a8:33:6e:ee:e5:d1:62:de:7e:5b:60:73:f9: 93:b8:4a:8f:d4:be:07:a6:12:02:0e:b6:21:86:fa:1e: 0c:9e:e5:8c:ed:df:e1:60:ed:32:12:79:6e:5d:b2:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: aa:4f:d9:7d:ed:4a:f6:fe:36:f6:d1:ed:7f:a8:6c:10: 73:6a:f1:44:68:e8:66:60:7c:07:76:51:f6:69:05:16: 49:72:83:59:6b:fe:f1:1c:b1:95:19:da:18:72:79:90: 79:11:d4:e6:d4:48:19:da:54:71:e5:0a:96:57:e2:3a: ba:e7:8a:b1:fa:2f:bb:f1:89:ec:83:d0:c0:9a:13:fc: 40:9e:54:67:4f:05:57:51:12:af:b0:38:06:32:d4:7f: 81:1c:45:87:a3:46:2a:0c:9b:41:54:cd:6e:21:e3:18: 78:7d:6d:c8:6b:75:30:ea:85:75:0d:fb:95:5e:27:3b: 4b:33:03:09:fc:1f:21:14:3b:59:59:c5:3f:15:eb:8b: ea:a8:10:b5:cc:d2:81:ed:2e:af:c8:37:05:b5:8a:dc: e1:e3:d2:5d:bb:f1:bc:83:f3:b9:86:74:37:2a:95:a0: da:d1:ac:93:16:5a:21:63:07:cc:55:00:bc:54:ec:8b: 23:d2:0c:eb:59:92:e3:f7:69:af:a6:aa:a9:97:31:d0: e5:34:dd:ca:60:55:bc:af:e9:c1:b5:45:c0:d4:67:c0: 72:b2:23:a1:94:64:79:79:9b:c6:66:06:3e:cc:55:39: 3e:48:7a:19:f3:31:40:5e:b5:39:72:b5:6d:8c:3a:f0 Fingerprint (SHA-256): E7:64:F3:3F:09:BB:41:F4:3B:C9:47:7F:10:1E:F5:D5:D1:15:B8:77:A5:89:A3:E5:3E:0D:E4:9B:C4:7D:95:3F Fingerprint (SHA1): 69:60:B4:41:BE:72:72:62:AC:87:84:2B:47:1D:E5:63:AB:EF:36:75 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #339: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #340: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141461 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #341: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #342: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #343: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #344: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018141462 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #345: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #346: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #347: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #348: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018141463 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #349: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #350: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #351: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #352: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018141464 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #353: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #354: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #355: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141461 (0x3caf9b15) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:09 2023 Not After : Wed Oct 18 14:15:09 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:1f:7f:9f:b9:42:44:f9:6a:eb:a1:dc:49:c5:90:21: ef:84:c7:a2:d1:7a:d4:e6:04:7c:fc:52:23:a6:ba:21: 05:23:aa:5a:b3:c2:81:dd:22:9a:a1:02:75:bb:04:74: 6f:50:f9:e8:75:01:87:fd:2b:d9:ab:cc:22:99:14:fa: 13:82:f3:6e:ce:12:9c:28:c6:8e:b8:97:01:41:9e:c7: d4:f6:50:6c:79:70:84:70:d3:9e:9b:61:87:0f:0b:1e: de:48:85:a0:5d:c8:44:6c:06:52:43:6a:60:19:d0:23: 3d:63:07:70:4b:1b:12:50:e5:ff:2d:9d:5d:76:72:28: fc:32:30:3d:1a:6d:35:60:b4:fa:1e:bf:45:d3:ab:82: d7:06:62:dc:79:3e:26:76:f5:62:d8:f3:d6:55:9e:12: 46:fc:6a:ee:b1:0d:5a:00:b2:33:63:c3:be:5a:42:a0: 48:36:ad:d1:cd:31:38:5a:f6:c1:06:f7:ab:bc:3e:3e: b7:5e:36:51:df:d5:0b:6c:c2:57:21:80:58:6e:ee:97: 74:b4:7d:cc:d0:79:f1:3c:ce:79:5f:b7:dc:30:ee:d1: f1:b4:47:47:f9:04:75:51:2d:90:1b:99:a4:04:d7:94: d1:ab:10:e6:8b:fb:8b:74:5c:92:a0:2e:66:4f:e6:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:79:94:ac:c7:33:5c:84:e2:06:e4:a1:1e:54:8b:e8: e2:03:38:67:61:a7:d9:be:0a:aa:c2:eb:52:38:4e:3f: 6d:35:6c:89:d9:5c:14:22:66:c7:3f:ed:22:5b:35:13: 1c:18:8b:6f:50:26:5d:ab:29:f1:50:ed:d1:b4:20:cf: a9:54:09:50:bf:b5:fb:64:75:06:a6:08:1d:e8:2b:46: 33:6f:4b:1f:63:eb:d7:af:e5:e7:94:09:03:2b:c2:98: a9:36:70:d7:4b:fe:93:15:da:ff:df:9e:b3:3a:85:a2: 68:95:31:fc:4c:45:b2:66:4a:41:3c:66:1d:bb:65:35: c2:47:27:b2:96:ec:83:c6:4e:b5:d8:2a:d8:28:ab:9e: 4e:25:3b:a9:e2:96:68:72:9e:51:f4:7e:ed:68:b9:35: ab:bb:6b:7d:9d:46:e7:85:20:17:3b:46:31:1e:76:6f: 08:f8:c3:10:1b:cf:3f:b7:57:43:56:50:16:31:c7:9d: 58:9c:e3:18:84:f3:9b:b4:2f:be:17:4f:4c:24:10:41: 98:b7:1c:33:28:ae:56:75:f0:90:bf:d0:36:d7:11:ee: d9:9c:0e:31:89:a7:a2:0a:92:f1:ef:64:5c:de:fc:1d: 4c:b0:be:ef:d4:41:07:a7:fb:bf:e7:da:9a:15:10:b5 Fingerprint (SHA-256): 26:F5:53:DA:47:80:08:DC:5A:CE:F3:9D:1E:6F:8C:64:D4:D9:32:75:E0:A1:8E:B6:9F:26:92:D1:52:4B:4F:F3 Fingerprint (SHA1): 16:5D:5D:CE:D0:BA:1F:64:E4:87:04:87:36:E4:C1:23:D6:2A:63:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #356: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #357: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141462 (0x3caf9b16) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:10 2023 Not After : Wed Oct 18 14:15:10 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:c8:04:d0:27:75:c7:76:e0:de:86:ec:96:40:ca:24: ac:c5:42:41:0b:8e:49:a0:71:ac:39:5a:8e:6d:d9:9d: bd:df:4d:ba:db:1f:12:e5:d4:df:fa:e7:a6:41:f3:a5: 8f:e0:b8:f0:35:f3:af:93:b0:03:e4:41:8b:c9:06:f6: 0f:8c:f4:77:3a:2d:32:58:1f:27:68:83:da:99:7f:d9: 1e:9f:2d:33:9e:17:b8:ec:2f:fa:2d:98:ae:fa:6d:4b: 88:d2:89:cf:db:b4:49:fa:7d:fe:b3:ce:1b:5f:37:43: 33:10:94:c6:ea:a3:2c:7b:fd:93:ba:51:be:1d:2b:8a: b5:12:41:8f:1a:c4:d9:7a:5c:8e:dd:5b:c2:0c:f8:52: 66:38:a3:fc:1e:f8:a6:e0:3d:96:59:15:37:26:9e:60: 78:12:0e:08:bf:72:e9:5a:f4:e5:32:fe:49:19:4c:c9: e8:65:f3:63:06:9d:13:8e:2c:4c:75:68:18:bb:d3:60: 06:d4:8a:87:ae:c6:b3:9b:1a:3d:b1:a7:6c:f9:08:ef: 6f:b4:a0:7e:41:a1:c2:58:eb:aa:ec:42:5f:a6:de:22: 49:b5:9b:68:94:16:f2:e2:87:09:9c:78:06:2a:8a:8a: 9e:a6:7b:92:05:cc:4f:e5:e0:0e:97:12:eb:55:8d:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:54:0a:bf:24:81:28:b3:ba:24:ba:22:78:cc:3e:de: 5a:a7:ab:56:43:e5:e2:31:af:9a:7c:38:64:33:67:b6: a3:e3:1c:31:e0:f8:61:8e:e3:99:84:95:62:eb:8e:78: ee:fc:af:3e:fb:4b:ca:d5:4f:88:8d:8f:fb:d6:65:5f: 01:50:a1:e7:bc:75:69:ff:1f:5b:cc:7e:4f:0d:19:a8: 76:dd:80:37:d6:b3:f7:d1:75:cd:fb:23:3d:5d:e7:57: b9:49:a9:9a:f7:a8:cd:0e:0c:a8:2f:bc:0c:90:86:94: d0:5c:e2:64:b0:c1:9b:a2:ad:f3:0f:0c:24:8d:64:c1: d4:45:48:bb:96:89:65:44:23:b5:1e:1d:26:e2:a6:a4: 51:ff:b0:fc:07:59:2b:ec:ec:56:ec:37:f8:ad:94:8a: 8d:ae:11:cb:44:53:91:33:57:69:3d:ce:f4:9e:67:fd: 5e:67:32:54:34:93:7d:b5:3d:a2:fa:ba:2a:67:c3:63: d3:30:dd:73:cc:f9:38:f7:e3:31:d3:f9:ea:34:12:21: 58:7f:dd:cd:68:8a:5f:7c:ed:45:b1:80:38:ab:1b:1f: 0e:55:c7:22:3d:10:ff:51:23:ea:86:66:d6:56:6f:76: fa:9e:19:fd:ab:58:3f:cc:1b:30:d5:b2:4e:c6:41:cd Fingerprint (SHA-256): 9E:0A:F4:45:C0:76:24:70:B9:A1:57:36:B6:1B:4F:0A:F8:CC:18:B0:31:21:AA:38:E7:71:7E:40:D7:72:43:B2 Fingerprint (SHA1): 14:BA:8A:FB:D4:E3:56:E8:3D:18:DD:54:D2:52:AE:3F:27:B0:D0:54 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #358: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #359: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141463 (0x3caf9b17) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:15:10 2023 Not After : Wed Oct 18 14:15:10 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:b3:17:a7:b9:42:b8:c3:60:19:b0:8b:45:bf:97:e6: 81:27:03:1e:ad:ae:20:fd:2f:4d:74:fa:b7:8a:ed:f6: cf:43:83:d6:e9:2a:5c:19:59:35:82:94:48:7f:76:bd: 8f:89:20:59:85:23:4a:72:ca:a9:fc:d8:cf:12:83:79: 4c:6b:fc:32:0c:5d:b4:36:2b:bf:e2:25:f0:6d:33:34: 17:e5:a1:28:66:9f:cc:75:e3:7a:68:b4:81:59:40:e1: d9:ea:80:f9:f2:07:e2:9d:a4:85:11:fe:47:5d:af:8c: f6:97:bb:03:2e:9b:1f:c8:bf:d0:e0:14:5b:56:33:93: 42:03:17:7d:f0:b7:34:c5:ca:ac:3a:89:88:36:b0:1b: df:06:49:18:b5:22:c2:29:22:2c:e0:b1:44:b4:7c:4a: 70:ed:16:62:11:b2:2d:6e:4a:3d:81:73:71:92:ca:52: 13:ac:ac:b0:5b:2a:c8:0d:5a:8d:9e:43:6d:c9:ac:c2: a3:c3:88:fd:d7:5b:50:ac:26:e3:95:c6:96:89:3f:48: 01:56:a9:dd:32:7e:c8:7f:19:ab:cd:6c:81:6b:d9:5b: a0:14:7c:12:7f:a2:1a:af:7c:ee:51:b3:cd:2b:38:29: 62:16:65:72:f2:a4:e8:37:3d:39:55:10:59:b5:46:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:66:2b:56:0e:6f:25:e3:97:4c:fd:15:63:e4:20:3c: 53:fa:30:6a:55:30:87:97:52:74:32:45:0b:34:55:f2: 12:e0:e4:6f:e0:6c:04:1c:36:c9:1c:76:38:d9:fa:45: 19:73:37:f7:9a:2c:7c:67:e4:53:92:2f:03:f2:f3:ed: 5c:13:dd:de:b9:19:49:a5:b8:17:c0:c4:ed:10:fc:56: fe:ff:6d:7d:64:3d:22:57:61:48:23:be:ff:a0:46:63: 02:73:b1:be:ed:4a:40:9b:6e:ac:a2:a2:2a:11:9b:95: ac:ab:2f:11:1a:3b:7a:4e:28:6b:61:36:c9:0a:b3:2b: b4:f9:33:86:4c:f0:b4:a2:c8:75:40:f7:aa:df:1d:a5: ce:e1:dd:6c:17:85:5b:e8:02:0a:03:4c:69:54:a7:10: 74:af:f3:a6:9e:08:37:25:f9:9d:09:30:8f:40:c5:54: 4f:23:2d:1d:d4:2b:1a:70:a2:55:ec:87:6c:f5:b8:6d: 88:07:e8:3e:1c:4b:95:f9:ef:84:2f:76:c6:e7:af:4b: 2a:01:ff:b6:b7:3c:ac:3b:aa:82:5d:62:a1:24:ea:9b: e7:0c:69:13:b3:e5:6c:71:ad:c8:f5:64:38:1c:23:f2: ea:98:3a:4c:23:5b:54:2b:71:2d:bb:0a:c0:46:b6:3a Fingerprint (SHA-256): 09:5A:37:D8:EA:AC:7F:63:88:31:4F:51:AC:9A:0D:2E:F1:D3:2C:B6:E9:96:8B:A4:8C:F2:E7:14:3C:B0:03:28 Fingerprint (SHA1): 41:F1:96:D1:F8:00:65:B2:B5:1A:83:66:50:2B:34:5D:C2:6B:E9:7F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #360: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #361: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #362: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #363: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #364: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141461 (0x3caf9b15) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:09 2023 Not After : Wed Oct 18 14:15:09 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:1f:7f:9f:b9:42:44:f9:6a:eb:a1:dc:49:c5:90:21: ef:84:c7:a2:d1:7a:d4:e6:04:7c:fc:52:23:a6:ba:21: 05:23:aa:5a:b3:c2:81:dd:22:9a:a1:02:75:bb:04:74: 6f:50:f9:e8:75:01:87:fd:2b:d9:ab:cc:22:99:14:fa: 13:82:f3:6e:ce:12:9c:28:c6:8e:b8:97:01:41:9e:c7: d4:f6:50:6c:79:70:84:70:d3:9e:9b:61:87:0f:0b:1e: de:48:85:a0:5d:c8:44:6c:06:52:43:6a:60:19:d0:23: 3d:63:07:70:4b:1b:12:50:e5:ff:2d:9d:5d:76:72:28: fc:32:30:3d:1a:6d:35:60:b4:fa:1e:bf:45:d3:ab:82: d7:06:62:dc:79:3e:26:76:f5:62:d8:f3:d6:55:9e:12: 46:fc:6a:ee:b1:0d:5a:00:b2:33:63:c3:be:5a:42:a0: 48:36:ad:d1:cd:31:38:5a:f6:c1:06:f7:ab:bc:3e:3e: b7:5e:36:51:df:d5:0b:6c:c2:57:21:80:58:6e:ee:97: 74:b4:7d:cc:d0:79:f1:3c:ce:79:5f:b7:dc:30:ee:d1: f1:b4:47:47:f9:04:75:51:2d:90:1b:99:a4:04:d7:94: d1:ab:10:e6:8b:fb:8b:74:5c:92:a0:2e:66:4f:e6:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:79:94:ac:c7:33:5c:84:e2:06:e4:a1:1e:54:8b:e8: e2:03:38:67:61:a7:d9:be:0a:aa:c2:eb:52:38:4e:3f: 6d:35:6c:89:d9:5c:14:22:66:c7:3f:ed:22:5b:35:13: 1c:18:8b:6f:50:26:5d:ab:29:f1:50:ed:d1:b4:20:cf: a9:54:09:50:bf:b5:fb:64:75:06:a6:08:1d:e8:2b:46: 33:6f:4b:1f:63:eb:d7:af:e5:e7:94:09:03:2b:c2:98: a9:36:70:d7:4b:fe:93:15:da:ff:df:9e:b3:3a:85:a2: 68:95:31:fc:4c:45:b2:66:4a:41:3c:66:1d:bb:65:35: c2:47:27:b2:96:ec:83:c6:4e:b5:d8:2a:d8:28:ab:9e: 4e:25:3b:a9:e2:96:68:72:9e:51:f4:7e:ed:68:b9:35: ab:bb:6b:7d:9d:46:e7:85:20:17:3b:46:31:1e:76:6f: 08:f8:c3:10:1b:cf:3f:b7:57:43:56:50:16:31:c7:9d: 58:9c:e3:18:84:f3:9b:b4:2f:be:17:4f:4c:24:10:41: 98:b7:1c:33:28:ae:56:75:f0:90:bf:d0:36:d7:11:ee: d9:9c:0e:31:89:a7:a2:0a:92:f1:ef:64:5c:de:fc:1d: 4c:b0:be:ef:d4:41:07:a7:fb:bf:e7:da:9a:15:10:b5 Fingerprint (SHA-256): 26:F5:53:DA:47:80:08:DC:5A:CE:F3:9D:1E:6F:8C:64:D4:D9:32:75:E0:A1:8E:B6:9F:26:92:D1:52:4B:4F:F3 Fingerprint (SHA1): 16:5D:5D:CE:D0:BA:1F:64:E4:87:04:87:36:E4:C1:23:D6:2A:63:08 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #365: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #366: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141462 (0x3caf9b16) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:10 2023 Not After : Wed Oct 18 14:15:10 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:c8:04:d0:27:75:c7:76:e0:de:86:ec:96:40:ca:24: ac:c5:42:41:0b:8e:49:a0:71:ac:39:5a:8e:6d:d9:9d: bd:df:4d:ba:db:1f:12:e5:d4:df:fa:e7:a6:41:f3:a5: 8f:e0:b8:f0:35:f3:af:93:b0:03:e4:41:8b:c9:06:f6: 0f:8c:f4:77:3a:2d:32:58:1f:27:68:83:da:99:7f:d9: 1e:9f:2d:33:9e:17:b8:ec:2f:fa:2d:98:ae:fa:6d:4b: 88:d2:89:cf:db:b4:49:fa:7d:fe:b3:ce:1b:5f:37:43: 33:10:94:c6:ea:a3:2c:7b:fd:93:ba:51:be:1d:2b:8a: b5:12:41:8f:1a:c4:d9:7a:5c:8e:dd:5b:c2:0c:f8:52: 66:38:a3:fc:1e:f8:a6:e0:3d:96:59:15:37:26:9e:60: 78:12:0e:08:bf:72:e9:5a:f4:e5:32:fe:49:19:4c:c9: e8:65:f3:63:06:9d:13:8e:2c:4c:75:68:18:bb:d3:60: 06:d4:8a:87:ae:c6:b3:9b:1a:3d:b1:a7:6c:f9:08:ef: 6f:b4:a0:7e:41:a1:c2:58:eb:aa:ec:42:5f:a6:de:22: 49:b5:9b:68:94:16:f2:e2:87:09:9c:78:06:2a:8a:8a: 9e:a6:7b:92:05:cc:4f:e5:e0:0e:97:12:eb:55:8d:8f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 39:54:0a:bf:24:81:28:b3:ba:24:ba:22:78:cc:3e:de: 5a:a7:ab:56:43:e5:e2:31:af:9a:7c:38:64:33:67:b6: a3:e3:1c:31:e0:f8:61:8e:e3:99:84:95:62:eb:8e:78: ee:fc:af:3e:fb:4b:ca:d5:4f:88:8d:8f:fb:d6:65:5f: 01:50:a1:e7:bc:75:69:ff:1f:5b:cc:7e:4f:0d:19:a8: 76:dd:80:37:d6:b3:f7:d1:75:cd:fb:23:3d:5d:e7:57: b9:49:a9:9a:f7:a8:cd:0e:0c:a8:2f:bc:0c:90:86:94: d0:5c:e2:64:b0:c1:9b:a2:ad:f3:0f:0c:24:8d:64:c1: d4:45:48:bb:96:89:65:44:23:b5:1e:1d:26:e2:a6:a4: 51:ff:b0:fc:07:59:2b:ec:ec:56:ec:37:f8:ad:94:8a: 8d:ae:11:cb:44:53:91:33:57:69:3d:ce:f4:9e:67:fd: 5e:67:32:54:34:93:7d:b5:3d:a2:fa:ba:2a:67:c3:63: d3:30:dd:73:cc:f9:38:f7:e3:31:d3:f9:ea:34:12:21: 58:7f:dd:cd:68:8a:5f:7c:ed:45:b1:80:38:ab:1b:1f: 0e:55:c7:22:3d:10:ff:51:23:ea:86:66:d6:56:6f:76: fa:9e:19:fd:ab:58:3f:cc:1b:30:d5:b2:4e:c6:41:cd Fingerprint (SHA-256): 9E:0A:F4:45:C0:76:24:70:B9:A1:57:36:B6:1B:4F:0A:F8:CC:18:B0:31:21:AA:38:E7:71:7E:40:D7:72:43:B2 Fingerprint (SHA1): 14:BA:8A:FB:D4:E3:56:E8:3D:18:DD:54:D2:52:AE:3F:27:B0:D0:54 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #367: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #368: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141463 (0x3caf9b17) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:15:10 2023 Not After : Wed Oct 18 14:15:10 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:b3:17:a7:b9:42:b8:c3:60:19:b0:8b:45:bf:97:e6: 81:27:03:1e:ad:ae:20:fd:2f:4d:74:fa:b7:8a:ed:f6: cf:43:83:d6:e9:2a:5c:19:59:35:82:94:48:7f:76:bd: 8f:89:20:59:85:23:4a:72:ca:a9:fc:d8:cf:12:83:79: 4c:6b:fc:32:0c:5d:b4:36:2b:bf:e2:25:f0:6d:33:34: 17:e5:a1:28:66:9f:cc:75:e3:7a:68:b4:81:59:40:e1: d9:ea:80:f9:f2:07:e2:9d:a4:85:11:fe:47:5d:af:8c: f6:97:bb:03:2e:9b:1f:c8:bf:d0:e0:14:5b:56:33:93: 42:03:17:7d:f0:b7:34:c5:ca:ac:3a:89:88:36:b0:1b: df:06:49:18:b5:22:c2:29:22:2c:e0:b1:44:b4:7c:4a: 70:ed:16:62:11:b2:2d:6e:4a:3d:81:73:71:92:ca:52: 13:ac:ac:b0:5b:2a:c8:0d:5a:8d:9e:43:6d:c9:ac:c2: a3:c3:88:fd:d7:5b:50:ac:26:e3:95:c6:96:89:3f:48: 01:56:a9:dd:32:7e:c8:7f:19:ab:cd:6c:81:6b:d9:5b: a0:14:7c:12:7f:a2:1a:af:7c:ee:51:b3:cd:2b:38:29: 62:16:65:72:f2:a4:e8:37:3d:39:55:10:59:b5:46:75 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:66:2b:56:0e:6f:25:e3:97:4c:fd:15:63:e4:20:3c: 53:fa:30:6a:55:30:87:97:52:74:32:45:0b:34:55:f2: 12:e0:e4:6f:e0:6c:04:1c:36:c9:1c:76:38:d9:fa:45: 19:73:37:f7:9a:2c:7c:67:e4:53:92:2f:03:f2:f3:ed: 5c:13:dd:de:b9:19:49:a5:b8:17:c0:c4:ed:10:fc:56: fe:ff:6d:7d:64:3d:22:57:61:48:23:be:ff:a0:46:63: 02:73:b1:be:ed:4a:40:9b:6e:ac:a2:a2:2a:11:9b:95: ac:ab:2f:11:1a:3b:7a:4e:28:6b:61:36:c9:0a:b3:2b: b4:f9:33:86:4c:f0:b4:a2:c8:75:40:f7:aa:df:1d:a5: ce:e1:dd:6c:17:85:5b:e8:02:0a:03:4c:69:54:a7:10: 74:af:f3:a6:9e:08:37:25:f9:9d:09:30:8f:40:c5:54: 4f:23:2d:1d:d4:2b:1a:70:a2:55:ec:87:6c:f5:b8:6d: 88:07:e8:3e:1c:4b:95:f9:ef:84:2f:76:c6:e7:af:4b: 2a:01:ff:b6:b7:3c:ac:3b:aa:82:5d:62:a1:24:ea:9b: e7:0c:69:13:b3:e5:6c:71:ad:c8:f5:64:38:1c:23:f2: ea:98:3a:4c:23:5b:54:2b:71:2d:bb:0a:c0:46:b6:3a Fingerprint (SHA-256): 09:5A:37:D8:EA:AC:7F:63:88:31:4F:51:AC:9A:0D:2E:F1:D3:2C:B6:E9:96:8B:A4:8C:F2:E7:14:3C:B0:03:28 Fingerprint (SHA1): 41:F1:96:D1:F8:00:65:B2:B5:1A:83:66:50:2B:34:5D:C2:6B:E9:7F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #369: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #370: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #371: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141465 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #372: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #373: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #374: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #375: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018141466 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #376: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #377: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #378: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #379: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018141467 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #380: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #381: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #382: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #383: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018141468 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #384: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #385: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #386: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #387: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018141469 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #388: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #389: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #390: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141465 (0x3caf9b19) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:11 2023 Not After : Wed Oct 18 14:15:11 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:fc:44:ef:af:4e:43:b8:17:f7:cc:ab:5a:27:9a:0e: 03:a5:01:a1:1e:e0:76:20:e5:4e:26:05:e4:8b:c4:31: 8b:27:3b:66:f4:c1:20:50:63:f9:fa:69:ab:15:1e:dc: e7:e2:f5:5c:3b:58:b5:52:95:fa:3d:3b:cf:51:5f:c4: 13:e4:73:1b:e3:55:0f:17:fd:ef:36:c4:6d:4c:c8:f8: c4:e4:d8:9a:b6:fa:88:15:71:2e:1c:3f:fa:27:34:2f: be:8c:58:b6:f3:24:2b:91:72:7f:1f:da:40:72:72:57: 2c:c8:23:cb:21:3f:e2:fb:29:ae:0f:ba:ce:97:a2:e7: c8:fe:9f:c2:40:c1:79:1a:48:0d:06:c3:64:e3:58:00: db:11:05:f2:45:72:f1:24:83:b0:aa:11:77:3e:4b:96: f9:7c:f0:91:fa:d1:d2:a0:74:e1:05:2d:7c:72:1d:37: 70:e3:4a:ac:ff:80:19:24:87:12:bd:21:df:e8:dc:d0: 27:fe:32:80:1d:04:06:14:47:3e:5c:b1:ad:6b:31:83: f0:be:09:2c:d8:bb:b3:5b:90:2b:34:52:0e:ba:52:fb: 7a:70:d5:47:31:4c:b5:ec:58:be:21:68:22:60:31:f4: f3:ce:42:15:46:e5:83:d8:d3:73:59:e9:b5:36:36:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:b9:6f:26:a6:08:47:03:5d:98:e4:d0:b0:14:ed:cd: b2:4b:c9:eb:0f:25:6c:1a:c4:54:85:19:ce:4b:3b:8b: 29:77:ff:15:d4:99:30:44:cc:5e:0c:86:ea:1f:93:12: 2a:14:db:39:9b:8e:0c:14:b9:d5:1b:cf:fc:54:b6:d8: c0:ec:96:15:31:55:14:51:4f:d9:a1:73:b4:58:f8:e7: b0:1b:87:e2:48:8c:06:b8:6d:51:e7:91:7a:73:43:5c: af:5a:2f:5c:cd:dc:1b:db:b4:52:9e:91:94:4b:24:ab: 11:47:6a:0a:3f:34:97:29:e5:db:37:33:a6:10:50:7f: 8b:4b:ce:c2:1e:e2:d0:5a:92:3e:e9:c1:22:9d:0a:83: cc:ef:de:e1:0b:4c:d7:17:d9:e7:f5:4e:0f:34:cb:85: 5f:bd:78:ea:ad:18:f7:49:55:82:14:eb:24:ca:1d:57: 29:2f:9c:32:4f:14:d5:99:d5:5e:a7:c1:56:7e:26:6b: 43:98:47:be:74:30:4a:6e:7d:60:7e:92:ee:5e:da:28: a6:8b:93:4d:7b:91:67:d9:dd:1b:25:da:6d:c9:60:29: 49:06:9a:66:4d:2e:ca:da:0f:b4:f5:e8:62:81:3b:35: 2d:45:6c:4c:b4:66:3d:22:d5:dc:24:8a:34:a1:f7:21 Fingerprint (SHA-256): 63:55:9F:0C:0B:99:C7:D9:9D:D7:5E:21:4E:0D:FA:1D:29:F7:7F:A2:1D:15:4C:71:B4:97:45:6B:F7:8C:61:36 Fingerprint (SHA1): 8A:C7:33:14:73:7A:30:FE:11:7C:91:65:49:C8:42:E2:9A:BD:82:D3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #391: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #392: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141466 (0x3caf9b1a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:11 2023 Not After : Wed Oct 18 14:15:11 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:62:ad:00:22:98:b7:5a:14:33:c7:91:38:73:af:5e: e5:f0:6d:d6:8f:33:8f:32:23:00:7f:72:ea:58:e4:3e: c1:40:10:e7:8f:fb:98:55:0d:6f:6b:99:d4:a8:4b:2a: 66:df:33:7a:2f:f9:0a:e9:a1:30:76:57:21:cf:91:ab: cf:34:f3:67:bb:15:79:c2:e0:7e:10:f1:13:af:2d:c3: ec:a8:6f:55:c3:7f:87:e1:c5:f5:2d:b9:e2:e8:7e:25: 33:6f:96:b0:fa:8f:ca:af:7b:89:20:7b:8f:95:57:f8: 23:41:65:f4:a1:aa:84:47:1f:22:b0:d5:84:3b:bb:c2: 3c:8e:f6:4d:38:1e:b2:c0:45:af:90:56:28:a8:95:00: a4:f7:6c:9f:5b:c5:73:0e:8f:aa:ca:ae:21:9f:6c:87: 2e:97:05:8e:26:91:b4:8f:1f:36:00:89:ca:5e:30:90: 73:5f:83:12:ef:19:7f:5c:a6:3e:ed:20:21:ce:92:ef: 89:49:51:02:e2:79:05:e3:72:e8:67:03:82:a2:ee:76: 40:17:b6:91:1e:71:45:c8:28:f5:e7:3d:68:d7:4e:20: f6:c8:4c:58:23:ed:5b:d0:b1:19:62:bc:1b:d7:54:2c: ab:9c:b8:49:c1:87:b7:04:a8:cd:8f:44:dc:84:ee:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:74:9d:6e:57:5c:e3:7d:02:e2:84:85:bf:75:52:d5: d0:c6:f4:73:6b:4c:64:b4:df:94:7c:23:11:17:df:2f: 37:2c:ce:e4:b4:7d:79:a0:ed:27:18:1e:a0:66:f3:8f: ec:94:71:f9:5e:60:25:d0:cd:34:be:d7:3d:54:8e:11: 15:a8:14:5b:f1:0e:e9:66:f6:cc:2d:3e:7b:69:af:af: 0f:d5:0d:8b:04:1a:79:3a:fa:e0:15:72:01:36:53:df: 29:22:3d:8d:b0:bc:8d:26:2c:d8:0b:68:d9:ec:30:bc: ee:e0:3c:d7:57:7e:39:b8:2a:3e:ef:b0:c5:af:01:9c: 3c:6c:08:20:ff:3a:8f:37:22:8b:06:75:eb:bb:28:e4: f7:45:74:9f:f5:19:3f:fe:d5:69:59:a8:99:c7:15:de: 19:75:fa:04:9e:da:a5:93:cf:d1:2b:86:ce:bd:fd:f2: c3:70:cb:68:fc:b3:ca:50:b5:a7:71:0e:c3:ae:43:51: 30:7e:96:96:ef:04:43:95:ae:c7:ac:b4:8f:94:9d:2c: 07:c8:97:32:9e:57:c1:cc:50:58:62:40:cd:a1:aa:d2: 3f:87:9c:5f:25:40:a9:30:c3:99:b8:9b:46:87:2f:13: e9:bd:c0:ca:cd:69:d6:f3:8b:40:a5:88:12:57:b9:75 Fingerprint (SHA-256): F0:4C:0F:AE:29:CD:97:46:68:5F:9B:73:92:90:35:95:DC:62:F5:26:8D:B7:B0:6F:FA:3F:C7:0C:F3:11:8C:E1 Fingerprint (SHA1): FE:04:96:BE:5E:62:8E:85:34:53:9B:53:F1:12:F7:02:1B:7A:64:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #393: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #394: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141467 (0x3caf9b1b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:15:12 2023 Not After : Wed Oct 18 14:15:12 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:fe:cf:cd:2f:a5:7a:1a:81:f5:8e:6d:87:86:60:53: 04:b3:45:80:6b:bd:fb:db:bb:70:fe:2d:5d:95:5d:01: d2:65:dc:90:16:af:2a:09:fa:f3:66:b5:0e:4c:ae:e2: 4e:d2:84:dd:31:7a:c5:49:43:3e:6f:96:89:49:dd:99: 93:a8:7d:0d:2e:22:2e:e6:53:97:28:41:7a:f8:64:87: ca:af:3b:d6:71:0e:24:2b:21:08:d5:05:a6:2a:37:31: 84:b4:fa:23:e5:c3:a0:e6:b9:76:ca:0a:9a:b7:53:78: f1:82:e2:7a:59:9d:bd:66:c1:4f:7e:67:38:00:a9:cd: ae:d6:e3:fe:0e:2a:37:e9:0b:c4:9d:73:ad:fa:3f:e9: ed:ef:15:c8:00:77:68:89:f1:30:36:5f:ef:d7:1c:bc: 61:c9:dd:ff:94:04:c0:92:78:2b:84:91:76:3f:fe:b9: 40:19:70:ac:a2:06:57:f3:ed:35:09:74:d8:fa:f1:06: 17:f6:69:67:09:ed:4a:83:74:1f:11:a2:1d:f0:43:9d: 8f:c7:ce:40:aa:e8:ed:c1:79:12:18:3f:40:b2:89:b8: 27:86:c0:79:65:ff:8d:ca:d2:2a:84:d8:31:a9:2d:b0: d7:e5:80:1f:7f:9d:6f:bf:71:76:a8:67:47:11:ab:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:c5:ce:73:26:07:22:6f:d0:55:a8:5e:94:22:a8:d1: 23:2a:54:fc:5d:09:0c:a2:70:64:27:1b:ca:98:40:6f: 0a:43:4d:4e:89:f6:13:0a:9d:22:13:8e:a9:b9:32:f3: ff:44:55:27:8b:e0:cf:83:f7:33:e1:d9:34:aa:37:57: 40:a2:f3:86:df:81:6c:fc:cb:d0:29:bf:21:21:ea:cf: 77:90:91:86:bc:f5:84:98:80:a8:4a:95:f6:78:60:ef: f6:54:06:5b:78:75:bf:d2:fd:81:54:27:18:bb:22:e1: 43:00:fb:26:38:9f:b9:a4:59:1c:d5:3d:02:57:f3:41: 29:d2:e1:58:ba:8e:a5:62:55:36:01:3f:86:5e:87:18: 9b:3b:08:e6:dc:92:2a:fd:9f:60:15:b5:2e:b0:a7:3a: 6e:41:59:59:f6:cd:cb:f0:33:74:11:24:36:e2:2b:a4: 75:f6:2d:49:ae:e9:23:2f:cf:75:c8:32:91:d9:6e:8b: 1e:22:7d:db:b3:a5:b7:ce:f2:fa:44:f8:10:19:97:ba: 2e:43:09:03:10:01:bd:74:ca:bb:49:e9:f9:d3:2e:57: 07:93:b4:cb:83:77:9b:f6:25:d9:93:ee:41:57:e5:30: 8f:dd:9a:29:d3:fe:9d:08:a1:27:7f:c3:3e:75:a9:8e Fingerprint (SHA-256): 5B:42:DC:D0:68:28:AE:AC:62:0E:C3:35:0C:EB:7B:1B:8F:CB:B2:C9:47:36:6B:C5:42:CC:93:AA:1A:AA:E6:15 Fingerprint (SHA1): FA:DA:5B:45:FC:DA:D0:51:79:D2:F0:F4:48:85:C8:0A:DC:0F:97:C8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #395: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #396: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #397: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #398: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #399: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141465 (0x3caf9b19) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:11 2023 Not After : Wed Oct 18 14:15:11 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:fc:44:ef:af:4e:43:b8:17:f7:cc:ab:5a:27:9a:0e: 03:a5:01:a1:1e:e0:76:20:e5:4e:26:05:e4:8b:c4:31: 8b:27:3b:66:f4:c1:20:50:63:f9:fa:69:ab:15:1e:dc: e7:e2:f5:5c:3b:58:b5:52:95:fa:3d:3b:cf:51:5f:c4: 13:e4:73:1b:e3:55:0f:17:fd:ef:36:c4:6d:4c:c8:f8: c4:e4:d8:9a:b6:fa:88:15:71:2e:1c:3f:fa:27:34:2f: be:8c:58:b6:f3:24:2b:91:72:7f:1f:da:40:72:72:57: 2c:c8:23:cb:21:3f:e2:fb:29:ae:0f:ba:ce:97:a2:e7: c8:fe:9f:c2:40:c1:79:1a:48:0d:06:c3:64:e3:58:00: db:11:05:f2:45:72:f1:24:83:b0:aa:11:77:3e:4b:96: f9:7c:f0:91:fa:d1:d2:a0:74:e1:05:2d:7c:72:1d:37: 70:e3:4a:ac:ff:80:19:24:87:12:bd:21:df:e8:dc:d0: 27:fe:32:80:1d:04:06:14:47:3e:5c:b1:ad:6b:31:83: f0:be:09:2c:d8:bb:b3:5b:90:2b:34:52:0e:ba:52:fb: 7a:70:d5:47:31:4c:b5:ec:58:be:21:68:22:60:31:f4: f3:ce:42:15:46:e5:83:d8:d3:73:59:e9:b5:36:36:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:b9:6f:26:a6:08:47:03:5d:98:e4:d0:b0:14:ed:cd: b2:4b:c9:eb:0f:25:6c:1a:c4:54:85:19:ce:4b:3b:8b: 29:77:ff:15:d4:99:30:44:cc:5e:0c:86:ea:1f:93:12: 2a:14:db:39:9b:8e:0c:14:b9:d5:1b:cf:fc:54:b6:d8: c0:ec:96:15:31:55:14:51:4f:d9:a1:73:b4:58:f8:e7: b0:1b:87:e2:48:8c:06:b8:6d:51:e7:91:7a:73:43:5c: af:5a:2f:5c:cd:dc:1b:db:b4:52:9e:91:94:4b:24:ab: 11:47:6a:0a:3f:34:97:29:e5:db:37:33:a6:10:50:7f: 8b:4b:ce:c2:1e:e2:d0:5a:92:3e:e9:c1:22:9d:0a:83: cc:ef:de:e1:0b:4c:d7:17:d9:e7:f5:4e:0f:34:cb:85: 5f:bd:78:ea:ad:18:f7:49:55:82:14:eb:24:ca:1d:57: 29:2f:9c:32:4f:14:d5:99:d5:5e:a7:c1:56:7e:26:6b: 43:98:47:be:74:30:4a:6e:7d:60:7e:92:ee:5e:da:28: a6:8b:93:4d:7b:91:67:d9:dd:1b:25:da:6d:c9:60:29: 49:06:9a:66:4d:2e:ca:da:0f:b4:f5:e8:62:81:3b:35: 2d:45:6c:4c:b4:66:3d:22:d5:dc:24:8a:34:a1:f7:21 Fingerprint (SHA-256): 63:55:9F:0C:0B:99:C7:D9:9D:D7:5E:21:4E:0D:FA:1D:29:F7:7F:A2:1D:15:4C:71:B4:97:45:6B:F7:8C:61:36 Fingerprint (SHA1): 8A:C7:33:14:73:7A:30:FE:11:7C:91:65:49:C8:42:E2:9A:BD:82:D3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #400: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #401: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141466 (0x3caf9b1a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:11 2023 Not After : Wed Oct 18 14:15:11 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:62:ad:00:22:98:b7:5a:14:33:c7:91:38:73:af:5e: e5:f0:6d:d6:8f:33:8f:32:23:00:7f:72:ea:58:e4:3e: c1:40:10:e7:8f:fb:98:55:0d:6f:6b:99:d4:a8:4b:2a: 66:df:33:7a:2f:f9:0a:e9:a1:30:76:57:21:cf:91:ab: cf:34:f3:67:bb:15:79:c2:e0:7e:10:f1:13:af:2d:c3: ec:a8:6f:55:c3:7f:87:e1:c5:f5:2d:b9:e2:e8:7e:25: 33:6f:96:b0:fa:8f:ca:af:7b:89:20:7b:8f:95:57:f8: 23:41:65:f4:a1:aa:84:47:1f:22:b0:d5:84:3b:bb:c2: 3c:8e:f6:4d:38:1e:b2:c0:45:af:90:56:28:a8:95:00: a4:f7:6c:9f:5b:c5:73:0e:8f:aa:ca:ae:21:9f:6c:87: 2e:97:05:8e:26:91:b4:8f:1f:36:00:89:ca:5e:30:90: 73:5f:83:12:ef:19:7f:5c:a6:3e:ed:20:21:ce:92:ef: 89:49:51:02:e2:79:05:e3:72:e8:67:03:82:a2:ee:76: 40:17:b6:91:1e:71:45:c8:28:f5:e7:3d:68:d7:4e:20: f6:c8:4c:58:23:ed:5b:d0:b1:19:62:bc:1b:d7:54:2c: ab:9c:b8:49:c1:87:b7:04:a8:cd:8f:44:dc:84:ee:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:74:9d:6e:57:5c:e3:7d:02:e2:84:85:bf:75:52:d5: d0:c6:f4:73:6b:4c:64:b4:df:94:7c:23:11:17:df:2f: 37:2c:ce:e4:b4:7d:79:a0:ed:27:18:1e:a0:66:f3:8f: ec:94:71:f9:5e:60:25:d0:cd:34:be:d7:3d:54:8e:11: 15:a8:14:5b:f1:0e:e9:66:f6:cc:2d:3e:7b:69:af:af: 0f:d5:0d:8b:04:1a:79:3a:fa:e0:15:72:01:36:53:df: 29:22:3d:8d:b0:bc:8d:26:2c:d8:0b:68:d9:ec:30:bc: ee:e0:3c:d7:57:7e:39:b8:2a:3e:ef:b0:c5:af:01:9c: 3c:6c:08:20:ff:3a:8f:37:22:8b:06:75:eb:bb:28:e4: f7:45:74:9f:f5:19:3f:fe:d5:69:59:a8:99:c7:15:de: 19:75:fa:04:9e:da:a5:93:cf:d1:2b:86:ce:bd:fd:f2: c3:70:cb:68:fc:b3:ca:50:b5:a7:71:0e:c3:ae:43:51: 30:7e:96:96:ef:04:43:95:ae:c7:ac:b4:8f:94:9d:2c: 07:c8:97:32:9e:57:c1:cc:50:58:62:40:cd:a1:aa:d2: 3f:87:9c:5f:25:40:a9:30:c3:99:b8:9b:46:87:2f:13: e9:bd:c0:ca:cd:69:d6:f3:8b:40:a5:88:12:57:b9:75 Fingerprint (SHA-256): F0:4C:0F:AE:29:CD:97:46:68:5F:9B:73:92:90:35:95:DC:62:F5:26:8D:B7:B0:6F:FA:3F:C7:0C:F3:11:8C:E1 Fingerprint (SHA1): FE:04:96:BE:5E:62:8E:85:34:53:9B:53:F1:12:F7:02:1B:7A:64:A2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #402: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #403: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141467 (0x3caf9b1b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:15:12 2023 Not After : Wed Oct 18 14:15:12 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:fe:cf:cd:2f:a5:7a:1a:81:f5:8e:6d:87:86:60:53: 04:b3:45:80:6b:bd:fb:db:bb:70:fe:2d:5d:95:5d:01: d2:65:dc:90:16:af:2a:09:fa:f3:66:b5:0e:4c:ae:e2: 4e:d2:84:dd:31:7a:c5:49:43:3e:6f:96:89:49:dd:99: 93:a8:7d:0d:2e:22:2e:e6:53:97:28:41:7a:f8:64:87: ca:af:3b:d6:71:0e:24:2b:21:08:d5:05:a6:2a:37:31: 84:b4:fa:23:e5:c3:a0:e6:b9:76:ca:0a:9a:b7:53:78: f1:82:e2:7a:59:9d:bd:66:c1:4f:7e:67:38:00:a9:cd: ae:d6:e3:fe:0e:2a:37:e9:0b:c4:9d:73:ad:fa:3f:e9: ed:ef:15:c8:00:77:68:89:f1:30:36:5f:ef:d7:1c:bc: 61:c9:dd:ff:94:04:c0:92:78:2b:84:91:76:3f:fe:b9: 40:19:70:ac:a2:06:57:f3:ed:35:09:74:d8:fa:f1:06: 17:f6:69:67:09:ed:4a:83:74:1f:11:a2:1d:f0:43:9d: 8f:c7:ce:40:aa:e8:ed:c1:79:12:18:3f:40:b2:89:b8: 27:86:c0:79:65:ff:8d:ca:d2:2a:84:d8:31:a9:2d:b0: d7:e5:80:1f:7f:9d:6f:bf:71:76:a8:67:47:11:ab:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:c5:ce:73:26:07:22:6f:d0:55:a8:5e:94:22:a8:d1: 23:2a:54:fc:5d:09:0c:a2:70:64:27:1b:ca:98:40:6f: 0a:43:4d:4e:89:f6:13:0a:9d:22:13:8e:a9:b9:32:f3: ff:44:55:27:8b:e0:cf:83:f7:33:e1:d9:34:aa:37:57: 40:a2:f3:86:df:81:6c:fc:cb:d0:29:bf:21:21:ea:cf: 77:90:91:86:bc:f5:84:98:80:a8:4a:95:f6:78:60:ef: f6:54:06:5b:78:75:bf:d2:fd:81:54:27:18:bb:22:e1: 43:00:fb:26:38:9f:b9:a4:59:1c:d5:3d:02:57:f3:41: 29:d2:e1:58:ba:8e:a5:62:55:36:01:3f:86:5e:87:18: 9b:3b:08:e6:dc:92:2a:fd:9f:60:15:b5:2e:b0:a7:3a: 6e:41:59:59:f6:cd:cb:f0:33:74:11:24:36:e2:2b:a4: 75:f6:2d:49:ae:e9:23:2f:cf:75:c8:32:91:d9:6e:8b: 1e:22:7d:db:b3:a5:b7:ce:f2:fa:44:f8:10:19:97:ba: 2e:43:09:03:10:01:bd:74:ca:bb:49:e9:f9:d3:2e:57: 07:93:b4:cb:83:77:9b:f6:25:d9:93:ee:41:57:e5:30: 8f:dd:9a:29:d3:fe:9d:08:a1:27:7f:c3:3e:75:a9:8e Fingerprint (SHA-256): 5B:42:DC:D0:68:28:AE:AC:62:0E:C3:35:0C:EB:7B:1B:8F:CB:B2:C9:47:36:6B:C5:42:CC:93:AA:1A:AA:E6:15 Fingerprint (SHA1): FA:DA:5B:45:FC:DA:D0:51:79:D2:F0:F4:48:85:C8:0A:DC:0F:97:C8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #404: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #405: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141465 (0x3caf9b19) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:11 2023 Not After : Wed Oct 18 14:15:11 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:fc:44:ef:af:4e:43:b8:17:f7:cc:ab:5a:27:9a:0e: 03:a5:01:a1:1e:e0:76:20:e5:4e:26:05:e4:8b:c4:31: 8b:27:3b:66:f4:c1:20:50:63:f9:fa:69:ab:15:1e:dc: e7:e2:f5:5c:3b:58:b5:52:95:fa:3d:3b:cf:51:5f:c4: 13:e4:73:1b:e3:55:0f:17:fd:ef:36:c4:6d:4c:c8:f8: c4:e4:d8:9a:b6:fa:88:15:71:2e:1c:3f:fa:27:34:2f: be:8c:58:b6:f3:24:2b:91:72:7f:1f:da:40:72:72:57: 2c:c8:23:cb:21:3f:e2:fb:29:ae:0f:ba:ce:97:a2:e7: c8:fe:9f:c2:40:c1:79:1a:48:0d:06:c3:64:e3:58:00: db:11:05:f2:45:72:f1:24:83:b0:aa:11:77:3e:4b:96: f9:7c:f0:91:fa:d1:d2:a0:74:e1:05:2d:7c:72:1d:37: 70:e3:4a:ac:ff:80:19:24:87:12:bd:21:df:e8:dc:d0: 27:fe:32:80:1d:04:06:14:47:3e:5c:b1:ad:6b:31:83: f0:be:09:2c:d8:bb:b3:5b:90:2b:34:52:0e:ba:52:fb: 7a:70:d5:47:31:4c:b5:ec:58:be:21:68:22:60:31:f4: f3:ce:42:15:46:e5:83:d8:d3:73:59:e9:b5:36:36:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:b9:6f:26:a6:08:47:03:5d:98:e4:d0:b0:14:ed:cd: b2:4b:c9:eb:0f:25:6c:1a:c4:54:85:19:ce:4b:3b:8b: 29:77:ff:15:d4:99:30:44:cc:5e:0c:86:ea:1f:93:12: 2a:14:db:39:9b:8e:0c:14:b9:d5:1b:cf:fc:54:b6:d8: c0:ec:96:15:31:55:14:51:4f:d9:a1:73:b4:58:f8:e7: b0:1b:87:e2:48:8c:06:b8:6d:51:e7:91:7a:73:43:5c: af:5a:2f:5c:cd:dc:1b:db:b4:52:9e:91:94:4b:24:ab: 11:47:6a:0a:3f:34:97:29:e5:db:37:33:a6:10:50:7f: 8b:4b:ce:c2:1e:e2:d0:5a:92:3e:e9:c1:22:9d:0a:83: cc:ef:de:e1:0b:4c:d7:17:d9:e7:f5:4e:0f:34:cb:85: 5f:bd:78:ea:ad:18:f7:49:55:82:14:eb:24:ca:1d:57: 29:2f:9c:32:4f:14:d5:99:d5:5e:a7:c1:56:7e:26:6b: 43:98:47:be:74:30:4a:6e:7d:60:7e:92:ee:5e:da:28: a6:8b:93:4d:7b:91:67:d9:dd:1b:25:da:6d:c9:60:29: 49:06:9a:66:4d:2e:ca:da:0f:b4:f5:e8:62:81:3b:35: 2d:45:6c:4c:b4:66:3d:22:d5:dc:24:8a:34:a1:f7:21 Fingerprint (SHA-256): 63:55:9F:0C:0B:99:C7:D9:9D:D7:5E:21:4E:0D:FA:1D:29:F7:7F:A2:1D:15:4C:71:B4:97:45:6B:F7:8C:61:36 Fingerprint (SHA1): 8A:C7:33:14:73:7A:30:FE:11:7C:91:65:49:C8:42:E2:9A:BD:82:D3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #406: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141465 (0x3caf9b19) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:11 2023 Not After : Wed Oct 18 14:15:11 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:fc:44:ef:af:4e:43:b8:17:f7:cc:ab:5a:27:9a:0e: 03:a5:01:a1:1e:e0:76:20:e5:4e:26:05:e4:8b:c4:31: 8b:27:3b:66:f4:c1:20:50:63:f9:fa:69:ab:15:1e:dc: e7:e2:f5:5c:3b:58:b5:52:95:fa:3d:3b:cf:51:5f:c4: 13:e4:73:1b:e3:55:0f:17:fd:ef:36:c4:6d:4c:c8:f8: c4:e4:d8:9a:b6:fa:88:15:71:2e:1c:3f:fa:27:34:2f: be:8c:58:b6:f3:24:2b:91:72:7f:1f:da:40:72:72:57: 2c:c8:23:cb:21:3f:e2:fb:29:ae:0f:ba:ce:97:a2:e7: c8:fe:9f:c2:40:c1:79:1a:48:0d:06:c3:64:e3:58:00: db:11:05:f2:45:72:f1:24:83:b0:aa:11:77:3e:4b:96: f9:7c:f0:91:fa:d1:d2:a0:74:e1:05:2d:7c:72:1d:37: 70:e3:4a:ac:ff:80:19:24:87:12:bd:21:df:e8:dc:d0: 27:fe:32:80:1d:04:06:14:47:3e:5c:b1:ad:6b:31:83: f0:be:09:2c:d8:bb:b3:5b:90:2b:34:52:0e:ba:52:fb: 7a:70:d5:47:31:4c:b5:ec:58:be:21:68:22:60:31:f4: f3:ce:42:15:46:e5:83:d8:d3:73:59:e9:b5:36:36:91 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:b9:6f:26:a6:08:47:03:5d:98:e4:d0:b0:14:ed:cd: b2:4b:c9:eb:0f:25:6c:1a:c4:54:85:19:ce:4b:3b:8b: 29:77:ff:15:d4:99:30:44:cc:5e:0c:86:ea:1f:93:12: 2a:14:db:39:9b:8e:0c:14:b9:d5:1b:cf:fc:54:b6:d8: c0:ec:96:15:31:55:14:51:4f:d9:a1:73:b4:58:f8:e7: b0:1b:87:e2:48:8c:06:b8:6d:51:e7:91:7a:73:43:5c: af:5a:2f:5c:cd:dc:1b:db:b4:52:9e:91:94:4b:24:ab: 11:47:6a:0a:3f:34:97:29:e5:db:37:33:a6:10:50:7f: 8b:4b:ce:c2:1e:e2:d0:5a:92:3e:e9:c1:22:9d:0a:83: cc:ef:de:e1:0b:4c:d7:17:d9:e7:f5:4e:0f:34:cb:85: 5f:bd:78:ea:ad:18:f7:49:55:82:14:eb:24:ca:1d:57: 29:2f:9c:32:4f:14:d5:99:d5:5e:a7:c1:56:7e:26:6b: 43:98:47:be:74:30:4a:6e:7d:60:7e:92:ee:5e:da:28: a6:8b:93:4d:7b:91:67:d9:dd:1b:25:da:6d:c9:60:29: 49:06:9a:66:4d:2e:ca:da:0f:b4:f5:e8:62:81:3b:35: 2d:45:6c:4c:b4:66:3d:22:d5:dc:24:8a:34:a1:f7:21 Fingerprint (SHA-256): 63:55:9F:0C:0B:99:C7:D9:9D:D7:5E:21:4E:0D:FA:1D:29:F7:7F:A2:1D:15:4C:71:B4:97:45:6B:F7:8C:61:36 Fingerprint (SHA1): 8A:C7:33:14:73:7A:30:FE:11:7C:91:65:49:C8:42:E2:9A:BD:82:D3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #407: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141466 (0x3caf9b1a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:11 2023 Not After : Wed Oct 18 14:15:11 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:62:ad:00:22:98:b7:5a:14:33:c7:91:38:73:af:5e: e5:f0:6d:d6:8f:33:8f:32:23:00:7f:72:ea:58:e4:3e: c1:40:10:e7:8f:fb:98:55:0d:6f:6b:99:d4:a8:4b:2a: 66:df:33:7a:2f:f9:0a:e9:a1:30:76:57:21:cf:91:ab: cf:34:f3:67:bb:15:79:c2:e0:7e:10:f1:13:af:2d:c3: ec:a8:6f:55:c3:7f:87:e1:c5:f5:2d:b9:e2:e8:7e:25: 33:6f:96:b0:fa:8f:ca:af:7b:89:20:7b:8f:95:57:f8: 23:41:65:f4:a1:aa:84:47:1f:22:b0:d5:84:3b:bb:c2: 3c:8e:f6:4d:38:1e:b2:c0:45:af:90:56:28:a8:95:00: a4:f7:6c:9f:5b:c5:73:0e:8f:aa:ca:ae:21:9f:6c:87: 2e:97:05:8e:26:91:b4:8f:1f:36:00:89:ca:5e:30:90: 73:5f:83:12:ef:19:7f:5c:a6:3e:ed:20:21:ce:92:ef: 89:49:51:02:e2:79:05:e3:72:e8:67:03:82:a2:ee:76: 40:17:b6:91:1e:71:45:c8:28:f5:e7:3d:68:d7:4e:20: f6:c8:4c:58:23:ed:5b:d0:b1:19:62:bc:1b:d7:54:2c: ab:9c:b8:49:c1:87:b7:04:a8:cd:8f:44:dc:84:ee:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:74:9d:6e:57:5c:e3:7d:02:e2:84:85:bf:75:52:d5: d0:c6:f4:73:6b:4c:64:b4:df:94:7c:23:11:17:df:2f: 37:2c:ce:e4:b4:7d:79:a0:ed:27:18:1e:a0:66:f3:8f: ec:94:71:f9:5e:60:25:d0:cd:34:be:d7:3d:54:8e:11: 15:a8:14:5b:f1:0e:e9:66:f6:cc:2d:3e:7b:69:af:af: 0f:d5:0d:8b:04:1a:79:3a:fa:e0:15:72:01:36:53:df: 29:22:3d:8d:b0:bc:8d:26:2c:d8:0b:68:d9:ec:30:bc: ee:e0:3c:d7:57:7e:39:b8:2a:3e:ef:b0:c5:af:01:9c: 3c:6c:08:20:ff:3a:8f:37:22:8b:06:75:eb:bb:28:e4: f7:45:74:9f:f5:19:3f:fe:d5:69:59:a8:99:c7:15:de: 19:75:fa:04:9e:da:a5:93:cf:d1:2b:86:ce:bd:fd:f2: c3:70:cb:68:fc:b3:ca:50:b5:a7:71:0e:c3:ae:43:51: 30:7e:96:96:ef:04:43:95:ae:c7:ac:b4:8f:94:9d:2c: 07:c8:97:32:9e:57:c1:cc:50:58:62:40:cd:a1:aa:d2: 3f:87:9c:5f:25:40:a9:30:c3:99:b8:9b:46:87:2f:13: e9:bd:c0:ca:cd:69:d6:f3:8b:40:a5:88:12:57:b9:75 Fingerprint (SHA-256): F0:4C:0F:AE:29:CD:97:46:68:5F:9B:73:92:90:35:95:DC:62:F5:26:8D:B7:B0:6F:FA:3F:C7:0C:F3:11:8C:E1 Fingerprint (SHA1): FE:04:96:BE:5E:62:8E:85:34:53:9B:53:F1:12:F7:02:1B:7A:64:A2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #408: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141466 (0x3caf9b1a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:11 2023 Not After : Wed Oct 18 14:15:11 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:62:ad:00:22:98:b7:5a:14:33:c7:91:38:73:af:5e: e5:f0:6d:d6:8f:33:8f:32:23:00:7f:72:ea:58:e4:3e: c1:40:10:e7:8f:fb:98:55:0d:6f:6b:99:d4:a8:4b:2a: 66:df:33:7a:2f:f9:0a:e9:a1:30:76:57:21:cf:91:ab: cf:34:f3:67:bb:15:79:c2:e0:7e:10:f1:13:af:2d:c3: ec:a8:6f:55:c3:7f:87:e1:c5:f5:2d:b9:e2:e8:7e:25: 33:6f:96:b0:fa:8f:ca:af:7b:89:20:7b:8f:95:57:f8: 23:41:65:f4:a1:aa:84:47:1f:22:b0:d5:84:3b:bb:c2: 3c:8e:f6:4d:38:1e:b2:c0:45:af:90:56:28:a8:95:00: a4:f7:6c:9f:5b:c5:73:0e:8f:aa:ca:ae:21:9f:6c:87: 2e:97:05:8e:26:91:b4:8f:1f:36:00:89:ca:5e:30:90: 73:5f:83:12:ef:19:7f:5c:a6:3e:ed:20:21:ce:92:ef: 89:49:51:02:e2:79:05:e3:72:e8:67:03:82:a2:ee:76: 40:17:b6:91:1e:71:45:c8:28:f5:e7:3d:68:d7:4e:20: f6:c8:4c:58:23:ed:5b:d0:b1:19:62:bc:1b:d7:54:2c: ab:9c:b8:49:c1:87:b7:04:a8:cd:8f:44:dc:84:ee:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:74:9d:6e:57:5c:e3:7d:02:e2:84:85:bf:75:52:d5: d0:c6:f4:73:6b:4c:64:b4:df:94:7c:23:11:17:df:2f: 37:2c:ce:e4:b4:7d:79:a0:ed:27:18:1e:a0:66:f3:8f: ec:94:71:f9:5e:60:25:d0:cd:34:be:d7:3d:54:8e:11: 15:a8:14:5b:f1:0e:e9:66:f6:cc:2d:3e:7b:69:af:af: 0f:d5:0d:8b:04:1a:79:3a:fa:e0:15:72:01:36:53:df: 29:22:3d:8d:b0:bc:8d:26:2c:d8:0b:68:d9:ec:30:bc: ee:e0:3c:d7:57:7e:39:b8:2a:3e:ef:b0:c5:af:01:9c: 3c:6c:08:20:ff:3a:8f:37:22:8b:06:75:eb:bb:28:e4: f7:45:74:9f:f5:19:3f:fe:d5:69:59:a8:99:c7:15:de: 19:75:fa:04:9e:da:a5:93:cf:d1:2b:86:ce:bd:fd:f2: c3:70:cb:68:fc:b3:ca:50:b5:a7:71:0e:c3:ae:43:51: 30:7e:96:96:ef:04:43:95:ae:c7:ac:b4:8f:94:9d:2c: 07:c8:97:32:9e:57:c1:cc:50:58:62:40:cd:a1:aa:d2: 3f:87:9c:5f:25:40:a9:30:c3:99:b8:9b:46:87:2f:13: e9:bd:c0:ca:cd:69:d6:f3:8b:40:a5:88:12:57:b9:75 Fingerprint (SHA-256): F0:4C:0F:AE:29:CD:97:46:68:5F:9B:73:92:90:35:95:DC:62:F5:26:8D:B7:B0:6F:FA:3F:C7:0C:F3:11:8C:E1 Fingerprint (SHA1): FE:04:96:BE:5E:62:8E:85:34:53:9B:53:F1:12:F7:02:1B:7A:64:A2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #409: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141467 (0x3caf9b1b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:15:12 2023 Not After : Wed Oct 18 14:15:12 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:fe:cf:cd:2f:a5:7a:1a:81:f5:8e:6d:87:86:60:53: 04:b3:45:80:6b:bd:fb:db:bb:70:fe:2d:5d:95:5d:01: d2:65:dc:90:16:af:2a:09:fa:f3:66:b5:0e:4c:ae:e2: 4e:d2:84:dd:31:7a:c5:49:43:3e:6f:96:89:49:dd:99: 93:a8:7d:0d:2e:22:2e:e6:53:97:28:41:7a:f8:64:87: ca:af:3b:d6:71:0e:24:2b:21:08:d5:05:a6:2a:37:31: 84:b4:fa:23:e5:c3:a0:e6:b9:76:ca:0a:9a:b7:53:78: f1:82:e2:7a:59:9d:bd:66:c1:4f:7e:67:38:00:a9:cd: ae:d6:e3:fe:0e:2a:37:e9:0b:c4:9d:73:ad:fa:3f:e9: ed:ef:15:c8:00:77:68:89:f1:30:36:5f:ef:d7:1c:bc: 61:c9:dd:ff:94:04:c0:92:78:2b:84:91:76:3f:fe:b9: 40:19:70:ac:a2:06:57:f3:ed:35:09:74:d8:fa:f1:06: 17:f6:69:67:09:ed:4a:83:74:1f:11:a2:1d:f0:43:9d: 8f:c7:ce:40:aa:e8:ed:c1:79:12:18:3f:40:b2:89:b8: 27:86:c0:79:65:ff:8d:ca:d2:2a:84:d8:31:a9:2d:b0: d7:e5:80:1f:7f:9d:6f:bf:71:76:a8:67:47:11:ab:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:c5:ce:73:26:07:22:6f:d0:55:a8:5e:94:22:a8:d1: 23:2a:54:fc:5d:09:0c:a2:70:64:27:1b:ca:98:40:6f: 0a:43:4d:4e:89:f6:13:0a:9d:22:13:8e:a9:b9:32:f3: ff:44:55:27:8b:e0:cf:83:f7:33:e1:d9:34:aa:37:57: 40:a2:f3:86:df:81:6c:fc:cb:d0:29:bf:21:21:ea:cf: 77:90:91:86:bc:f5:84:98:80:a8:4a:95:f6:78:60:ef: f6:54:06:5b:78:75:bf:d2:fd:81:54:27:18:bb:22:e1: 43:00:fb:26:38:9f:b9:a4:59:1c:d5:3d:02:57:f3:41: 29:d2:e1:58:ba:8e:a5:62:55:36:01:3f:86:5e:87:18: 9b:3b:08:e6:dc:92:2a:fd:9f:60:15:b5:2e:b0:a7:3a: 6e:41:59:59:f6:cd:cb:f0:33:74:11:24:36:e2:2b:a4: 75:f6:2d:49:ae:e9:23:2f:cf:75:c8:32:91:d9:6e:8b: 1e:22:7d:db:b3:a5:b7:ce:f2:fa:44:f8:10:19:97:ba: 2e:43:09:03:10:01:bd:74:ca:bb:49:e9:f9:d3:2e:57: 07:93:b4:cb:83:77:9b:f6:25:d9:93:ee:41:57:e5:30: 8f:dd:9a:29:d3:fe:9d:08:a1:27:7f:c3:3e:75:a9:8e Fingerprint (SHA-256): 5B:42:DC:D0:68:28:AE:AC:62:0E:C3:35:0C:EB:7B:1B:8F:CB:B2:C9:47:36:6B:C5:42:CC:93:AA:1A:AA:E6:15 Fingerprint (SHA1): FA:DA:5B:45:FC:DA:D0:51:79:D2:F0:F4:48:85:C8:0A:DC:0F:97:C8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #410: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141467 (0x3caf9b1b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:15:12 2023 Not After : Wed Oct 18 14:15:12 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:fe:cf:cd:2f:a5:7a:1a:81:f5:8e:6d:87:86:60:53: 04:b3:45:80:6b:bd:fb:db:bb:70:fe:2d:5d:95:5d:01: d2:65:dc:90:16:af:2a:09:fa:f3:66:b5:0e:4c:ae:e2: 4e:d2:84:dd:31:7a:c5:49:43:3e:6f:96:89:49:dd:99: 93:a8:7d:0d:2e:22:2e:e6:53:97:28:41:7a:f8:64:87: ca:af:3b:d6:71:0e:24:2b:21:08:d5:05:a6:2a:37:31: 84:b4:fa:23:e5:c3:a0:e6:b9:76:ca:0a:9a:b7:53:78: f1:82:e2:7a:59:9d:bd:66:c1:4f:7e:67:38:00:a9:cd: ae:d6:e3:fe:0e:2a:37:e9:0b:c4:9d:73:ad:fa:3f:e9: ed:ef:15:c8:00:77:68:89:f1:30:36:5f:ef:d7:1c:bc: 61:c9:dd:ff:94:04:c0:92:78:2b:84:91:76:3f:fe:b9: 40:19:70:ac:a2:06:57:f3:ed:35:09:74:d8:fa:f1:06: 17:f6:69:67:09:ed:4a:83:74:1f:11:a2:1d:f0:43:9d: 8f:c7:ce:40:aa:e8:ed:c1:79:12:18:3f:40:b2:89:b8: 27:86:c0:79:65:ff:8d:ca:d2:2a:84:d8:31:a9:2d:b0: d7:e5:80:1f:7f:9d:6f:bf:71:76:a8:67:47:11:ab:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7c:c5:ce:73:26:07:22:6f:d0:55:a8:5e:94:22:a8:d1: 23:2a:54:fc:5d:09:0c:a2:70:64:27:1b:ca:98:40:6f: 0a:43:4d:4e:89:f6:13:0a:9d:22:13:8e:a9:b9:32:f3: ff:44:55:27:8b:e0:cf:83:f7:33:e1:d9:34:aa:37:57: 40:a2:f3:86:df:81:6c:fc:cb:d0:29:bf:21:21:ea:cf: 77:90:91:86:bc:f5:84:98:80:a8:4a:95:f6:78:60:ef: f6:54:06:5b:78:75:bf:d2:fd:81:54:27:18:bb:22:e1: 43:00:fb:26:38:9f:b9:a4:59:1c:d5:3d:02:57:f3:41: 29:d2:e1:58:ba:8e:a5:62:55:36:01:3f:86:5e:87:18: 9b:3b:08:e6:dc:92:2a:fd:9f:60:15:b5:2e:b0:a7:3a: 6e:41:59:59:f6:cd:cb:f0:33:74:11:24:36:e2:2b:a4: 75:f6:2d:49:ae:e9:23:2f:cf:75:c8:32:91:d9:6e:8b: 1e:22:7d:db:b3:a5:b7:ce:f2:fa:44:f8:10:19:97:ba: 2e:43:09:03:10:01:bd:74:ca:bb:49:e9:f9:d3:2e:57: 07:93:b4:cb:83:77:9b:f6:25:d9:93:ee:41:57:e5:30: 8f:dd:9a:29:d3:fe:9d:08:a1:27:7f:c3:3e:75:a9:8e Fingerprint (SHA-256): 5B:42:DC:D0:68:28:AE:AC:62:0E:C3:35:0C:EB:7B:1B:8F:CB:B2:C9:47:36:6B:C5:42:CC:93:AA:1A:AA:E6:15 Fingerprint (SHA1): FA:DA:5B:45:FC:DA:D0:51:79:D2:F0:F4:48:85:C8:0A:DC:0F:97:C8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #411: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #412: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141470 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #413: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #414: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #415: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #416: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018141471 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #417: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #418: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #419: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #420: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018141472 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #421: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #422: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #423: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #424: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1018141473 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #425: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #426: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #427: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #428: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018141474 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #429: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #430: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #431: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #432: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018141475 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #433: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #434: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #435: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #436: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1018141476 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #437: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #438: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #439: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #440: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #441: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #442: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #443: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141470 (0x3caf9b1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:15:14 2023 Not After : Wed Oct 18 14:15:14 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:a1:7c:86:89:8f:0f:2a:d1:47:26:25:d5:82:d6:3d: d6:38:bc:d7:83:3b:b8:27:97:0f:2c:20:41:b6:38:91: d0:9b:4a:38:d2:ce:94:a0:ce:b4:ae:a0:ca:91:40:7a: 83:3c:dd:49:8e:a9:f3:75:ef:9f:78:34:8d:a6:ec:be: 73:0d:f9:d0:f0:0d:fb:85:3e:ee:71:91:a3:cd:27:5c: 30:10:05:7d:ed:a5:76:f7:8b:51:97:eb:75:23:77:27: ab:56:ba:1e:3b:60:06:c2:b9:d1:46:45:e6:f4:b1:4c: b4:91:7a:ad:ed:03:f1:00:15:ec:e5:80:a5:53:b6:32: 1d:cb:3f:bb:86:1c:06:de:b9:98:c4:28:45:f8:33:2d: 4a:2f:6b:ac:24:3a:49:16:51:bb:f1:8c:8c:9d:90:9f: 13:a8:62:83:0c:c7:17:bf:0e:c8:b0:b8:46:c9:66:94: b2:1e:1d:98:03:14:4e:6f:43:5f:f4:bf:80:37:54:fa: 97:f2:64:79:3f:11:a2:39:09:21:7a:72:cd:4c:ee:d3: cb:30:59:cf:7f:8a:28:91:e0:53:f4:21:8f:a6:29:48: 47:a6:69:f2:a6:90:11:0e:eb:f5:f1:47:02:a4:e2:e5: f7:0a:65:dd:85:76:36:78:01:fe:61:16:0d:4d:8e:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:69:8e:07:b6:63:c9:be:4a:4c:c0:f4:83:40:a6:82: 24:b5:b9:a2:82:c7:54:68:08:9a:d7:3b:bb:78:c1:3c: 83:68:d1:43:05:c5:36:1a:61:76:a8:12:fe:3e:47:03: 00:8f:b2:1d:96:9f:ef:15:82:1b:cd:e9:d0:f2:96:62: 45:70:f9:09:67:ee:21:ee:7a:c9:97:3f:a2:b0:a9:cb: 6e:a1:43:93:ee:2b:20:a0:2f:66:30:54:a9:cf:71:6f: 7f:cd:fe:0d:87:14:09:40:7c:c3:97:f7:50:60:b6:2c: 8f:e4:fe:ab:2c:bf:87:1a:82:0f:a9:ed:12:53:50:13: c4:8b:f1:c5:6c:17:9a:29:89:c5:a1:f7:9b:92:14:1f: e1:7a:ea:3d:42:5a:88:a8:80:f9:80:be:87:73:2a:ee: a0:c8:cb:b9:b8:9a:93:06:91:4a:35:95:9a:1a:80:e2: fe:b3:d8:6c:b4:d7:f6:43:df:83:eb:99:84:da:76:4e: 27:97:36:64:a0:09:e5:91:f4:63:e3:61:20:06:b9:8d: 0d:f4:1a:b4:d3:f5:f9:da:59:30:c2:a9:e4:16:07:fa: de:3b:c9:8c:51:73:55:b8:f3:f5:53:14:93:a7:77:29: 19:ba:9d:c4:bc:c6:d9:71:7d:77:a6:a6:28:73:13:c0 Fingerprint (SHA-256): 23:C6:85:E1:C1:9E:61:F4:C1:41:C6:F2:19:A8:27:43:ED:40:EC:99:DC:BB:65:F4:3D:15:14:BE:D4:7D:76:3D Fingerprint (SHA1): 24:51:F7:3F:60:71:E4:DE:06:A3:70:48:71:0D:76:03:21:04:F0:CE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #444: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #445: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #446: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #447: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141470 (0x3caf9b1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:15:14 2023 Not After : Wed Oct 18 14:15:14 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:a1:7c:86:89:8f:0f:2a:d1:47:26:25:d5:82:d6:3d: d6:38:bc:d7:83:3b:b8:27:97:0f:2c:20:41:b6:38:91: d0:9b:4a:38:d2:ce:94:a0:ce:b4:ae:a0:ca:91:40:7a: 83:3c:dd:49:8e:a9:f3:75:ef:9f:78:34:8d:a6:ec:be: 73:0d:f9:d0:f0:0d:fb:85:3e:ee:71:91:a3:cd:27:5c: 30:10:05:7d:ed:a5:76:f7:8b:51:97:eb:75:23:77:27: ab:56:ba:1e:3b:60:06:c2:b9:d1:46:45:e6:f4:b1:4c: b4:91:7a:ad:ed:03:f1:00:15:ec:e5:80:a5:53:b6:32: 1d:cb:3f:bb:86:1c:06:de:b9:98:c4:28:45:f8:33:2d: 4a:2f:6b:ac:24:3a:49:16:51:bb:f1:8c:8c:9d:90:9f: 13:a8:62:83:0c:c7:17:bf:0e:c8:b0:b8:46:c9:66:94: b2:1e:1d:98:03:14:4e:6f:43:5f:f4:bf:80:37:54:fa: 97:f2:64:79:3f:11:a2:39:09:21:7a:72:cd:4c:ee:d3: cb:30:59:cf:7f:8a:28:91:e0:53:f4:21:8f:a6:29:48: 47:a6:69:f2:a6:90:11:0e:eb:f5:f1:47:02:a4:e2:e5: f7:0a:65:dd:85:76:36:78:01:fe:61:16:0d:4d:8e:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:69:8e:07:b6:63:c9:be:4a:4c:c0:f4:83:40:a6:82: 24:b5:b9:a2:82:c7:54:68:08:9a:d7:3b:bb:78:c1:3c: 83:68:d1:43:05:c5:36:1a:61:76:a8:12:fe:3e:47:03: 00:8f:b2:1d:96:9f:ef:15:82:1b:cd:e9:d0:f2:96:62: 45:70:f9:09:67:ee:21:ee:7a:c9:97:3f:a2:b0:a9:cb: 6e:a1:43:93:ee:2b:20:a0:2f:66:30:54:a9:cf:71:6f: 7f:cd:fe:0d:87:14:09:40:7c:c3:97:f7:50:60:b6:2c: 8f:e4:fe:ab:2c:bf:87:1a:82:0f:a9:ed:12:53:50:13: c4:8b:f1:c5:6c:17:9a:29:89:c5:a1:f7:9b:92:14:1f: e1:7a:ea:3d:42:5a:88:a8:80:f9:80:be:87:73:2a:ee: a0:c8:cb:b9:b8:9a:93:06:91:4a:35:95:9a:1a:80:e2: fe:b3:d8:6c:b4:d7:f6:43:df:83:eb:99:84:da:76:4e: 27:97:36:64:a0:09:e5:91:f4:63:e3:61:20:06:b9:8d: 0d:f4:1a:b4:d3:f5:f9:da:59:30:c2:a9:e4:16:07:fa: de:3b:c9:8c:51:73:55:b8:f3:f5:53:14:93:a7:77:29: 19:ba:9d:c4:bc:c6:d9:71:7d:77:a6:a6:28:73:13:c0 Fingerprint (SHA-256): 23:C6:85:E1:C1:9E:61:F4:C1:41:C6:F2:19:A8:27:43:ED:40:EC:99:DC:BB:65:F4:3D:15:14:BE:D4:7D:76:3D Fingerprint (SHA1): 24:51:F7:3F:60:71:E4:DE:06:A3:70:48:71:0D:76:03:21:04:F0:CE Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #448: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #449: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #450: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141477 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #451: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #452: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #453: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #454: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018141478 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #455: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #456: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #457: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #458: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1018141479 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #459: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #460: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #461: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #462: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1018141480 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #463: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #464: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #465: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #466: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1018141481 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #467: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #468: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #469: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #470: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1018141482 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #471: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #472: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #473: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #474: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1018141483 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #475: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #476: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #477: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #478: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1018141484 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #479: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #480: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #481: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #482: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1018141485 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #483: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #484: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #485: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #486: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1018141486 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #487: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #488: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #489: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #490: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1018141487 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #491: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #492: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #493: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #494: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1018141488 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #495: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #496: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #497: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #498: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1018141489 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #499: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #500: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #501: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #502: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1018141490 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #503: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #504: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #505: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #506: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1018141491 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #507: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #508: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #509: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #510: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1018141492 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #511: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #512: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #513: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #514: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1018141493 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #515: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #516: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #517: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #518: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1018141494 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #519: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #520: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #521: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #522: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1018141495 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #523: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #524: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #525: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #526: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1018141496 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #527: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #528: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #529: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #530: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1018141497 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #531: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #532: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #533: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #534: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1018141498 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #535: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #536: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #537: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #538: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1018141499 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #539: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #540: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #541: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #542: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1018141500 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #543: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #544: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #545: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #546: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1018141501 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #547: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #548: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #549: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #550: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1018141502 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #551: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #552: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #553: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #554: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1018141503 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #555: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #556: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #557: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #558: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1018141504 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #559: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #560: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #561: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #562: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1018141505 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #563: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #564: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #565: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #566: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1018141506 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #567: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #568: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #569: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141477 (0x3caf9b25) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:15:18 2023 Not After : Wed Oct 18 14:15:18 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:ad:9c:a7:c6:2d:e9:b0:83:7c:11:2d:83:02:ca:af: 28:7f:dc:24:9a:94:92:df:33:41:9a:40:69:dc:c6:ae: bc:46:42:54:68:4e:e8:ef:58:3c:7a:42:c4:4b:3e:c2: 7e:f0:49:80:f5:f3:ae:80:b4:56:cf:32:af:fc:0f:f3: 66:71:7f:aa:2f:15:c0:de:c9:5a:80:02:be:13:75:1e: 38:6d:2a:ce:9c:25:48:19:b5:c7:23:86:3e:b2:73:16: 1c:4f:4f:fe:53:0b:76:0f:39:c3:d0:e2:67:24:76:bd: a9:3a:b0:69:e0:ee:1b:9e:4f:83:4c:4c:51:b4:19:f6: cf:95:7a:c6:4e:06:50:03:5e:e9:a9:46:c2:93:95:63: cd:f1:aa:c5:8b:7b:5d:f3:68:9b:73:87:b6:fa:12:57: 14:0e:4a:5e:16:b5:d4:b6:b0:e9:25:66:96:2c:94:b6: 8f:c5:8b:80:74:df:2e:98:83:00:57:bd:fc:b2:7e:8c: 1f:73:78:5c:f3:bc:92:c6:a8:b9:28:5e:0d:1f:1c:c2: 59:c5:07:78:97:34:aa:e5:84:ac:c6:42:a8:81:50:b6: 9f:38:f4:b2:b6:05:4c:6d:0c:29:e0:7f:c8:18:77:8b: 71:ee:cf:af:1d:31:cd:a9:79:4c:d1:f2:02:d9:3d:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:b9:eb:06:0c:7a:c4:c8:c9:10:39:0b:a2:5b:1b:2c: b1:b7:91:f1:79:73:da:2e:fc:aa:8e:b9:bf:69:a2:32: 28:d6:ac:a9:08:bc:35:1f:f9:7c:b3:dd:9a:c4:0a:20: 77:a3:37:31:4a:02:96:a5:21:b4:7a:17:7c:de:6f:bc: e8:6e:c8:94:a7:d9:f2:70:8d:fa:49:7d:88:2f:1e:4b: 80:12:10:9d:d7:db:ff:42:59:7c:c2:2c:8a:05:75:d0: c2:dc:84:67:10:aa:36:63:c1:d3:7e:b5:28:78:dc:c2: 1a:14:1b:1c:1a:42:06:57:cd:38:8c:32:e5:d4:36:07: 1a:f6:73:2e:7f:45:0c:1b:f8:f4:b8:cf:ca:b0:c1:66: b3:6f:95:39:18:87:e9:a9:8d:00:52:dc:87:c5:6b:22: 87:07:e5:29:7c:fe:1e:3e:fe:61:50:af:a8:3b:cf:d9: ed:d3:c4:07:d5:5d:f8:e4:86:dd:ec:18:52:82:60:99: f6:f6:5b:8c:59:c9:b6:bc:cb:8b:89:33:67:2b:f5:e6: df:2b:dd:ec:46:3b:35:82:e2:06:ab:22:5f:62:bc:1c: 26:29:e9:81:a1:d6:fd:62:6b:68:5f:18:c0:f3:82:a4: dc:9c:0f:fb:66:1e:51:86:5e:09:e9:de:2f:75:67:58 Fingerprint (SHA-256): C8:B3:95:02:3B:E8:62:99:B8:A4:8E:A3:C9:53:BE:A3:C0:07:23:11:83:B3:11:FC:EB:80:27:1F:13:6B:30:3A Fingerprint (SHA1): BC:EC:06:C4:87:0E:11:31:51:E3:E6:73:D0:CD:CA:E2:20:00:68:D2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #570: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #571: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141477 (0x3caf9b25) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:15:18 2023 Not After : Wed Oct 18 14:15:18 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:ad:9c:a7:c6:2d:e9:b0:83:7c:11:2d:83:02:ca:af: 28:7f:dc:24:9a:94:92:df:33:41:9a:40:69:dc:c6:ae: bc:46:42:54:68:4e:e8:ef:58:3c:7a:42:c4:4b:3e:c2: 7e:f0:49:80:f5:f3:ae:80:b4:56:cf:32:af:fc:0f:f3: 66:71:7f:aa:2f:15:c0:de:c9:5a:80:02:be:13:75:1e: 38:6d:2a:ce:9c:25:48:19:b5:c7:23:86:3e:b2:73:16: 1c:4f:4f:fe:53:0b:76:0f:39:c3:d0:e2:67:24:76:bd: a9:3a:b0:69:e0:ee:1b:9e:4f:83:4c:4c:51:b4:19:f6: cf:95:7a:c6:4e:06:50:03:5e:e9:a9:46:c2:93:95:63: cd:f1:aa:c5:8b:7b:5d:f3:68:9b:73:87:b6:fa:12:57: 14:0e:4a:5e:16:b5:d4:b6:b0:e9:25:66:96:2c:94:b6: 8f:c5:8b:80:74:df:2e:98:83:00:57:bd:fc:b2:7e:8c: 1f:73:78:5c:f3:bc:92:c6:a8:b9:28:5e:0d:1f:1c:c2: 59:c5:07:78:97:34:aa:e5:84:ac:c6:42:a8:81:50:b6: 9f:38:f4:b2:b6:05:4c:6d:0c:29:e0:7f:c8:18:77:8b: 71:ee:cf:af:1d:31:cd:a9:79:4c:d1:f2:02:d9:3d:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:b9:eb:06:0c:7a:c4:c8:c9:10:39:0b:a2:5b:1b:2c: b1:b7:91:f1:79:73:da:2e:fc:aa:8e:b9:bf:69:a2:32: 28:d6:ac:a9:08:bc:35:1f:f9:7c:b3:dd:9a:c4:0a:20: 77:a3:37:31:4a:02:96:a5:21:b4:7a:17:7c:de:6f:bc: e8:6e:c8:94:a7:d9:f2:70:8d:fa:49:7d:88:2f:1e:4b: 80:12:10:9d:d7:db:ff:42:59:7c:c2:2c:8a:05:75:d0: c2:dc:84:67:10:aa:36:63:c1:d3:7e:b5:28:78:dc:c2: 1a:14:1b:1c:1a:42:06:57:cd:38:8c:32:e5:d4:36:07: 1a:f6:73:2e:7f:45:0c:1b:f8:f4:b8:cf:ca:b0:c1:66: b3:6f:95:39:18:87:e9:a9:8d:00:52:dc:87:c5:6b:22: 87:07:e5:29:7c:fe:1e:3e:fe:61:50:af:a8:3b:cf:d9: ed:d3:c4:07:d5:5d:f8:e4:86:dd:ec:18:52:82:60:99: f6:f6:5b:8c:59:c9:b6:bc:cb:8b:89:33:67:2b:f5:e6: df:2b:dd:ec:46:3b:35:82:e2:06:ab:22:5f:62:bc:1c: 26:29:e9:81:a1:d6:fd:62:6b:68:5f:18:c0:f3:82:a4: dc:9c:0f:fb:66:1e:51:86:5e:09:e9:de:2f:75:67:58 Fingerprint (SHA-256): C8:B3:95:02:3B:E8:62:99:B8:A4:8E:A3:C9:53:BE:A3:C0:07:23:11:83:B3:11:FC:EB:80:27:1F:13:6B:30:3A Fingerprint (SHA1): BC:EC:06:C4:87:0E:11:31:51:E3:E6:73:D0:CD:CA:E2:20:00:68:D2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #572: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #573: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #574: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #575: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141477 (0x3caf9b25) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:15:18 2023 Not After : Wed Oct 18 14:15:18 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:ad:9c:a7:c6:2d:e9:b0:83:7c:11:2d:83:02:ca:af: 28:7f:dc:24:9a:94:92:df:33:41:9a:40:69:dc:c6:ae: bc:46:42:54:68:4e:e8:ef:58:3c:7a:42:c4:4b:3e:c2: 7e:f0:49:80:f5:f3:ae:80:b4:56:cf:32:af:fc:0f:f3: 66:71:7f:aa:2f:15:c0:de:c9:5a:80:02:be:13:75:1e: 38:6d:2a:ce:9c:25:48:19:b5:c7:23:86:3e:b2:73:16: 1c:4f:4f:fe:53:0b:76:0f:39:c3:d0:e2:67:24:76:bd: a9:3a:b0:69:e0:ee:1b:9e:4f:83:4c:4c:51:b4:19:f6: cf:95:7a:c6:4e:06:50:03:5e:e9:a9:46:c2:93:95:63: cd:f1:aa:c5:8b:7b:5d:f3:68:9b:73:87:b6:fa:12:57: 14:0e:4a:5e:16:b5:d4:b6:b0:e9:25:66:96:2c:94:b6: 8f:c5:8b:80:74:df:2e:98:83:00:57:bd:fc:b2:7e:8c: 1f:73:78:5c:f3:bc:92:c6:a8:b9:28:5e:0d:1f:1c:c2: 59:c5:07:78:97:34:aa:e5:84:ac:c6:42:a8:81:50:b6: 9f:38:f4:b2:b6:05:4c:6d:0c:29:e0:7f:c8:18:77:8b: 71:ee:cf:af:1d:31:cd:a9:79:4c:d1:f2:02:d9:3d:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:b9:eb:06:0c:7a:c4:c8:c9:10:39:0b:a2:5b:1b:2c: b1:b7:91:f1:79:73:da:2e:fc:aa:8e:b9:bf:69:a2:32: 28:d6:ac:a9:08:bc:35:1f:f9:7c:b3:dd:9a:c4:0a:20: 77:a3:37:31:4a:02:96:a5:21:b4:7a:17:7c:de:6f:bc: e8:6e:c8:94:a7:d9:f2:70:8d:fa:49:7d:88:2f:1e:4b: 80:12:10:9d:d7:db:ff:42:59:7c:c2:2c:8a:05:75:d0: c2:dc:84:67:10:aa:36:63:c1:d3:7e:b5:28:78:dc:c2: 1a:14:1b:1c:1a:42:06:57:cd:38:8c:32:e5:d4:36:07: 1a:f6:73:2e:7f:45:0c:1b:f8:f4:b8:cf:ca:b0:c1:66: b3:6f:95:39:18:87:e9:a9:8d:00:52:dc:87:c5:6b:22: 87:07:e5:29:7c:fe:1e:3e:fe:61:50:af:a8:3b:cf:d9: ed:d3:c4:07:d5:5d:f8:e4:86:dd:ec:18:52:82:60:99: f6:f6:5b:8c:59:c9:b6:bc:cb:8b:89:33:67:2b:f5:e6: df:2b:dd:ec:46:3b:35:82:e2:06:ab:22:5f:62:bc:1c: 26:29:e9:81:a1:d6:fd:62:6b:68:5f:18:c0:f3:82:a4: dc:9c:0f:fb:66:1e:51:86:5e:09:e9:de:2f:75:67:58 Fingerprint (SHA-256): C8:B3:95:02:3B:E8:62:99:B8:A4:8E:A3:C9:53:BE:A3:C0:07:23:11:83:B3:11:FC:EB:80:27:1F:13:6B:30:3A Fingerprint (SHA1): BC:EC:06:C4:87:0E:11:31:51:E3:E6:73:D0:CD:CA:E2:20:00:68:D2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #576: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #577: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #578: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #579: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141477 (0x3caf9b25) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:15:18 2023 Not After : Wed Oct 18 14:15:18 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:ad:9c:a7:c6:2d:e9:b0:83:7c:11:2d:83:02:ca:af: 28:7f:dc:24:9a:94:92:df:33:41:9a:40:69:dc:c6:ae: bc:46:42:54:68:4e:e8:ef:58:3c:7a:42:c4:4b:3e:c2: 7e:f0:49:80:f5:f3:ae:80:b4:56:cf:32:af:fc:0f:f3: 66:71:7f:aa:2f:15:c0:de:c9:5a:80:02:be:13:75:1e: 38:6d:2a:ce:9c:25:48:19:b5:c7:23:86:3e:b2:73:16: 1c:4f:4f:fe:53:0b:76:0f:39:c3:d0:e2:67:24:76:bd: a9:3a:b0:69:e0:ee:1b:9e:4f:83:4c:4c:51:b4:19:f6: cf:95:7a:c6:4e:06:50:03:5e:e9:a9:46:c2:93:95:63: cd:f1:aa:c5:8b:7b:5d:f3:68:9b:73:87:b6:fa:12:57: 14:0e:4a:5e:16:b5:d4:b6:b0:e9:25:66:96:2c:94:b6: 8f:c5:8b:80:74:df:2e:98:83:00:57:bd:fc:b2:7e:8c: 1f:73:78:5c:f3:bc:92:c6:a8:b9:28:5e:0d:1f:1c:c2: 59:c5:07:78:97:34:aa:e5:84:ac:c6:42:a8:81:50:b6: 9f:38:f4:b2:b6:05:4c:6d:0c:29:e0:7f:c8:18:77:8b: 71:ee:cf:af:1d:31:cd:a9:79:4c:d1:f2:02:d9:3d:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:b9:eb:06:0c:7a:c4:c8:c9:10:39:0b:a2:5b:1b:2c: b1:b7:91:f1:79:73:da:2e:fc:aa:8e:b9:bf:69:a2:32: 28:d6:ac:a9:08:bc:35:1f:f9:7c:b3:dd:9a:c4:0a:20: 77:a3:37:31:4a:02:96:a5:21:b4:7a:17:7c:de:6f:bc: e8:6e:c8:94:a7:d9:f2:70:8d:fa:49:7d:88:2f:1e:4b: 80:12:10:9d:d7:db:ff:42:59:7c:c2:2c:8a:05:75:d0: c2:dc:84:67:10:aa:36:63:c1:d3:7e:b5:28:78:dc:c2: 1a:14:1b:1c:1a:42:06:57:cd:38:8c:32:e5:d4:36:07: 1a:f6:73:2e:7f:45:0c:1b:f8:f4:b8:cf:ca:b0:c1:66: b3:6f:95:39:18:87:e9:a9:8d:00:52:dc:87:c5:6b:22: 87:07:e5:29:7c:fe:1e:3e:fe:61:50:af:a8:3b:cf:d9: ed:d3:c4:07:d5:5d:f8:e4:86:dd:ec:18:52:82:60:99: f6:f6:5b:8c:59:c9:b6:bc:cb:8b:89:33:67:2b:f5:e6: df:2b:dd:ec:46:3b:35:82:e2:06:ab:22:5f:62:bc:1c: 26:29:e9:81:a1:d6:fd:62:6b:68:5f:18:c0:f3:82:a4: dc:9c:0f:fb:66:1e:51:86:5e:09:e9:de:2f:75:67:58 Fingerprint (SHA-256): C8:B3:95:02:3B:E8:62:99:B8:A4:8E:A3:C9:53:BE:A3:C0:07:23:11:83:B3:11:FC:EB:80:27:1F:13:6B:30:3A Fingerprint (SHA1): BC:EC:06:C4:87:0E:11:31:51:E3:E6:73:D0:CD:CA:E2:20:00:68:D2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #580: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141477 (0x3caf9b25) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:15:18 2023 Not After : Wed Oct 18 14:15:18 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:ad:9c:a7:c6:2d:e9:b0:83:7c:11:2d:83:02:ca:af: 28:7f:dc:24:9a:94:92:df:33:41:9a:40:69:dc:c6:ae: bc:46:42:54:68:4e:e8:ef:58:3c:7a:42:c4:4b:3e:c2: 7e:f0:49:80:f5:f3:ae:80:b4:56:cf:32:af:fc:0f:f3: 66:71:7f:aa:2f:15:c0:de:c9:5a:80:02:be:13:75:1e: 38:6d:2a:ce:9c:25:48:19:b5:c7:23:86:3e:b2:73:16: 1c:4f:4f:fe:53:0b:76:0f:39:c3:d0:e2:67:24:76:bd: a9:3a:b0:69:e0:ee:1b:9e:4f:83:4c:4c:51:b4:19:f6: cf:95:7a:c6:4e:06:50:03:5e:e9:a9:46:c2:93:95:63: cd:f1:aa:c5:8b:7b:5d:f3:68:9b:73:87:b6:fa:12:57: 14:0e:4a:5e:16:b5:d4:b6:b0:e9:25:66:96:2c:94:b6: 8f:c5:8b:80:74:df:2e:98:83:00:57:bd:fc:b2:7e:8c: 1f:73:78:5c:f3:bc:92:c6:a8:b9:28:5e:0d:1f:1c:c2: 59:c5:07:78:97:34:aa:e5:84:ac:c6:42:a8:81:50:b6: 9f:38:f4:b2:b6:05:4c:6d:0c:29:e0:7f:c8:18:77:8b: 71:ee:cf:af:1d:31:cd:a9:79:4c:d1:f2:02:d9:3d:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:b9:eb:06:0c:7a:c4:c8:c9:10:39:0b:a2:5b:1b:2c: b1:b7:91:f1:79:73:da:2e:fc:aa:8e:b9:bf:69:a2:32: 28:d6:ac:a9:08:bc:35:1f:f9:7c:b3:dd:9a:c4:0a:20: 77:a3:37:31:4a:02:96:a5:21:b4:7a:17:7c:de:6f:bc: e8:6e:c8:94:a7:d9:f2:70:8d:fa:49:7d:88:2f:1e:4b: 80:12:10:9d:d7:db:ff:42:59:7c:c2:2c:8a:05:75:d0: c2:dc:84:67:10:aa:36:63:c1:d3:7e:b5:28:78:dc:c2: 1a:14:1b:1c:1a:42:06:57:cd:38:8c:32:e5:d4:36:07: 1a:f6:73:2e:7f:45:0c:1b:f8:f4:b8:cf:ca:b0:c1:66: b3:6f:95:39:18:87:e9:a9:8d:00:52:dc:87:c5:6b:22: 87:07:e5:29:7c:fe:1e:3e:fe:61:50:af:a8:3b:cf:d9: ed:d3:c4:07:d5:5d:f8:e4:86:dd:ec:18:52:82:60:99: f6:f6:5b:8c:59:c9:b6:bc:cb:8b:89:33:67:2b:f5:e6: df:2b:dd:ec:46:3b:35:82:e2:06:ab:22:5f:62:bc:1c: 26:29:e9:81:a1:d6:fd:62:6b:68:5f:18:c0:f3:82:a4: dc:9c:0f:fb:66:1e:51:86:5e:09:e9:de:2f:75:67:58 Fingerprint (SHA-256): C8:B3:95:02:3B:E8:62:99:B8:A4:8E:A3:C9:53:BE:A3:C0:07:23:11:83:B3:11:FC:EB:80:27:1F:13:6B:30:3A Fingerprint (SHA1): BC:EC:06:C4:87:0E:11:31:51:E3:E6:73:D0:CD:CA:E2:20:00:68:D2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #581: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #582: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141477 (0x3caf9b25) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:15:18 2023 Not After : Wed Oct 18 14:15:18 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:ad:9c:a7:c6:2d:e9:b0:83:7c:11:2d:83:02:ca:af: 28:7f:dc:24:9a:94:92:df:33:41:9a:40:69:dc:c6:ae: bc:46:42:54:68:4e:e8:ef:58:3c:7a:42:c4:4b:3e:c2: 7e:f0:49:80:f5:f3:ae:80:b4:56:cf:32:af:fc:0f:f3: 66:71:7f:aa:2f:15:c0:de:c9:5a:80:02:be:13:75:1e: 38:6d:2a:ce:9c:25:48:19:b5:c7:23:86:3e:b2:73:16: 1c:4f:4f:fe:53:0b:76:0f:39:c3:d0:e2:67:24:76:bd: a9:3a:b0:69:e0:ee:1b:9e:4f:83:4c:4c:51:b4:19:f6: cf:95:7a:c6:4e:06:50:03:5e:e9:a9:46:c2:93:95:63: cd:f1:aa:c5:8b:7b:5d:f3:68:9b:73:87:b6:fa:12:57: 14:0e:4a:5e:16:b5:d4:b6:b0:e9:25:66:96:2c:94:b6: 8f:c5:8b:80:74:df:2e:98:83:00:57:bd:fc:b2:7e:8c: 1f:73:78:5c:f3:bc:92:c6:a8:b9:28:5e:0d:1f:1c:c2: 59:c5:07:78:97:34:aa:e5:84:ac:c6:42:a8:81:50:b6: 9f:38:f4:b2:b6:05:4c:6d:0c:29:e0:7f:c8:18:77:8b: 71:ee:cf:af:1d:31:cd:a9:79:4c:d1:f2:02:d9:3d:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:b9:eb:06:0c:7a:c4:c8:c9:10:39:0b:a2:5b:1b:2c: b1:b7:91:f1:79:73:da:2e:fc:aa:8e:b9:bf:69:a2:32: 28:d6:ac:a9:08:bc:35:1f:f9:7c:b3:dd:9a:c4:0a:20: 77:a3:37:31:4a:02:96:a5:21:b4:7a:17:7c:de:6f:bc: e8:6e:c8:94:a7:d9:f2:70:8d:fa:49:7d:88:2f:1e:4b: 80:12:10:9d:d7:db:ff:42:59:7c:c2:2c:8a:05:75:d0: c2:dc:84:67:10:aa:36:63:c1:d3:7e:b5:28:78:dc:c2: 1a:14:1b:1c:1a:42:06:57:cd:38:8c:32:e5:d4:36:07: 1a:f6:73:2e:7f:45:0c:1b:f8:f4:b8:cf:ca:b0:c1:66: b3:6f:95:39:18:87:e9:a9:8d:00:52:dc:87:c5:6b:22: 87:07:e5:29:7c:fe:1e:3e:fe:61:50:af:a8:3b:cf:d9: ed:d3:c4:07:d5:5d:f8:e4:86:dd:ec:18:52:82:60:99: f6:f6:5b:8c:59:c9:b6:bc:cb:8b:89:33:67:2b:f5:e6: df:2b:dd:ec:46:3b:35:82:e2:06:ab:22:5f:62:bc:1c: 26:29:e9:81:a1:d6:fd:62:6b:68:5f:18:c0:f3:82:a4: dc:9c:0f:fb:66:1e:51:86:5e:09:e9:de:2f:75:67:58 Fingerprint (SHA-256): C8:B3:95:02:3B:E8:62:99:B8:A4:8E:A3:C9:53:BE:A3:C0:07:23:11:83:B3:11:FC:EB:80:27:1F:13:6B:30:3A Fingerprint (SHA1): BC:EC:06:C4:87:0E:11:31:51:E3:E6:73:D0:CD:CA:E2:20:00:68:D2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #583: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #584: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #585: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #586: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141477 (0x3caf9b25) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:15:18 2023 Not After : Wed Oct 18 14:15:18 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:ad:9c:a7:c6:2d:e9:b0:83:7c:11:2d:83:02:ca:af: 28:7f:dc:24:9a:94:92:df:33:41:9a:40:69:dc:c6:ae: bc:46:42:54:68:4e:e8:ef:58:3c:7a:42:c4:4b:3e:c2: 7e:f0:49:80:f5:f3:ae:80:b4:56:cf:32:af:fc:0f:f3: 66:71:7f:aa:2f:15:c0:de:c9:5a:80:02:be:13:75:1e: 38:6d:2a:ce:9c:25:48:19:b5:c7:23:86:3e:b2:73:16: 1c:4f:4f:fe:53:0b:76:0f:39:c3:d0:e2:67:24:76:bd: a9:3a:b0:69:e0:ee:1b:9e:4f:83:4c:4c:51:b4:19:f6: cf:95:7a:c6:4e:06:50:03:5e:e9:a9:46:c2:93:95:63: cd:f1:aa:c5:8b:7b:5d:f3:68:9b:73:87:b6:fa:12:57: 14:0e:4a:5e:16:b5:d4:b6:b0:e9:25:66:96:2c:94:b6: 8f:c5:8b:80:74:df:2e:98:83:00:57:bd:fc:b2:7e:8c: 1f:73:78:5c:f3:bc:92:c6:a8:b9:28:5e:0d:1f:1c:c2: 59:c5:07:78:97:34:aa:e5:84:ac:c6:42:a8:81:50:b6: 9f:38:f4:b2:b6:05:4c:6d:0c:29:e0:7f:c8:18:77:8b: 71:ee:cf:af:1d:31:cd:a9:79:4c:d1:f2:02:d9:3d:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:b9:eb:06:0c:7a:c4:c8:c9:10:39:0b:a2:5b:1b:2c: b1:b7:91:f1:79:73:da:2e:fc:aa:8e:b9:bf:69:a2:32: 28:d6:ac:a9:08:bc:35:1f:f9:7c:b3:dd:9a:c4:0a:20: 77:a3:37:31:4a:02:96:a5:21:b4:7a:17:7c:de:6f:bc: e8:6e:c8:94:a7:d9:f2:70:8d:fa:49:7d:88:2f:1e:4b: 80:12:10:9d:d7:db:ff:42:59:7c:c2:2c:8a:05:75:d0: c2:dc:84:67:10:aa:36:63:c1:d3:7e:b5:28:78:dc:c2: 1a:14:1b:1c:1a:42:06:57:cd:38:8c:32:e5:d4:36:07: 1a:f6:73:2e:7f:45:0c:1b:f8:f4:b8:cf:ca:b0:c1:66: b3:6f:95:39:18:87:e9:a9:8d:00:52:dc:87:c5:6b:22: 87:07:e5:29:7c:fe:1e:3e:fe:61:50:af:a8:3b:cf:d9: ed:d3:c4:07:d5:5d:f8:e4:86:dd:ec:18:52:82:60:99: f6:f6:5b:8c:59:c9:b6:bc:cb:8b:89:33:67:2b:f5:e6: df:2b:dd:ec:46:3b:35:82:e2:06:ab:22:5f:62:bc:1c: 26:29:e9:81:a1:d6:fd:62:6b:68:5f:18:c0:f3:82:a4: dc:9c:0f:fb:66:1e:51:86:5e:09:e9:de:2f:75:67:58 Fingerprint (SHA-256): C8:B3:95:02:3B:E8:62:99:B8:A4:8E:A3:C9:53:BE:A3:C0:07:23:11:83:B3:11:FC:EB:80:27:1F:13:6B:30:3A Fingerprint (SHA1): BC:EC:06:C4:87:0E:11:31:51:E3:E6:73:D0:CD:CA:E2:20:00:68:D2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #587: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141477 (0x3caf9b25) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:15:18 2023 Not After : Wed Oct 18 14:15:18 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:ad:9c:a7:c6:2d:e9:b0:83:7c:11:2d:83:02:ca:af: 28:7f:dc:24:9a:94:92:df:33:41:9a:40:69:dc:c6:ae: bc:46:42:54:68:4e:e8:ef:58:3c:7a:42:c4:4b:3e:c2: 7e:f0:49:80:f5:f3:ae:80:b4:56:cf:32:af:fc:0f:f3: 66:71:7f:aa:2f:15:c0:de:c9:5a:80:02:be:13:75:1e: 38:6d:2a:ce:9c:25:48:19:b5:c7:23:86:3e:b2:73:16: 1c:4f:4f:fe:53:0b:76:0f:39:c3:d0:e2:67:24:76:bd: a9:3a:b0:69:e0:ee:1b:9e:4f:83:4c:4c:51:b4:19:f6: cf:95:7a:c6:4e:06:50:03:5e:e9:a9:46:c2:93:95:63: cd:f1:aa:c5:8b:7b:5d:f3:68:9b:73:87:b6:fa:12:57: 14:0e:4a:5e:16:b5:d4:b6:b0:e9:25:66:96:2c:94:b6: 8f:c5:8b:80:74:df:2e:98:83:00:57:bd:fc:b2:7e:8c: 1f:73:78:5c:f3:bc:92:c6:a8:b9:28:5e:0d:1f:1c:c2: 59:c5:07:78:97:34:aa:e5:84:ac:c6:42:a8:81:50:b6: 9f:38:f4:b2:b6:05:4c:6d:0c:29:e0:7f:c8:18:77:8b: 71:ee:cf:af:1d:31:cd:a9:79:4c:d1:f2:02:d9:3d:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:b9:eb:06:0c:7a:c4:c8:c9:10:39:0b:a2:5b:1b:2c: b1:b7:91:f1:79:73:da:2e:fc:aa:8e:b9:bf:69:a2:32: 28:d6:ac:a9:08:bc:35:1f:f9:7c:b3:dd:9a:c4:0a:20: 77:a3:37:31:4a:02:96:a5:21:b4:7a:17:7c:de:6f:bc: e8:6e:c8:94:a7:d9:f2:70:8d:fa:49:7d:88:2f:1e:4b: 80:12:10:9d:d7:db:ff:42:59:7c:c2:2c:8a:05:75:d0: c2:dc:84:67:10:aa:36:63:c1:d3:7e:b5:28:78:dc:c2: 1a:14:1b:1c:1a:42:06:57:cd:38:8c:32:e5:d4:36:07: 1a:f6:73:2e:7f:45:0c:1b:f8:f4:b8:cf:ca:b0:c1:66: b3:6f:95:39:18:87:e9:a9:8d:00:52:dc:87:c5:6b:22: 87:07:e5:29:7c:fe:1e:3e:fe:61:50:af:a8:3b:cf:d9: ed:d3:c4:07:d5:5d:f8:e4:86:dd:ec:18:52:82:60:99: f6:f6:5b:8c:59:c9:b6:bc:cb:8b:89:33:67:2b:f5:e6: df:2b:dd:ec:46:3b:35:82:e2:06:ab:22:5f:62:bc:1c: 26:29:e9:81:a1:d6:fd:62:6b:68:5f:18:c0:f3:82:a4: dc:9c:0f:fb:66:1e:51:86:5e:09:e9:de:2f:75:67:58 Fingerprint (SHA-256): C8:B3:95:02:3B:E8:62:99:B8:A4:8E:A3:C9:53:BE:A3:C0:07:23:11:83:B3:11:FC:EB:80:27:1F:13:6B:30:3A Fingerprint (SHA1): BC:EC:06:C4:87:0E:11:31:51:E3:E6:73:D0:CD:CA:E2:20:00:68:D2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #588: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141477 (0x3caf9b25) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:15:18 2023 Not After : Wed Oct 18 14:15:18 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:ad:9c:a7:c6:2d:e9:b0:83:7c:11:2d:83:02:ca:af: 28:7f:dc:24:9a:94:92:df:33:41:9a:40:69:dc:c6:ae: bc:46:42:54:68:4e:e8:ef:58:3c:7a:42:c4:4b:3e:c2: 7e:f0:49:80:f5:f3:ae:80:b4:56:cf:32:af:fc:0f:f3: 66:71:7f:aa:2f:15:c0:de:c9:5a:80:02:be:13:75:1e: 38:6d:2a:ce:9c:25:48:19:b5:c7:23:86:3e:b2:73:16: 1c:4f:4f:fe:53:0b:76:0f:39:c3:d0:e2:67:24:76:bd: a9:3a:b0:69:e0:ee:1b:9e:4f:83:4c:4c:51:b4:19:f6: cf:95:7a:c6:4e:06:50:03:5e:e9:a9:46:c2:93:95:63: cd:f1:aa:c5:8b:7b:5d:f3:68:9b:73:87:b6:fa:12:57: 14:0e:4a:5e:16:b5:d4:b6:b0:e9:25:66:96:2c:94:b6: 8f:c5:8b:80:74:df:2e:98:83:00:57:bd:fc:b2:7e:8c: 1f:73:78:5c:f3:bc:92:c6:a8:b9:28:5e:0d:1f:1c:c2: 59:c5:07:78:97:34:aa:e5:84:ac:c6:42:a8:81:50:b6: 9f:38:f4:b2:b6:05:4c:6d:0c:29:e0:7f:c8:18:77:8b: 71:ee:cf:af:1d:31:cd:a9:79:4c:d1:f2:02:d9:3d:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:b9:eb:06:0c:7a:c4:c8:c9:10:39:0b:a2:5b:1b:2c: b1:b7:91:f1:79:73:da:2e:fc:aa:8e:b9:bf:69:a2:32: 28:d6:ac:a9:08:bc:35:1f:f9:7c:b3:dd:9a:c4:0a:20: 77:a3:37:31:4a:02:96:a5:21:b4:7a:17:7c:de:6f:bc: e8:6e:c8:94:a7:d9:f2:70:8d:fa:49:7d:88:2f:1e:4b: 80:12:10:9d:d7:db:ff:42:59:7c:c2:2c:8a:05:75:d0: c2:dc:84:67:10:aa:36:63:c1:d3:7e:b5:28:78:dc:c2: 1a:14:1b:1c:1a:42:06:57:cd:38:8c:32:e5:d4:36:07: 1a:f6:73:2e:7f:45:0c:1b:f8:f4:b8:cf:ca:b0:c1:66: b3:6f:95:39:18:87:e9:a9:8d:00:52:dc:87:c5:6b:22: 87:07:e5:29:7c:fe:1e:3e:fe:61:50:af:a8:3b:cf:d9: ed:d3:c4:07:d5:5d:f8:e4:86:dd:ec:18:52:82:60:99: f6:f6:5b:8c:59:c9:b6:bc:cb:8b:89:33:67:2b:f5:e6: df:2b:dd:ec:46:3b:35:82:e2:06:ab:22:5f:62:bc:1c: 26:29:e9:81:a1:d6:fd:62:6b:68:5f:18:c0:f3:82:a4: dc:9c:0f:fb:66:1e:51:86:5e:09:e9:de:2f:75:67:58 Fingerprint (SHA-256): C8:B3:95:02:3B:E8:62:99:B8:A4:8E:A3:C9:53:BE:A3:C0:07:23:11:83:B3:11:FC:EB:80:27:1F:13:6B:30:3A Fingerprint (SHA1): BC:EC:06:C4:87:0E:11:31:51:E3:E6:73:D0:CD:CA:E2:20:00:68:D2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #589: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141477 (0x3caf9b25) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:15:18 2023 Not After : Wed Oct 18 14:15:18 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:ad:9c:a7:c6:2d:e9:b0:83:7c:11:2d:83:02:ca:af: 28:7f:dc:24:9a:94:92:df:33:41:9a:40:69:dc:c6:ae: bc:46:42:54:68:4e:e8:ef:58:3c:7a:42:c4:4b:3e:c2: 7e:f0:49:80:f5:f3:ae:80:b4:56:cf:32:af:fc:0f:f3: 66:71:7f:aa:2f:15:c0:de:c9:5a:80:02:be:13:75:1e: 38:6d:2a:ce:9c:25:48:19:b5:c7:23:86:3e:b2:73:16: 1c:4f:4f:fe:53:0b:76:0f:39:c3:d0:e2:67:24:76:bd: a9:3a:b0:69:e0:ee:1b:9e:4f:83:4c:4c:51:b4:19:f6: cf:95:7a:c6:4e:06:50:03:5e:e9:a9:46:c2:93:95:63: cd:f1:aa:c5:8b:7b:5d:f3:68:9b:73:87:b6:fa:12:57: 14:0e:4a:5e:16:b5:d4:b6:b0:e9:25:66:96:2c:94:b6: 8f:c5:8b:80:74:df:2e:98:83:00:57:bd:fc:b2:7e:8c: 1f:73:78:5c:f3:bc:92:c6:a8:b9:28:5e:0d:1f:1c:c2: 59:c5:07:78:97:34:aa:e5:84:ac:c6:42:a8:81:50:b6: 9f:38:f4:b2:b6:05:4c:6d:0c:29:e0:7f:c8:18:77:8b: 71:ee:cf:af:1d:31:cd:a9:79:4c:d1:f2:02:d9:3d:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:b9:eb:06:0c:7a:c4:c8:c9:10:39:0b:a2:5b:1b:2c: b1:b7:91:f1:79:73:da:2e:fc:aa:8e:b9:bf:69:a2:32: 28:d6:ac:a9:08:bc:35:1f:f9:7c:b3:dd:9a:c4:0a:20: 77:a3:37:31:4a:02:96:a5:21:b4:7a:17:7c:de:6f:bc: e8:6e:c8:94:a7:d9:f2:70:8d:fa:49:7d:88:2f:1e:4b: 80:12:10:9d:d7:db:ff:42:59:7c:c2:2c:8a:05:75:d0: c2:dc:84:67:10:aa:36:63:c1:d3:7e:b5:28:78:dc:c2: 1a:14:1b:1c:1a:42:06:57:cd:38:8c:32:e5:d4:36:07: 1a:f6:73:2e:7f:45:0c:1b:f8:f4:b8:cf:ca:b0:c1:66: b3:6f:95:39:18:87:e9:a9:8d:00:52:dc:87:c5:6b:22: 87:07:e5:29:7c:fe:1e:3e:fe:61:50:af:a8:3b:cf:d9: ed:d3:c4:07:d5:5d:f8:e4:86:dd:ec:18:52:82:60:99: f6:f6:5b:8c:59:c9:b6:bc:cb:8b:89:33:67:2b:f5:e6: df:2b:dd:ec:46:3b:35:82:e2:06:ab:22:5f:62:bc:1c: 26:29:e9:81:a1:d6:fd:62:6b:68:5f:18:c0:f3:82:a4: dc:9c:0f:fb:66:1e:51:86:5e:09:e9:de:2f:75:67:58 Fingerprint (SHA-256): C8:B3:95:02:3B:E8:62:99:B8:A4:8E:A3:C9:53:BE:A3:C0:07:23:11:83:B3:11:FC:EB:80:27:1F:13:6B:30:3A Fingerprint (SHA1): BC:EC:06:C4:87:0E:11:31:51:E3:E6:73:D0:CD:CA:E2:20:00:68:D2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #590: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141477 (0x3caf9b25) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:15:18 2023 Not After : Wed Oct 18 14:15:18 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:ad:9c:a7:c6:2d:e9:b0:83:7c:11:2d:83:02:ca:af: 28:7f:dc:24:9a:94:92:df:33:41:9a:40:69:dc:c6:ae: bc:46:42:54:68:4e:e8:ef:58:3c:7a:42:c4:4b:3e:c2: 7e:f0:49:80:f5:f3:ae:80:b4:56:cf:32:af:fc:0f:f3: 66:71:7f:aa:2f:15:c0:de:c9:5a:80:02:be:13:75:1e: 38:6d:2a:ce:9c:25:48:19:b5:c7:23:86:3e:b2:73:16: 1c:4f:4f:fe:53:0b:76:0f:39:c3:d0:e2:67:24:76:bd: a9:3a:b0:69:e0:ee:1b:9e:4f:83:4c:4c:51:b4:19:f6: cf:95:7a:c6:4e:06:50:03:5e:e9:a9:46:c2:93:95:63: cd:f1:aa:c5:8b:7b:5d:f3:68:9b:73:87:b6:fa:12:57: 14:0e:4a:5e:16:b5:d4:b6:b0:e9:25:66:96:2c:94:b6: 8f:c5:8b:80:74:df:2e:98:83:00:57:bd:fc:b2:7e:8c: 1f:73:78:5c:f3:bc:92:c6:a8:b9:28:5e:0d:1f:1c:c2: 59:c5:07:78:97:34:aa:e5:84:ac:c6:42:a8:81:50:b6: 9f:38:f4:b2:b6:05:4c:6d:0c:29:e0:7f:c8:18:77:8b: 71:ee:cf:af:1d:31:cd:a9:79:4c:d1:f2:02:d9:3d:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:b9:eb:06:0c:7a:c4:c8:c9:10:39:0b:a2:5b:1b:2c: b1:b7:91:f1:79:73:da:2e:fc:aa:8e:b9:bf:69:a2:32: 28:d6:ac:a9:08:bc:35:1f:f9:7c:b3:dd:9a:c4:0a:20: 77:a3:37:31:4a:02:96:a5:21:b4:7a:17:7c:de:6f:bc: e8:6e:c8:94:a7:d9:f2:70:8d:fa:49:7d:88:2f:1e:4b: 80:12:10:9d:d7:db:ff:42:59:7c:c2:2c:8a:05:75:d0: c2:dc:84:67:10:aa:36:63:c1:d3:7e:b5:28:78:dc:c2: 1a:14:1b:1c:1a:42:06:57:cd:38:8c:32:e5:d4:36:07: 1a:f6:73:2e:7f:45:0c:1b:f8:f4:b8:cf:ca:b0:c1:66: b3:6f:95:39:18:87:e9:a9:8d:00:52:dc:87:c5:6b:22: 87:07:e5:29:7c:fe:1e:3e:fe:61:50:af:a8:3b:cf:d9: ed:d3:c4:07:d5:5d:f8:e4:86:dd:ec:18:52:82:60:99: f6:f6:5b:8c:59:c9:b6:bc:cb:8b:89:33:67:2b:f5:e6: df:2b:dd:ec:46:3b:35:82:e2:06:ab:22:5f:62:bc:1c: 26:29:e9:81:a1:d6:fd:62:6b:68:5f:18:c0:f3:82:a4: dc:9c:0f:fb:66:1e:51:86:5e:09:e9:de:2f:75:67:58 Fingerprint (SHA-256): C8:B3:95:02:3B:E8:62:99:B8:A4:8E:A3:C9:53:BE:A3:C0:07:23:11:83:B3:11:FC:EB:80:27:1F:13:6B:30:3A Fingerprint (SHA1): BC:EC:06:C4:87:0E:11:31:51:E3:E6:73:D0:CD:CA:E2:20:00:68:D2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #591: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141477 (0x3caf9b25) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:15:18 2023 Not After : Wed Oct 18 14:15:18 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:ad:9c:a7:c6:2d:e9:b0:83:7c:11:2d:83:02:ca:af: 28:7f:dc:24:9a:94:92:df:33:41:9a:40:69:dc:c6:ae: bc:46:42:54:68:4e:e8:ef:58:3c:7a:42:c4:4b:3e:c2: 7e:f0:49:80:f5:f3:ae:80:b4:56:cf:32:af:fc:0f:f3: 66:71:7f:aa:2f:15:c0:de:c9:5a:80:02:be:13:75:1e: 38:6d:2a:ce:9c:25:48:19:b5:c7:23:86:3e:b2:73:16: 1c:4f:4f:fe:53:0b:76:0f:39:c3:d0:e2:67:24:76:bd: a9:3a:b0:69:e0:ee:1b:9e:4f:83:4c:4c:51:b4:19:f6: cf:95:7a:c6:4e:06:50:03:5e:e9:a9:46:c2:93:95:63: cd:f1:aa:c5:8b:7b:5d:f3:68:9b:73:87:b6:fa:12:57: 14:0e:4a:5e:16:b5:d4:b6:b0:e9:25:66:96:2c:94:b6: 8f:c5:8b:80:74:df:2e:98:83:00:57:bd:fc:b2:7e:8c: 1f:73:78:5c:f3:bc:92:c6:a8:b9:28:5e:0d:1f:1c:c2: 59:c5:07:78:97:34:aa:e5:84:ac:c6:42:a8:81:50:b6: 9f:38:f4:b2:b6:05:4c:6d:0c:29:e0:7f:c8:18:77:8b: 71:ee:cf:af:1d:31:cd:a9:79:4c:d1:f2:02:d9:3d:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:b9:eb:06:0c:7a:c4:c8:c9:10:39:0b:a2:5b:1b:2c: b1:b7:91:f1:79:73:da:2e:fc:aa:8e:b9:bf:69:a2:32: 28:d6:ac:a9:08:bc:35:1f:f9:7c:b3:dd:9a:c4:0a:20: 77:a3:37:31:4a:02:96:a5:21:b4:7a:17:7c:de:6f:bc: e8:6e:c8:94:a7:d9:f2:70:8d:fa:49:7d:88:2f:1e:4b: 80:12:10:9d:d7:db:ff:42:59:7c:c2:2c:8a:05:75:d0: c2:dc:84:67:10:aa:36:63:c1:d3:7e:b5:28:78:dc:c2: 1a:14:1b:1c:1a:42:06:57:cd:38:8c:32:e5:d4:36:07: 1a:f6:73:2e:7f:45:0c:1b:f8:f4:b8:cf:ca:b0:c1:66: b3:6f:95:39:18:87:e9:a9:8d:00:52:dc:87:c5:6b:22: 87:07:e5:29:7c:fe:1e:3e:fe:61:50:af:a8:3b:cf:d9: ed:d3:c4:07:d5:5d:f8:e4:86:dd:ec:18:52:82:60:99: f6:f6:5b:8c:59:c9:b6:bc:cb:8b:89:33:67:2b:f5:e6: df:2b:dd:ec:46:3b:35:82:e2:06:ab:22:5f:62:bc:1c: 26:29:e9:81:a1:d6:fd:62:6b:68:5f:18:c0:f3:82:a4: dc:9c:0f:fb:66:1e:51:86:5e:09:e9:de:2f:75:67:58 Fingerprint (SHA-256): C8:B3:95:02:3B:E8:62:99:B8:A4:8E:A3:C9:53:BE:A3:C0:07:23:11:83:B3:11:FC:EB:80:27:1F:13:6B:30:3A Fingerprint (SHA1): BC:EC:06:C4:87:0E:11:31:51:E3:E6:73:D0:CD:CA:E2:20:00:68:D2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #592: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #593: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #594: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141507 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #595: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #596: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #597: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #598: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1018141508 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #599: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #600: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #601: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #602: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1018141509 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #603: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #604: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #605: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #606: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1018141510 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #607: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #608: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #609: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #610: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1018141511 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #611: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #612: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #613: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #614: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1018141512 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #615: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #616: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #617: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #618: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1018141513 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #619: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #620: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #621: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141507 (0x3caf9b43) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:32 2023 Not After : Wed Oct 18 14:15:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:76:9d:0d:7e:c8:11:3d:1c:14:25:b8:d8:14:ba:ad: 9f:05:97:97:bb:0f:d6:52:ad:ba:21:5e:ef:05:04:e7: ca:64:96:67:cf:5e:96:4c:84:25:d2:67:f6:1f:7d:2b: 57:be:ac:d2:be:3b:e3:21:b0:93:fc:ce:52:00:61:ae: 2f:12:f0:ab:de:f4:d8:b6:37:48:e1:a5:da:a5:1c:d0: 78:cd:52:88:31:71:91:6d:75:6a:d7:9c:8d:36:37:8a: d8:29:43:dd:a1:50:9a:c8:7f:21:38:0d:46:ea:af:d8: 5e:6a:3b:05:04:42:d6:38:72:5f:49:b9:75:6c:f9:fb: cf:bf:5c:33:86:1a:2e:bb:09:91:40:14:c3:02:8c:eb: b4:50:e2:d7:06:41:01:97:02:ee:da:3c:1e:3a:fb:02: c6:51:ee:41:af:63:fd:f7:dd:27:eb:87:82:f9:af:87: 15:7a:97:25:2f:84:ca:05:12:27:a6:b6:cc:bf:12:4f: 44:14:7e:7c:de:83:0e:cf:d6:99:b9:c0:a0:4f:07:79: 89:ec:b5:a5:15:26:18:b1:6c:fd:54:e7:ef:6f:58:4f: 94:fa:61:2b:71:67:e2:82:27:88:82:41:6b:b8:10:81: 6c:4c:d9:7c:0b:24:26:16:8c:df:f9:59:5b:91:55:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:04:d9:ad:b5:2a:5c:b7:91:35:59:47:69:06:27:6a: b9:f7:3b:ba:9e:01:ff:cf:f8:57:ce:7b:74:3e:10:c3: e9:b0:a9:f5:de:2b:7e:90:7c:1a:57:f4:dd:16:f2:12: ca:37:c4:a9:56:e8:6b:f8:2d:f8:18:c4:c7:ad:f8:a3: 55:a6:f8:82:31:64:06:ff:3d:68:07:04:d1:86:83:50: eb:78:4a:bc:a8:a6:76:5e:93:b2:c8:ff:ee:a1:ec:e4: 3f:de:59:22:0c:45:54:11:e8:ab:18:3c:3e:29:d0:28: 8e:48:7a:07:b3:c1:70:38:7b:e4:76:e7:e2:19:bf:2f: 39:8f:33:f5:67:44:78:9d:f5:a9:b6:14:1a:82:04:02: 95:5a:cf:3d:51:67:40:ce:35:50:cc:71:7b:52:05:8e: 39:a0:f4:a7:fc:a8:d5:6b:ad:08:7b:31:1d:c5:24:eb: 9f:37:81:d3:a2:af:56:86:4b:53:c9:34:5f:95:56:63: 8d:bf:5f:43:12:57:f9:0d:7c:21:c9:72:02:a7:ae:8a: 87:f2:f6:d8:16:c3:28:e0:19:03:a0:21:b7:6c:dd:fa: 5d:6a:7b:99:01:75:64:88:b9:dd:a7:09:51:09:11:3a: 87:dd:8e:04:1c:3a:d4:b5:0f:e7:db:cd:58:08:bd:b2 Fingerprint (SHA-256): 81:96:46:D7:4E:07:A1:F2:D4:B7:AC:94:9D:8B:66:3F:6C:C6:81:4C:66:A8:96:E2:8B:82:93:78:09:23:5A:EE Fingerprint (SHA1): 33:EA:09:21:F0:8A:19:98:F5:C1:95:9F:A4:21:73:87:27:08:84:42 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #622: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #623: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #624: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #625: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141507 (0x3caf9b43) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:32 2023 Not After : Wed Oct 18 14:15:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:76:9d:0d:7e:c8:11:3d:1c:14:25:b8:d8:14:ba:ad: 9f:05:97:97:bb:0f:d6:52:ad:ba:21:5e:ef:05:04:e7: ca:64:96:67:cf:5e:96:4c:84:25:d2:67:f6:1f:7d:2b: 57:be:ac:d2:be:3b:e3:21:b0:93:fc:ce:52:00:61:ae: 2f:12:f0:ab:de:f4:d8:b6:37:48:e1:a5:da:a5:1c:d0: 78:cd:52:88:31:71:91:6d:75:6a:d7:9c:8d:36:37:8a: d8:29:43:dd:a1:50:9a:c8:7f:21:38:0d:46:ea:af:d8: 5e:6a:3b:05:04:42:d6:38:72:5f:49:b9:75:6c:f9:fb: cf:bf:5c:33:86:1a:2e:bb:09:91:40:14:c3:02:8c:eb: b4:50:e2:d7:06:41:01:97:02:ee:da:3c:1e:3a:fb:02: c6:51:ee:41:af:63:fd:f7:dd:27:eb:87:82:f9:af:87: 15:7a:97:25:2f:84:ca:05:12:27:a6:b6:cc:bf:12:4f: 44:14:7e:7c:de:83:0e:cf:d6:99:b9:c0:a0:4f:07:79: 89:ec:b5:a5:15:26:18:b1:6c:fd:54:e7:ef:6f:58:4f: 94:fa:61:2b:71:67:e2:82:27:88:82:41:6b:b8:10:81: 6c:4c:d9:7c:0b:24:26:16:8c:df:f9:59:5b:91:55:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6a:04:d9:ad:b5:2a:5c:b7:91:35:59:47:69:06:27:6a: b9:f7:3b:ba:9e:01:ff:cf:f8:57:ce:7b:74:3e:10:c3: e9:b0:a9:f5:de:2b:7e:90:7c:1a:57:f4:dd:16:f2:12: ca:37:c4:a9:56:e8:6b:f8:2d:f8:18:c4:c7:ad:f8:a3: 55:a6:f8:82:31:64:06:ff:3d:68:07:04:d1:86:83:50: eb:78:4a:bc:a8:a6:76:5e:93:b2:c8:ff:ee:a1:ec:e4: 3f:de:59:22:0c:45:54:11:e8:ab:18:3c:3e:29:d0:28: 8e:48:7a:07:b3:c1:70:38:7b:e4:76:e7:e2:19:bf:2f: 39:8f:33:f5:67:44:78:9d:f5:a9:b6:14:1a:82:04:02: 95:5a:cf:3d:51:67:40:ce:35:50:cc:71:7b:52:05:8e: 39:a0:f4:a7:fc:a8:d5:6b:ad:08:7b:31:1d:c5:24:eb: 9f:37:81:d3:a2:af:56:86:4b:53:c9:34:5f:95:56:63: 8d:bf:5f:43:12:57:f9:0d:7c:21:c9:72:02:a7:ae:8a: 87:f2:f6:d8:16:c3:28:e0:19:03:a0:21:b7:6c:dd:fa: 5d:6a:7b:99:01:75:64:88:b9:dd:a7:09:51:09:11:3a: 87:dd:8e:04:1c:3a:d4:b5:0f:e7:db:cd:58:08:bd:b2 Fingerprint (SHA-256): 81:96:46:D7:4E:07:A1:F2:D4:B7:AC:94:9D:8B:66:3F:6C:C6:81:4C:66:A8:96:E2:8B:82:93:78:09:23:5A:EE Fingerprint (SHA1): 33:EA:09:21:F0:8A:19:98:F5:C1:95:9F:A4:21:73:87:27:08:84:42 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #626: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #627: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #628: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #629: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141514 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #630: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #631: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #632: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #633: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018141515 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #634: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #635: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #636: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #637: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018141516 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #638: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #639: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #640: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #641: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018141517 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #642: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #643: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #644: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #645: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #646: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #647: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141514 (0x3caf9b4a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:36 2023 Not After : Wed Oct 18 14:15:36 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:60:92:29:91:d3:bb:5e:86:44:36:fc:ea:c3:a5:18: 6e:f6:f7:9f:a2:ed:2e:41:9d:3f:ed:c5:5e:02:98:0e: 0e:a1:98:61:92:7e:a7:2f:73:f5:6f:bc:34:36:53:33: ee:f8:ee:22:04:ba:53:d2:61:82:99:66:b9:ab:d1:fa: 17:c1:b1:c6:e7:69:93:b1:69:e0:f3:b0:fa:fe:5e:0b: 9b:56:e8:9b:a0:70:96:38:31:67:1b:d1:e8:0d:2f:65: 03:05:75:3f:30:a6:43:96:25:34:4a:60:ab:d2:80:a9: 33:0f:61:c4:f9:95:de:6c:20:3f:2d:18:d5:90:92:57: 00:97:e0:4f:f7:39:97:65:7e:3e:d2:d3:88:23:93:c7: ec:d5:e8:77:a8:92:6d:e7:f0:6e:48:89:65:67:50:01: 39:a6:13:30:c9:96:45:6f:0f:e3:9e:97:fa:c0:73:d7: 3b:6c:77:84:ae:f5:27:55:5b:29:c6:12:aa:6f:c1:b6: 43:7c:17:1e:a4:cd:c3:39:a9:71:56:24:bd:46:2d:90: ad:20:9b:3e:a8:2c:c7:a9:ed:fe:12:eb:f0:fc:3d:80: f9:78:48:f6:63:64:04:57:7c:cf:6c:5f:44:f1:a8:d0: 8e:6c:4d:bd:df:e2:2c:f9:af:5b:3a:9c:a2:01:95:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 60:b0:6b:09:13:87:9a:1c:63:c2:ff:48:b5:7d:63:77: 41:9b:e5:38:6e:06:28:20:b4:88:1c:87:c9:e1:fc:83: 75:c1:bc:93:35:0a:9b:87:e4:95:d3:ac:f6:21:3b:ef: db:56:f9:d1:b9:a7:2a:50:b4:e9:83:74:8a:65:f0:0e: c9:a6:fd:e5:02:99:6f:a2:c0:db:79:64:41:ab:5d:9f: ef:89:ca:07:2a:11:93:94:15:76:c8:91:b0:b8:3a:bd: 78:1e:a4:6b:f4:41:83:fa:c6:88:4f:3c:82:73:31:03: ce:fb:98:a9:00:76:c5:dc:b4:ad:fd:e4:46:9a:6d:32: 21:d1:60:0f:c8:2f:85:68:7b:ac:6e:2d:d1:d7:46:be: bd:93:40:a9:d7:3e:aa:73:0d:b1:52:d6:2b:45:9a:54: 6d:25:83:08:08:7b:d6:7f:49:3b:4e:c8:33:72:1b:a2: 50:6c:99:6d:68:11:32:16:0b:ea:7e:10:f7:eb:a5:1f: dd:af:38:8d:bf:d6:54:f7:d8:f9:31:9d:1b:35:78:99: 47:98:6d:eb:6b:7d:7f:b2:54:d9:3c:5a:e9:f2:3a:92: de:29:f3:49:59:1a:f1:4e:96:cf:01:ed:5a:c1:da:64: 2b:1e:42:6b:f1:2b:11:5f:03:cc:17:9b:a2:d1:9c:63 Fingerprint (SHA-256): 7E:B8:DF:0A:32:7C:87:F7:93:AE:6C:2F:B4:6F:6A:33:7A:0F:1A:CD:98:92:98:70:2A:64:5E:E4:26:E6:FF:8D Fingerprint (SHA1): D3:88:D5:EA:A7:D3:DB:30:D2:4A:BF:20:28:8A:AD:2A:D6:C4:B1:27 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #648: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #649: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #650: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141515 (0x3caf9b4b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:36 2023 Not After : Wed Oct 18 14:15:36 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ac:92:fb:9d:29:e2:8e:98:7b:5d:d9:06:8d:56:35:55: fa:8f:ff:05:4e:33:51:16:f2:79:29:b6:e7:bd:3d:c9: eb:16:3f:fb:32:a7:de:85:95:64:bc:a3:11:19:bd:f2: 92:9f:ea:8a:6d:af:64:80:c2:04:4d:ed:ae:14:d8:1d: b3:d1:0d:d4:54:a9:e9:ed:5e:9b:c2:ea:ea:d3:ad:d5: 77:13:c2:aa:ea:0a:bf:a0:b0:8e:69:5d:f1:a3:e7:9d: ec:ba:bd:7b:ea:8f:80:36:01:80:79:74:8f:95:11:af: c0:40:65:9a:0d:be:1e:06:d6:c2:64:c0:5b:d4:e4:92: 29:4d:e9:2c:d3:07:73:81:84:fa:4b:2c:26:63:44:60: 72:da:30:4c:3f:db:0b:7d:c4:31:b2:9e:9d:da:c9:75: 01:7c:8f:39:e7:10:8b:9e:d8:ee:a5:c6:98:d0:1c:df: a0:20:c5:9f:4f:8b:8f:5a:d9:51:80:97:28:d1:b2:f6: 8a:0a:5d:31:ab:4e:d0:e4:1b:d9:42:ac:79:3a:70:28: a2:a5:a3:d1:f6:26:56:98:d7:29:94:9e:c1:60:4c:f4: 18:3a:09:54:f5:96:c7:fd:c2:0b:84:f4:52:0e:9f:56: 2b:cb:f8:45:e1:c7:15:8a:51:b4:39:2b:a9:aa:f9:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:37:e3:75:0c:3d:fa:a9:8a:f2:64:a9:e7:2e:72:21: b9:4c:27:e6:85:d7:5f:76:d6:16:50:73:04:41:23:5a: d3:c1:42:39:d8:c5:71:86:a1:98:dc:f3:be:ec:41:aa: 05:ee:99:83:45:66:9d:69:c4:a5:63:33:8f:6b:09:d3: 54:a2:63:c0:df:f0:10:ca:d2:75:5d:03:b6:d0:fb:35: 27:09:b2:8c:28:08:7b:c1:62:81:dd:d2:e7:b9:6d:ee: 1b:f3:87:24:1f:16:e3:47:15:98:7e:16:b8:8d:1f:df: ce:1c:32:72:7b:32:a7:84:16:16:59:2d:23:de:88:cc: 25:78:52:62:aa:8e:95:33:13:94:ed:9a:75:25:0e:e8: 2d:7f:05:d0:93:b1:0c:61:54:44:09:95:c3:5f:76:a2: 9d:b9:c2:b0:65:96:fb:db:ba:73:70:16:82:92:5a:67: 80:70:af:f8:a8:e3:04:0a:c1:58:18:80:35:4b:9c:30: 80:4e:fb:77:3f:ea:0d:24:1e:bd:a0:a8:e3:6c:59:94: 6f:0d:9f:74:70:f3:a4:34:cf:9a:fe:af:07:48:ee:52: b1:84:b9:d3:6a:b0:db:da:89:58:a6:31:51:cd:e4:76: 87:f8:c2:65:b0:9d:45:dc:ff:f0:05:dc:af:ce:55:3b Fingerprint (SHA-256): B0:D2:88:49:E9:A2:1C:4B:80:AB:CC:55:74:BA:8E:6C:CA:57:0A:A0:88:EC:4A:74:E0:87:9C:D6:69:F9:17:E4 Fingerprint (SHA1): 82:57:FC:18:CB:B0:24:67:95:73:AD:3E:31:C1:8C:55:25:3F:DA:B0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #651: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #652: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141516 (0x3caf9b4c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:15:37 2023 Not After : Wed Oct 18 14:15:37 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:7c:a4:64:f5:03:65:14:a6:8c:83:9d:45:eb:47:d2: d5:9e:ed:fc:15:63:da:0a:02:12:c1:a2:18:2b:e2:45: 75:83:a7:28:7d:5e:8b:57:4b:d9:9a:e2:84:cf:09:b2: d4:32:98:c9:7d:39:66:51:36:89:99:d4:16:1b:b9:6f: 33:f0:37:a0:9f:38:ad:d4:1b:f0:c5:b0:a5:2b:be:b3: 81:fa:ff:23:52:18:50:3a:0b:07:b3:9a:51:bb:43:ad: 10:d1:59:a3:7c:3f:f8:a8:11:3d:a6:a0:f1:a6:58:c3: 4f:25:b8:ca:81:da:2c:94:6a:90:a1:0a:50:0c:14:ac: 02:d1:c6:b5:a3:31:f2:04:90:7a:3d:14:fd:3f:43:84: 74:d3:29:f8:1c:71:0a:99:2c:2e:7b:07:94:0b:39:79: 38:a2:2b:09:c8:bd:85:ea:42:29:ef:bb:15:26:ad:cb: f3:69:f0:cd:c2:13:d9:2f:ae:5c:50:2c:89:74:d4:ae: a0:be:f7:80:ac:95:b4:74:ed:13:2b:f1:60:ac:2e:4b: 89:7a:b1:ce:8c:29:c1:7d:3c:b5:d3:90:06:e5:b1:17: f1:0c:ce:90:bf:12:2e:e7:84:70:7c:6d:c6:c5:58:6c: b3:d3:ed:b5:21:1f:33:e6:59:47:27:e4:19:4d:3b:dd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:1e:5c:b1:cb:3f:82:88:ad:cc:b5:43:58:75:34:6c: 73:22:5a:d4:52:f9:27:0d:ef:b9:97:9f:82:ee:9c:f5: 92:17:40:95:bc:b5:ce:7e:e0:d2:fc:01:b3:31:95:e2: ae:71:80:2e:38:21:a5:11:bf:30:30:55:97:e2:b4:1c: 69:c1:6c:52:f8:3b:f1:65:22:d3:e4:65:d1:e5:4a:90: 75:4c:ef:a9:e0:c7:e0:ee:16:ff:f0:d3:d1:4b:b1:01: fa:fe:18:e6:b9:98:cf:e8:9c:c7:2a:96:2c:aa:bb:42: c2:f4:79:e4:98:fb:c8:94:61:ac:a9:72:33:70:84:2f: d8:2c:28:fe:52:24:d1:b9:c7:9d:14:30:c7:fc:96:a7: ed:b3:d4:e7:c1:16:cb:cc:18:64:90:65:5b:be:60:9c: f7:d3:6f:5d:79:70:7e:c1:55:4f:ec:af:fe:9c:75:0b: 0f:93:27:5d:0f:8b:c6:3a:88:1c:13:54:da:84:b4:97: bf:5e:41:c6:33:50:c3:db:65:b3:8a:06:90:af:ee:96: 3f:70:6a:e9:bd:f6:4d:c6:96:bc:d5:f6:2f:1e:d6:2c: b1:3a:43:8d:eb:f7:ef:f1:4e:f5:0e:b3:be:80:77:cc: 72:05:3e:a1:e5:c3:5d:60:0e:b1:15:18:9d:4d:c7:95 Fingerprint (SHA-256): CF:6B:0F:DB:CA:1C:BF:7A:38:7A:48:8E:BA:1E:CE:E7:FE:60:43:6C:D2:A0:C3:96:7F:C6:0D:FB:E6:22:ED:E7 Fingerprint (SHA1): C2:2E:9C:B1:35:75:84:19:52:4C:03:14:72:62:77:14:A3:CA:30:E2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #653: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #654: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141518 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #655: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #656: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #657: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #658: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018141519 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #659: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #660: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #661: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #662: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018141520 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #663: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #664: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #665: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #666: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1018141521 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #667: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #668: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #669: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #670: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1018141522 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #671: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #672: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #673: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #674: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #675: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #676: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #677: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141518 (0x3caf9b4e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:38 2023 Not After : Wed Oct 18 14:15:38 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:d6:39:0d:8e:8b:2d:19:11:19:6d:39:fa:98:e3:f1: 03:c0:cb:9c:09:71:28:70:07:05:75:30:b6:e4:1f:e4: ce:46:20:38:f8:0d:e0:55:a9:c7:95:92:32:39:0c:fb: e3:ae:3d:6c:44:a9:40:9b:fc:cc:6c:7c:09:54:f4:4e: 1b:fb:63:60:ed:a6:bd:1b:34:ec:bf:35:1a:7f:0a:53: f3:95:0d:d8:9f:7a:29:87:7f:01:dc:59:8e:62:5d:81: 04:56:6c:23:82:e4:f8:dd:7b:0c:6f:02:c2:55:ae:76: 5b:c7:2c:57:3c:5e:f5:0e:bb:84:6a:38:43:e8:9c:f2: 11:a3:a7:d3:dc:85:2f:ca:36:8e:0e:d4:b6:e7:5a:f0: 29:03:69:83:c0:1b:e6:fe:cc:f1:bd:d7:3d:3a:ef:9b: 14:3e:b7:30:71:6e:43:54:1a:a9:a1:35:63:6d:07:81: e1:15:dc:9f:c3:f1:3d:35:94:1d:94:fc:a4:93:9e:8c: 0a:94:bd:67:c3:4f:73:65:36:be:2b:6b:52:2b:9e:19: 40:2e:38:d8:31:53:8f:a5:7d:a4:c5:f3:4d:4d:4c:e2: e8:50:4d:55:e5:f7:07:1d:a9:15:4e:1d:b2:7d:7f:4f: cc:cd:03:06:99:5e:15:55:1b:6c:f8:fc:66:4d:9e:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 22:8e:e4:30:a3:34:fa:f5:b2:cd:91:53:1f:55:72:d0: bd:c0:f3:c1:f0:47:f5:61:f7:49:18:6f:c6:c2:03:50: 38:4f:34:26:4c:10:63:b4:ef:5a:bd:e0:b0:71:2f:c1: 99:1a:d5:02:0a:bd:0e:69:09:d8:96:88:ca:fe:f3:57: 52:2a:19:95:0b:00:74:89:a3:ca:6d:66:d9:af:70:b2: 81:a9:34:15:56:82:f6:93:5f:13:1b:3c:d9:16:c1:a7: 42:40:c8:5d:19:24:73:8a:1f:e5:a8:21:cf:a5:8c:e3: fe:c0:4b:e3:cc:3c:1e:f4:d2:ad:1c:28:8a:6e:a6:2d: ed:a0:85:a7:fe:35:51:34:b9:20:8a:30:6f:3b:8b:af: 50:68:6f:d7:ef:11:89:77:21:ef:5c:fb:46:ae:1d:f3: 77:f3:c7:5d:9d:a4:4f:6d:b2:9d:6a:1d:bf:9a:5e:a1: a3:44:8d:bc:83:9f:7f:a9:8c:15:c7:e1:85:01:b3:e4: 04:d3:ec:3e:53:0f:f5:8a:a6:5b:c2:02:48:ea:ca:40: fe:2f:72:b6:05:c1:e5:a2:b6:55:e7:e3:e1:66:1a:d6: a3:fa:b1:f4:8e:00:ef:61:b6:7d:94:65:0c:70:4a:35: 13:0b:1b:aa:17:f1:39:5b:b4:33:08:dd:5a:f9:b5:0b Fingerprint (SHA-256): 3B:CF:C0:BD:9E:F5:3F:A3:6D:BD:1C:AE:6C:5A:B8:A8:80:33:58:77:FA:0D:7E:29:B1:59:8C:4B:80:0E:61:1C Fingerprint (SHA1): 9A:A4:D6:D7:DC:0D:FC:7E:E4:BE:E2:51:7B:57:42:96:0F:26:57:F8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #678: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #679: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141519 (0x3caf9b4f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:38 2023 Not After : Wed Oct 18 14:15:38 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:67:c4:9c:84:5a:fa:80:5c:30:c4:fe:bb:c6:11:9f: 6f:2f:39:be:dc:99:78:9f:92:a6:cb:c0:26:fa:15:18: 60:8a:6a:70:3a:cd:30:e5:ad:aa:c0:4e:a4:6d:80:1a: 1d:ba:61:15:05:7b:6e:ee:c3:26:3c:f1:36:f0:eb:cd: eb:7d:6d:f7:df:f0:ed:44:ba:9b:82:27:23:25:53:e4: 49:52:65:14:68:01:ad:78:ce:c9:ea:85:2a:9f:46:11: 9f:26:0f:51:a8:c7:8b:36:1d:3b:ab:a3:8f:d9:24:11: f3:99:48:66:13:4c:db:e7:82:24:f9:ca:d6:2d:92:03: 06:68:b3:56:13:d2:34:ef:21:de:3a:ae:1b:90:56:f1: 1d:68:61:06:6d:13:2b:99:24:1c:61:09:a3:b1:17:c0: 5d:7f:f9:1f:2c:89:ce:8c:67:50:b8:5c:43:e7:d6:02: 9d:93:1d:b7:11:2d:a8:c3:60:0a:ac:c0:08:4f:e9:d6: 5d:b9:c8:31:1c:84:95:e4:2d:12:dc:55:d5:8e:bc:5d: e8:9b:d9:a8:14:ba:92:6b:ad:f0:ec:fa:a5:12:3b:c8: 9d:7d:ca:b8:f5:0a:70:86:31:c1:ff:9a:e5:e0:49:05: 2f:a8:33:a4:d5:1a:26:32:9e:ab:a8:21:16:6e:b4:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:65:4e:08:d2:4d:68:cf:93:9b:0a:d8:76:55:13:41: ab:22:da:f4:94:ce:cc:6d:65:76:da:4b:e8:1e:26:52: a0:be:9e:b1:bb:94:a5:00:79:b2:5d:63:67:0c:2b:e0: e8:d3:c1:ec:4e:bf:47:a8:4c:15:2b:f2:6b:bb:fd:ee: fc:53:63:d0:70:84:b7:03:f4:40:85:a8:38:7f:81:1d: 53:0b:f5:fa:53:b5:af:44:60:8e:9c:97:8f:7b:00:e0: 1f:b3:77:1f:01:3c:78:00:5e:5b:e5:31:43:ba:f1:40: 60:75:63:9f:6f:6d:39:a8:3c:7d:b6:0f:88:15:ed:ed: ab:56:dc:11:62:64:2a:96:83:e2:23:24:35:cd:f5:1c: 7b:b0:e8:bc:0d:19:9d:17:79:19:60:e7:14:24:d5:92: a2:d3:f7:7f:b1:62:32:cc:65:98:eb:c1:1c:16:73:a4: 24:4c:4f:22:67:fc:a5:c6:f5:f3:81:aa:e6:e7:73:10: 47:5b:61:3d:95:7c:bb:d1:3f:30:d4:4e:44:07:36:e6: a5:10:4a:d6:aa:94:5f:5f:3a:49:8f:d3:4e:d4:55:6f: 7e:65:c6:d3:f9:31:17:37:fa:0a:4a:cb:42:f2:27:70: 92:11:9a:9b:4d:17:70:fa:18:ef:50:e1:90:3b:f2:fa Fingerprint (SHA-256): 50:A6:D9:8E:D9:DF:37:4E:8F:CC:C5:B7:47:47:E7:60:9D:6E:F1:68:A9:04:9C:19:86:4C:4F:F5:9F:94:45:05 Fingerprint (SHA1): 9C:17:8D:06:C3:36:07:92:02:DB:DE:9F:0E:B7:E5:9C:E1:D7:34:71 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #680: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #681: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #682: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141520 (0x3caf9b50) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:15:39 2023 Not After : Wed Oct 18 14:15:39 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:63:a1:e3:7f:74:ab:08:ed:8d:cc:63:30:15:70:a7: cb:f9:0a:ff:ce:3c:68:d4:39:6d:cf:e2:cd:82:1f:9e: 13:fa:bc:0e:51:48:47:28:79:3f:9e:ed:07:5a:1f:10: 57:24:e0:2b:cc:38:28:26:03:f5:de:d3:a3:35:c0:4a: ba:e0:4c:dd:b1:2a:80:2f:51:9d:44:70:5c:c2:15:0a: 06:12:e3:7d:bb:b4:6b:48:1a:88:0f:07:5a:52:32:1f: f1:9d:3e:8c:2a:ce:ff:27:2c:6f:6c:8b:a4:33:3a:6f: 75:ca:be:89:a8:68:e5:32:9f:16:98:4c:0d:28:ec:07: 3a:d0:d3:56:7e:8f:ea:9c:b6:a2:5b:d9:ed:32:ab:5c: 35:61:82:b9:ad:fd:3b:38:cf:43:99:37:5d:8c:3b:b9: b7:d8:23:c2:2e:61:da:ce:27:f4:19:e4:59:3c:01:2e: 60:60:c5:ae:2c:29:43:50:52:1f:2a:e0:c1:32:fe:50: a8:ba:2b:7b:53:b4:a4:bf:c1:f5:12:a0:92:1a:73:bf: f3:4f:d0:e6:c7:9a:59:e7:07:fc:47:4f:2c:f0:3e:49: eb:72:32:c9:0e:c2:dd:ed:c6:9f:7a:cf:35:6e:2c:76: d5:60:8a:21:76:bf:13:27:5c:e1:d4:4f:3d:97:0a:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 52:9a:ed:f8:e1:79:b3:53:a3:ff:2d:8e:4f:25:ac:eb: b5:20:ae:23:6b:d1:4a:8f:34:47:a6:c3:8b:06:f1:af: 2d:41:94:52:85:31:95:ff:ba:1c:e3:8a:0b:b2:5d:fa: 81:0a:de:df:e9:c0:f9:92:4c:b7:a3:cb:3d:88:b1:1e: ae:ee:ca:82:ce:28:24:54:58:03:f8:ca:d1:5a:a9:a9: 9b:cc:16:55:c6:2a:53:76:44:36:57:52:53:3c:bf:b4: 35:81:ba:c6:05:e5:b5:2c:71:a7:1d:03:95:91:54:c3: 09:20:f6:50:0d:10:fc:eb:0a:d8:3a:e2:b9:75:08:9c: 7f:fb:f0:fb:c5:14:ca:53:89:4d:02:39:d6:76:01:f0: 3b:93:6c:61:b5:ff:e5:c7:37:90:b8:ca:ed:bd:81:a4: 93:1c:19:00:a5:37:8f:57:d3:75:a3:e9:15:36:3e:87: 27:7b:da:a9:79:55:7a:6b:30:6a:09:2d:36:f3:cb:3e: 95:7b:9e:8b:6a:f5:dc:5c:04:b9:ee:46:71:72:d5:50: da:57:c5:19:ba:80:a6:03:fd:89:06:3c:c5:07:5f:37: 0f:8f:06:9a:52:2d:76:80:f1:c7:b2:d0:1b:3c:be:e4: 11:52:31:ab:5f:e1:02:40:35:0f:8d:5d:e6:0f:8b:bf Fingerprint (SHA-256): 14:13:28:0A:B4:0D:61:61:65:1A:56:53:37:E9:71:A9:22:CF:6B:2C:7D:86:F4:6A:E5:FF:8B:3B:11:03:AE:CA Fingerprint (SHA1): 63:1A:73:48:AB:10:B0:5F:7B:62:AE:7A:B1:3B:67:9D:1D:6C:28:C8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #683: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #684: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141523 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #685: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #686: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #687: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #688: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018141524 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #689: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #690: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #691: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #692: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018141525 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA1Root-1018141416.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #693: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #694: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #695: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #696: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018141526 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #697: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #698: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #699: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141523 (0x3caf9b53) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:40 2023 Not After : Wed Oct 18 14:15:40 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:f3:e4:21:6f:a3:57:60:6c:f0:ad:86:0e:0f:c0:ca: fc:6a:25:be:fa:e6:10:65:db:d6:9f:65:6a:58:ac:cc: 2c:f5:02:ab:9f:bb:fb:44:d7:06:02:9c:be:2f:03:6a: bf:79:51:39:e3:5b:19:0d:e3:61:db:f2:be:f3:90:c8: f9:d9:1e:d2:9b:e9:50:68:e8:68:13:0f:30:73:ec:0d: 79:57:ed:d1:5e:5c:5a:2b:29:fd:f6:84:d4:68:38:b1: 7a:33:04:52:24:ae:31:bb:e3:df:fd:05:71:c8:83:4b: 84:3b:6c:a6:4c:d1:b3:e3:21:9e:62:ba:43:71:05:a6: 5f:47:6d:ae:ad:bd:97:56:16:1d:a8:87:2a:19:02:30: 55:2c:c6:d8:03:a8:39:32:4b:4a:d5:77:14:6f:ea:95: ce:8a:76:37:fe:ff:fd:cb:e2:ac:d2:5f:b0:9b:30:04: df:92:63:a0:f9:b9:b3:90:09:57:75:f3:2c:ad:be:38: 03:ab:07:d3:14:11:2c:a8:f1:dc:58:8c:1c:03:cd:1e: b9:9e:31:83:c6:f2:b6:a0:71:2b:3c:92:9a:56:30:f1: 25:7a:65:9b:48:b6:fb:f5:d2:6a:0b:3e:14:03:a6:98: e0:47:fe:1e:65:c9:08:62:0f:e5:ca:04:0c:61:d9:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a0:63:0a:9d:2f:a2:06:92:5d:30:c5:93:a1:80:64:51: 9b:29:25:82:c8:22:b3:46:51:37:b0:f4:00:d2:b8:0f: 19:e1:37:fa:d3:4e:0f:e2:2e:9d:fb:9b:03:62:5d:d5: 2b:b5:c4:94:62:ba:a8:96:96:27:d0:dd:bc:cc:e5:02: 04:51:0b:96:03:0a:8d:39:76:ba:9c:57:af:1d:ab:d3: b8:3b:ce:a6:8e:f2:36:f3:da:a9:b4:e5:0a:62:2f:5f: fe:87:e3:cb:69:86:19:2e:80:5d:d8:ad:ba:f4:2b:f6: e9:57:27:be:1c:1f:c4:c2:67:84:8d:c6:1c:5c:92:86: ad:29:5b:22:fe:eb:32:14:f7:55:ef:61:ba:6c:9c:9b: 0d:2d:0a:b2:8c:56:e1:a4:e7:bc:93:cc:cd:fa:e0:2d: 5c:f9:4b:10:77:3f:1a:63:c2:6c:57:78:f5:14:19:b6: a8:b9:0e:9c:68:06:d0:6d:95:fb:a9:3f:c1:29:68:8b: 29:1f:c4:e6:53:3d:d2:bd:38:40:9c:09:37:0a:6f:e8: b3:54:b3:1a:a7:f9:5f:2c:cb:92:da:52:b7:4c:b2:ee: 38:f1:f5:cb:95:6e:1a:cd:f5:6d:34:42:7f:c9:f0:fd: 9f:2d:45:b8:41:12:18:e7:c9:b9:2e:ab:00:8e:24:40 Fingerprint (SHA-256): 27:52:E1:B6:CB:5C:D0:3D:AA:9B:BA:CA:52:16:B3:B2:45:78:3D:5E:3C:82:89:EB:83:49:33:16:FD:03:2E:78 Fingerprint (SHA1): 60:1D:C8:61:5E:7F:81:4A:09:0B:D1:70:A2:AF:2E:64:43:D8:10:7F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #700: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #701: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141527 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #702: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #703: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #704: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141528 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #705: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #706: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #707: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #708: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018141529 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #709: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #710: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018141530 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #711: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #712: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #713: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #714: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #715: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018141531 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-Bridge-1018141417.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #716: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #717: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #718: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #719: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018141532 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #720: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #721: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #722: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #723: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141528 (0x3caf9b58) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:15:42 2023 Not After : Wed Oct 18 14:15:42 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:19:f2:d5:b6:ea:28:df:bf:df:54:13:75:c2:4c:0b: af:82:76:d9:09:ee:82:4c:68:7e:fb:0a:4d:4f:2c:5f: 4a:aa:56:23:f9:6e:6d:dd:79:41:07:d5:ba:35:89:e0: 5e:b2:78:07:49:7f:dd:72:8a:76:83:73:3c:1d:b3:43: 37:b5:ee:3e:ea:9f:5c:ac:db:ff:c5:dc:fd:c4:59:3d: 2f:50:07:7f:89:6b:7d:30:78:2a:ac:a1:cd:e5:c2:f2: 05:ae:b4:2b:e1:f8:02:ca:11:5e:1d:cc:a8:c2:6c:96: b4:2f:b9:62:c6:cc:8b:9d:dd:97:ac:6e:e9:f6:5c:2a: e0:b0:26:e6:d2:3f:54:15:92:fc:76:7d:39:40:74:97: a1:77:34:35:87:ba:4b:be:3f:33:b2:b3:37:86:93:1d: c9:c7:2d:e6:c1:c1:1e:b5:03:9c:97:16:78:52:35:83: b6:1b:f8:e4:c1:07:ea:1a:91:72:f3:d1:6a:a1:8f:d5: 33:79:e9:de:4a:67:bc:19:ad:f0:b1:19:56:80:bb:f6: 08:98:d8:94:be:3f:52:b8:55:80:1c:de:85:36:3a:85: 28:cf:dc:cc:b4:e4:f2:75:63:4f:ab:b0:78:8e:79:25: c5:9f:b6:1c:6c:d8:6e:55:47:b5:95:0f:3c:8f:4b:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:4c:02:30:6e:68:34:79:3e:06:87:d0:92:25:2e:5c: a0:f5:c0:7a:81:31:6d:5d:94:35:b5:1b:73:1c:38:19: b0:13:4e:16:60:2e:c3:f5:e7:ec:eb:bf:fc:eb:aa:cd: 69:10:68:f7:1b:51:ef:57:41:84:f2:a7:1f:98:2c:7e: 99:0e:f2:09:cf:47:8c:76:82:1d:30:3f:24:28:35:4c: 52:64:34:ed:d3:d6:5e:90:43:85:55:87:05:23:d7:b7: c6:3c:5c:66:93:67:7d:77:22:e1:f5:3a:1e:9e:44:a1: fc:5d:74:b3:52:c2:b2:df:fb:dc:da:ca:e5:4c:03:d3: 61:2f:b3:40:82:e1:e0:b8:13:62:87:f4:cf:79:86:6f: fa:c6:d2:95:53:89:a0:ef:6e:2c:b4:43:d4:d2:85:2f: da:75:0d:e1:79:5a:1d:b7:00:42:37:fd:3e:18:70:4a: 53:e0:3a:57:da:37:22:71:3a:58:50:c6:7f:34:43:9a: 52:dd:03:6f:26:03:3c:dd:25:ce:db:3b:ae:30:76:f2: cf:9f:23:20:32:11:99:fc:51:d9:ee:e1:50:ae:44:71: fa:f2:d0:79:91:9c:ed:4b:49:02:2c:64:e3:f7:18:d4: 7c:7b:dc:5a:97:51:5e:6b:dd:4a:c2:a3:78:b0:55:64 Fingerprint (SHA-256): EA:31:A8:05:53:E9:D2:1A:15:AC:3D:A9:B1:62:4E:54:29:14:52:FD:64:27:0A:59:1F:50:71:5B:23:EC:43:24 Fingerprint (SHA1): 9F:E5:7E:3F:34:BE:EC:D7:A2:AF:51:7E:4F:96:E7:24:ED:91:96:9B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #724: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141528 (0x3caf9b58) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:15:42 2023 Not After : Wed Oct 18 14:15:42 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:19:f2:d5:b6:ea:28:df:bf:df:54:13:75:c2:4c:0b: af:82:76:d9:09:ee:82:4c:68:7e:fb:0a:4d:4f:2c:5f: 4a:aa:56:23:f9:6e:6d:dd:79:41:07:d5:ba:35:89:e0: 5e:b2:78:07:49:7f:dd:72:8a:76:83:73:3c:1d:b3:43: 37:b5:ee:3e:ea:9f:5c:ac:db:ff:c5:dc:fd:c4:59:3d: 2f:50:07:7f:89:6b:7d:30:78:2a:ac:a1:cd:e5:c2:f2: 05:ae:b4:2b:e1:f8:02:ca:11:5e:1d:cc:a8:c2:6c:96: b4:2f:b9:62:c6:cc:8b:9d:dd:97:ac:6e:e9:f6:5c:2a: e0:b0:26:e6:d2:3f:54:15:92:fc:76:7d:39:40:74:97: a1:77:34:35:87:ba:4b:be:3f:33:b2:b3:37:86:93:1d: c9:c7:2d:e6:c1:c1:1e:b5:03:9c:97:16:78:52:35:83: b6:1b:f8:e4:c1:07:ea:1a:91:72:f3:d1:6a:a1:8f:d5: 33:79:e9:de:4a:67:bc:19:ad:f0:b1:19:56:80:bb:f6: 08:98:d8:94:be:3f:52:b8:55:80:1c:de:85:36:3a:85: 28:cf:dc:cc:b4:e4:f2:75:63:4f:ab:b0:78:8e:79:25: c5:9f:b6:1c:6c:d8:6e:55:47:b5:95:0f:3c:8f:4b:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:4c:02:30:6e:68:34:79:3e:06:87:d0:92:25:2e:5c: a0:f5:c0:7a:81:31:6d:5d:94:35:b5:1b:73:1c:38:19: b0:13:4e:16:60:2e:c3:f5:e7:ec:eb:bf:fc:eb:aa:cd: 69:10:68:f7:1b:51:ef:57:41:84:f2:a7:1f:98:2c:7e: 99:0e:f2:09:cf:47:8c:76:82:1d:30:3f:24:28:35:4c: 52:64:34:ed:d3:d6:5e:90:43:85:55:87:05:23:d7:b7: c6:3c:5c:66:93:67:7d:77:22:e1:f5:3a:1e:9e:44:a1: fc:5d:74:b3:52:c2:b2:df:fb:dc:da:ca:e5:4c:03:d3: 61:2f:b3:40:82:e1:e0:b8:13:62:87:f4:cf:79:86:6f: fa:c6:d2:95:53:89:a0:ef:6e:2c:b4:43:d4:d2:85:2f: da:75:0d:e1:79:5a:1d:b7:00:42:37:fd:3e:18:70:4a: 53:e0:3a:57:da:37:22:71:3a:58:50:c6:7f:34:43:9a: 52:dd:03:6f:26:03:3c:dd:25:ce:db:3b:ae:30:76:f2: cf:9f:23:20:32:11:99:fc:51:d9:ee:e1:50:ae:44:71: fa:f2:d0:79:91:9c:ed:4b:49:02:2c:64:e3:f7:18:d4: 7c:7b:dc:5a:97:51:5e:6b:dd:4a:c2:a3:78:b0:55:64 Fingerprint (SHA-256): EA:31:A8:05:53:E9:D2:1A:15:AC:3D:A9:B1:62:4E:54:29:14:52:FD:64:27:0A:59:1F:50:71:5B:23:EC:43:24 Fingerprint (SHA1): 9F:E5:7E:3F:34:BE:EC:D7:A2:AF:51:7E:4F:96:E7:24:ED:91:96:9B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #725: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #726: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141533 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #727: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #728: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #729: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141534 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #730: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #731: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #732: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #733: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018141535 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #734: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #735: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018141536 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #736: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #737: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #738: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #739: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #740: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018141537 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-Bridge-1018141418.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #741: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #742: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #743: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #744: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018141538 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #745: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #746: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #747: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #748: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018141539 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-BridgeNavy-1018141419.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #749: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #750: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #751: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #752: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018141540 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #753: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #754: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #755: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #756: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141534 (0x3caf9b5e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:15:45 2023 Not After : Wed Oct 18 14:15:45 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:ef:62:7b:e6:dd:49:88:1e:61:a9:ca:68:a0:26:5c: 2f:78:da:be:c8:a6:56:10:67:0d:aa:5f:3d:a7:58:b5: 42:3d:3e:db:23:b5:62:00:cc:f2:fa:da:f9:a4:ce:17: 85:93:c2:cd:6c:65:b1:71:cd:50:02:c2:ce:b4:d6:c7: 6c:d6:ad:c6:aa:5d:40:3f:20:e8:89:82:58:58:42:48: d6:45:af:de:af:71:df:a3:60:0e:27:f6:64:ce:7b:b8: 2d:6c:ac:e9:2c:48:64:84:45:ff:e9:57:4f:0f:67:f5: 99:a7:ec:21:97:93:32:ff:df:20:49:99:5f:00:c1:28: d0:15:93:0a:b4:7f:da:4b:80:96:e7:26:e4:eb:6d:57: d6:0f:52:44:d1:e5:6f:0d:9f:cd:12:ab:4f:5f:d8:4a: c2:5c:68:1a:be:1d:34:e7:71:4f:f8:a7:d5:c1:6c:f4: f4:86:eb:3c:89:d1:81:49:2c:b0:5d:69:09:08:c6:7d: cd:24:a5:81:02:0b:8e:9f:06:76:39:f6:b1:35:51:13: 67:7e:13:81:a9:c8:6e:4a:a0:71:14:89:29:8e:0d:fa: 51:39:93:7d:2b:ee:b7:c0:c0:86:01:c3:37:60:ab:2e: 33:40:ac:5c:c1:51:bb:4c:28:5f:64:f2:09:be:10:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:8c:5d:8c:fb:fa:b9:46:9e:3b:6a:7b:b9:9e:13:6d: c9:0b:4c:4b:68:bf:b0:e9:ad:54:21:9d:db:14:7c:6c: 53:6b:40:b6:4d:57:86:e5:98:e8:d3:de:33:ca:f5:ab: c9:91:1e:e7:2a:88:4b:69:e4:43:7b:25:a9:c8:b9:1a: 7f:22:26:40:7e:ca:50:71:7a:55:e0:6d:fc:a6:b4:d1: 34:f8:db:f4:5a:53:22:b5:ee:15:00:a7:3b:14:77:67: 1c:53:68:f4:f5:ce:f4:bf:5f:27:cd:f6:06:59:37:b5: 7b:31:90:db:9b:23:2a:a2:f1:73:76:e5:9c:6d:c4:5d: 17:25:c3:b7:bd:be:bd:3b:d4:6b:ba:25:7c:05:40:9e: dd:d5:1e:a2:09:be:7b:9e:a8:1f:94:d0:dc:31:6f:71: 22:68:8b:61:af:98:20:27:da:83:f8:a8:50:d9:fa:0f: 64:a4:e2:eb:1f:40:05:68:b9:05:e1:88:a6:51:30:bf: 87:a4:e1:ae:05:63:4f:3c:67:bd:0e:cb:0f:5d:78:cb: 7d:01:ef:c2:7d:73:9b:ba:5f:62:96:b4:e8:fe:4a:54: d6:e9:f9:07:35:e6:fa:55:59:8a:89:1d:75:19:19:d5: 48:ac:ab:7e:b0:d7:e5:ec:10:91:3f:2f:1a:10:81:93 Fingerprint (SHA-256): B6:66:13:D3:D2:57:38:42:01:2A:DB:BF:94:42:77:DE:1E:2C:2B:AD:E7:C8:D9:1F:17:AE:8C:78:63:72:15:88 Fingerprint (SHA1): 12:88:54:28:81:B8:73:DF:8D:83:91:0D:97:0F:C7:BA:BB:5B:DC:43 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #757: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141534 (0x3caf9b5e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:15:45 2023 Not After : Wed Oct 18 14:15:45 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:ef:62:7b:e6:dd:49:88:1e:61:a9:ca:68:a0:26:5c: 2f:78:da:be:c8:a6:56:10:67:0d:aa:5f:3d:a7:58:b5: 42:3d:3e:db:23:b5:62:00:cc:f2:fa:da:f9:a4:ce:17: 85:93:c2:cd:6c:65:b1:71:cd:50:02:c2:ce:b4:d6:c7: 6c:d6:ad:c6:aa:5d:40:3f:20:e8:89:82:58:58:42:48: d6:45:af:de:af:71:df:a3:60:0e:27:f6:64:ce:7b:b8: 2d:6c:ac:e9:2c:48:64:84:45:ff:e9:57:4f:0f:67:f5: 99:a7:ec:21:97:93:32:ff:df:20:49:99:5f:00:c1:28: d0:15:93:0a:b4:7f:da:4b:80:96:e7:26:e4:eb:6d:57: d6:0f:52:44:d1:e5:6f:0d:9f:cd:12:ab:4f:5f:d8:4a: c2:5c:68:1a:be:1d:34:e7:71:4f:f8:a7:d5:c1:6c:f4: f4:86:eb:3c:89:d1:81:49:2c:b0:5d:69:09:08:c6:7d: cd:24:a5:81:02:0b:8e:9f:06:76:39:f6:b1:35:51:13: 67:7e:13:81:a9:c8:6e:4a:a0:71:14:89:29:8e:0d:fa: 51:39:93:7d:2b:ee:b7:c0:c0:86:01:c3:37:60:ab:2e: 33:40:ac:5c:c1:51:bb:4c:28:5f:64:f2:09:be:10:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:8c:5d:8c:fb:fa:b9:46:9e:3b:6a:7b:b9:9e:13:6d: c9:0b:4c:4b:68:bf:b0:e9:ad:54:21:9d:db:14:7c:6c: 53:6b:40:b6:4d:57:86:e5:98:e8:d3:de:33:ca:f5:ab: c9:91:1e:e7:2a:88:4b:69:e4:43:7b:25:a9:c8:b9:1a: 7f:22:26:40:7e:ca:50:71:7a:55:e0:6d:fc:a6:b4:d1: 34:f8:db:f4:5a:53:22:b5:ee:15:00:a7:3b:14:77:67: 1c:53:68:f4:f5:ce:f4:bf:5f:27:cd:f6:06:59:37:b5: 7b:31:90:db:9b:23:2a:a2:f1:73:76:e5:9c:6d:c4:5d: 17:25:c3:b7:bd:be:bd:3b:d4:6b:ba:25:7c:05:40:9e: dd:d5:1e:a2:09:be:7b:9e:a8:1f:94:d0:dc:31:6f:71: 22:68:8b:61:af:98:20:27:da:83:f8:a8:50:d9:fa:0f: 64:a4:e2:eb:1f:40:05:68:b9:05:e1:88:a6:51:30:bf: 87:a4:e1:ae:05:63:4f:3c:67:bd:0e:cb:0f:5d:78:cb: 7d:01:ef:c2:7d:73:9b:ba:5f:62:96:b4:e8:fe:4a:54: d6:e9:f9:07:35:e6:fa:55:59:8a:89:1d:75:19:19:d5: 48:ac:ab:7e:b0:d7:e5:ec:10:91:3f:2f:1a:10:81:93 Fingerprint (SHA-256): B6:66:13:D3:D2:57:38:42:01:2A:DB:BF:94:42:77:DE:1E:2C:2B:AD:E7:C8:D9:1F:17:AE:8C:78:63:72:15:88 Fingerprint (SHA1): 12:88:54:28:81:B8:73:DF:8D:83:91:0D:97:0F:C7:BA:BB:5B:DC:43 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #758: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #759: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141533 (0x3caf9b5d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:15:44 2023 Not After : Wed Oct 18 14:15:44 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:b1:1f:96:08:f2:cf:00:56:99:d3:04:2e:cb:ae:87: b9:1f:f7:5f:fd:da:aa:db:6a:0d:4f:58:ca:0d:92:01: 7c:0d:71:02:5a:e8:f6:a2:8a:15:17:3e:e5:16:95:2d: ef:aa:71:e3:6a:c8:f0:a3:1f:4c:19:77:d2:7f:01:b9: f1:38:77:ea:4d:21:db:c2:8e:86:72:3e:11:4e:3a:11: ab:6f:c4:0d:b2:6f:0f:28:4c:aa:33:dc:6c:b6:97:91: cd:17:ea:df:68:11:2c:21:83:b7:c3:dd:ac:34:53:3f: 77:d5:ae:69:7d:ce:fe:72:27:2b:4d:00:2e:31:b5:c4: b0:d7:19:f6:57:b5:f4:6f:ea:fd:52:be:63:57:b9:c5: 31:c7:0b:08:67:99:b5:09:90:a8:f3:76:4f:f8:dc:5a: db:e2:a2:ae:e3:3d:96:b4:5f:80:1a:26:d1:a7:b5:53: ab:58:8e:5a:3d:ab:5b:7d:f8:05:67:f2:d3:e0:1d:aa: 12:80:1d:1b:c0:8a:19:43:36:dd:56:92:85:e6:6b:78: 1a:5c:1f:a8:a1:b7:55:06:a9:1e:69:12:6d:2b:e8:5c: 8a:f9:4c:65:84:42:16:2f:3a:63:1b:ab:e7:13:3a:9a: 0a:8a:f2:29:e2:da:9d:74:75:2f:f8:57:e5:f3:81:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:b5:c0:87:7d:67:d0:13:0b:c7:c1:61:bc:49:95:ab: 19:29:78:06:ac:a9:a9:e3:67:54:04:2c:33:88:52:e4: 93:e8:18:ee:b6:0d:1c:21:96:fd:67:70:7f:17:47:d1: 53:30:17:b4:fb:4c:7f:16:d0:48:84:fe:a5:26:17:0e: 12:8c:c6:26:53:fb:3a:e8:fd:1d:22:bc:29:79:fd:2b: 5e:1e:82:9c:23:40:d4:a9:32:df:48:fb:9f:28:1c:76: 7c:6d:7c:7f:11:1a:83:71:73:17:06:88:40:66:07:80: 6e:4b:03:aa:dd:85:b4:42:99:e5:bf:e4:19:f5:65:22: b5:6c:36:78:4a:b0:5a:0d:c1:a9:2a:cb:40:b4:65:d4: 6d:bb:62:8f:32:b5:b1:b4:5b:5b:37:98:24:34:ad:c2: 9f:96:26:76:a6:3f:1d:66:b7:df:2a:03:86:85:2d:7f: 40:31:f5:a9:dc:7e:12:c5:27:09:5b:92:e8:66:35:5a: 16:19:df:f6:e3:53:03:ec:dc:40:41:49:20:62:1a:31: e0:f0:78:9b:30:1f:99:18:f9:2f:71:e7:aa:68:49:17: d4:db:cc:18:ee:45:c3:d5:ec:2a:df:e6:6b:43:70:0d: 78:ba:75:b9:b3:61:b4:d6:14:ea:47:86:33:32:47:da Fingerprint (SHA-256): 6F:1D:07:82:EE:7C:FC:40:12:A2:78:E8:37:7A:D8:CF:9A:02:0E:B4:0E:2F:0B:D8:EE:66:0F:F4:AF:D7:76:E0 Fingerprint (SHA1): 94:CB:69:ED:D6:E7:E6:8A:EC:79:08:4D:59:9F:58:AE:CD:3C:C7:A8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #760: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141534 (0x3caf9b5e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:15:45 2023 Not After : Wed Oct 18 14:15:45 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:ef:62:7b:e6:dd:49:88:1e:61:a9:ca:68:a0:26:5c: 2f:78:da:be:c8:a6:56:10:67:0d:aa:5f:3d:a7:58:b5: 42:3d:3e:db:23:b5:62:00:cc:f2:fa:da:f9:a4:ce:17: 85:93:c2:cd:6c:65:b1:71:cd:50:02:c2:ce:b4:d6:c7: 6c:d6:ad:c6:aa:5d:40:3f:20:e8:89:82:58:58:42:48: d6:45:af:de:af:71:df:a3:60:0e:27:f6:64:ce:7b:b8: 2d:6c:ac:e9:2c:48:64:84:45:ff:e9:57:4f:0f:67:f5: 99:a7:ec:21:97:93:32:ff:df:20:49:99:5f:00:c1:28: d0:15:93:0a:b4:7f:da:4b:80:96:e7:26:e4:eb:6d:57: d6:0f:52:44:d1:e5:6f:0d:9f:cd:12:ab:4f:5f:d8:4a: c2:5c:68:1a:be:1d:34:e7:71:4f:f8:a7:d5:c1:6c:f4: f4:86:eb:3c:89:d1:81:49:2c:b0:5d:69:09:08:c6:7d: cd:24:a5:81:02:0b:8e:9f:06:76:39:f6:b1:35:51:13: 67:7e:13:81:a9:c8:6e:4a:a0:71:14:89:29:8e:0d:fa: 51:39:93:7d:2b:ee:b7:c0:c0:86:01:c3:37:60:ab:2e: 33:40:ac:5c:c1:51:bb:4c:28:5f:64:f2:09:be:10:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:8c:5d:8c:fb:fa:b9:46:9e:3b:6a:7b:b9:9e:13:6d: c9:0b:4c:4b:68:bf:b0:e9:ad:54:21:9d:db:14:7c:6c: 53:6b:40:b6:4d:57:86:e5:98:e8:d3:de:33:ca:f5:ab: c9:91:1e:e7:2a:88:4b:69:e4:43:7b:25:a9:c8:b9:1a: 7f:22:26:40:7e:ca:50:71:7a:55:e0:6d:fc:a6:b4:d1: 34:f8:db:f4:5a:53:22:b5:ee:15:00:a7:3b:14:77:67: 1c:53:68:f4:f5:ce:f4:bf:5f:27:cd:f6:06:59:37:b5: 7b:31:90:db:9b:23:2a:a2:f1:73:76:e5:9c:6d:c4:5d: 17:25:c3:b7:bd:be:bd:3b:d4:6b:ba:25:7c:05:40:9e: dd:d5:1e:a2:09:be:7b:9e:a8:1f:94:d0:dc:31:6f:71: 22:68:8b:61:af:98:20:27:da:83:f8:a8:50:d9:fa:0f: 64:a4:e2:eb:1f:40:05:68:b9:05:e1:88:a6:51:30:bf: 87:a4:e1:ae:05:63:4f:3c:67:bd:0e:cb:0f:5d:78:cb: 7d:01:ef:c2:7d:73:9b:ba:5f:62:96:b4:e8:fe:4a:54: d6:e9:f9:07:35:e6:fa:55:59:8a:89:1d:75:19:19:d5: 48:ac:ab:7e:b0:d7:e5:ec:10:91:3f:2f:1a:10:81:93 Fingerprint (SHA-256): B6:66:13:D3:D2:57:38:42:01:2A:DB:BF:94:42:77:DE:1E:2C:2B:AD:E7:C8:D9:1F:17:AE:8C:78:63:72:15:88 Fingerprint (SHA1): 12:88:54:28:81:B8:73:DF:8D:83:91:0D:97:0F:C7:BA:BB:5B:DC:43 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #761: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141534 (0x3caf9b5e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:15:45 2023 Not After : Wed Oct 18 14:15:45 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:ef:62:7b:e6:dd:49:88:1e:61:a9:ca:68:a0:26:5c: 2f:78:da:be:c8:a6:56:10:67:0d:aa:5f:3d:a7:58:b5: 42:3d:3e:db:23:b5:62:00:cc:f2:fa:da:f9:a4:ce:17: 85:93:c2:cd:6c:65:b1:71:cd:50:02:c2:ce:b4:d6:c7: 6c:d6:ad:c6:aa:5d:40:3f:20:e8:89:82:58:58:42:48: d6:45:af:de:af:71:df:a3:60:0e:27:f6:64:ce:7b:b8: 2d:6c:ac:e9:2c:48:64:84:45:ff:e9:57:4f:0f:67:f5: 99:a7:ec:21:97:93:32:ff:df:20:49:99:5f:00:c1:28: d0:15:93:0a:b4:7f:da:4b:80:96:e7:26:e4:eb:6d:57: d6:0f:52:44:d1:e5:6f:0d:9f:cd:12:ab:4f:5f:d8:4a: c2:5c:68:1a:be:1d:34:e7:71:4f:f8:a7:d5:c1:6c:f4: f4:86:eb:3c:89:d1:81:49:2c:b0:5d:69:09:08:c6:7d: cd:24:a5:81:02:0b:8e:9f:06:76:39:f6:b1:35:51:13: 67:7e:13:81:a9:c8:6e:4a:a0:71:14:89:29:8e:0d:fa: 51:39:93:7d:2b:ee:b7:c0:c0:86:01:c3:37:60:ab:2e: 33:40:ac:5c:c1:51:bb:4c:28:5f:64:f2:09:be:10:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4a:8c:5d:8c:fb:fa:b9:46:9e:3b:6a:7b:b9:9e:13:6d: c9:0b:4c:4b:68:bf:b0:e9:ad:54:21:9d:db:14:7c:6c: 53:6b:40:b6:4d:57:86:e5:98:e8:d3:de:33:ca:f5:ab: c9:91:1e:e7:2a:88:4b:69:e4:43:7b:25:a9:c8:b9:1a: 7f:22:26:40:7e:ca:50:71:7a:55:e0:6d:fc:a6:b4:d1: 34:f8:db:f4:5a:53:22:b5:ee:15:00:a7:3b:14:77:67: 1c:53:68:f4:f5:ce:f4:bf:5f:27:cd:f6:06:59:37:b5: 7b:31:90:db:9b:23:2a:a2:f1:73:76:e5:9c:6d:c4:5d: 17:25:c3:b7:bd:be:bd:3b:d4:6b:ba:25:7c:05:40:9e: dd:d5:1e:a2:09:be:7b:9e:a8:1f:94:d0:dc:31:6f:71: 22:68:8b:61:af:98:20:27:da:83:f8:a8:50:d9:fa:0f: 64:a4:e2:eb:1f:40:05:68:b9:05:e1:88:a6:51:30:bf: 87:a4:e1:ae:05:63:4f:3c:67:bd:0e:cb:0f:5d:78:cb: 7d:01:ef:c2:7d:73:9b:ba:5f:62:96:b4:e8:fe:4a:54: d6:e9:f9:07:35:e6:fa:55:59:8a:89:1d:75:19:19:d5: 48:ac:ab:7e:b0:d7:e5:ec:10:91:3f:2f:1a:10:81:93 Fingerprint (SHA-256): B6:66:13:D3:D2:57:38:42:01:2A:DB:BF:94:42:77:DE:1E:2C:2B:AD:E7:C8:D9:1F:17:AE:8C:78:63:72:15:88 Fingerprint (SHA1): 12:88:54:28:81:B8:73:DF:8D:83:91:0D:97:0F:C7:BA:BB:5B:DC:43 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #762: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #763: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141541 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #764: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #765: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #766: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141542 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #767: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #768: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #769: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #770: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1018141543 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #771: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #772: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #773: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #774: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1018141544 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #775: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #776: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #777: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #778: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1018141545 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #779: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #780: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1018141546 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #781: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #782: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #783: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #784: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #785: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018141547 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #786: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #787: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #788: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #789: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018141548 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #790: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #791: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #792: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #793: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018141549 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #794: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #795: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #796: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #797: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018141550 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #798: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #799: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #800: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141541 (0x3caf9b65) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:15:48 2023 Not After : Wed Oct 18 14:15:48 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:45:4e:76:e0:d6:a8:98:db:d0:7b:ae:1e:4b:1d:41: 88:74:39:9e:a8:62:89:14:d4:a7:c4:cd:00:a7:38:91: d5:19:18:b3:49:12:81:d6:6d:44:b6:f5:66:67:37:40: 3b:01:50:c5:d0:60:18:23:a5:f5:de:23:a9:43:bf:90: e6:db:11:49:09:ed:2b:50:2a:1e:ac:26:b4:5e:3e:f4: fc:31:98:fc:dc:ef:2d:fc:af:31:62:d0:a1:25:dc:94: 53:50:3e:4c:09:20:63:3e:61:42:98:c5:f3:42:11:1c: 1b:d1:a9:dc:77:b5:ef:ca:5a:21:9a:26:27:e3:13:97: f4:bd:82:6f:5f:a4:7d:9e:6b:3a:bc:c3:f3:0c:1a:75: 43:17:2b:16:ca:45:01:d6:8d:2e:15:e4:4e:94:51:66: f7:88:13:98:fa:37:e2:5e:12:20:7f:71:81:96:ef:be: e3:4a:2f:ce:81:09:b9:5e:25:f7:17:38:3c:3f:2d:6b: 20:c9:dd:45:e8:ce:26:cc:9f:84:ab:4b:97:71:cb:ca: 96:6c:8d:84:9f:6c:54:43:9d:25:c2:ba:b6:15:72:a8: b1:9d:eb:a2:a6:73:6e:b7:21:71:2d:51:05:ac:6d:e2: 98:6b:c5:59:dd:12:a0:c3:61:23:da:5b:4f:a2:2e:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:10:3f:5d:54:a7:d1:e8:9f:c2:56:63:75:22:c5:8c: 8d:e8:7c:76:86:82:50:de:05:79:84:92:34:eb:bc:5b: 81:b2:fe:db:60:ac:aa:63:41:8a:b7:5e:20:2f:27:46: 70:06:75:62:40:8f:43:f1:74:b4:4c:6c:0a:31:f8:e7: 1a:9a:92:97:7e:6e:74:e1:1d:e5:00:3d:08:5a:d6:c7: a6:08:ca:2c:7d:52:af:71:9c:09:f1:33:0b:3a:b5:df: 52:d8:0b:e9:97:29:eb:e3:eb:8d:41:9d:ab:e7:b8:87: f6:e1:ac:28:54:c5:57:92:a7:4a:e4:b1:db:41:f8:4f: f8:aa:2a:4d:0e:15:c2:24:c4:e5:64:b9:7e:e6:eb:eb: 30:b8:8f:c8:2a:b1:8a:1f:77:e3:06:5e:4d:58:94:19: 76:35:d2:36:3f:d1:c2:25:f4:ca:b6:6d:2f:c8:01:f4: ab:d1:82:5d:85:77:89:31:bc:97:5f:c5:60:f2:79:d6: 88:3e:88:ec:85:94:b4:1e:94:6a:0b:6e:69:6d:73:2e: a7:0f:28:2e:37:1a:d0:74:c4:50:53:31:cd:9a:bb:e2: 6c:5c:43:e6:46:72:2c:cf:3e:16:22:85:f7:6f:6e:67: 7c:34:aa:59:35:1f:c9:a6:af:3e:f7:5f:81:e6:1c:c6 Fingerprint (SHA-256): 2B:19:E2:FA:A6:81:11:AF:18:E9:7F:AB:08:B6:F0:3F:28:65:39:FE:A7:B2:5F:18:CA:96:E7:1D:00:65:C5:A4 Fingerprint (SHA1): 4B:D6:A0:3D:6A:AE:83:C2:B7:FA:0D:6B:B4:25:5A:85:1D:22:7B:53 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #801: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #802: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #803: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #804: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #805: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #806: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #807: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #808: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #809: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141542 (0x3caf9b66) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:15:49 2023 Not After : Wed Oct 18 14:15:49 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:d3:95:2b:ce:73:cf:e2:27:5f:d0:48:8b:2f:46:c6: b0:e7:5f:5b:9a:92:29:19:05:42:73:69:89:a7:cd:d4: ef:71:c8:35:72:91:90:cb:91:e3:3c:53:3c:72:17:8e: 49:e0:19:13:29:03:25:2a:0f:92:04:2a:c4:c8:d0:7f: 27:79:f2:e8:68:24:0d:76:a7:b3:3f:81:bc:f3:44:20: 88:69:75:c1:6b:e9:c5:8a:c2:75:f8:5b:43:d1:de:57: 9f:f8:aa:85:df:94:53:20:23:b1:44:2e:a5:64:05:3f: d5:7c:57:ce:15:b7:f0:03:1a:dc:83:f4:b1:4d:65:82: f7:61:b3:3e:8a:d4:b4:62:8f:f6:fd:3f:87:92:af:3d: e3:6b:5c:7d:95:90:b6:b4:83:cc:17:f2:cc:e1:e2:88: a2:21:cc:5e:b6:8b:8a:30:f4:d5:21:1f:51:d0:67:36: c0:ca:5f:a1:c6:72:ed:6e:9d:82:ba:41:2b:a6:32:be: 53:e8:f7:df:cd:06:96:67:41:98:b8:36:b9:54:2b:e7: 65:01:e5:49:3f:18:f0:50:a5:8d:19:73:de:8a:7e:76: ba:a9:5d:57:77:b0:fe:71:b7:d9:30:9e:19:b7:91:d8: 7f:ad:03:95:ee:42:2b:36:f1:7a:6c:51:6f:67:ec:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 94:61:6d:2a:db:1a:40:6b:6e:ce:a4:9b:61:0b:21:bc: 8e:01:d2:92:fd:66:3b:5d:8b:b0:fc:50:bf:b2:20:97: 66:f0:a7:db:9d:e9:2c:45:04:35:32:55:c5:9c:4f:b5: 36:22:b5:c9:7f:5b:67:06:ee:4a:07:38:5f:ab:df:c6: 9f:18:54:30:2d:7b:2f:71:7f:b1:f6:d9:5f:16:6d:5b: 2e:d5:70:14:95:90:d5:2d:b0:e1:71:5e:bb:ed:a7:a6: 91:4a:32:6c:92:23:5c:2b:82:a8:52:54:61:97:7e:c9: 81:a2:5c:90:f9:50:15:4d:4a:ba:9b:2d:d5:8a:87:16: a3:34:72:f3:31:74:c3:90:63:7c:79:41:1e:c4:18:1f: 60:a1:60:4e:f8:0b:01:3d:d8:06:8c:ab:be:78:e9:0a: 92:b4:0d:a1:3d:64:17:b0:88:24:39:13:5a:40:fe:88: a5:38:a7:87:0b:bb:eb:74:42:16:ed:e8:fc:ee:96:67: 4b:29:d3:49:72:72:c4:aa:f3:cf:bd:cb:9a:55:ef:ec: f0:10:c8:a2:67:12:80:8b:a5:02:1c:76:62:77:04:2d: 72:86:3e:bc:aa:75:1e:1f:fe:d9:fa:51:36:9a:3e:5e: 34:a4:84:73:28:40:28:1d:9c:b3:80:72:d3:97:ef:e7 Fingerprint (SHA-256): F5:7C:24:8F:72:3C:F4:5A:27:BE:6C:97:1B:B5:8D:19:4A:0D:FC:BB:83:80:7F:5E:0E:AB:1B:DF:BF:EA:8D:9D Fingerprint (SHA1): 01:E5:72:A7:E2:38:7D:6B:33:9B:0C:F4:88:7D:89:84:B4:8E:B4:74 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #810: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #811: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #812: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #813: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #814: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #815: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #816: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #817: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #818: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #819: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #820: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #821: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #822: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #823: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #824: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #825: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #826: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #827: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #828: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141551 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #829: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #830: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #831: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #832: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018141552 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #833: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #834: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #835: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #836: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018141553 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #837: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #838: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #839: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #840: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1018141554 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #841: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #842: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #843: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #844: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018141555 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #845: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #846: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #847: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #848: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1018141556 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #849: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #850: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #851: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #852: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1018141557 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #853: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #854: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #855: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #856: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1018141558 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #857: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #858: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #859: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #860: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1018141559 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #861: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #862: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #863: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141551 (0x3caf9b6f) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:54 2023 Not After : Wed Oct 18 14:15:54 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 6c:f6:41:cd:5b:00:a7:58:39:1c:c0:29:ba:8b:f0:20: b9:d1:d8:eb:03:68:2d:e3:fd:b9:a6:7d:66:ca:1a:6a: 96:21:30:96:98:7f:6f:94:b3:b5:fc:ea:2a:e2:b8:c1: 0e:e3:0e:74:34:2a:f2:07:eb:08:bf:1f:de:f5:20:13: 85:bb:5c:72:a0:2a:19:26:3a:39:dd:cc:29:a0:0a:2b: c3:1b:a5:37:bc:1e:25:25:b3:e6:56:dd:04:6f:a2:9d: 9e:5e:d1:38:8e:0b:70:7d:ed:21:47:f9:53:7c:f7:6e: 61:50:b5:5c:e3:4c:ed:ee:0d:11:7b:c9:e1:70:3d:c9: 49:13:80:dd:ad:bd:8f:2b:fb:8c:fa:d2:d3:e0:93:e4: 7e:b7:71:28:87:97:73:ff:5e:11:33:ab:6f:16:40:49: 72:32:2a:69:3b:48:6d:99:36:4d:77:7b:21:4b:e2:44: e2:ed:43:ac:80:12:c0:08:a0:b1:0e:ee:35:bb:a8:c4: 44:ef:3a:09:93:6a:b3:ab:12:ce:9b:ce:91:9d:01:d7: 34:e0:7e:23:00:e6:9e:d2:08:a4:8b:36:47:98:7f:c1: 1d:7d:12:b2:cd:0f:34:04:2d:be:03:d6:ac:29:bc:2a: bd:89:62:e2:8c:a0:a6:3c:02:bd:b5:20:16:d3:50:d6 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:a2:60:23:19:3d:ff:1a:e7:3a:71:76: aa:91:92:53:6c:a7:ef:b8:94:7f:5d:64:5d:ff:3d:86: 58:02:1c:26:ed:f0:b2:81:c1:af:e0:e4:93:de:ea:52: 6d:c7:14:a5:29:eb:14:1f:76:46:61:e6:bd:3a:ea Fingerprint (SHA-256): 94:90:0C:F6:7D:2C:B5:69:24:00:DE:70:EC:85:6D:A7:B1:28:5B:7D:97:B2:1F:03:02:6E:7F:89:24:53:A6:8A Fingerprint (SHA1): F5:41:83:97:3F:F0:DA:AB:9B:B7:EB:B9:4F:9A:77:E7:AE:DD:3F:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #864: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141551 (0x3caf9b6f) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:54 2023 Not After : Wed Oct 18 14:15:54 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 6c:f6:41:cd:5b:00:a7:58:39:1c:c0:29:ba:8b:f0:20: b9:d1:d8:eb:03:68:2d:e3:fd:b9:a6:7d:66:ca:1a:6a: 96:21:30:96:98:7f:6f:94:b3:b5:fc:ea:2a:e2:b8:c1: 0e:e3:0e:74:34:2a:f2:07:eb:08:bf:1f:de:f5:20:13: 85:bb:5c:72:a0:2a:19:26:3a:39:dd:cc:29:a0:0a:2b: c3:1b:a5:37:bc:1e:25:25:b3:e6:56:dd:04:6f:a2:9d: 9e:5e:d1:38:8e:0b:70:7d:ed:21:47:f9:53:7c:f7:6e: 61:50:b5:5c:e3:4c:ed:ee:0d:11:7b:c9:e1:70:3d:c9: 49:13:80:dd:ad:bd:8f:2b:fb:8c:fa:d2:d3:e0:93:e4: 7e:b7:71:28:87:97:73:ff:5e:11:33:ab:6f:16:40:49: 72:32:2a:69:3b:48:6d:99:36:4d:77:7b:21:4b:e2:44: e2:ed:43:ac:80:12:c0:08:a0:b1:0e:ee:35:bb:a8:c4: 44:ef:3a:09:93:6a:b3:ab:12:ce:9b:ce:91:9d:01:d7: 34:e0:7e:23:00:e6:9e:d2:08:a4:8b:36:47:98:7f:c1: 1d:7d:12:b2:cd:0f:34:04:2d:be:03:d6:ac:29:bc:2a: bd:89:62:e2:8c:a0:a6:3c:02:bd:b5:20:16:d3:50:d6 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:a2:60:23:19:3d:ff:1a:e7:3a:71:76: aa:91:92:53:6c:a7:ef:b8:94:7f:5d:64:5d:ff:3d:86: 58:02:1c:26:ed:f0:b2:81:c1:af:e0:e4:93:de:ea:52: 6d:c7:14:a5:29:eb:14:1f:76:46:61:e6:bd:3a:ea Fingerprint (SHA-256): 94:90:0C:F6:7D:2C:B5:69:24:00:DE:70:EC:85:6D:A7:B1:28:5B:7D:97:B2:1F:03:02:6E:7F:89:24:53:A6:8A Fingerprint (SHA1): F5:41:83:97:3F:F0:DA:AB:9B:B7:EB:B9:4F:9A:77:E7:AE:DD:3F:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #865: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141551 (0x3caf9b6f) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:54 2023 Not After : Wed Oct 18 14:15:54 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 6c:f6:41:cd:5b:00:a7:58:39:1c:c0:29:ba:8b:f0:20: b9:d1:d8:eb:03:68:2d:e3:fd:b9:a6:7d:66:ca:1a:6a: 96:21:30:96:98:7f:6f:94:b3:b5:fc:ea:2a:e2:b8:c1: 0e:e3:0e:74:34:2a:f2:07:eb:08:bf:1f:de:f5:20:13: 85:bb:5c:72:a0:2a:19:26:3a:39:dd:cc:29:a0:0a:2b: c3:1b:a5:37:bc:1e:25:25:b3:e6:56:dd:04:6f:a2:9d: 9e:5e:d1:38:8e:0b:70:7d:ed:21:47:f9:53:7c:f7:6e: 61:50:b5:5c:e3:4c:ed:ee:0d:11:7b:c9:e1:70:3d:c9: 49:13:80:dd:ad:bd:8f:2b:fb:8c:fa:d2:d3:e0:93:e4: 7e:b7:71:28:87:97:73:ff:5e:11:33:ab:6f:16:40:49: 72:32:2a:69:3b:48:6d:99:36:4d:77:7b:21:4b:e2:44: e2:ed:43:ac:80:12:c0:08:a0:b1:0e:ee:35:bb:a8:c4: 44:ef:3a:09:93:6a:b3:ab:12:ce:9b:ce:91:9d:01:d7: 34:e0:7e:23:00:e6:9e:d2:08:a4:8b:36:47:98:7f:c1: 1d:7d:12:b2:cd:0f:34:04:2d:be:03:d6:ac:29:bc:2a: bd:89:62:e2:8c:a0:a6:3c:02:bd:b5:20:16:d3:50:d6 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:a2:60:23:19:3d:ff:1a:e7:3a:71:76: aa:91:92:53:6c:a7:ef:b8:94:7f:5d:64:5d:ff:3d:86: 58:02:1c:26:ed:f0:b2:81:c1:af:e0:e4:93:de:ea:52: 6d:c7:14:a5:29:eb:14:1f:76:46:61:e6:bd:3a:ea Fingerprint (SHA-256): 94:90:0C:F6:7D:2C:B5:69:24:00:DE:70:EC:85:6D:A7:B1:28:5B:7D:97:B2:1F:03:02:6E:7F:89:24:53:A6:8A Fingerprint (SHA1): F5:41:83:97:3F:F0:DA:AB:9B:B7:EB:B9:4F:9A:77:E7:AE:DD:3F:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #866: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141551 (0x3caf9b6f) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:54 2023 Not After : Wed Oct 18 14:15:54 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 6c:f6:41:cd:5b:00:a7:58:39:1c:c0:29:ba:8b:f0:20: b9:d1:d8:eb:03:68:2d:e3:fd:b9:a6:7d:66:ca:1a:6a: 96:21:30:96:98:7f:6f:94:b3:b5:fc:ea:2a:e2:b8:c1: 0e:e3:0e:74:34:2a:f2:07:eb:08:bf:1f:de:f5:20:13: 85:bb:5c:72:a0:2a:19:26:3a:39:dd:cc:29:a0:0a:2b: c3:1b:a5:37:bc:1e:25:25:b3:e6:56:dd:04:6f:a2:9d: 9e:5e:d1:38:8e:0b:70:7d:ed:21:47:f9:53:7c:f7:6e: 61:50:b5:5c:e3:4c:ed:ee:0d:11:7b:c9:e1:70:3d:c9: 49:13:80:dd:ad:bd:8f:2b:fb:8c:fa:d2:d3:e0:93:e4: 7e:b7:71:28:87:97:73:ff:5e:11:33:ab:6f:16:40:49: 72:32:2a:69:3b:48:6d:99:36:4d:77:7b:21:4b:e2:44: e2:ed:43:ac:80:12:c0:08:a0:b1:0e:ee:35:bb:a8:c4: 44:ef:3a:09:93:6a:b3:ab:12:ce:9b:ce:91:9d:01:d7: 34:e0:7e:23:00:e6:9e:d2:08:a4:8b:36:47:98:7f:c1: 1d:7d:12:b2:cd:0f:34:04:2d:be:03:d6:ac:29:bc:2a: bd:89:62:e2:8c:a0:a6:3c:02:bd:b5:20:16:d3:50:d6 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:a2:60:23:19:3d:ff:1a:e7:3a:71:76: aa:91:92:53:6c:a7:ef:b8:94:7f:5d:64:5d:ff:3d:86: 58:02:1c:26:ed:f0:b2:81:c1:af:e0:e4:93:de:ea:52: 6d:c7:14:a5:29:eb:14:1f:76:46:61:e6:bd:3a:ea Fingerprint (SHA-256): 94:90:0C:F6:7D:2C:B5:69:24:00:DE:70:EC:85:6D:A7:B1:28:5B:7D:97:B2:1F:03:02:6E:7F:89:24:53:A6:8A Fingerprint (SHA1): F5:41:83:97:3F:F0:DA:AB:9B:B7:EB:B9:4F:9A:77:E7:AE:DD:3F:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #867: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #868: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #869: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #870: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #871: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #872: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #873: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #874: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #875: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #876: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #877: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #878: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #879: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #880: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #881: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #882: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #883: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #884: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #885: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #886: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #887: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #888: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #889: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #890: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #891: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #892: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #893: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #894: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018141600Z nextupdate=20241018141600Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 14:16:00 2023 Next Update: Fri Oct 18 14:16:00 2024 CRL Extensions: chains.sh: #895: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018141600Z nextupdate=20241018141600Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:16:00 2023 Next Update: Fri Oct 18 14:16:00 2024 CRL Extensions: chains.sh: #896: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018141600Z nextupdate=20241018141600Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 14:16:00 2023 Next Update: Fri Oct 18 14:16:00 2024 CRL Extensions: chains.sh: #897: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018141600Z nextupdate=20241018141600Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 14:16:00 2023 Next Update: Fri Oct 18 14:16:00 2024 CRL Extensions: chains.sh: #898: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018141601Z addcert 14 20231018141601Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 14:16:01 2023 Next Update: Fri Oct 18 14:16:00 2024 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Wed Oct 18 14:16:01 2023 CRL Extensions: chains.sh: #899: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018141602Z addcert 15 20231018141602Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:16:02 2023 Next Update: Fri Oct 18 14:16:00 2024 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Wed Oct 18 14:16:02 2023 CRL Extensions: chains.sh: #900: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #901: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #902: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #903: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #904: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #905: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #906: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #907: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #908: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #909: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:58 2023 Not After : Wed Oct 18 14:15:58 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fb:95:9f:99:40:d3:f1:b4:06:e6:21:18:69:ad:58:70: a9:1f:0f:4c:97:fd:67:c8:7c:e2:9d:cc:f2:a7:70:18: 6b:7d:58:69:46:ce:5b:5c:8d:6c:f9:2a:4e:b0:24:08: 8b:ed:ec:a0:87:50:ad:2a:57:b7:79:a5:07:4d:47:79: 7d:ab:95:ac:23:ba:43:16:b5:95:02:22:03:a6:f1:06: 48:2f:51:92:d7:32:92:32:0c:cf:61:65:77:34:50:91: ad:0b:67:02:29:a4:70:e5:6f:62:54:2d:f5:10:73:d5: 25:06:63:b8:1d:61:de:1d:b1:17:74:88:80:f9:3c:7d: 2d:21:0f:78:cb:7b:57:08:7b:77:e8:6e:d2:14:5c:ba: 57:73:fe:a5:2e:0f:41:41:a1:39:b2:25:1f:d8:25:7f: 9a:25:73:2a:2f:65:55:83:1b:8f:f7:1a:6e:ad:9d:e8: de:5c:77:0d:64:11:45:9a:06:f1:5a:04:22:9d:7b:1a: d5:a8:4b:e6:18:9c:2c:1f:13:62:fc:52:7e:04:d6:00: 77:23:64:46:0c:e1:e5:a7:46:c0:b3:7b:85:35:ac:e7: ab:0e:65:ca:b5:b6:a1:2e:f5:29:14:54:c8:ae:4d:dd: 38:1a:79:7e:ab:85:35:b7:5a:06:26:2a:34:9e:a2:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:7c:d4:5d:c7:a4:04:00:7a:2e:c2:3f:62:1a:6f:36: 25:a9:46:1c:e3:ae:59:5f:b2:53:0c:44:f2:11:84:f6: e5:d3:97:74:85:fa:86:1a:a1:2e:28:07:47:1f:b8:ab: 96:cc:21:6f:7c:ab:d9:7d:7a:5b:b8:8a:55:ba:c3:e4: 0f:6c:40:37:ab:58:ae:3f:7c:ef:45:8c:94:14:14:c6: ba:fd:97:af:e3:82:a9:11:be:2a:9c:cc:6d:f8:3e:96: 90:43:94:bd:39:ef:60:97:90:10:9a:df:0f:95:49:91: f0:0a:aa:2b:f2:8e:a2:d7:82:63:8b:da:20:32:d1:a0: 1d:e0:f2:9e:d6:d6:f4:aa:64:9a:7c:0b:fd:51:46:0e: ed:32:06:05:ca:39:13:e2:27:eb:e2:75:ff:20:3e:14: a3:90:ee:41:68:7a:aa:bb:e3:49:81:f0:3d:f7:dd:fa: 5c:04:5e:ba:e1:7a:76:39:a7:4f:1e:76:b9:4a:90:f8: ad:b2:4c:97:e5:d9:cc:37:e5:ef:a2:01:97:44:be:14: b8:66:f6:71:a3:f6:b6:0d:73:11:5d:6e:9f:3b:46:8b: ca:7f:91:c4:2c:0c:62:b6:e5:76:7c:6f:5c:f5:71:e3: 44:27:51:44:97:da:ee:2c:f0:76:a4:c6:3d:4b:d3:10 Fingerprint (SHA-256): 5D:2A:71:73:E8:C4:0C:A8:A6:E7:74:D9:2C:80:15:49:D6:44:61:33:35:67:92:2D:8E:95:94:9D:0A:EB:BB:F1 Fingerprint (SHA1): 27:45:B1:30:FC:A2:1F:C2:F5:A8:F7:29:3C:D7:FC:9B:37:89:EA:FA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #910: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #911: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:15:58 2023 Not After : Wed Oct 18 14:15:58 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: fb:95:9f:99:40:d3:f1:b4:06:e6:21:18:69:ad:58:70: a9:1f:0f:4c:97:fd:67:c8:7c:e2:9d:cc:f2:a7:70:18: 6b:7d:58:69:46:ce:5b:5c:8d:6c:f9:2a:4e:b0:24:08: 8b:ed:ec:a0:87:50:ad:2a:57:b7:79:a5:07:4d:47:79: 7d:ab:95:ac:23:ba:43:16:b5:95:02:22:03:a6:f1:06: 48:2f:51:92:d7:32:92:32:0c:cf:61:65:77:34:50:91: ad:0b:67:02:29:a4:70:e5:6f:62:54:2d:f5:10:73:d5: 25:06:63:b8:1d:61:de:1d:b1:17:74:88:80:f9:3c:7d: 2d:21:0f:78:cb:7b:57:08:7b:77:e8:6e:d2:14:5c:ba: 57:73:fe:a5:2e:0f:41:41:a1:39:b2:25:1f:d8:25:7f: 9a:25:73:2a:2f:65:55:83:1b:8f:f7:1a:6e:ad:9d:e8: de:5c:77:0d:64:11:45:9a:06:f1:5a:04:22:9d:7b:1a: d5:a8:4b:e6:18:9c:2c:1f:13:62:fc:52:7e:04:d6:00: 77:23:64:46:0c:e1:e5:a7:46:c0:b3:7b:85:35:ac:e7: ab:0e:65:ca:b5:b6:a1:2e:f5:29:14:54:c8:ae:4d:dd: 38:1a:79:7e:ab:85:35:b7:5a:06:26:2a:34:9e:a2:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:7c:d4:5d:c7:a4:04:00:7a:2e:c2:3f:62:1a:6f:36: 25:a9:46:1c:e3:ae:59:5f:b2:53:0c:44:f2:11:84:f6: e5:d3:97:74:85:fa:86:1a:a1:2e:28:07:47:1f:b8:ab: 96:cc:21:6f:7c:ab:d9:7d:7a:5b:b8:8a:55:ba:c3:e4: 0f:6c:40:37:ab:58:ae:3f:7c:ef:45:8c:94:14:14:c6: ba:fd:97:af:e3:82:a9:11:be:2a:9c:cc:6d:f8:3e:96: 90:43:94:bd:39:ef:60:97:90:10:9a:df:0f:95:49:91: f0:0a:aa:2b:f2:8e:a2:d7:82:63:8b:da:20:32:d1:a0: 1d:e0:f2:9e:d6:d6:f4:aa:64:9a:7c:0b:fd:51:46:0e: ed:32:06:05:ca:39:13:e2:27:eb:e2:75:ff:20:3e:14: a3:90:ee:41:68:7a:aa:bb:e3:49:81:f0:3d:f7:dd:fa: 5c:04:5e:ba:e1:7a:76:39:a7:4f:1e:76:b9:4a:90:f8: ad:b2:4c:97:e5:d9:cc:37:e5:ef:a2:01:97:44:be:14: b8:66:f6:71:a3:f6:b6:0d:73:11:5d:6e:9f:3b:46:8b: ca:7f:91:c4:2c:0c:62:b6:e5:76:7c:6f:5c:f5:71:e3: 44:27:51:44:97:da:ee:2c:f0:76:a4:c6:3d:4b:d3:10 Fingerprint (SHA-256): 5D:2A:71:73:E8:C4:0C:A8:A6:E7:74:D9:2C:80:15:49:D6:44:61:33:35:67:92:2D:8E:95:94:9D:0A:EB:BB:F1 Fingerprint (SHA1): 27:45:B1:30:FC:A2:1F:C2:F5:A8:F7:29:3C:D7:FC:9B:37:89:EA:FA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #912: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #913: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #914: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141560 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #915: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #916: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #917: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #918: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1018141561 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #919: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #920: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #921: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018141436.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #922: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018141420.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #923: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #924: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #925: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018141436.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #926: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1018141562 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #927: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #928: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #929: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018141436.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #930: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018141421.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #931: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #932: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #933: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #934: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1018141563 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #935: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #936: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #937: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018141436.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #938: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018141422.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #939: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #940: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #941: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018141436.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #942: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018141423.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #943: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #944: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018141606Z nextupdate=20241018141606Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 14:16:06 2023 Next Update: Fri Oct 18 14:16:06 2024 CRL Extensions: chains.sh: #945: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018141606Z nextupdate=20241018141606Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:16:06 2023 Next Update: Fri Oct 18 14:16:06 2024 CRL Extensions: chains.sh: #946: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018141606Z nextupdate=20241018141606Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 14:16:06 2023 Next Update: Fri Oct 18 14:16:06 2024 CRL Extensions: chains.sh: #947: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018141606Z nextupdate=20241018141606Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 14:16:06 2023 Next Update: Fri Oct 18 14:16:06 2024 CRL Extensions: chains.sh: #948: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018141607Z addcert 20 20231018141607Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:16:07 2023 Next Update: Fri Oct 18 14:16:06 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 14:16:07 2023 CRL Extensions: chains.sh: #949: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018141608Z addcert 40 20231018141608Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:16:08 2023 Next Update: Fri Oct 18 14:16:06 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 14:16:07 2023 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Wed Oct 18 14:16:08 2023 CRL Extensions: chains.sh: #950: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #951: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #952: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #953: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141560 (0x3caf9b78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:02 2023 Not After : Wed Oct 18 14:16:02 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:81:8f:95:f6:6e:ed:dc:3c:f0:42:89:88:29:ab:40: fe:89:81:8e:9e:5d:f5:fa:dc:01:c1:eb:fc:11:3b:a5: e8:ef:a6:03:17:47:18:e4:9d:b9:ce:40:ed:0b:12:c0: 64:d2:e2:bb:46:55:0c:96:be:7e:7e:2c:63:d9:bb:3f: 11:ef:f0:1c:70:0e:68:8e:7b:36:68:e2:78:89:5d:4a: 14:5e:fa:0a:ce:75:d1:18:e3:5b:7d:fd:71:c1:a6:f0: 68:1d:7a:7f:5e:4b:77:3e:28:ee:fb:b5:8d:a5:21:bf: 33:46:e4:0e:3e:e2:a3:64:b7:94:b8:8d:04:8c:f2:31: 51:e4:7c:cd:3f:6d:9d:5f:d7:61:6c:2e:f3:1f:39:32: aa:fb:5f:90:c6:e3:ff:fd:2b:68:cd:21:61:a9:0e:8d: 08:bb:8f:a4:d4:bb:6c:3b:0b:96:ba:3d:fe:b6:60:9d: b3:2b:e5:f3:02:47:86:b9:55:76:42:38:34:0c:d6:9a: df:a3:ee:ac:5c:0c:88:c3:38:37:81:2b:92:b7:f2:11: 6a:0e:90:76:ec:93:08:56:f7:31:c9:24:47:bb:d6:4c: f4:5a:4e:d4:9e:97:8f:87:f3:ff:4e:a9:e8:65:97:c9: 88:dd:40:07:43:88:34:1f:75:40:21:35:25:91:55:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:7f:39:4f:10:7f:67:09:76:ef:d2:32:37:f0:0a:32: a3:1d:a9:ea:f4:6c:7a:cc:83:cd:a6:6e:8e:df:ba:a2: ed:c8:08:81:d8:ae:06:d8:f9:90:4a:a6:aa:7e:bc:98: b7:88:df:db:84:1c:cd:0c:40:b8:48:2a:f8:8e:3d:c2: b9:86:24:15:8e:bd:16:b2:14:41:c3:17:ed:00:5e:14: 12:d5:e4:65:24:76:59:18:09:e0:94:fa:94:db:d4:93: dd:5a:a4:eb:7a:88:7b:44:07:10:c8:78:db:55:34:e8: 0c:8b:72:de:1e:1e:6a:b3:22:bd:37:34:30:cd:a2:95: ca:00:81:60:16:e9:40:40:78:7f:54:78:3f:6c:f6:5e: 1c:1c:a9:63:52:1a:bc:ed:fb:a9:03:ca:ad:eb:aa:cf: fb:0e:66:21:31:68:e7:a3:5e:e1:b4:72:39:05:72:d5: 74:d7:be:e3:76:3d:56:b7:91:63:b3:a6:28:5c:97:e4: ef:c0:9d:a3:c5:f5:08:55:c3:00:82:8c:eb:3b:63:d8: 25:24:77:ac:b0:fd:f4:60:55:76:37:23:cd:da:f3:e0: 85:d3:f3:d3:f9:f1:f5:5c:3f:dc:6f:a9:57:b5:9a:35: 7f:77:7b:20:99:02:e8:b4:f0:8c:f7:bc:b6:0d:b7:1a Fingerprint (SHA-256): C8:0D:E0:06:42:E3:82:8E:F0:A8:CA:74:1C:DF:01:63:D8:F9:A5:8F:58:0D:6A:33:A4:A5:2E:F1:C3:F3:69:F4 Fingerprint (SHA1): 85:F8:CA:8A:FE:6D:E7:06:D7:A2:31:DC:29:6A:3E:9D:40:B4:57:06 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #954: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #955: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141560 (0x3caf9b78) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:02 2023 Not After : Wed Oct 18 14:16:02 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:81:8f:95:f6:6e:ed:dc:3c:f0:42:89:88:29:ab:40: fe:89:81:8e:9e:5d:f5:fa:dc:01:c1:eb:fc:11:3b:a5: e8:ef:a6:03:17:47:18:e4:9d:b9:ce:40:ed:0b:12:c0: 64:d2:e2:bb:46:55:0c:96:be:7e:7e:2c:63:d9:bb:3f: 11:ef:f0:1c:70:0e:68:8e:7b:36:68:e2:78:89:5d:4a: 14:5e:fa:0a:ce:75:d1:18:e3:5b:7d:fd:71:c1:a6:f0: 68:1d:7a:7f:5e:4b:77:3e:28:ee:fb:b5:8d:a5:21:bf: 33:46:e4:0e:3e:e2:a3:64:b7:94:b8:8d:04:8c:f2:31: 51:e4:7c:cd:3f:6d:9d:5f:d7:61:6c:2e:f3:1f:39:32: aa:fb:5f:90:c6:e3:ff:fd:2b:68:cd:21:61:a9:0e:8d: 08:bb:8f:a4:d4:bb:6c:3b:0b:96:ba:3d:fe:b6:60:9d: b3:2b:e5:f3:02:47:86:b9:55:76:42:38:34:0c:d6:9a: df:a3:ee:ac:5c:0c:88:c3:38:37:81:2b:92:b7:f2:11: 6a:0e:90:76:ec:93:08:56:f7:31:c9:24:47:bb:d6:4c: f4:5a:4e:d4:9e:97:8f:87:f3:ff:4e:a9:e8:65:97:c9: 88:dd:40:07:43:88:34:1f:75:40:21:35:25:91:55:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:7f:39:4f:10:7f:67:09:76:ef:d2:32:37:f0:0a:32: a3:1d:a9:ea:f4:6c:7a:cc:83:cd:a6:6e:8e:df:ba:a2: ed:c8:08:81:d8:ae:06:d8:f9:90:4a:a6:aa:7e:bc:98: b7:88:df:db:84:1c:cd:0c:40:b8:48:2a:f8:8e:3d:c2: b9:86:24:15:8e:bd:16:b2:14:41:c3:17:ed:00:5e:14: 12:d5:e4:65:24:76:59:18:09:e0:94:fa:94:db:d4:93: dd:5a:a4:eb:7a:88:7b:44:07:10:c8:78:db:55:34:e8: 0c:8b:72:de:1e:1e:6a:b3:22:bd:37:34:30:cd:a2:95: ca:00:81:60:16:e9:40:40:78:7f:54:78:3f:6c:f6:5e: 1c:1c:a9:63:52:1a:bc:ed:fb:a9:03:ca:ad:eb:aa:cf: fb:0e:66:21:31:68:e7:a3:5e:e1:b4:72:39:05:72:d5: 74:d7:be:e3:76:3d:56:b7:91:63:b3:a6:28:5c:97:e4: ef:c0:9d:a3:c5:f5:08:55:c3:00:82:8c:eb:3b:63:d8: 25:24:77:ac:b0:fd:f4:60:55:76:37:23:cd:da:f3:e0: 85:d3:f3:d3:f9:f1:f5:5c:3f:dc:6f:a9:57:b5:9a:35: 7f:77:7b:20:99:02:e8:b4:f0:8c:f7:bc:b6:0d:b7:1a Fingerprint (SHA-256): C8:0D:E0:06:42:E3:82:8E:F0:A8:CA:74:1C:DF:01:63:D8:F9:A5:8F:58:0D:6A:33:A4:A5:2E:F1:C3:F3:69:F4 Fingerprint (SHA1): 85:F8:CA:8A:FE:6D:E7:06:D7:A2:31:DC:29:6A:3E:9D:40:B4:57:06 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #956: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #957: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #958: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141564 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #959: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #960: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #961: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #962: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018141565 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #963: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #964: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #965: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #966: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018141566 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #967: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #968: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #969: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #970: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1018141567 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #971: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #972: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #973: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141568 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #974: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #975: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #976: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #977: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1018141569 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #978: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #979: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #980: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #981: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1018141570 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #982: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #983: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #984: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #985: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #986: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141564 (0x3caf9b7c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:16:08 2023 Not After : Wed Oct 18 14:16:08 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:e3:1a:8b:a7:a5:4d:8d:e3:43:1d:58:86:13:da:b2: d9:cd:19:5f:e5:00:d8:ea:52:41:53:70:6c:2d:2e:2c: 63:3c:5b:da:c8:ac:65:20:5a:99:3c:0b:8b:1b:fc:e8: f0:c7:f0:d8:f1:06:54:97:02:07:ab:c5:d8:89:28:0c: 39:41:70:9a:7f:0c:66:e7:fb:10:a0:9c:df:69:3a:72: cc:8f:c7:e5:d6:7c:c9:61:aa:9b:1a:87:9b:7f:ac:40: 90:06:ef:b9:dd:69:80:66:fe:78:43:65:3e:e9:05:7a: f9:24:e7:bc:09:1c:e1:f8:e8:ed:42:bf:25:be:66:25: e8:47:fb:3f:d9:dd:71:53:9a:77:f2:4b:a4:60:82:62: 53:c4:cd:a2:f6:1d:a3:4b:a9:f2:b4:2d:2a:71:ef:a5: 8c:6a:a0:30:02:53:75:30:1f:34:b3:4f:b2:be:74:c5: 7a:71:22:71:c0:5e:e6:c1:fa:43:92:97:29:25:e3:1c: 6a:29:80:b1:36:0f:9c:4c:3a:7e:2d:3a:cb:02:5e:d1: 7a:31:68:a5:a9:21:9a:56:1a:f9:57:ec:ff:84:76:e2: ca:5d:24:90:1b:2f:a3:0d:17:64:62:5a:df:e0:dd:30: c5:2f:8a:60:c1:ba:6c:6b:5b:50:90:bd:5d:83:e2:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e0:25:c9:20:fb:6e:71:d3:48:b9:02:13:41:f1:0c:d7: 73:61:39:51:be:b0:50:20:36:91:20:f3:c1:44:a7:ef: b2:db:d3:29:a1:45:ee:8f:34:78:d7:5e:8a:89:63:e7: 04:9c:40:29:ab:9b:e9:d8:37:0a:c3:ef:34:b4:28:68: 7c:1e:b6:0e:45:24:f6:26:66:81:cf:40:12:05:7f:0d: 6f:d0:65:7c:1e:4e:03:dc:29:c9:c7:2d:3b:30:06:0e: cc:c2:d6:34:67:ec:d0:8c:64:46:f3:b1:5f:2b:a0:f2: d7:80:69:c0:22:5e:9a:a1:ed:21:67:fe:49:5b:24:c1: 64:0d:0d:fc:cf:56:0a:28:ae:89:ee:0b:75:90:1d:8c: a7:28:d4:79:4a:bb:b5:73:4d:80:2c:f5:34:76:9f:bf: 94:b6:d7:72:3f:ae:db:76:8e:e9:2d:30:aa:25:1a:2c: 84:d2:d5:33:f5:48:7f:d3:93:66:78:c9:c1:37:85:c3: 18:75:1e:dd:3b:f6:95:0b:d6:97:e2:31:1a:3c:9d:3b: 16:84:92:94:c6:b1:b6:39:06:4c:93:f0:52:81:e0:1b: 08:d4:14:af:92:70:33:22:05:ba:c6:ef:ae:44:19:25: c9:2f:8b:95:a7:3e:90:88:68:53:ef:63:04:5d:1f:3f Fingerprint (SHA-256): 8F:34:46:8F:E2:BF:34:BC:6F:7C:FE:DC:A9:7B:30:1A:59:C5:53:F0:4A:8A:BA:45:58:34:E5:F3:F1:CF:8A:28 Fingerprint (SHA1): 4F:F0:9D:88:69:5A:40:F6:68:5E:3C:AB:D5:B0:9C:9C:E4:52:02:A2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #987: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141566 (0x3caf9b7e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:16:10 2023 Not After : Wed Oct 18 14:16:10 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:71:94:dc:68:ab:76:9a:8e:c3:46:d2:01:42:89:49: 32:da:37:cf:e3:12:11:07:35:fc:33:5e:3d:ba:b4:d4: 3d:4c:25:98:aa:af:ea:92:ab:ef:8a:cf:a9:b3:a1:4b: 44:15:9a:e1:46:9c:f4:d2:bc:c0:e4:5c:ad:d6:3f:b8: 95:19:f9:12:1e:4c:8b:1f:c4:29:3d:b2:97:48:4a:68: 22:c7:8d:e7:f4:d5:de:7f:2a:2f:c8:40:76:50:08:e9: 31:81:d0:86:6e:85:05:df:e0:70:37:d1:dd:9f:11:ba: 82:61:cb:70:dd:94:fe:b4:67:9b:17:51:c3:03:68:da: e7:e4:85:92:ac:7a:a2:24:dd:42:f1:44:51:f1:e4:79: 7f:1a:99:02:7f:60:31:ff:84:df:a8:fb:78:5c:a5:10: d1:22:90:8e:a1:70:c5:65:e8:a6:65:4b:54:52:5c:c0: 1f:9d:6c:76:d8:18:5b:7c:82:91:86:8d:12:5b:0a:d6: 52:0e:21:9a:b7:ef:0f:6f:12:06:81:7a:48:1e:3f:0b: b6:6a:0b:7d:74:41:e5:3d:2e:cf:b6:1b:87:dd:1e:65: 27:5c:bd:d1:b9:8d:78:85:b5:82:01:d1:69:55:99:2c: d0:c3:b1:a5:24:13:17:4c:89:b9:cd:f8:69:04:13:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 64:9e:8e:7f:30:42:bf:63:22:c7:87:97:ae:fd:96:61: 1f:f0:f7:4b:4b:06:06:13:f0:8e:b7:87:8c:29:dc:9c: 32:9f:8a:dc:60:59:f9:f5:97:81:70:73:99:81:2c:64: e2:ff:51:b1:66:ca:24:9b:3b:70:f2:61:a0:ac:bd:01: 0a:6e:90:d2:66:4e:10:d7:7b:de:00:44:0a:a3:2a:30: d1:f9:f5:5f:3e:9c:de:30:69:4a:09:8a:a4:2f:44:72: 2f:ad:48:62:35:59:af:60:ee:e8:cd:58:f0:c2:86:65: ca:8d:7d:a7:be:4d:a4:fa:ac:5d:df:dc:2e:ca:49:37: 1e:36:22:a7:59:6b:21:9d:23:a5:17:ec:38:41:88:bf: c6:98:a3:b5:e4:48:d1:65:4b:89:7f:2f:13:5a:b3:51: 3a:ab:86:9e:cb:51:1f:02:0a:0c:0c:2e:a6:df:70:7d: d7:e3:c2:d4:73:93:fd:e7:ab:d3:2f:30:56:33:03:27: 33:d4:ed:7f:a5:69:8b:61:20:f1:38:d5:28:62:3a:ca: 74:0f:a0:3c:7e:fc:ab:29:24:6f:28:66:2f:c9:e5:e1: 82:af:1d:23:8d:c6:ea:f4:21:0e:c3:b7:d8:c8:e4:82: a2:8b:51:4a:9c:8e:94:9e:a1:73:c6:56:de:6a:a9:fb Fingerprint (SHA-256): 91:A5:A7:E4:7E:0B:95:C1:76:D2:6F:32:CE:AE:6C:9F:B2:DE:43:21:42:86:F1:CF:44:AE:EB:4D:C5:03:FA:4A Fingerprint (SHA1): 77:65:00:36:A7:0B:90:BF:4E:B6:CE:39:65:33:AF:9C:D4:BD:D0:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #988: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141564 (0x3caf9b7c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:16:08 2023 Not After : Wed Oct 18 14:16:08 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:e3:1a:8b:a7:a5:4d:8d:e3:43:1d:58:86:13:da:b2: d9:cd:19:5f:e5:00:d8:ea:52:41:53:70:6c:2d:2e:2c: 63:3c:5b:da:c8:ac:65:20:5a:99:3c:0b:8b:1b:fc:e8: f0:c7:f0:d8:f1:06:54:97:02:07:ab:c5:d8:89:28:0c: 39:41:70:9a:7f:0c:66:e7:fb:10:a0:9c:df:69:3a:72: cc:8f:c7:e5:d6:7c:c9:61:aa:9b:1a:87:9b:7f:ac:40: 90:06:ef:b9:dd:69:80:66:fe:78:43:65:3e:e9:05:7a: f9:24:e7:bc:09:1c:e1:f8:e8:ed:42:bf:25:be:66:25: e8:47:fb:3f:d9:dd:71:53:9a:77:f2:4b:a4:60:82:62: 53:c4:cd:a2:f6:1d:a3:4b:a9:f2:b4:2d:2a:71:ef:a5: 8c:6a:a0:30:02:53:75:30:1f:34:b3:4f:b2:be:74:c5: 7a:71:22:71:c0:5e:e6:c1:fa:43:92:97:29:25:e3:1c: 6a:29:80:b1:36:0f:9c:4c:3a:7e:2d:3a:cb:02:5e:d1: 7a:31:68:a5:a9:21:9a:56:1a:f9:57:ec:ff:84:76:e2: ca:5d:24:90:1b:2f:a3:0d:17:64:62:5a:df:e0:dd:30: c5:2f:8a:60:c1:ba:6c:6b:5b:50:90:bd:5d:83:e2:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e0:25:c9:20:fb:6e:71:d3:48:b9:02:13:41:f1:0c:d7: 73:61:39:51:be:b0:50:20:36:91:20:f3:c1:44:a7:ef: b2:db:d3:29:a1:45:ee:8f:34:78:d7:5e:8a:89:63:e7: 04:9c:40:29:ab:9b:e9:d8:37:0a:c3:ef:34:b4:28:68: 7c:1e:b6:0e:45:24:f6:26:66:81:cf:40:12:05:7f:0d: 6f:d0:65:7c:1e:4e:03:dc:29:c9:c7:2d:3b:30:06:0e: cc:c2:d6:34:67:ec:d0:8c:64:46:f3:b1:5f:2b:a0:f2: d7:80:69:c0:22:5e:9a:a1:ed:21:67:fe:49:5b:24:c1: 64:0d:0d:fc:cf:56:0a:28:ae:89:ee:0b:75:90:1d:8c: a7:28:d4:79:4a:bb:b5:73:4d:80:2c:f5:34:76:9f:bf: 94:b6:d7:72:3f:ae:db:76:8e:e9:2d:30:aa:25:1a:2c: 84:d2:d5:33:f5:48:7f:d3:93:66:78:c9:c1:37:85:c3: 18:75:1e:dd:3b:f6:95:0b:d6:97:e2:31:1a:3c:9d:3b: 16:84:92:94:c6:b1:b6:39:06:4c:93:f0:52:81:e0:1b: 08:d4:14:af:92:70:33:22:05:ba:c6:ef:ae:44:19:25: c9:2f:8b:95:a7:3e:90:88:68:53:ef:63:04:5d:1f:3f Fingerprint (SHA-256): 8F:34:46:8F:E2:BF:34:BC:6F:7C:FE:DC:A9:7B:30:1A:59:C5:53:F0:4A:8A:BA:45:58:34:E5:F3:F1:CF:8A:28 Fingerprint (SHA1): 4F:F0:9D:88:69:5A:40:F6:68:5E:3C:AB:D5:B0:9C:9C:E4:52:02:A2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #989: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #990: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141564 (0x3caf9b7c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:16:08 2023 Not After : Wed Oct 18 14:16:08 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:e3:1a:8b:a7:a5:4d:8d:e3:43:1d:58:86:13:da:b2: d9:cd:19:5f:e5:00:d8:ea:52:41:53:70:6c:2d:2e:2c: 63:3c:5b:da:c8:ac:65:20:5a:99:3c:0b:8b:1b:fc:e8: f0:c7:f0:d8:f1:06:54:97:02:07:ab:c5:d8:89:28:0c: 39:41:70:9a:7f:0c:66:e7:fb:10:a0:9c:df:69:3a:72: cc:8f:c7:e5:d6:7c:c9:61:aa:9b:1a:87:9b:7f:ac:40: 90:06:ef:b9:dd:69:80:66:fe:78:43:65:3e:e9:05:7a: f9:24:e7:bc:09:1c:e1:f8:e8:ed:42:bf:25:be:66:25: e8:47:fb:3f:d9:dd:71:53:9a:77:f2:4b:a4:60:82:62: 53:c4:cd:a2:f6:1d:a3:4b:a9:f2:b4:2d:2a:71:ef:a5: 8c:6a:a0:30:02:53:75:30:1f:34:b3:4f:b2:be:74:c5: 7a:71:22:71:c0:5e:e6:c1:fa:43:92:97:29:25:e3:1c: 6a:29:80:b1:36:0f:9c:4c:3a:7e:2d:3a:cb:02:5e:d1: 7a:31:68:a5:a9:21:9a:56:1a:f9:57:ec:ff:84:76:e2: ca:5d:24:90:1b:2f:a3:0d:17:64:62:5a:df:e0:dd:30: c5:2f:8a:60:c1:ba:6c:6b:5b:50:90:bd:5d:83:e2:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e0:25:c9:20:fb:6e:71:d3:48:b9:02:13:41:f1:0c:d7: 73:61:39:51:be:b0:50:20:36:91:20:f3:c1:44:a7:ef: b2:db:d3:29:a1:45:ee:8f:34:78:d7:5e:8a:89:63:e7: 04:9c:40:29:ab:9b:e9:d8:37:0a:c3:ef:34:b4:28:68: 7c:1e:b6:0e:45:24:f6:26:66:81:cf:40:12:05:7f:0d: 6f:d0:65:7c:1e:4e:03:dc:29:c9:c7:2d:3b:30:06:0e: cc:c2:d6:34:67:ec:d0:8c:64:46:f3:b1:5f:2b:a0:f2: d7:80:69:c0:22:5e:9a:a1:ed:21:67:fe:49:5b:24:c1: 64:0d:0d:fc:cf:56:0a:28:ae:89:ee:0b:75:90:1d:8c: a7:28:d4:79:4a:bb:b5:73:4d:80:2c:f5:34:76:9f:bf: 94:b6:d7:72:3f:ae:db:76:8e:e9:2d:30:aa:25:1a:2c: 84:d2:d5:33:f5:48:7f:d3:93:66:78:c9:c1:37:85:c3: 18:75:1e:dd:3b:f6:95:0b:d6:97:e2:31:1a:3c:9d:3b: 16:84:92:94:c6:b1:b6:39:06:4c:93:f0:52:81:e0:1b: 08:d4:14:af:92:70:33:22:05:ba:c6:ef:ae:44:19:25: c9:2f:8b:95:a7:3e:90:88:68:53:ef:63:04:5d:1f:3f Fingerprint (SHA-256): 8F:34:46:8F:E2:BF:34:BC:6F:7C:FE:DC:A9:7B:30:1A:59:C5:53:F0:4A:8A:BA:45:58:34:E5:F3:F1:CF:8A:28 Fingerprint (SHA1): 4F:F0:9D:88:69:5A:40:F6:68:5E:3C:AB:D5:B0:9C:9C:E4:52:02:A2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #991: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141566 (0x3caf9b7e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:16:10 2023 Not After : Wed Oct 18 14:16:10 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:71:94:dc:68:ab:76:9a:8e:c3:46:d2:01:42:89:49: 32:da:37:cf:e3:12:11:07:35:fc:33:5e:3d:ba:b4:d4: 3d:4c:25:98:aa:af:ea:92:ab:ef:8a:cf:a9:b3:a1:4b: 44:15:9a:e1:46:9c:f4:d2:bc:c0:e4:5c:ad:d6:3f:b8: 95:19:f9:12:1e:4c:8b:1f:c4:29:3d:b2:97:48:4a:68: 22:c7:8d:e7:f4:d5:de:7f:2a:2f:c8:40:76:50:08:e9: 31:81:d0:86:6e:85:05:df:e0:70:37:d1:dd:9f:11:ba: 82:61:cb:70:dd:94:fe:b4:67:9b:17:51:c3:03:68:da: e7:e4:85:92:ac:7a:a2:24:dd:42:f1:44:51:f1:e4:79: 7f:1a:99:02:7f:60:31:ff:84:df:a8:fb:78:5c:a5:10: d1:22:90:8e:a1:70:c5:65:e8:a6:65:4b:54:52:5c:c0: 1f:9d:6c:76:d8:18:5b:7c:82:91:86:8d:12:5b:0a:d6: 52:0e:21:9a:b7:ef:0f:6f:12:06:81:7a:48:1e:3f:0b: b6:6a:0b:7d:74:41:e5:3d:2e:cf:b6:1b:87:dd:1e:65: 27:5c:bd:d1:b9:8d:78:85:b5:82:01:d1:69:55:99:2c: d0:c3:b1:a5:24:13:17:4c:89:b9:cd:f8:69:04:13:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 64:9e:8e:7f:30:42:bf:63:22:c7:87:97:ae:fd:96:61: 1f:f0:f7:4b:4b:06:06:13:f0:8e:b7:87:8c:29:dc:9c: 32:9f:8a:dc:60:59:f9:f5:97:81:70:73:99:81:2c:64: e2:ff:51:b1:66:ca:24:9b:3b:70:f2:61:a0:ac:bd:01: 0a:6e:90:d2:66:4e:10:d7:7b:de:00:44:0a:a3:2a:30: d1:f9:f5:5f:3e:9c:de:30:69:4a:09:8a:a4:2f:44:72: 2f:ad:48:62:35:59:af:60:ee:e8:cd:58:f0:c2:86:65: ca:8d:7d:a7:be:4d:a4:fa:ac:5d:df:dc:2e:ca:49:37: 1e:36:22:a7:59:6b:21:9d:23:a5:17:ec:38:41:88:bf: c6:98:a3:b5:e4:48:d1:65:4b:89:7f:2f:13:5a:b3:51: 3a:ab:86:9e:cb:51:1f:02:0a:0c:0c:2e:a6:df:70:7d: d7:e3:c2:d4:73:93:fd:e7:ab:d3:2f:30:56:33:03:27: 33:d4:ed:7f:a5:69:8b:61:20:f1:38:d5:28:62:3a:ca: 74:0f:a0:3c:7e:fc:ab:29:24:6f:28:66:2f:c9:e5:e1: 82:af:1d:23:8d:c6:ea:f4:21:0e:c3:b7:d8:c8:e4:82: a2:8b:51:4a:9c:8e:94:9e:a1:73:c6:56:de:6a:a9:fb Fingerprint (SHA-256): 91:A5:A7:E4:7E:0B:95:C1:76:D2:6F:32:CE:AE:6C:9F:B2:DE:43:21:42:86:F1:CF:44:AE:EB:4D:C5:03:FA:4A Fingerprint (SHA1): 77:65:00:36:A7:0B:90:BF:4E:B6:CE:39:65:33:AF:9C:D4:BD:D0:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #992: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #993: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #994: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #995: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141564 (0x3caf9b7c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:16:08 2023 Not After : Wed Oct 18 14:16:08 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:e3:1a:8b:a7:a5:4d:8d:e3:43:1d:58:86:13:da:b2: d9:cd:19:5f:e5:00:d8:ea:52:41:53:70:6c:2d:2e:2c: 63:3c:5b:da:c8:ac:65:20:5a:99:3c:0b:8b:1b:fc:e8: f0:c7:f0:d8:f1:06:54:97:02:07:ab:c5:d8:89:28:0c: 39:41:70:9a:7f:0c:66:e7:fb:10:a0:9c:df:69:3a:72: cc:8f:c7:e5:d6:7c:c9:61:aa:9b:1a:87:9b:7f:ac:40: 90:06:ef:b9:dd:69:80:66:fe:78:43:65:3e:e9:05:7a: f9:24:e7:bc:09:1c:e1:f8:e8:ed:42:bf:25:be:66:25: e8:47:fb:3f:d9:dd:71:53:9a:77:f2:4b:a4:60:82:62: 53:c4:cd:a2:f6:1d:a3:4b:a9:f2:b4:2d:2a:71:ef:a5: 8c:6a:a0:30:02:53:75:30:1f:34:b3:4f:b2:be:74:c5: 7a:71:22:71:c0:5e:e6:c1:fa:43:92:97:29:25:e3:1c: 6a:29:80:b1:36:0f:9c:4c:3a:7e:2d:3a:cb:02:5e:d1: 7a:31:68:a5:a9:21:9a:56:1a:f9:57:ec:ff:84:76:e2: ca:5d:24:90:1b:2f:a3:0d:17:64:62:5a:df:e0:dd:30: c5:2f:8a:60:c1:ba:6c:6b:5b:50:90:bd:5d:83:e2:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e0:25:c9:20:fb:6e:71:d3:48:b9:02:13:41:f1:0c:d7: 73:61:39:51:be:b0:50:20:36:91:20:f3:c1:44:a7:ef: b2:db:d3:29:a1:45:ee:8f:34:78:d7:5e:8a:89:63:e7: 04:9c:40:29:ab:9b:e9:d8:37:0a:c3:ef:34:b4:28:68: 7c:1e:b6:0e:45:24:f6:26:66:81:cf:40:12:05:7f:0d: 6f:d0:65:7c:1e:4e:03:dc:29:c9:c7:2d:3b:30:06:0e: cc:c2:d6:34:67:ec:d0:8c:64:46:f3:b1:5f:2b:a0:f2: d7:80:69:c0:22:5e:9a:a1:ed:21:67:fe:49:5b:24:c1: 64:0d:0d:fc:cf:56:0a:28:ae:89:ee:0b:75:90:1d:8c: a7:28:d4:79:4a:bb:b5:73:4d:80:2c:f5:34:76:9f:bf: 94:b6:d7:72:3f:ae:db:76:8e:e9:2d:30:aa:25:1a:2c: 84:d2:d5:33:f5:48:7f:d3:93:66:78:c9:c1:37:85:c3: 18:75:1e:dd:3b:f6:95:0b:d6:97:e2:31:1a:3c:9d:3b: 16:84:92:94:c6:b1:b6:39:06:4c:93:f0:52:81:e0:1b: 08:d4:14:af:92:70:33:22:05:ba:c6:ef:ae:44:19:25: c9:2f:8b:95:a7:3e:90:88:68:53:ef:63:04:5d:1f:3f Fingerprint (SHA-256): 8F:34:46:8F:E2:BF:34:BC:6F:7C:FE:DC:A9:7B:30:1A:59:C5:53:F0:4A:8A:BA:45:58:34:E5:F3:F1:CF:8A:28 Fingerprint (SHA1): 4F:F0:9D:88:69:5A:40:F6:68:5E:3C:AB:D5:B0:9C:9C:E4:52:02:A2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #996: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141568 (0x3caf9b80) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 14:16:11 2023 Not After : Wed Oct 18 14:16:11 2073 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:1a:41:69:2c:7c:15:34:54:d5:d4:71:97:3c:22:ba: 2b:4c:79:96:5f:6b:98:9c:14:68:77:fa:40:28:42:22: 51:16:8e:ae:86:35:a2:a3:da:0b:90:45:b6:3a:6a:ce: eb:f3:83:45:fd:37:ee:c2:1b:a7:24:5e:ee:e3:4e:90: bf:b2:eb:93:fe:6a:9f:b1:40:a0:06:fa:f9:e1:73:38: 55:85:39:9d:4b:2f:40:b2:d0:86:05:f4:ab:5f:7b:04: 32:08:42:6c:16:48:01:c2:72:eb:07:10:d6:62:61:77: 03:4f:5c:5c:c6:7d:1d:fd:a8:4e:38:85:90:67:6d:d2: 8e:a8:2a:a4:2d:89:8d:65:b3:40:90:fb:87:3d:d3:e6: 65:31:08:81:e2:76:0f:da:b8:24:71:b4:38:e6:b9:13: 00:f9:d0:ed:96:b7:fc:96:2f:3c:c5:d4:94:5a:d5:0c: b3:6e:56:65:58:f7:61:05:24:4b:df:57:c5:d9:aa:96: 12:9e:35:63:ea:74:66:ed:9d:a9:d9:da:2f:64:71:3d: c2:a3:81:07:99:9c:29:7d:07:d8:d2:36:17:5e:55:7d: bc:11:cc:8b:41:69:e2:89:4e:56:65:88:ae:b1:94:7c: a3:67:ee:60:3f:89:99:a9:06:2e:d8:95:69:a1:5c:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:e9:62:b7:4d:a8:e4:d1:45:d5:17:ef:88:9f:0c:59: 04:4b:a8:47:d8:5f:5f:95:59:00:ea:06:4f:a2:43:8d: 03:50:07:03:e5:0b:ea:4d:82:b2:9e:1a:a2:d6:82:19: c6:ca:5e:0b:61:11:c8:6a:cf:d3:47:36:59:94:f2:ca: c3:cb:2a:1d:6c:dd:9e:26:01:8a:ec:e3:a3:1d:c7:e8: 10:3f:6d:99:34:e0:1d:58:fc:a2:a2:a9:09:7a:61:dc: c8:cc:91:f4:af:02:f4:03:2e:5b:83:72:5f:04:21:59: 6a:90:00:de:f9:8f:c9:05:41:ed:61:66:14:75:fa:48: e3:6a:12:2a:45:8e:6d:c1:e5:41:6e:15:6b:d5:5d:d0: 7a:f5:60:a5:6a:f5:c4:e0:e3:36:94:13:57:de:d6:c1: b2:5a:f2:8a:79:1a:e3:31:6b:b7:a4:20:00:d7:e9:ab: fb:e9:1c:e8:6a:eb:d8:f4:07:56:fe:4c:6b:90:a4:d0: 3a:01:fc:7b:df:56:a0:23:cc:75:8f:0f:af:d9:fc:5b: eb:53:8d:26:01:31:66:6a:73:6f:7f:7e:89:79:bc:68: 6c:28:da:83:ba:f9:0f:72:38:3f:de:cb:29:0d:0c:b1: 69:ff:4c:53:fb:c2:ed:fc:2c:dc:d4:84:5e:34:d0:d2 Fingerprint (SHA-256): 55:F5:A1:D3:49:A1:F8:59:A2:B2:A3:FD:8C:8C:06:0D:FA:BC:75:53:50:B2:81:28:94:BF:DC:40:BE:90:3D:6D Fingerprint (SHA1): 13:B4:9A:B6:E7:82:2B:81:C3:92:6E:8F:CE:7D:FB:A5:2C:E5:53:5B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #997: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141564 (0x3caf9b7c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:16:08 2023 Not After : Wed Oct 18 14:16:08 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:e3:1a:8b:a7:a5:4d:8d:e3:43:1d:58:86:13:da:b2: d9:cd:19:5f:e5:00:d8:ea:52:41:53:70:6c:2d:2e:2c: 63:3c:5b:da:c8:ac:65:20:5a:99:3c:0b:8b:1b:fc:e8: f0:c7:f0:d8:f1:06:54:97:02:07:ab:c5:d8:89:28:0c: 39:41:70:9a:7f:0c:66:e7:fb:10:a0:9c:df:69:3a:72: cc:8f:c7:e5:d6:7c:c9:61:aa:9b:1a:87:9b:7f:ac:40: 90:06:ef:b9:dd:69:80:66:fe:78:43:65:3e:e9:05:7a: f9:24:e7:bc:09:1c:e1:f8:e8:ed:42:bf:25:be:66:25: e8:47:fb:3f:d9:dd:71:53:9a:77:f2:4b:a4:60:82:62: 53:c4:cd:a2:f6:1d:a3:4b:a9:f2:b4:2d:2a:71:ef:a5: 8c:6a:a0:30:02:53:75:30:1f:34:b3:4f:b2:be:74:c5: 7a:71:22:71:c0:5e:e6:c1:fa:43:92:97:29:25:e3:1c: 6a:29:80:b1:36:0f:9c:4c:3a:7e:2d:3a:cb:02:5e:d1: 7a:31:68:a5:a9:21:9a:56:1a:f9:57:ec:ff:84:76:e2: ca:5d:24:90:1b:2f:a3:0d:17:64:62:5a:df:e0:dd:30: c5:2f:8a:60:c1:ba:6c:6b:5b:50:90:bd:5d:83:e2:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e0:25:c9:20:fb:6e:71:d3:48:b9:02:13:41:f1:0c:d7: 73:61:39:51:be:b0:50:20:36:91:20:f3:c1:44:a7:ef: b2:db:d3:29:a1:45:ee:8f:34:78:d7:5e:8a:89:63:e7: 04:9c:40:29:ab:9b:e9:d8:37:0a:c3:ef:34:b4:28:68: 7c:1e:b6:0e:45:24:f6:26:66:81:cf:40:12:05:7f:0d: 6f:d0:65:7c:1e:4e:03:dc:29:c9:c7:2d:3b:30:06:0e: cc:c2:d6:34:67:ec:d0:8c:64:46:f3:b1:5f:2b:a0:f2: d7:80:69:c0:22:5e:9a:a1:ed:21:67:fe:49:5b:24:c1: 64:0d:0d:fc:cf:56:0a:28:ae:89:ee:0b:75:90:1d:8c: a7:28:d4:79:4a:bb:b5:73:4d:80:2c:f5:34:76:9f:bf: 94:b6:d7:72:3f:ae:db:76:8e:e9:2d:30:aa:25:1a:2c: 84:d2:d5:33:f5:48:7f:d3:93:66:78:c9:c1:37:85:c3: 18:75:1e:dd:3b:f6:95:0b:d6:97:e2:31:1a:3c:9d:3b: 16:84:92:94:c6:b1:b6:39:06:4c:93:f0:52:81:e0:1b: 08:d4:14:af:92:70:33:22:05:ba:c6:ef:ae:44:19:25: c9:2f:8b:95:a7:3e:90:88:68:53:ef:63:04:5d:1f:3f Fingerprint (SHA-256): 8F:34:46:8F:E2:BF:34:BC:6F:7C:FE:DC:A9:7B:30:1A:59:C5:53:F0:4A:8A:BA:45:58:34:E5:F3:F1:CF:8A:28 Fingerprint (SHA1): 4F:F0:9D:88:69:5A:40:F6:68:5E:3C:AB:D5:B0:9C:9C:E4:52:02:A2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #998: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #999: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1000: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1001: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1002: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1003: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141569 (0x3caf9b81) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 14:16:11 2023 Not After : Wed Oct 18 14:16:11 2028 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:d3:ce:78:f4:1a:8d:71:e9:9f:2e:f4:e0:bc:ee:d2: ff:5f:24:c9:06:5e:d2:fb:47:d8:07:42:c2:cc:79:0a: 31:b8:29:96:22:bf:4b:08:98:d0:45:2b:47:68:98:ae: e8:c1:eb:af:c4:50:b7:7b:a6:ca:93:e3:c6:ba:56:fd: 5f:46:19:a5:59:08:8d:a0:ad:61:ab:a2:79:f2:3c:21: 64:b7:ec:fb:eb:6e:a5:c5:d1:8f:21:08:41:c1:34:f9: 8a:f3:1a:f3:27:43:d4:9c:c1:6c:b7:a8:c0:08:5c:c6: c6:88:eb:35:8b:0d:77:4e:2e:92:43:26:b3:cd:a8:65: 5f:d0:3b:5e:f4:7e:cf:f3:b0:45:6d:0b:2b:c8:84:69: 88:05:6d:22:1e:97:fa:8f:a2:c2:79:c4:e3:85:1c:19: 49:ee:c6:fa:64:66:e0:78:7d:a5:43:5e:05:48:a2:7c: db:dc:e1:85:13:03:98:6c:73:4f:96:0b:a3:4e:5d:58: 89:9b:b0:1f:cd:7b:a2:76:d9:dc:b5:f9:bc:69:64:4d: eb:89:e5:04:b3:30:4c:1b:2f:ba:2b:32:57:ca:bc:af: b6:b7:01:17:d6:11:8e:3e:63:67:35:2f:f6:9a:9d:ec: 75:39:11:45:9a:e1:58:1a:82:6a:4c:cb:9a:4b:59:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 79:45:cb:16:c3:d8:a8:a8:b3:d2:ee:a9:04:93:18:59: 05:8c:9e:ee:a9:92:1d:fe:92:b7:e8:fc:32:f7:1b:6e: 0b:a6:7f:5a:ef:81:2b:f5:33:01:5c:54:af:c1:f2:f7: 9c:87:3e:f8:c9:66:a8:06:06:be:19:ad:34:13:6e:54: f3:22:a5:64:a0:eb:da:20:c0:d7:e5:e4:e5:49:6d:ef: f1:e7:33:26:05:3a:b3:a7:24:fb:62:ab:4b:0f:40:e1: fc:8f:35:54:3a:31:16:8f:51:08:a0:78:a3:8d:40:ad: a5:aa:70:ad:af:e6:41:7c:91:81:21:06:16:c0:98:94: ee:4e:e5:bf:b9:ef:57:20:eb:b5:f6:18:d4:12:75:d6: 4a:8e:3e:bf:0e:9b:9b:54:37:77:e2:a3:55:0f:c0:61: bf:08:d8:79:f4:50:07:74:fc:55:56:1e:51:cb:be:47: c7:48:17:af:66:df:3a:87:44:10:76:7c:7f:f4:c9:11: ca:81:27:31:c8:07:12:02:48:c2:28:73:01:2a:7f:70: 75:78:4a:dd:a4:56:ea:90:fa:b1:73:ad:63:86:5a:90: a6:df:e9:e8:20:e6:7e:76:a7:2c:c2:3e:74:be:bc:bc: c8:12:92:b3:06:e5:65:31:6d:f8:ec:42:6a:15:70:4e Fingerprint (SHA-256): BA:97:A4:BE:E7:6A:B3:68:03:0F:51:1E:6F:96:FE:39:94:85:CD:45:F1:8B:18:8E:60:03:A4:0D:26:E3:A3:A5 Fingerprint (SHA1): 4C:64:E5:52:1A:9D:84:2B:27:E5:7B:BA:0A:BC:5B:7C:89:4D:B6:1E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1004: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1005: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1006: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1007: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1008: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1009: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1010: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1011: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1012: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1013: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1014: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1015: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1016: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1017: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1018: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bar.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1019: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=site.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1020: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=Honest Achmed,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1021: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=OtherOrg,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1022: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1023: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=testfoo.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1024: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test3.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1025: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1026: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1027: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1028: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1029: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 29749 at Wed Oct 18 14:16:14 UTC 2023 kill -USR1 29749 httpserv: normal termination httpserv -b -p 10007 2>/dev/null; httpserv with PID 29749 killed at Wed Oct 18 14:16:14 UTC 2023 httpserv starting at Wed Oct 18 14:16:14 UTC 2023 httpserv -D -p 10007 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/aiahttp/http_pid.17687 & trying to connect to httpserv at Wed Oct 18 14:16:14 UTC 2023 tstclnt -4 -p 10007 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:10007 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 9745 >/dev/null 2>/dev/null httpserv with PID 9745 found at Wed Oct 18 14:16:14 UTC 2023 httpserv with PID 9745 started at Wed Oct 18 14:16:14 UTC 2023 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1030: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1031: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141571 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1032: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1033: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1034: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141572 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1035: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1036: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1037: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1038: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018141573 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1039: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1040: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018141574 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1041: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1042: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1043: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1044: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1045: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1018141575 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1046: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1047: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1048: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1049: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1050: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141572 (0x3caf9b84) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:16:14 2023 Not After : Wed Oct 18 14:16:14 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:e6:0f:48:e7:d6:68:a6:8e:31:1d:22:a3:f3:c1:87: 47:62:03:27:83:4b:ed:8e:a3:ed:67:4f:3c:3b:5d:1b: 3f:88:8e:6a:ad:e0:31:00:3a:ee:89:80:8e:91:da:6b: 9e:bc:13:0e:83:f6:db:4f:15:7e:15:f1:b8:7b:b4:6a: 3b:3c:e0:bb:fe:8c:73:0c:d4:2f:81:dd:b4:45:1e:e8: 7e:72:bc:06:53:41:ff:19:b0:13:b6:2a:d1:9b:55:6f: bd:98:94:32:a5:4e:8d:d8:27:f6:67:a8:21:4a:6d:a8: 32:e4:ca:4f:73:6f:76:ee:a4:03:1e:97:41:2a:20:76: b1:c7:9a:bb:b6:33:d8:00:e6:50:1d:eb:24:94:aa:43: fd:5f:3d:06:a3:a6:2b:54:9c:be:cb:c9:9b:38:96:a8: c6:70:7d:be:f2:0d:22:00:3e:da:25:52:ad:78:f1:f5: 02:89:69:0f:ff:22:46:73:4d:a1:44:e8:10:82:ac:c3: 06:a8:6f:c3:c9:bb:71:59:ad:b6:08:c7:fc:91:2a:ec: 15:30:d0:6f:28:36:aa:40:5b:e3:ed:95:ae:a1:17:50: b5:6e:b8:cb:26:66:93:10:5b:17:d0:dc:65:b0:bf:64: ae:03:e9:d6:b4:2a:80:5b:f6:29:21:67:cc:ee:b5:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:5e:8e:54:6c:7d:fe:6f:dd:72:38:df:72:76:33:00: f6:a4:96:76:42:22:4f:d6:b1:31:3b:2e:0c:cd:1c:9d: 4a:cb:f0:a9:4b:6d:6a:15:a5:a1:d7:a9:93:01:0e:8e: 34:8d:ef:2b:c9:f2:8e:e3:33:6b:08:9c:f1:5c:3c:f5: 38:45:03:17:af:dd:02:4f:20:00:60:27:ad:05:b5:17: b7:23:ea:e9:8e:76:ef:b2:ac:55:fd:87:bd:50:e7:62: 0e:c0:22:8c:ae:a4:4c:23:ea:55:11:e6:c2:89:fd:d5: f3:87:85:3a:97:0e:ee:34:e6:0d:f8:3a:13:68:6d:6b: 7a:ab:bc:41:13:28:b8:5b:96:dc:13:85:62:9f:41:a4: 64:c4:c0:93:5a:b4:14:da:46:aa:0d:69:dc:2a:0f:cc: 4a:a6:36:73:02:1a:9f:fa:a2:41:41:69:4e:f3:66:d5: f6:49:1b:1f:a1:bd:ea:dd:56:45:71:7d:60:cc:db:99: 21:66:82:20:7c:9b:f4:e3:6e:58:88:16:1e:80:42:a7: 5b:6d:15:be:ff:fd:5e:79:c4:2a:e5:ef:71:38:e6:e2: be:ce:3d:11:f8:1b:fd:28:d8:d3:00:36:b7:56:79:f7: 45:0b:e3:1e:67:27:ac:63:1c:91:63:cc:37:b0:9e:8e Fingerprint (SHA-256): 40:D1:15:53:FC:CB:8E:13:15:E1:C5:06:7E:C6:58:48:50:7D:84:ED:93:7C:BA:83:10:20:4D:70:89:09:CA:EB Fingerprint (SHA1): E3:94:DE:97:2C:21:25:78:F7:BC:BB:26:80:6D:BA:DC:43:6E:AF:7E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1051: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141571 (0x3caf9b83) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:16:14 2023 Not After : Wed Oct 18 14:16:14 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:ca:df:e9:29:b4:c5:1d:da:a9:49:e6:1b:40:21:93: 5b:24:a3:c3:c7:53:90:fe:79:15:98:a8:fc:63:8c:87: a5:cd:34:b8:02:17:4b:23:39:75:7f:e5:d4:88:8d:33: c8:a7:52:fe:85:74:3d:ec:3e:10:e5:b8:3e:98:c5:45: fe:e2:ff:51:11:ca:58:e7:c3:10:5c:fd:1e:18:23:bc: 50:ac:e8:00:86:df:bc:87:8d:20:cf:87:72:a3:6e:af: 54:f5:fc:56:22:50:e5:f4:18:88:05:4c:08:e7:ea:bb: 99:9a:0a:97:43:f1:ab:4a:2e:a2:44:e0:60:65:b2:0f: 95:a6:49:69:2c:76:aa:70:f8:f6:c9:47:6e:fb:6f:4a: c6:3a:43:85:1b:25:18:82:25:fb:3f:1d:22:52:24:1d: 74:bc:cd:67:5c:83:49:4f:21:74:cb:fa:d3:c7:95:4c: 6a:f4:8f:4a:a5:79:f8:e7:af:6b:af:f0:15:19:d8:67: 44:98:47:46:a8:63:01:61:bb:60:46:b8:bf:ce:0c:b1: 7f:c7:b7:1c:05:a1:32:01:55:30:75:ee:15:4c:21:4e: b8:da:89:96:80:25:ce:fc:16:73:2f:a0:4a:cb:a3:60: 1e:78:bf:6f:03:88:40:c8:9b:c0:d6:52:40:15:bf:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:91:d2:cc:05:ae:46:6f:79:ab:ae:64:ca:76:3b:b3: 1e:cf:3a:90:fc:d7:9b:38:26:1d:f7:18:62:11:1f:56: 02:b3:45:67:1e:cf:0d:4b:b2:e1:1d:f8:54:c7:bb:a1: 90:6c:a6:3a:d5:89:fc:6e:7e:e9:a0:48:5b:77:f4:06: c2:43:56:79:1a:17:65:1e:7f:cc:12:65:72:b2:e6:30: 44:28:77:c9:40:90:94:4a:6d:b7:f1:62:88:db:86:65: af:33:78:75:e9:9d:aa:41:9c:6f:b8:ec:68:06:3e:f3: 9d:d8:fa:50:53:2c:08:18:d5:cf:a2:23:06:ac:cd:32: 10:74:99:66:f4:5a:e4:e3:c8:6c:0b:9c:ef:34:df:0c: 2e:17:bc:e2:f2:9a:ba:02:70:02:45:e9:0e:59:45:87: 7f:f0:c7:e5:cd:a8:fc:85:1d:4a:cb:01:cb:5d:82:9f: d0:c3:bf:10:30:4a:b8:d8:3e:fa:33:bb:5b:fd:5d:27: 7a:c0:12:97:8a:ef:a1:44:07:eb:f2:dc:74:61:77:53: 66:d5:08:3c:af:41:8c:80:50:6f:8c:03:3d:0e:c6:90: 69:46:18:8e:c9:70:b2:8b:6a:4b:8d:75:26:79:9d:ef: 24:cb:af:fa:c2:99:cf:37:4f:fb:90:7c:ae:87:15:1a Fingerprint (SHA-256): 47:48:AE:CA:CB:8C:DC:C0:88:DD:EB:84:1F:D5:51:0C:57:00:B3:E7:F2:1A:3A:6C:9B:37:A3:F5:B2:E2:E1:D3 Fingerprint (SHA1): 32:01:82:E0:29:2E:3A:8C:19:23:75:F2:6C:48:BA:FE:B1:CF:48:E1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1052: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1053: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1054: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1055: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141571 (0x3caf9b83) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:16:14 2023 Not After : Wed Oct 18 14:16:14 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:ca:df:e9:29:b4:c5:1d:da:a9:49:e6:1b:40:21:93: 5b:24:a3:c3:c7:53:90:fe:79:15:98:a8:fc:63:8c:87: a5:cd:34:b8:02:17:4b:23:39:75:7f:e5:d4:88:8d:33: c8:a7:52:fe:85:74:3d:ec:3e:10:e5:b8:3e:98:c5:45: fe:e2:ff:51:11:ca:58:e7:c3:10:5c:fd:1e:18:23:bc: 50:ac:e8:00:86:df:bc:87:8d:20:cf:87:72:a3:6e:af: 54:f5:fc:56:22:50:e5:f4:18:88:05:4c:08:e7:ea:bb: 99:9a:0a:97:43:f1:ab:4a:2e:a2:44:e0:60:65:b2:0f: 95:a6:49:69:2c:76:aa:70:f8:f6:c9:47:6e:fb:6f:4a: c6:3a:43:85:1b:25:18:82:25:fb:3f:1d:22:52:24:1d: 74:bc:cd:67:5c:83:49:4f:21:74:cb:fa:d3:c7:95:4c: 6a:f4:8f:4a:a5:79:f8:e7:af:6b:af:f0:15:19:d8:67: 44:98:47:46:a8:63:01:61:bb:60:46:b8:bf:ce:0c:b1: 7f:c7:b7:1c:05:a1:32:01:55:30:75:ee:15:4c:21:4e: b8:da:89:96:80:25:ce:fc:16:73:2f:a0:4a:cb:a3:60: 1e:78:bf:6f:03:88:40:c8:9b:c0:d6:52:40:15:bf:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:91:d2:cc:05:ae:46:6f:79:ab:ae:64:ca:76:3b:b3: 1e:cf:3a:90:fc:d7:9b:38:26:1d:f7:18:62:11:1f:56: 02:b3:45:67:1e:cf:0d:4b:b2:e1:1d:f8:54:c7:bb:a1: 90:6c:a6:3a:d5:89:fc:6e:7e:e9:a0:48:5b:77:f4:06: c2:43:56:79:1a:17:65:1e:7f:cc:12:65:72:b2:e6:30: 44:28:77:c9:40:90:94:4a:6d:b7:f1:62:88:db:86:65: af:33:78:75:e9:9d:aa:41:9c:6f:b8:ec:68:06:3e:f3: 9d:d8:fa:50:53:2c:08:18:d5:cf:a2:23:06:ac:cd:32: 10:74:99:66:f4:5a:e4:e3:c8:6c:0b:9c:ef:34:df:0c: 2e:17:bc:e2:f2:9a:ba:02:70:02:45:e9:0e:59:45:87: 7f:f0:c7:e5:cd:a8:fc:85:1d:4a:cb:01:cb:5d:82:9f: d0:c3:bf:10:30:4a:b8:d8:3e:fa:33:bb:5b:fd:5d:27: 7a:c0:12:97:8a:ef:a1:44:07:eb:f2:dc:74:61:77:53: 66:d5:08:3c:af:41:8c:80:50:6f:8c:03:3d:0e:c6:90: 69:46:18:8e:c9:70:b2:8b:6a:4b:8d:75:26:79:9d:ef: 24:cb:af:fa:c2:99:cf:37:4f:fb:90:7c:ae:87:15:1a Fingerprint (SHA-256): 47:48:AE:CA:CB:8C:DC:C0:88:DD:EB:84:1F:D5:51:0C:57:00:B3:E7:F2:1A:3A:6C:9B:37:A3:F5:B2:E2:E1:D3 Fingerprint (SHA1): 32:01:82:E0:29:2E:3A:8C:19:23:75:F2:6C:48:BA:FE:B1:CF:48:E1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1056: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141572 (0x3caf9b84) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:16:14 2023 Not After : Wed Oct 18 14:16:14 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:e6:0f:48:e7:d6:68:a6:8e:31:1d:22:a3:f3:c1:87: 47:62:03:27:83:4b:ed:8e:a3:ed:67:4f:3c:3b:5d:1b: 3f:88:8e:6a:ad:e0:31:00:3a:ee:89:80:8e:91:da:6b: 9e:bc:13:0e:83:f6:db:4f:15:7e:15:f1:b8:7b:b4:6a: 3b:3c:e0:bb:fe:8c:73:0c:d4:2f:81:dd:b4:45:1e:e8: 7e:72:bc:06:53:41:ff:19:b0:13:b6:2a:d1:9b:55:6f: bd:98:94:32:a5:4e:8d:d8:27:f6:67:a8:21:4a:6d:a8: 32:e4:ca:4f:73:6f:76:ee:a4:03:1e:97:41:2a:20:76: b1:c7:9a:bb:b6:33:d8:00:e6:50:1d:eb:24:94:aa:43: fd:5f:3d:06:a3:a6:2b:54:9c:be:cb:c9:9b:38:96:a8: c6:70:7d:be:f2:0d:22:00:3e:da:25:52:ad:78:f1:f5: 02:89:69:0f:ff:22:46:73:4d:a1:44:e8:10:82:ac:c3: 06:a8:6f:c3:c9:bb:71:59:ad:b6:08:c7:fc:91:2a:ec: 15:30:d0:6f:28:36:aa:40:5b:e3:ed:95:ae:a1:17:50: b5:6e:b8:cb:26:66:93:10:5b:17:d0:dc:65:b0:bf:64: ae:03:e9:d6:b4:2a:80:5b:f6:29:21:67:cc:ee:b5:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:5e:8e:54:6c:7d:fe:6f:dd:72:38:df:72:76:33:00: f6:a4:96:76:42:22:4f:d6:b1:31:3b:2e:0c:cd:1c:9d: 4a:cb:f0:a9:4b:6d:6a:15:a5:a1:d7:a9:93:01:0e:8e: 34:8d:ef:2b:c9:f2:8e:e3:33:6b:08:9c:f1:5c:3c:f5: 38:45:03:17:af:dd:02:4f:20:00:60:27:ad:05:b5:17: b7:23:ea:e9:8e:76:ef:b2:ac:55:fd:87:bd:50:e7:62: 0e:c0:22:8c:ae:a4:4c:23:ea:55:11:e6:c2:89:fd:d5: f3:87:85:3a:97:0e:ee:34:e6:0d:f8:3a:13:68:6d:6b: 7a:ab:bc:41:13:28:b8:5b:96:dc:13:85:62:9f:41:a4: 64:c4:c0:93:5a:b4:14:da:46:aa:0d:69:dc:2a:0f:cc: 4a:a6:36:73:02:1a:9f:fa:a2:41:41:69:4e:f3:66:d5: f6:49:1b:1f:a1:bd:ea:dd:56:45:71:7d:60:cc:db:99: 21:66:82:20:7c:9b:f4:e3:6e:58:88:16:1e:80:42:a7: 5b:6d:15:be:ff:fd:5e:79:c4:2a:e5:ef:71:38:e6:e2: be:ce:3d:11:f8:1b:fd:28:d8:d3:00:36:b7:56:79:f7: 45:0b:e3:1e:67:27:ac:63:1c:91:63:cc:37:b0:9e:8e Fingerprint (SHA-256): 40:D1:15:53:FC:CB:8E:13:15:E1:C5:06:7E:C6:58:48:50:7D:84:ED:93:7C:BA:83:10:20:4D:70:89:09:CA:EB Fingerprint (SHA1): E3:94:DE:97:2C:21:25:78:F7:BC:BB:26:80:6D:BA:DC:43:6E:AF:7E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1057: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1058: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1059: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1060: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1061: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1062: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141572 (0x3caf9b84) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:16:14 2023 Not After : Wed Oct 18 14:16:14 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:e6:0f:48:e7:d6:68:a6:8e:31:1d:22:a3:f3:c1:87: 47:62:03:27:83:4b:ed:8e:a3:ed:67:4f:3c:3b:5d:1b: 3f:88:8e:6a:ad:e0:31:00:3a:ee:89:80:8e:91:da:6b: 9e:bc:13:0e:83:f6:db:4f:15:7e:15:f1:b8:7b:b4:6a: 3b:3c:e0:bb:fe:8c:73:0c:d4:2f:81:dd:b4:45:1e:e8: 7e:72:bc:06:53:41:ff:19:b0:13:b6:2a:d1:9b:55:6f: bd:98:94:32:a5:4e:8d:d8:27:f6:67:a8:21:4a:6d:a8: 32:e4:ca:4f:73:6f:76:ee:a4:03:1e:97:41:2a:20:76: b1:c7:9a:bb:b6:33:d8:00:e6:50:1d:eb:24:94:aa:43: fd:5f:3d:06:a3:a6:2b:54:9c:be:cb:c9:9b:38:96:a8: c6:70:7d:be:f2:0d:22:00:3e:da:25:52:ad:78:f1:f5: 02:89:69:0f:ff:22:46:73:4d:a1:44:e8:10:82:ac:c3: 06:a8:6f:c3:c9:bb:71:59:ad:b6:08:c7:fc:91:2a:ec: 15:30:d0:6f:28:36:aa:40:5b:e3:ed:95:ae:a1:17:50: b5:6e:b8:cb:26:66:93:10:5b:17:d0:dc:65:b0:bf:64: ae:03:e9:d6:b4:2a:80:5b:f6:29:21:67:cc:ee:b5:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:5e:8e:54:6c:7d:fe:6f:dd:72:38:df:72:76:33:00: f6:a4:96:76:42:22:4f:d6:b1:31:3b:2e:0c:cd:1c:9d: 4a:cb:f0:a9:4b:6d:6a:15:a5:a1:d7:a9:93:01:0e:8e: 34:8d:ef:2b:c9:f2:8e:e3:33:6b:08:9c:f1:5c:3c:f5: 38:45:03:17:af:dd:02:4f:20:00:60:27:ad:05:b5:17: b7:23:ea:e9:8e:76:ef:b2:ac:55:fd:87:bd:50:e7:62: 0e:c0:22:8c:ae:a4:4c:23:ea:55:11:e6:c2:89:fd:d5: f3:87:85:3a:97:0e:ee:34:e6:0d:f8:3a:13:68:6d:6b: 7a:ab:bc:41:13:28:b8:5b:96:dc:13:85:62:9f:41:a4: 64:c4:c0:93:5a:b4:14:da:46:aa:0d:69:dc:2a:0f:cc: 4a:a6:36:73:02:1a:9f:fa:a2:41:41:69:4e:f3:66:d5: f6:49:1b:1f:a1:bd:ea:dd:56:45:71:7d:60:cc:db:99: 21:66:82:20:7c:9b:f4:e3:6e:58:88:16:1e:80:42:a7: 5b:6d:15:be:ff:fd:5e:79:c4:2a:e5:ef:71:38:e6:e2: be:ce:3d:11:f8:1b:fd:28:d8:d3:00:36:b7:56:79:f7: 45:0b:e3:1e:67:27:ac:63:1c:91:63:cc:37:b0:9e:8e Fingerprint (SHA-256): 40:D1:15:53:FC:CB:8E:13:15:E1:C5:06:7E:C6:58:48:50:7D:84:ED:93:7C:BA:83:10:20:4D:70:89:09:CA:EB Fingerprint (SHA1): E3:94:DE:97:2C:21:25:78:F7:BC:BB:26:80:6D:BA:DC:43:6E:AF:7E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1063: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141572 (0x3caf9b84) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:16:14 2023 Not After : Wed Oct 18 14:16:14 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:e6:0f:48:e7:d6:68:a6:8e:31:1d:22:a3:f3:c1:87: 47:62:03:27:83:4b:ed:8e:a3:ed:67:4f:3c:3b:5d:1b: 3f:88:8e:6a:ad:e0:31:00:3a:ee:89:80:8e:91:da:6b: 9e:bc:13:0e:83:f6:db:4f:15:7e:15:f1:b8:7b:b4:6a: 3b:3c:e0:bb:fe:8c:73:0c:d4:2f:81:dd:b4:45:1e:e8: 7e:72:bc:06:53:41:ff:19:b0:13:b6:2a:d1:9b:55:6f: bd:98:94:32:a5:4e:8d:d8:27:f6:67:a8:21:4a:6d:a8: 32:e4:ca:4f:73:6f:76:ee:a4:03:1e:97:41:2a:20:76: b1:c7:9a:bb:b6:33:d8:00:e6:50:1d:eb:24:94:aa:43: fd:5f:3d:06:a3:a6:2b:54:9c:be:cb:c9:9b:38:96:a8: c6:70:7d:be:f2:0d:22:00:3e:da:25:52:ad:78:f1:f5: 02:89:69:0f:ff:22:46:73:4d:a1:44:e8:10:82:ac:c3: 06:a8:6f:c3:c9:bb:71:59:ad:b6:08:c7:fc:91:2a:ec: 15:30:d0:6f:28:36:aa:40:5b:e3:ed:95:ae:a1:17:50: b5:6e:b8:cb:26:66:93:10:5b:17:d0:dc:65:b0:bf:64: ae:03:e9:d6:b4:2a:80:5b:f6:29:21:67:cc:ee:b5:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 16:5e:8e:54:6c:7d:fe:6f:dd:72:38:df:72:76:33:00: f6:a4:96:76:42:22:4f:d6:b1:31:3b:2e:0c:cd:1c:9d: 4a:cb:f0:a9:4b:6d:6a:15:a5:a1:d7:a9:93:01:0e:8e: 34:8d:ef:2b:c9:f2:8e:e3:33:6b:08:9c:f1:5c:3c:f5: 38:45:03:17:af:dd:02:4f:20:00:60:27:ad:05:b5:17: b7:23:ea:e9:8e:76:ef:b2:ac:55:fd:87:bd:50:e7:62: 0e:c0:22:8c:ae:a4:4c:23:ea:55:11:e6:c2:89:fd:d5: f3:87:85:3a:97:0e:ee:34:e6:0d:f8:3a:13:68:6d:6b: 7a:ab:bc:41:13:28:b8:5b:96:dc:13:85:62:9f:41:a4: 64:c4:c0:93:5a:b4:14:da:46:aa:0d:69:dc:2a:0f:cc: 4a:a6:36:73:02:1a:9f:fa:a2:41:41:69:4e:f3:66:d5: f6:49:1b:1f:a1:bd:ea:dd:56:45:71:7d:60:cc:db:99: 21:66:82:20:7c:9b:f4:e3:6e:58:88:16:1e:80:42:a7: 5b:6d:15:be:ff:fd:5e:79:c4:2a:e5:ef:71:38:e6:e2: be:ce:3d:11:f8:1b:fd:28:d8:d3:00:36:b7:56:79:f7: 45:0b:e3:1e:67:27:ac:63:1c:91:63:cc:37:b0:9e:8e Fingerprint (SHA-256): 40:D1:15:53:FC:CB:8E:13:15:E1:C5:06:7E:C6:58:48:50:7D:84:ED:93:7C:BA:83:10:20:4D:70:89:09:CA:EB Fingerprint (SHA1): E3:94:DE:97:2C:21:25:78:F7:BC:BB:26:80:6D:BA:DC:43:6E:AF:7E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1064: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1065: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1066: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1067: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1068: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1069: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141571 (0x3caf9b83) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:16:14 2023 Not After : Wed Oct 18 14:16:14 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:ca:df:e9:29:b4:c5:1d:da:a9:49:e6:1b:40:21:93: 5b:24:a3:c3:c7:53:90:fe:79:15:98:a8:fc:63:8c:87: a5:cd:34:b8:02:17:4b:23:39:75:7f:e5:d4:88:8d:33: c8:a7:52:fe:85:74:3d:ec:3e:10:e5:b8:3e:98:c5:45: fe:e2:ff:51:11:ca:58:e7:c3:10:5c:fd:1e:18:23:bc: 50:ac:e8:00:86:df:bc:87:8d:20:cf:87:72:a3:6e:af: 54:f5:fc:56:22:50:e5:f4:18:88:05:4c:08:e7:ea:bb: 99:9a:0a:97:43:f1:ab:4a:2e:a2:44:e0:60:65:b2:0f: 95:a6:49:69:2c:76:aa:70:f8:f6:c9:47:6e:fb:6f:4a: c6:3a:43:85:1b:25:18:82:25:fb:3f:1d:22:52:24:1d: 74:bc:cd:67:5c:83:49:4f:21:74:cb:fa:d3:c7:95:4c: 6a:f4:8f:4a:a5:79:f8:e7:af:6b:af:f0:15:19:d8:67: 44:98:47:46:a8:63:01:61:bb:60:46:b8:bf:ce:0c:b1: 7f:c7:b7:1c:05:a1:32:01:55:30:75:ee:15:4c:21:4e: b8:da:89:96:80:25:ce:fc:16:73:2f:a0:4a:cb:a3:60: 1e:78:bf:6f:03:88:40:c8:9b:c0:d6:52:40:15:bf:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:91:d2:cc:05:ae:46:6f:79:ab:ae:64:ca:76:3b:b3: 1e:cf:3a:90:fc:d7:9b:38:26:1d:f7:18:62:11:1f:56: 02:b3:45:67:1e:cf:0d:4b:b2:e1:1d:f8:54:c7:bb:a1: 90:6c:a6:3a:d5:89:fc:6e:7e:e9:a0:48:5b:77:f4:06: c2:43:56:79:1a:17:65:1e:7f:cc:12:65:72:b2:e6:30: 44:28:77:c9:40:90:94:4a:6d:b7:f1:62:88:db:86:65: af:33:78:75:e9:9d:aa:41:9c:6f:b8:ec:68:06:3e:f3: 9d:d8:fa:50:53:2c:08:18:d5:cf:a2:23:06:ac:cd:32: 10:74:99:66:f4:5a:e4:e3:c8:6c:0b:9c:ef:34:df:0c: 2e:17:bc:e2:f2:9a:ba:02:70:02:45:e9:0e:59:45:87: 7f:f0:c7:e5:cd:a8:fc:85:1d:4a:cb:01:cb:5d:82:9f: d0:c3:bf:10:30:4a:b8:d8:3e:fa:33:bb:5b:fd:5d:27: 7a:c0:12:97:8a:ef:a1:44:07:eb:f2:dc:74:61:77:53: 66:d5:08:3c:af:41:8c:80:50:6f:8c:03:3d:0e:c6:90: 69:46:18:8e:c9:70:b2:8b:6a:4b:8d:75:26:79:9d:ef: 24:cb:af:fa:c2:99:cf:37:4f:fb:90:7c:ae:87:15:1a Fingerprint (SHA-256): 47:48:AE:CA:CB:8C:DC:C0:88:DD:EB:84:1F:D5:51:0C:57:00:B3:E7:F2:1A:3A:6C:9B:37:A3:F5:B2:E2:E1:D3 Fingerprint (SHA1): 32:01:82:E0:29:2E:3A:8C:19:23:75:F2:6C:48:BA:FE:B1:CF:48:E1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1070: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141571 (0x3caf9b83) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:16:14 2023 Not After : Wed Oct 18 14:16:14 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:ca:df:e9:29:b4:c5:1d:da:a9:49:e6:1b:40:21:93: 5b:24:a3:c3:c7:53:90:fe:79:15:98:a8:fc:63:8c:87: a5:cd:34:b8:02:17:4b:23:39:75:7f:e5:d4:88:8d:33: c8:a7:52:fe:85:74:3d:ec:3e:10:e5:b8:3e:98:c5:45: fe:e2:ff:51:11:ca:58:e7:c3:10:5c:fd:1e:18:23:bc: 50:ac:e8:00:86:df:bc:87:8d:20:cf:87:72:a3:6e:af: 54:f5:fc:56:22:50:e5:f4:18:88:05:4c:08:e7:ea:bb: 99:9a:0a:97:43:f1:ab:4a:2e:a2:44:e0:60:65:b2:0f: 95:a6:49:69:2c:76:aa:70:f8:f6:c9:47:6e:fb:6f:4a: c6:3a:43:85:1b:25:18:82:25:fb:3f:1d:22:52:24:1d: 74:bc:cd:67:5c:83:49:4f:21:74:cb:fa:d3:c7:95:4c: 6a:f4:8f:4a:a5:79:f8:e7:af:6b:af:f0:15:19:d8:67: 44:98:47:46:a8:63:01:61:bb:60:46:b8:bf:ce:0c:b1: 7f:c7:b7:1c:05:a1:32:01:55:30:75:ee:15:4c:21:4e: b8:da:89:96:80:25:ce:fc:16:73:2f:a0:4a:cb:a3:60: 1e:78:bf:6f:03:88:40:c8:9b:c0:d6:52:40:15:bf:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 27:91:d2:cc:05:ae:46:6f:79:ab:ae:64:ca:76:3b:b3: 1e:cf:3a:90:fc:d7:9b:38:26:1d:f7:18:62:11:1f:56: 02:b3:45:67:1e:cf:0d:4b:b2:e1:1d:f8:54:c7:bb:a1: 90:6c:a6:3a:d5:89:fc:6e:7e:e9:a0:48:5b:77:f4:06: c2:43:56:79:1a:17:65:1e:7f:cc:12:65:72:b2:e6:30: 44:28:77:c9:40:90:94:4a:6d:b7:f1:62:88:db:86:65: af:33:78:75:e9:9d:aa:41:9c:6f:b8:ec:68:06:3e:f3: 9d:d8:fa:50:53:2c:08:18:d5:cf:a2:23:06:ac:cd:32: 10:74:99:66:f4:5a:e4:e3:c8:6c:0b:9c:ef:34:df:0c: 2e:17:bc:e2:f2:9a:ba:02:70:02:45:e9:0e:59:45:87: 7f:f0:c7:e5:cd:a8:fc:85:1d:4a:cb:01:cb:5d:82:9f: d0:c3:bf:10:30:4a:b8:d8:3e:fa:33:bb:5b:fd:5d:27: 7a:c0:12:97:8a:ef:a1:44:07:eb:f2:dc:74:61:77:53: 66:d5:08:3c:af:41:8c:80:50:6f:8c:03:3d:0e:c6:90: 69:46:18:8e:c9:70:b2:8b:6a:4b:8d:75:26:79:9d:ef: 24:cb:af:fa:c2:99:cf:37:4f:fb:90:7c:ae:87:15:1a Fingerprint (SHA-256): 47:48:AE:CA:CB:8C:DC:C0:88:DD:EB:84:1F:D5:51:0C:57:00:B3:E7:F2:1A:3A:6C:9B:37:A3:F5:B2:E2:E1:D3 Fingerprint (SHA1): 32:01:82:E0:29:2E:3A:8C:19:23:75:F2:6C:48:BA:FE:B1:CF:48:E1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1071: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1072: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141576 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1073: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1074: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1075: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141577 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1076: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1077: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1078: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141578 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1079: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1080: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1081: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141579 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1082: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1083: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1084: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141580 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1085: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1086: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1087: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141581 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1088: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1089: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1090: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141582 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1091: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1092: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1093: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141583 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1094: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1095: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1096: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141584 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1097: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1098: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1099: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1100: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1018141585 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1101: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1102: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1018141586 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1103: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1104: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1018141587 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1105: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1106: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1107: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1108: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1109: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1018141588 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1110: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1111: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1018141589 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1112: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1113: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1018141590 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1114: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1115: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1116: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1117: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1118: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1018141591 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1119: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1120: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1018141592 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1121: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1122: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1018141593 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1123: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1124: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1125: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1126: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1127: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1018141594 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1128: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1129: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1018141595 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1130: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1131: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1018141596 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1132: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1133: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #1134: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1135: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1136: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1018141597 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1137: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1138: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1139: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1140: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018141598 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1141: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1142: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141576 (0x3caf9b88) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Wed Oct 18 14:16:17 2023 Not After : Wed Oct 18 14:16:17 2073 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:e4:09:14:ff:d6:7e:32:ff:9d:be:a6:1d:7c:f7:4c: e9:ce:b5:74:4b:03:a5:fb:8c:11:48:d0:9a:d3:18:3f: 7a:38:99:88:18:de:9f:68:21:70:92:f7:1c:87:01:9d: 7b:9c:59:13:96:3f:f8:f5:40:1a:3f:22:d9:64:b9:61: d3:f6:f3:36:f0:28:bd:f4:c9:b6:d2:31:53:a5:d6:4d: 9b:cc:55:d1:c8:48:c6:68:0d:b2:52:13:6f:62:c6:eb: 11:3a:7e:12:22:5a:e1:46:50:bd:0e:b5:94:ee:45:09: c7:51:ff:90:89:f4:5a:13:2f:80:0c:ec:e1:04:05:45: ed:93:96:10:e1:2b:ea:65:58:b6:c2:d3:08:9a:74:40: 55:ce:52:ef:4b:d2:50:47:6e:f3:c2:10:f6:57:20:22: f5:c5:71:64:33:08:a4:cf:55:7f:af:3c:a3:95:6b:fa: 1d:9b:f5:67:49:85:c1:0a:db:20:9b:af:90:55:d1:67: e2:47:1f:a7:c4:7d:1e:89:9b:34:4e:2f:40:84:56:1a: b9:8b:73:6d:3b:bc:27:17:17:ca:e9:7a:8b:a4:0f:56: 1e:36:60:bc:14:7e:7f:55:28:99:7f:aa:86:1a:b5:7d: 32:b9:5c:8b:a7:6d:03:53:ad:73:d0:60:46:33:92:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:1a:99:25:40:fe:20:a9:30:17:d2:a9:48:61:bf:5a: a6:8c:da:de:d6:13:db:b3:32:f6:d7:e1:b8:a6:d0:dc: 23:07:1d:d3:3c:f6:4b:6b:2d:d7:a4:8c:bb:8c:f3:47: 4a:d8:01:38:9d:9f:a1:4a:4c:dc:5b:47:51:bd:c4:87: c4:25:d2:c3:28:e6:dd:31:7d:b7:16:4d:cb:d4:ac:b2: 50:e8:b8:f0:04:d2:8a:17:90:c2:cf:70:8f:2c:4b:12: ee:50:1b:50:1d:dc:83:43:ef:92:8e:70:e6:28:13:9d: e1:16:a1:43:26:7f:0b:b0:4a:cb:4d:4e:40:6d:2d:b2: 53:d1:30:cb:ae:96:95:3b:c6:2a:e3:4a:be:af:25:6c: 63:d0:6c:4f:d9:00:a2:31:75:5f:26:b2:de:ed:9f:fb: d6:72:1a:39:0a:41:c3:40:92:7c:44:15:76:4e:1e:a2: c5:e9:6d:d6:7b:2a:72:09:aa:47:3c:62:ba:16:55:e7: fc:c7:04:ee:b3:59:6c:bb:f6:07:33:ca:36:0c:bb:95: 04:34:db:14:02:2f:00:f9:65:4e:92:39:65:da:a8:83: c3:1e:37:da:48:94:33:83:f0:cf:2f:5e:33:e7:71:e9: ee:68:d2:59:39:74:75:cc:7c:16:16:fe:7b:9a:1b:08 Fingerprint (SHA-256): 52:66:03:01:57:FE:6A:BB:AD:DF:A0:2C:68:3B:5B:81:2C:D7:99:DA:CD:21:B2:5D:14:8C:A0:E8:DC:6B:3B:93 Fingerprint (SHA1): D6:94:25:DF:25:6B:76:DC:1C:BE:9B:DE:B4:FF:52:F8:45:2D:5D:E3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1143: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141577 (0x3caf9b89) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Wed Oct 18 14:16:17 2023 Not After : Wed Oct 18 14:16:17 2073 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:04:5b:41:2c:cb:90:3c:6e:4d:e0:77:54:a7:ef:5e: 08:ec:11:df:2c:51:03:bc:4f:5a:cc:e7:ae:74:aa:71: ba:a0:9c:cf:6f:db:59:01:7f:aa:09:d4:4f:5a:73:00: 1c:e8:6a:62:5e:72:0f:73:49:0a:2b:e9:f2:90:9b:63: fb:da:1f:ed:cb:d0:93:12:08:16:3a:60:26:8b:b5:67: 46:a6:3c:39:12:9b:c5:51:25:b9:94:87:f5:b8:49:c0: b2:20:d7:dd:4f:40:50:21:d2:93:1b:d6:60:77:b7:2d: c9:34:90:50:0f:a3:5c:9d:63:b4:fc:00:e0:e4:7c:8e: d5:62:6c:1d:f5:72:c4:26:fc:b9:5b:f0:1a:73:e0:2f: a8:18:2e:1d:f0:92:23:18:4c:f1:db:dc:03:de:5b:82: 1f:cf:d2:08:34:29:95:a5:e1:f2:e2:6b:aa:07:5d:6d: 4a:60:06:ef:8f:87:dc:ca:f4:d4:7b:c1:58:04:5e:42: 5f:ee:06:3f:c7:72:ef:41:d4:3e:0f:f4:51:86:ec:43: 51:ec:c3:d9:de:d8:1f:30:76:b2:6b:e6:29:39:f1:21: d1:9f:3f:13:ae:f4:b3:65:be:2a:64:69:9b:94:b1:9c: 89:f1:48:40:a4:3f:32:52:d2:24:a8:27:35:88:31:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:c8:a6:09:dc:00:be:76:57:4f:bb:4a:0f:b3:03:dc: 39:11:46:cd:4d:79:21:d3:f6:ca:45:34:31:b2:ac:c2: 92:da:cc:7a:a8:f7:d6:4b:ab:6b:5b:33:fe:52:89:ba: 6f:9a:2e:e1:b1:f6:97:fd:59:3b:49:1a:a5:b4:97:32: e0:8e:36:df:a6:c1:d3:63:24:7b:38:5b:af:8e:13:8f: 7d:54:b6:32:e5:65:e3:34:ed:01:e3:a9:c0:48:bd:eb: b3:9e:c8:0d:63:76:1f:23:02:8c:33:74:f6:28:76:e7: 7a:28:c9:66:61:b7:b8:dc:0c:58:4d:a5:3c:10:4b:ec: 65:68:05:ec:58:da:f9:93:35:c6:22:66:78:75:d0:f1: 95:46:cb:3d:98:a2:43:45:48:b5:5b:dd:fd:71:7c:48: d4:a8:cf:20:d1:82:40:e7:a5:6e:53:40:e1:3e:c1:fc: 04:84:6d:4a:25:6d:bd:ba:27:3a:6a:0a:a6:c3:5c:ba: ba:da:7d:80:62:28:e7:c5:73:06:6d:7b:75:d3:77:8f: 67:97:e3:a8:32:3c:06:c7:36:a5:d4:31:08:03:1d:64: 60:24:42:f2:c3:98:d2:64:60:e2:9c:04:ff:dd:7f:d1: 7e:0f:bb:ab:70:88:bc:fe:45:39:9f:a6:55:7b:50:50 Fingerprint (SHA-256): 11:05:89:4E:EA:7C:40:05:8E:1A:6B:5B:41:39:A6:C7:87:07:08:59:3B:FF:3D:05:3D:3C:29:D8:85:89:41:82 Fingerprint (SHA1): 5C:6A:4F:59:39:C5:59:7B:18:95:31:96:64:3C:41:FE:5E:FE:83:3F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1144: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141578 (0x3caf9b8a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Wed Oct 18 14:16:18 2023 Not After : Wed Oct 18 14:16:18 2073 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:a2:6f:9c:e2:27:ab:04:44:9a:68:86:d9:f0:4b:e7: 84:29:fb:67:d4:6f:5c:c4:f1:b7:82:7c:a6:75:bb:35: b6:e1:d2:29:9c:91:c4:81:95:06:a0:ee:62:20:ea:5f: 57:cd:63:af:e6:39:36:5b:67:07:6f:06:a6:52:2e:63: 54:f7:cf:39:ff:da:f0:0c:a8:a0:79:08:e3:b1:6d:29: 40:23:b8:df:9e:45:49:6f:70:bc:e4:f1:11:5f:e0:1d: f7:d0:47:5b:9f:85:01:35:90:a7:46:ad:1e:d0:28:4d: 6b:1e:cc:94:f6:e4:e7:1f:6e:52:dd:40:58:e5:bd:c5: 67:47:e9:1f:e6:a0:d5:ee:1a:b7:c4:cc:4a:15:f7:d2: a6:4a:e9:3e:c9:1c:99:ff:7e:bc:58:23:7c:8f:74:20: fb:66:ee:a4:ec:6d:7b:b7:33:0b:25:c9:53:3d:04:5c: a5:cd:44:1a:e6:ee:1f:90:d0:78:3f:5b:68:6d:41:9a: 8a:99:56:9a:d3:c7:d1:ee:62:45:fc:b3:b6:7e:73:ef: 9d:03:9c:a5:ce:56:c6:7c:70:bb:d0:fc:c8:22:25:5d: fe:44:8b:52:f5:59:e2:c0:98:e6:3f:a2:1b:0d:23:6f: bc:ee:cd:73:9b:52:c6:9b:44:9f:a0:a2:40:15:3d:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:7d:fd:bd:33:d2:9e:7d:30:45:cc:55:f4:03:32:70: 01:de:4d:43:e1:f9:78:5e:e1:b8:9a:bf:ee:d8:0b:14: 46:53:8f:46:1f:c3:2e:0e:93:54:e3:da:94:c6:a5:98: ae:f1:b6:bd:95:ff:4e:7e:f7:d0:7f:2b:5a:cd:78:6e: 41:22:de:70:a9:94:c4:94:81:9b:82:82:38:e5:de:9a: 86:a5:7a:53:68:aa:9a:e3:f2:27:ee:62:cb:4c:cd:f6: 1b:2c:33:de:01:9b:b1:15:29:fd:6a:0f:93:6b:07:f0: 9d:95:39:14:be:a3:b0:83:17:04:5b:57:75:30:37:7f: d4:ee:2d:1b:a5:52:d0:02:37:a4:cc:2b:9f:6d:45:31: 4a:1b:cd:b8:29:ba:f4:82:08:74:dc:81:23:26:a0:13: 64:fa:78:21:43:36:3b:23:a6:8e:ae:8a:e8:50:d4:f7: 83:f4:37:60:fa:97:59:d7:0e:db:c5:17:a2:7d:5e:dd: c6:fa:12:8e:18:a5:fd:dc:3d:f1:a1:e0:40:8b:82:9d: 6a:e0:24:25:4d:e4:e7:36:18:d0:ee:04:23:70:8b:eb: ab:0e:34:63:95:80:d3:8d:ba:74:c7:ef:d1:39:b1:de: f6:52:bd:11:a3:75:4e:75:dc:fb:0d:72:84:84:6e:38 Fingerprint (SHA-256): 38:21:8B:AA:D0:2B:E1:5F:B2:48:0E:CB:21:90:80:92:E1:45:7B:E1:E9:FE:4E:CA:15:9C:DA:B0:3D:CB:EC:C2 Fingerprint (SHA1): 48:77:6D:6A:17:55:24:94:3F:74:6E:AB:EE:F9:86:EB:87:56:A8:6B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1145: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141579 (0x3caf9b8b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Wed Oct 18 14:16:18 2023 Not After : Wed Oct 18 14:16:18 2073 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:4c:28:a9:73:42:c4:55:a2:5a:7f:da:52:54:4f:b7: f2:99:ea:f6:ab:da:66:bc:c8:a9:46:38:ba:5d:8e:26: d8:3f:57:dc:f8:9e:da:cc:04:74:9a:9e:76:8b:b0:97: 2b:8f:83:21:42:5e:0a:cb:38:9b:30:11:68:68:bd:c8: a4:11:9e:32:dc:95:64:fc:61:7a:76:0c:23:b4:c4:25: 1d:ca:07:a1:51:bb:e8:1f:b2:20:6b:c6:5c:47:71:7f: 2c:37:42:b5:95:b6:6b:92:5b:f4:9c:ae:71:1e:5f:12: 6c:25:70:03:ae:8a:92:c0:bd:03:ed:8b:d7:7f:5b:32: 28:b7:1b:1b:ac:89:66:c7:af:44:c3:69:a2:74:0b:ba: e8:40:5d:d1:43:33:52:f5:db:89:de:67:37:19:b3:d9: 49:ab:d9:f8:59:e9:c6:2e:55:ce:b6:e3:f0:40:0c:88: 21:f0:42:c0:51:03:26:15:f2:b8:b8:30:82:8f:ff:b4: 2d:ad:90:3e:ca:af:fa:fc:8c:9a:f6:94:40:02:38:c2: ba:a1:87:6a:68:14:31:95:fb:9c:3e:34:18:45:28:96: 37:fa:a1:eb:4f:6a:77:a2:a2:c6:44:1d:04:e4:de:8a: c5:0d:29:78:ee:3d:c5:6f:ac:b1:7a:26:26:b8:bf:1b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:e3:bc:bc:90:d3:5e:42:ed:d1:30:40:0f:c9:fd:75: 54:b7:a5:11:44:28:0a:9d:7d:d3:47:59:70:bd:05:7a: 60:c3:e5:81:0f:39:58:8e:6d:c4:0c:09:57:ef:e0:d1: 2d:c0:59:c4:41:20:78:3d:bb:75:00:5e:14:c7:24:29: 96:1f:c7:5e:1e:bb:eb:0a:47:1b:38:bb:7c:25:11:dd: a7:c2:a9:5f:93:8e:7e:c1:88:6c:bd:81:3d:0d:4e:c9: b1:33:e9:9a:ec:2c:9b:31:34:36:3f:e9:79:d7:03:31: aa:61:f6:98:07:f9:cd:bb:0f:de:6f:88:0d:ba:2c:ae: 66:e8:50:12:2e:b1:5b:47:30:d2:94:f2:cd:e6:25:a4: fa:7f:2e:0d:90:8c:c3:41:1e:17:c2:bf:da:18:2f:67: ab:aa:42:c9:3b:89:11:94:92:88:f5:d3:dd:2d:d7:52: ff:97:34:69:e3:35:ba:c0:37:aa:a6:ab:c1:cb:d3:24: e5:9c:6c:a1:9f:e4:85:9e:9c:6b:b6:7f:60:80:bc:30: 88:63:7d:9f:63:1a:f8:a6:15:a9:bd:71:6f:3d:54:75: 49:5b:3d:26:06:77:fa:ca:58:0f:ac:33:8a:82:c6:f5: 1b:bb:0f:2d:b9:43:5f:cc:1c:a7:b5:83:e6:da:25:63 Fingerprint (SHA-256): F4:ED:2A:18:36:AF:86:F4:CF:2F:41:5F:55:DB:EE:29:51:57:1F:A8:86:60:6B:8F:86:25:B7:F5:C5:AD:98:21 Fingerprint (SHA1): 3F:C6:7E:D3:4E:CF:E8:42:D5:DE:23:1D:6B:2C:1A:F8:14:51:5D:34 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1146: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141580 (0x3caf9b8c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Wed Oct 18 14:16:18 2023 Not After : Wed Oct 18 14:16:18 2073 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:23:76:43:78:60:bb:7f:59:54:7d:bf:0e:1a:4c:72: d5:95:75:7e:46:67:06:d8:d2:43:98:1b:6f:60:93:29: d0:26:15:45:45:d6:bf:8c:b2:45:31:e5:f7:58:f5:4e: 4e:71:c5:bf:1a:3b:a7:62:77:c2:a5:1b:92:a6:17:5c: e6:55:6e:40:5a:83:39:82:a7:d4:68:08:02:e3:1c:02: 3a:85:81:da:79:d4:c2:85:5f:74:67:d4:74:61:ec:58: e5:43:36:90:67:f6:93:d5:8c:04:ab:4a:f7:15:c3:6e: 55:0d:89:f0:53:42:2a:d1:c7:49:68:cd:88:c5:d6:af: 52:00:7a:67:7a:9d:af:85:2b:d7:22:33:fd:02:d3:eb: 30:6f:c7:15:4b:dd:b7:3a:62:24:6e:81:02:ef:70:23: 48:5a:ba:b9:d7:eb:4a:6a:e2:e2:3c:ea:6c:4f:89:62: 80:8c:1f:70:32:23:4c:6e:89:8d:94:40:6c:1b:09:95: 2d:b5:37:0d:fd:ff:50:e0:13:30:b3:5e:a6:0e:6e:97: 46:0a:0c:94:f5:93:e5:b9:8b:12:c8:c8:63:16:1c:29: e2:f4:0b:1b:15:82:28:47:df:fd:85:4d:84:a0:63:b5: 0a:fd:b3:7f:3a:58:c0:65:f9:71:fb:d5:1a:2a:60:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:d5:ac:f9:d2:a0:18:74:b6:e9:50:f2:9f:4d:55:13: 02:28:fc:0c:d2:78:b3:16:16:03:85:fa:8a:c1:f1:ed: 19:bf:7d:22:fd:4a:14:b0:7e:a6:8e:90:d5:b9:91:2b: 23:b9:bd:06:4b:37:d9:1d:0e:95:fd:59:c6:6c:13:d6: 0a:2b:03:2e:d9:ff:e3:a1:46:ab:aa:fe:0d:67:45:42: 54:06:70:f9:55:2c:59:9c:6a:eb:b5:c6:f4:aa:06:d1: 0c:42:14:27:5d:0a:93:88:4c:57:af:56:5b:ca:fa:12: 68:bb:27:48:c7:12:51:84:a7:bd:18:53:ca:10:c8:45: e9:1a:05:7f:7f:6e:56:3d:b9:b3:c8:ba:f2:f1:f5:6d: 8b:77:fb:a5:b3:68:a2:8c:a2:1b:c4:e7:eb:e6:81:99: 5e:1d:9f:0c:61:9c:2d:2f:90:ec:ea:c4:97:7f:26:9f: a6:61:6f:1c:c0:63:7c:f1:ca:d4:7b:85:ba:0b:1c:9d: e7:46:d0:4d:bd:ba:07:dd:af:be:a2:65:28:71:b7:fe: 54:89:a6:95:17:65:8c:dd:e8:a9:d7:8f:0f:1a:84:53: 95:6f:6d:a7:d7:c2:6c:0e:c7:f8:1e:d0:91:f7:5a:de: 94:d1:58:a6:e2:31:c1:14:40:cb:41:78:d1:5b:9c:df Fingerprint (SHA-256): F9:81:A9:E7:E0:20:B4:E5:5C:3D:64:47:4D:65:6F:65:5D:28:04:62:F1:47:CA:45:8C:37:89:E4:D3:26:6E:71 Fingerprint (SHA1): F9:14:50:81:DD:A3:C6:27:FC:0B:3B:40:7C:AE:37:82:34:D7:DD:AC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1147: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141581 (0x3caf9b8d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Wed Oct 18 14:16:19 2023 Not After : Wed Oct 18 14:16:19 2073 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:92:57:4e:22:17:58:61:b9:6d:17:e6:9b:49:e3:05: e6:f6:36:88:d7:6e:22:4e:ea:a4:76:e2:55:0e:1b:68: c3:8a:78:28:d7:1b:35:20:e9:55:ab:35:bd:57:1b:ab: 92:8e:1d:b8:99:45:46:f3:bd:c2:c3:51:ef:d5:8f:ef: d3:81:4f:a4:20:4f:55:43:09:b1:27:41:eb:33:61:fb: 32:80:b0:cf:4a:41:1a:d7:7e:a9:6c:3a:ed:30:b1:f7: f4:9e:93:21:43:64:d3:f9:8b:f2:3a:b2:47:28:78:ca: 2c:2a:21:68:67:b6:4b:8d:cb:07:b0:0d:7a:94:c2:41: de:33:35:46:88:02:29:e5:75:15:c7:0c:68:4a:73:e1: 42:07:75:48:11:b5:4a:be:2f:94:8b:70:49:4b:44:77: b2:e9:d8:07:1c:c1:c0:1f:26:2c:0d:e2:e0:20:1e:ac: e2:7e:e0:8e:20:bf:a9:70:9c:51:2e:04:b6:eb:c1:9e: a9:69:20:97:b6:f1:54:d2:bd:b2:83:ae:44:52:95:e5: 90:3a:a1:6b:97:df:9f:ea:c6:57:aa:23:31:f6:24:69: 80:2e:c7:da:9f:39:32:79:7d:bd:ba:49:3f:6f:24:e9: 40:a5:21:4e:18:fb:0d:5b:4e:36:71:f3:db:38:82:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 76:ae:99:1a:4b:ef:3a:d9:3c:3b:bd:e3:3e:57:59:25: bf:7c:13:df:6b:8c:cd:c5:53:3f:7b:52:bf:ec:f7:c9: e1:19:9d:eb:35:31:e4:cf:1b:2c:84:e5:ff:c8:1e:87: e8:6b:65:3c:1b:cd:cb:32:8a:87:e9:55:6e:98:e4:6d: c9:59:31:e0:49:19:09:5d:a4:01:d4:ab:03:57:6f:84: 9b:cb:3e:87:55:d6:1a:da:a8:29:c3:1e:e5:f2:e8:8f: a0:7c:b8:54:b9:28:61:b3:a7:57:76:cf:02:72:2b:ca: 04:e6:d6:6a:2c:94:00:dd:a2:cd:d8:66:3a:3c:6d:21: 66:97:35:ad:bf:7a:3a:9e:21:7f:3d:22:1b:61:3c:fa: c2:72:84:e9:67:73:76:96:9e:84:51:b1:18:c1:aa:82: 49:ec:f1:77:0e:eb:09:78:d8:a4:2c:3f:2a:c8:51:de: f1:fc:cb:b4:d0:19:ed:04:1f:ee:c7:8f:28:28:36:8b: d1:d6:ca:2b:bf:32:e5:71:5b:fa:12:3b:6c:9d:b4:4a: 78:ce:71:9c:4e:d6:81:44:9f:b1:d4:4d:75:4e:33:fa: db:bd:05:b8:49:e3:5a:ca:ea:33:7f:7f:ea:f4:ca:14: fa:0b:b3:2f:74:5c:4e:bc:7d:57:bb:16:b7:3e:2d:3d Fingerprint (SHA-256): 88:8F:2B:7F:A8:18:33:65:11:75:4C:98:F7:8E:0E:B5:BC:FC:F4:7B:57:86:EC:AC:B6:2B:68:C0:53:36:D3:8E Fingerprint (SHA1): A7:CB:CE:00:50:47:04:3A:52:0F:9E:8D:BC:9E:B8:1B:6A:AA:FD:6E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1148: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141582 (0x3caf9b8e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Wed Oct 18 14:16:19 2023 Not After : Wed Oct 18 14:16:19 2073 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:28:79:e8:b1:74:3e:83:59:ad:da:2f:88:36:c9:4d: a1:dd:69:d6:c6:ae:50:25:51:cc:d8:f8:e1:11:27:10: 14:53:43:e6:e5:46:11:52:9c:6a:0f:4b:78:4d:12:0b: 36:5e:95:4d:f9:50:b7:a0:dc:cc:2c:75:71:52:29:9e: a0:e6:a3:37:de:30:12:0b:f6:4c:12:48:bf:76:97:17: 57:d3:b5:0d:c8:61:37:6c:12:10:c4:e8:29:8b:e6:07: 6d:12:0d:85:a3:2e:65:f0:1d:16:b5:b2:a7:6d:c7:cf: 82:ec:09:f8:c3:36:84:45:1d:38:24:b2:42:44:dc:82: 5f:52:8a:f3:28:b3:f2:68:38:07:37:31:dd:33:c3:40: 75:15:28:26:32:7a:dc:29:24:53:6f:ea:c1:1d:d4:55: db:de:0f:32:47:02:48:66:bf:a5:a8:fe:b9:8e:96:bf: 5e:39:2e:a1:28:0a:75:96:da:2f:d0:54:ab:88:94:9e: b0:be:ec:7e:b9:09:31:2e:fc:07:8d:52:a8:6d:82:bb: 60:20:0a:75:2f:79:17:5a:dc:0d:58:c2:7d:5d:d3:28: 9e:86:a9:e6:40:e5:f2:b2:2a:bb:a4:14:64:06:36:0e: 7a:25:f2:dc:01:d6:3a:b3:19:30:4a:d0:3c:1f:cf:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:dd:c9:5a:56:76:9b:1f:26:f3:ff:79:81:13:11:1f: dd:f7:ca:9f:ac:e5:ea:a2:b8:b8:2c:66:0c:7d:2b:32: 49:a2:d3:36:ae:b6:ec:ac:af:80:d5:ba:3d:e0:10:0f: 57:09:ef:f8:dc:1a:e3:47:1c:d9:3a:9c:37:8e:2a:2d: e8:a4:cf:9d:5f:54:4a:09:7d:4e:07:d4:ae:ef:b3:c1: fc:0f:dc:62:f1:d6:05:03:7e:02:8e:6e:f5:c8:24:ad: 8f:a3:2c:72:d7:a6:a1:45:f0:f4:e7:fa:4c:f3:01:34: 90:25:6c:a5:85:cf:7c:e5:a8:24:61:0f:91:60:aa:f5: 24:bb:c0:25:87:b1:17:1b:3a:8e:58:ad:7e:ff:21:d8: 60:dc:0e:63:d2:cd:f9:5b:de:5c:49:6b:23:66:cb:d1: 0f:0f:d5:22:cb:97:73:32:c2:33:bf:0d:78:ec:89:2a: eb:77:e9:de:cb:d1:10:67:4c:3a:54:93:6c:8a:12:3e: bc:c2:b5:f1:f9:cb:1c:5e:3a:d7:99:af:c5:b8:3f:00: f1:af:e9:7e:75:a8:6d:ed:da:96:d5:87:ef:7f:76:96: 9d:a4:44:93:23:ff:0c:a6:be:c9:68:19:b8:20:8e:cb: 95:3e:18:f4:86:e6:e2:48:a8:7b:c1:08:dc:c2:27:8f Fingerprint (SHA-256): D4:FD:1D:23:C2:F4:29:97:0C:0C:D3:68:D0:D8:90:B5:94:F6:CA:FF:29:C6:B3:94:CA:FE:C9:40:B0:DC:DF:C2 Fingerprint (SHA1): A6:96:6E:85:3A:10:BC:4D:E1:7A:DF:98:0A:CD:90:F0:74:1F:AB:E1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1149: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141583 (0x3caf9b8f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Wed Oct 18 14:16:20 2023 Not After : Wed Oct 18 14:16:20 2073 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:f1:b9:fa:b2:f8:50:89:fb:91:21:ac:2a:e3:01:e4: c8:d5:2a:c4:8f:1e:b9:e4:d5:5a:51:19:02:f8:4d:95: 9b:ea:54:eb:0a:f3:df:ce:f5:a6:c2:42:53:15:c4:3b: 8b:ed:52:1b:00:e5:13:f3:3f:e5:a0:82:29:52:a8:4f: 3c:b5:be:ce:aa:35:48:28:22:43:4c:fb:98:7c:16:37: 8d:d7:bb:8a:91:44:93:0d:8f:d6:fa:a1:e4:b6:b3:9f: 69:d8:7d:c0:92:63:46:33:1d:d0:47:97:a8:c0:58:5f: da:53:bb:bb:bc:3c:fc:7e:45:02:25:01:82:b6:fa:89: e6:d3:68:5e:b0:d8:2e:24:22:b7:26:11:3a:10:e2:b8: f4:40:c2:14:df:97:0b:4c:46:29:03:ac:25:69:18:82: 80:53:39:89:94:0c:07:da:82:40:7f:7a:5e:3a:a1:fe: 3c:a2:b8:57:6b:8e:f7:7a:10:ef:91:7e:a9:50:df:8b: 15:65:3b:09:46:fb:82:0b:48:04:70:09:4a:52:ec:57: c7:19:19:b0:45:dd:2e:57:e4:0f:33:84:4b:3b:72:a0: bd:0e:97:26:a7:45:df:23:5b:3d:24:8f:29:a9:61:c9: b6:d7:25:57:90:b4:3d:e8:ee:42:c6:20:f7:c9:cf:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 05:ca:cf:8b:65:3f:be:dd:e6:5e:05:1f:61:3a:33:36: 67:03:0d:48:49:ce:f2:99:87:5d:b9:2b:16:80:86:61: 33:67:6b:ed:3e:46:cb:e5:a6:06:99:87:24:21:6d:8a: 23:67:7e:af:58:d8:8f:63:09:e4:2d:43:4f:eb:f0:3c: 1d:b3:99:9a:47:5a:a9:1c:6d:04:38:1b:26:75:93:de: ce:e2:f5:7f:f2:bb:d7:56:9f:25:f2:bf:2c:a4:c0:f6: 47:db:68:1f:0a:67:0c:4e:a6:3d:14:89:48:30:37:58: fc:6d:d6:e0:20:dd:59:ae:52:1d:ed:46:9c:9f:bc:44: 58:98:0a:5e:03:84:73:95:40:45:00:49:fe:ea:f9:6f: e2:05:ae:b9:62:20:41:a4:3b:42:1f:5e:66:31:89:ad: 4d:4a:83:30:44:f6:0a:31:da:84:bc:d8:9c:2a:9c:46: df:88:4b:d5:6b:fa:18:e5:b2:95:19:65:60:64:54:46: c6:cf:48:4f:67:0f:4c:a6:6b:59:c4:04:ac:ab:9c:df: 71:8d:15:6a:c8:6f:e7:ee:e1:c8:98:5f:86:f9:fe:41: cd:f4:1b:ec:47:3b:ab:49:22:1f:22:9b:84:e1:bf:12: fb:a7:d4:93:9a:75:ee:08:3c:0a:5b:80:50:86:08:b5 Fingerprint (SHA-256): 86:B1:44:27:FF:2D:1A:86:E8:C8:34:C6:67:68:53:12:72:8C:F5:89:54:99:24:34:0E:35:EC:3C:CE:33:85:3B Fingerprint (SHA1): 7D:0C:70:E0:87:F8:89:46:00:47:B6:43:6D:74:D6:EB:8C:CD:5E:CD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1150: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141584 (0x3caf9b90) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Wed Oct 18 14:16:21 2023 Not After : Wed Oct 18 14:16:21 2073 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:a0:b7:1e:07:2b:44:f4:25:e7:3c:06:7d:82:09:77: 80:b7:a1:93:11:35:c4:d9:6a:30:d2:66:d9:51:68:81: 65:df:a2:61:44:82:6d:d3:71:bd:40:51:04:cf:c0:94: 8b:6c:cc:34:4c:c2:71:bb:9a:d4:e3:69:73:90:52:b5: 5e:db:a7:79:a2:d1:47:26:97:1d:9d:69:af:a0:40:99: 80:a9:7e:b6:f1:a8:43:f0:49:8b:97:b2:9a:e3:ae:4c: fe:8b:e0:70:1e:05:ea:e6:b8:00:50:f2:93:3b:06:c0: 65:93:ea:39:bb:3d:fd:11:03:7a:11:d6:11:19:dd:f0: 84:89:c6:db:30:49:36:03:51:18:ba:75:aa:d2:ea:ab: 6a:d4:f0:12:0b:7a:78:d7:7a:0c:3d:0c:1a:b5:fe:fd: 7b:68:15:9f:92:6f:8b:fa:4b:3c:54:ef:a3:54:0b:a1: f1:25:c1:49:da:6a:7f:aa:62:65:cc:c3:d7:e8:4d:73: 2f:97:62:4d:cc:fb:81:a7:26:ef:b3:0e:52:42:a4:e5: 1f:dc:2d:f1:3c:6f:9b:46:09:d3:81:e6:e3:b1:99:36: c9:a8:5a:3d:bf:97:e9:47:3f:4e:6c:f3:be:6f:ff:a5: 42:4a:9c:57:1f:67:d7:14:c4:a2:89:01:50:f7:ce:c3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:e5:96:bf:62:c0:ed:01:2a:69:70:5d:bd:d8:eb:d0: 94:cc:15:53:4f:1e:93:8d:43:d0:f3:65:87:5e:41:8a: ad:dc:33:00:f6:ce:33:dc:85:eb:28:ac:a3:6f:2a:3c: 33:75:37:36:ad:36:8a:46:ed:8b:24:51:80:b0:a6:79: 71:72:b7:b6:77:83:00:cc:6e:43:22:65:3a:cb:6c:b1: 03:01:e2:d3:da:20:b5:6f:c4:bc:5f:8f:34:5e:a3:db: 75:c3:12:8a:ef:58:60:28:62:3c:35:14:4a:54:b8:ad: f5:c7:7d:7a:45:aa:08:29:01:ae:c5:ea:e3:bc:12:4c: 5d:a3:0d:b5:60:8d:95:86:7b:ac:4a:f5:a4:d9:06:90: 7e:27:95:0e:71:06:0e:b8:31:cb:ca:f4:f1:60:d1:a0: 98:d2:c1:73:34:cf:85:eb:17:2f:df:72:26:33:64:17: 9e:c5:04:31:60:2d:05:81:05:f1:45:30:a2:0f:f3:cc: 5e:b1:c4:e4:d5:52:90:34:cf:8f:41:3f:24:cc:45:ba: 6f:4b:79:49:b4:59:f6:59:e4:50:c9:67:6e:79:70:34: 22:b0:9b:81:dd:3f:d0:cd:11:8f:20:af:77:30:78:09: f2:63:64:b0:ad:52:2c:cf:65:0f:fc:e6:96:70:9c:42 Fingerprint (SHA-256): 1A:29:34:C0:81:6D:4A:39:CA:D8:1D:68:9E:F3:5A:13:0F:F8:6A:56:A0:B5:42:1E:3E:75:D4:C8:BC:52:34:8A Fingerprint (SHA1): A4:43:2F:E8:1B:1C:27:ED:10:75:DA:79:2B:73:B2:8F:58:1D:D7:4C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1151: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1152: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141599 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1153: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1154: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1155: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1156: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018141600 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1157: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1158: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1159: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1160: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018141601 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1161: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1162: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1163: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1164: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018141602 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1165: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1166: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1167: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141599 (0x3caf9b9f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:26 2023 Not After : Wed Oct 18 14:16:26 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:10:98:d5:1c:0f:e4:a6:1d:80:f9:8d:97:9b:37:bb: 2b:a5:34:52:d5:dc:17:ab:51:2e:4a:45:70:d3:f0:7e: d6:2d:bb:e5:cf:bc:d8:42:a8:71:1a:fe:f8:fd:ab:3d: f1:7a:ad:68:6a:35:12:a5:12:dd:3d:90:b8:8a:45:cc: 3b:4e:4e:d7:fe:37:1f:18:39:1f:6b:2f:7c:ed:71:ba: de:55:4b:34:66:42:5d:52:32:18:09:b1:7e:b5:c6:4e: 5f:34:88:06:cd:32:db:4d:ed:bd:6a:11:f5:25:f6:4c: a1:6f:b9:23:d9:ca:a0:ce:36:44:5e:78:ba:e3:0e:85: 3a:8a:4c:fe:81:dc:a7:c4:db:a3:bc:ab:9e:aa:e4:b1: d2:49:56:9a:4a:15:ea:75:cd:08:03:a3:75:83:c8:6a: 54:70:a6:5e:93:91:2f:7c:22:cb:87:95:d4:f9:3b:ff: 37:de:35:57:e6:5d:56:e2:c4:18:0c:60:c2:c4:83:21: 20:70:0d:f1:61:62:61:94:99:47:ab:4c:7f:44:c2:de: 13:56:ba:e0:7c:ed:91:b0:b8:31:3a:cf:57:3c:30:a1: 8a:1c:c3:99:72:52:e9:94:3b:fe:82:ca:df:e6:a4:e2: d5:64:dc:8e:3a:b7:8a:18:2d:b0:cc:88:7d:6a:e8:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e0:de:35:4c:ee:ce:3e:4e:e9:83:e8:bf:4f:a4:dd:30: 84:02:e1:58:1d:6a:f8:c8:09:e9:3c:10:43:8f:16:a0: d5:12:17:2b:8d:e1:08:5b:e8:e3:cf:69:46:26:36:66: 1c:ec:3d:8b:ad:13:8c:1d:aa:5d:c7:4e:57:5f:7a:50: d3:42:d9:49:63:97:26:5f:5d:d8:06:9c:9b:5b:1c:00: 49:fd:f7:da:fb:c0:27:74:9e:ab:67:43:b7:ab:26:cb: 87:cc:3c:2b:91:da:69:f9:1d:45:82:d0:83:74:74:81: b5:8a:c0:fd:62:28:70:8e:1e:7a:5a:d1:90:2d:c4:9e: e1:aa:2f:01:97:22:6c:81:2a:f6:09:70:1a:b8:90:7c: eb:1c:aa:19:c0:33:61:9e:19:8a:a2:de:e7:8c:c4:52: ff:eb:cc:e7:96:ec:ab:b8:c6:00:b7:80:fa:ac:1a:8a: f9:b0:41:1e:f4:f5:63:6a:19:28:5d:9b:8d:21:75:77: a2:f5:83:ab:f2:04:a9:bd:0f:a2:2f:4a:b3:94:24:c2: c3:f2:c9:08:43:3b:11:09:c0:4c:ee:b5:d1:f6:53:47: b0:45:b8:39:fe:65:bc:84:71:0d:e2:6f:66:a1:4e:8b: d9:ef:84:ab:ab:2e:ca:a8:39:03:e7:ee:94:ac:9f:3b Fingerprint (SHA-256): F8:61:6C:8D:FC:0B:54:C5:D6:B6:6E:A2:39:27:1D:ED:C9:4A:38:C7:E9:5E:9D:03:D9:A1:83:F5:1C:90:87:21 Fingerprint (SHA1): 73:83:10:D0:1F:FD:0E:6B:EC:14:4F:95:45:D5:B2:A5:BD:F8:ED:EF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1168: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1169: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141600 (0x3caf9ba0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:27 2023 Not After : Wed Oct 18 14:16:27 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:27:35:92:61:79:73:21:ea:45:5d:bc:51:22:30:57: 86:36:ac:36:61:80:2f:a8:5a:e1:d7:1f:1b:ed:ea:0e: 61:03:66:79:bb:ac:fb:84:d3:9b:d5:f8:dd:74:30:25: 29:47:80:56:86:88:0a:c8:65:dc:29:b6:15:93:1c:81: 14:dd:f1:c2:14:8a:13:37:86:d0:98:e0:20:74:ea:ea: 4b:ea:83:e3:90:14:eb:d8:c7:cd:35:1d:bc:7b:60:74: d2:8f:f8:18:ea:80:7b:63:15:85:b9:6b:90:f1:48:9b: 11:ea:99:e1:39:23:27:47:5b:df:02:e4:f9:f7:af:42: f7:6b:ba:9a:27:ae:e7:ba:48:7b:76:7a:d5:3e:0e:a0: 03:50:bc:50:e5:0a:96:f1:bd:d0:39:f6:3f:da:f1:d7: 9b:11:0e:fa:3d:f4:14:35:bb:56:06:87:23:26:26:ac: c9:ab:17:ac:f3:cb:f5:30:ad:84:b8:d4:7a:42:24:a2: 86:a2:60:86:f5:d9:01:d1:74:5f:f3:26:4b:d7:d9:66: 79:48:b2:7f:a2:1a:33:75:d3:d3:7f:f5:ba:a2:29:f0: f6:ed:ea:46:d9:99:7b:12:47:ad:34:6e:03:94:4c:f2: 15:e4:38:ba:92:4b:7a:10:b7:57:5d:8e:e9:35:d1:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:49:79:d5:67:ce:a6:43:7b:5d:0f:0a:b0:72:81:e4: 4d:bf:79:ff:b0:cf:18:ab:3a:0c:2f:b6:be:d0:00:ad: 45:8e:67:76:e8:eb:29:3e:7a:d3:91:50:44:ed:c1:78: 6c:c1:ff:9c:68:7e:5f:07:70:54:50:20:82:2c:95:c5: dc:ca:8d:fa:e7:9c:15:bb:41:29:37:97:98:e2:49:d6: ca:75:0a:b6:30:f9:45:e6:56:bf:3d:79:b8:b4:2c:8a: 14:c0:96:08:c3:e3:78:2f:72:f8:62:63:cb:f1:22:3f: c4:37:d6:65:06:49:b3:b0:09:fd:75:66:b3:f1:2f:74: 43:e7:76:e8:ec:27:82:56:22:5b:02:a3:1b:37:b4:7b: 1f:0d:3a:cf:76:63:4b:e1:68:6b:0c:8a:ae:df:1e:b6: 32:af:c6:e4:6a:7b:1d:1c:08:88:02:26:0a:bc:01:69: 22:90:d8:cc:0c:55:f7:2f:0c:a4:a7:2b:c9:a2:7f:53: 65:cc:ea:4e:0a:61:af:ba:97:10:d8:80:56:d4:b4:5f: b5:ac:ec:ed:d3:68:99:75:55:bb:47:51:51:96:66:00: f7:2b:45:26:ac:6c:3f:e9:c8:4c:05:2d:99:a2:2b:da: ca:eb:fe:05:3d:8b:43:d3:4f:50:00:6c:9a:0b:d9:d1 Fingerprint (SHA-256): 1B:DD:C4:11:00:87:76:F9:E6:E5:25:E6:61:96:06:EA:B6:3C:5B:0C:08:65:A7:8B:70:DA:D5:97:EB:78:36:3D Fingerprint (SHA1): 83:CC:EE:86:C9:58:C0:33:1F:68:53:B4:AA:F5:C0:6D:38:A5:20:6C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1170: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1171: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141601 (0x3caf9ba1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:16:27 2023 Not After : Wed Oct 18 14:16:27 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:96:39:07:de:af:f2:26:4d:89:91:0a:74:b9:b5:20: f8:8e:66:fc:bc:80:07:6f:5a:06:04:14:e5:06:87:a9: bf:bd:de:88:5f:39:ce:11:63:67:61:1e:be:c5:08:80: 9b:aa:80:27:01:9e:f7:39:37:58:da:34:b4:ee:ed:51: d0:f1:01:b2:d4:be:d2:4e:c0:b9:87:f4:1f:a1:ce:ec: 24:fb:58:a9:de:4b:89:0a:c1:9e:ad:83:cd:27:b8:76: 34:4c:83:7c:c6:7a:f6:18:58:52:d1:9c:ef:65:c2:e3: fe:4f:0f:2d:ae:fc:8a:72:85:d4:50:d7:2f:6b:d5:44: d3:98:f6:c7:c0:07:c2:97:a3:42:5e:4c:f0:8f:e2:66: f4:23:b7:c4:68:b3:a6:22:64:72:00:45:19:70:31:9b: 86:33:64:b1:f5:25:ec:99:b9:e0:7b:0d:71:25:1b:01: ad:cd:2c:7a:0d:11:b4:ea:82:e5:22:77:96:78:a1:dc: 94:69:95:c9:16:66:68:27:5d:71:4f:de:b4:64:dc:5c: a8:af:e1:3b:56:1e:fd:00:a6:77:0c:0a:bb:3e:0a:bc: a8:dc:3e:39:a6:d0:ac:ec:c9:b0:44:ce:3c:78:42:e0: 43:04:55:75:14:55:2f:cc:05:64:b7:bf:0c:ec:da:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:09:7c:82:4e:b1:14:8f:b6:14:3a:af:22:e4:45:94: 15:fb:02:dd:01:97:3b:48:78:98:96:b4:f6:ac:37:53: af:83:75:e3:e7:97:2d:59:d8:72:98:dc:bf:72:28:fa: 9f:9e:7a:f2:64:e6:43:29:06:57:9a:91:fb:39:c8:ee: 7c:b8:6b:c7:81:01:f9:bb:8e:fe:bf:0d:a6:55:dd:7a: 0f:fd:93:af:92:be:ce:80:a5:ab:56:52:b2:4e:a9:fa: 09:d2:68:4f:83:a7:71:a2:3c:e1:3f:7e:7e:47:e8:28: e9:b5:34:cc:a7:75:f1:00:77:f5:9c:4f:49:4d:68:dc: df:cc:57:7d:5a:90:86:e3:4e:96:d1:31:18:ab:33:6e: 96:7e:e1:e9:29:bd:d9:51:62:3f:49:18:b3:ba:84:2e: a0:51:3e:51:cc:0e:d4:c6:aa:fc:73:c2:1c:eb:41:0b: 65:ed:30:8c:95:1d:da:ea:f4:2a:d0:6b:b1:79:f5:89: 71:fe:ff:57:ae:c5:2b:e5:54:2e:fb:42:ef:21:64:d2: 09:aa:a7:37:12:ab:cc:50:e2:b7:0a:bb:b4:eb:50:ea: 6d:5a:c7:b9:97:47:24:88:fe:64:ad:ac:7e:6c:b1:e2: 00:c8:05:4b:7d:29:88:59:8c:d1:ed:05:1b:ff:e4:d0 Fingerprint (SHA-256): 45:84:AE:73:62:1F:28:E8:19:0E:F4:8D:DD:B0:70:4A:58:ED:5F:FA:F7:D5:4D:84:AB:D0:C1:BB:C7:73:46:07 Fingerprint (SHA1): 46:4C:7D:44:1D:DE:BB:F0:1F:C1:26:95:5E:D5:10:26:50:0D:57:C4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1172: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1173: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1174: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1175: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1176: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141599 (0x3caf9b9f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:26 2023 Not After : Wed Oct 18 14:16:26 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ed:10:98:d5:1c:0f:e4:a6:1d:80:f9:8d:97:9b:37:bb: 2b:a5:34:52:d5:dc:17:ab:51:2e:4a:45:70:d3:f0:7e: d6:2d:bb:e5:cf:bc:d8:42:a8:71:1a:fe:f8:fd:ab:3d: f1:7a:ad:68:6a:35:12:a5:12:dd:3d:90:b8:8a:45:cc: 3b:4e:4e:d7:fe:37:1f:18:39:1f:6b:2f:7c:ed:71:ba: de:55:4b:34:66:42:5d:52:32:18:09:b1:7e:b5:c6:4e: 5f:34:88:06:cd:32:db:4d:ed:bd:6a:11:f5:25:f6:4c: a1:6f:b9:23:d9:ca:a0:ce:36:44:5e:78:ba:e3:0e:85: 3a:8a:4c:fe:81:dc:a7:c4:db:a3:bc:ab:9e:aa:e4:b1: d2:49:56:9a:4a:15:ea:75:cd:08:03:a3:75:83:c8:6a: 54:70:a6:5e:93:91:2f:7c:22:cb:87:95:d4:f9:3b:ff: 37:de:35:57:e6:5d:56:e2:c4:18:0c:60:c2:c4:83:21: 20:70:0d:f1:61:62:61:94:99:47:ab:4c:7f:44:c2:de: 13:56:ba:e0:7c:ed:91:b0:b8:31:3a:cf:57:3c:30:a1: 8a:1c:c3:99:72:52:e9:94:3b:fe:82:ca:df:e6:a4:e2: d5:64:dc:8e:3a:b7:8a:18:2d:b0:cc:88:7d:6a:e8:c7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: e0:de:35:4c:ee:ce:3e:4e:e9:83:e8:bf:4f:a4:dd:30: 84:02:e1:58:1d:6a:f8:c8:09:e9:3c:10:43:8f:16:a0: d5:12:17:2b:8d:e1:08:5b:e8:e3:cf:69:46:26:36:66: 1c:ec:3d:8b:ad:13:8c:1d:aa:5d:c7:4e:57:5f:7a:50: d3:42:d9:49:63:97:26:5f:5d:d8:06:9c:9b:5b:1c:00: 49:fd:f7:da:fb:c0:27:74:9e:ab:67:43:b7:ab:26:cb: 87:cc:3c:2b:91:da:69:f9:1d:45:82:d0:83:74:74:81: b5:8a:c0:fd:62:28:70:8e:1e:7a:5a:d1:90:2d:c4:9e: e1:aa:2f:01:97:22:6c:81:2a:f6:09:70:1a:b8:90:7c: eb:1c:aa:19:c0:33:61:9e:19:8a:a2:de:e7:8c:c4:52: ff:eb:cc:e7:96:ec:ab:b8:c6:00:b7:80:fa:ac:1a:8a: f9:b0:41:1e:f4:f5:63:6a:19:28:5d:9b:8d:21:75:77: a2:f5:83:ab:f2:04:a9:bd:0f:a2:2f:4a:b3:94:24:c2: c3:f2:c9:08:43:3b:11:09:c0:4c:ee:b5:d1:f6:53:47: b0:45:b8:39:fe:65:bc:84:71:0d:e2:6f:66:a1:4e:8b: d9:ef:84:ab:ab:2e:ca:a8:39:03:e7:ee:94:ac:9f:3b Fingerprint (SHA-256): F8:61:6C:8D:FC:0B:54:C5:D6:B6:6E:A2:39:27:1D:ED:C9:4A:38:C7:E9:5E:9D:03:D9:A1:83:F5:1C:90:87:21 Fingerprint (SHA1): 73:83:10:D0:1F:FD:0E:6B:EC:14:4F:95:45:D5:B2:A5:BD:F8:ED:EF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1177: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1178: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141600 (0x3caf9ba0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:27 2023 Not After : Wed Oct 18 14:16:27 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:27:35:92:61:79:73:21:ea:45:5d:bc:51:22:30:57: 86:36:ac:36:61:80:2f:a8:5a:e1:d7:1f:1b:ed:ea:0e: 61:03:66:79:bb:ac:fb:84:d3:9b:d5:f8:dd:74:30:25: 29:47:80:56:86:88:0a:c8:65:dc:29:b6:15:93:1c:81: 14:dd:f1:c2:14:8a:13:37:86:d0:98:e0:20:74:ea:ea: 4b:ea:83:e3:90:14:eb:d8:c7:cd:35:1d:bc:7b:60:74: d2:8f:f8:18:ea:80:7b:63:15:85:b9:6b:90:f1:48:9b: 11:ea:99:e1:39:23:27:47:5b:df:02:e4:f9:f7:af:42: f7:6b:ba:9a:27:ae:e7:ba:48:7b:76:7a:d5:3e:0e:a0: 03:50:bc:50:e5:0a:96:f1:bd:d0:39:f6:3f:da:f1:d7: 9b:11:0e:fa:3d:f4:14:35:bb:56:06:87:23:26:26:ac: c9:ab:17:ac:f3:cb:f5:30:ad:84:b8:d4:7a:42:24:a2: 86:a2:60:86:f5:d9:01:d1:74:5f:f3:26:4b:d7:d9:66: 79:48:b2:7f:a2:1a:33:75:d3:d3:7f:f5:ba:a2:29:f0: f6:ed:ea:46:d9:99:7b:12:47:ad:34:6e:03:94:4c:f2: 15:e4:38:ba:92:4b:7a:10:b7:57:5d:8e:e9:35:d1:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5e:49:79:d5:67:ce:a6:43:7b:5d:0f:0a:b0:72:81:e4: 4d:bf:79:ff:b0:cf:18:ab:3a:0c:2f:b6:be:d0:00:ad: 45:8e:67:76:e8:eb:29:3e:7a:d3:91:50:44:ed:c1:78: 6c:c1:ff:9c:68:7e:5f:07:70:54:50:20:82:2c:95:c5: dc:ca:8d:fa:e7:9c:15:bb:41:29:37:97:98:e2:49:d6: ca:75:0a:b6:30:f9:45:e6:56:bf:3d:79:b8:b4:2c:8a: 14:c0:96:08:c3:e3:78:2f:72:f8:62:63:cb:f1:22:3f: c4:37:d6:65:06:49:b3:b0:09:fd:75:66:b3:f1:2f:74: 43:e7:76:e8:ec:27:82:56:22:5b:02:a3:1b:37:b4:7b: 1f:0d:3a:cf:76:63:4b:e1:68:6b:0c:8a:ae:df:1e:b6: 32:af:c6:e4:6a:7b:1d:1c:08:88:02:26:0a:bc:01:69: 22:90:d8:cc:0c:55:f7:2f:0c:a4:a7:2b:c9:a2:7f:53: 65:cc:ea:4e:0a:61:af:ba:97:10:d8:80:56:d4:b4:5f: b5:ac:ec:ed:d3:68:99:75:55:bb:47:51:51:96:66:00: f7:2b:45:26:ac:6c:3f:e9:c8:4c:05:2d:99:a2:2b:da: ca:eb:fe:05:3d:8b:43:d3:4f:50:00:6c:9a:0b:d9:d1 Fingerprint (SHA-256): 1B:DD:C4:11:00:87:76:F9:E6:E5:25:E6:61:96:06:EA:B6:3C:5B:0C:08:65:A7:8B:70:DA:D5:97:EB:78:36:3D Fingerprint (SHA1): 83:CC:EE:86:C9:58:C0:33:1F:68:53:B4:AA:F5:C0:6D:38:A5:20:6C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1179: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1180: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141601 (0x3caf9ba1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:16:27 2023 Not After : Wed Oct 18 14:16:27 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:96:39:07:de:af:f2:26:4d:89:91:0a:74:b9:b5:20: f8:8e:66:fc:bc:80:07:6f:5a:06:04:14:e5:06:87:a9: bf:bd:de:88:5f:39:ce:11:63:67:61:1e:be:c5:08:80: 9b:aa:80:27:01:9e:f7:39:37:58:da:34:b4:ee:ed:51: d0:f1:01:b2:d4:be:d2:4e:c0:b9:87:f4:1f:a1:ce:ec: 24:fb:58:a9:de:4b:89:0a:c1:9e:ad:83:cd:27:b8:76: 34:4c:83:7c:c6:7a:f6:18:58:52:d1:9c:ef:65:c2:e3: fe:4f:0f:2d:ae:fc:8a:72:85:d4:50:d7:2f:6b:d5:44: d3:98:f6:c7:c0:07:c2:97:a3:42:5e:4c:f0:8f:e2:66: f4:23:b7:c4:68:b3:a6:22:64:72:00:45:19:70:31:9b: 86:33:64:b1:f5:25:ec:99:b9:e0:7b:0d:71:25:1b:01: ad:cd:2c:7a:0d:11:b4:ea:82:e5:22:77:96:78:a1:dc: 94:69:95:c9:16:66:68:27:5d:71:4f:de:b4:64:dc:5c: a8:af:e1:3b:56:1e:fd:00:a6:77:0c:0a:bb:3e:0a:bc: a8:dc:3e:39:a6:d0:ac:ec:c9:b0:44:ce:3c:78:42:e0: 43:04:55:75:14:55:2f:cc:05:64:b7:bf:0c:ec:da:53 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:09:7c:82:4e:b1:14:8f:b6:14:3a:af:22:e4:45:94: 15:fb:02:dd:01:97:3b:48:78:98:96:b4:f6:ac:37:53: af:83:75:e3:e7:97:2d:59:d8:72:98:dc:bf:72:28:fa: 9f:9e:7a:f2:64:e6:43:29:06:57:9a:91:fb:39:c8:ee: 7c:b8:6b:c7:81:01:f9:bb:8e:fe:bf:0d:a6:55:dd:7a: 0f:fd:93:af:92:be:ce:80:a5:ab:56:52:b2:4e:a9:fa: 09:d2:68:4f:83:a7:71:a2:3c:e1:3f:7e:7e:47:e8:28: e9:b5:34:cc:a7:75:f1:00:77:f5:9c:4f:49:4d:68:dc: df:cc:57:7d:5a:90:86:e3:4e:96:d1:31:18:ab:33:6e: 96:7e:e1:e9:29:bd:d9:51:62:3f:49:18:b3:ba:84:2e: a0:51:3e:51:cc:0e:d4:c6:aa:fc:73:c2:1c:eb:41:0b: 65:ed:30:8c:95:1d:da:ea:f4:2a:d0:6b:b1:79:f5:89: 71:fe:ff:57:ae:c5:2b:e5:54:2e:fb:42:ef:21:64:d2: 09:aa:a7:37:12:ab:cc:50:e2:b7:0a:bb:b4:eb:50:ea: 6d:5a:c7:b9:97:47:24:88:fe:64:ad:ac:7e:6c:b1:e2: 00:c8:05:4b:7d:29:88:59:8c:d1:ed:05:1b:ff:e4:d0 Fingerprint (SHA-256): 45:84:AE:73:62:1F:28:E8:19:0E:F4:8D:DD:B0:70:4A:58:ED:5F:FA:F7:D5:4D:84:AB:D0:C1:BB:C7:73:46:07 Fingerprint (SHA1): 46:4C:7D:44:1D:DE:BB:F0:1F:C1:26:95:5E:D5:10:26:50:0D:57:C4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1181: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1182: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1183: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141603 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1184: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1185: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1186: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1187: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018141604 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1188: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1189: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1190: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1191: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018141605 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1192: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1193: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1194: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1195: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018141606 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1196: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1197: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1198: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1199: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018141607 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1200: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1201: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1202: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141603 (0x3caf9ba3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:28 2023 Not After : Wed Oct 18 14:16:28 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:b9:12:f2:b2:a5:1a:db:d2:9d:35:35:40:c4:1d:62: 8a:a4:2a:fd:c3:14:d0:fc:6b:7f:f4:be:c6:ac:b1:9c: 55:22:c0:53:2b:b0:7d:91:9c:25:b8:eb:56:2d:3d:75: 6c:91:68:81:6d:34:5f:ab:22:90:a9:61:e5:bf:c6:a3: 80:67:dd:24:2e:05:b4:c4:65:e7:40:ce:aa:73:82:5a: 48:e5:f9:8e:22:fa:5f:84:d0:23:7c:44:2e:03:86:41: dd:73:14:f3:54:b5:01:51:fa:af:36:52:70:8c:26:7b: 26:ce:1f:b3:68:64:f3:69:25:c2:2e:84:31:d2:dc:99: 07:c5:4c:ff:c4:56:72:9e:f6:f4:24:d6:5f:ec:2b:18: ab:c1:b4:8e:8c:b5:fc:d2:32:68:2d:93:2c:04:37:77: 50:90:35:8a:95:96:a3:a3:ed:01:02:72:e6:e1:5c:b8: 6e:dc:8e:f8:46:91:0c:2d:db:f3:bd:3b:33:57:80:6c: 27:9d:83:d4:44:f5:9a:e4:64:67:1c:09:eb:dc:ea:3c: 65:d0:62:63:14:7d:fb:41:b8:81:fa:b9:ec:c5:b8:07: 60:5f:56:d2:b4:da:00:cb:75:e5:b3:14:f7:0b:11:56: ad:4d:73:00:bc:82:2e:36:0d:ca:52:5f:36:0a:53:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:cf:bf:a1:1a:4f:16:90:e5:87:e3:91:c0:28:c5:b0: 14:14:d7:f1:03:17:41:75:46:6d:4a:3d:12:50:8a:e7: a2:c2:a1:bb:18:b6:76:06:62:e0:06:18:44:ff:64:14: 4d:49:19:77:8a:bb:7a:46:b3:08:1a:e4:47:65:2a:5b: ed:5b:ce:6f:36:94:31:11:22:5e:bb:9f:d7:2e:ce:28: 07:28:9f:82:ee:be:b7:db:c6:ee:c6:e5:3f:ec:3c:91: b5:da:2e:3d:93:26:de:41:53:97:0a:29:ff:60:30:fc: 42:20:e7:30:08:09:2b:f5:bf:5e:12:11:92:1f:e7:87: 72:c5:ee:f0:f0:bc:81:d1:5e:30:d4:2b:6d:64:5e:98: 40:20:83:7e:bc:68:a6:36:72:d0:27:f1:be:85:02:48: 3c:17:8d:19:c5:f8:04:f8:61:8f:f1:d1:3f:11:3d:38: 9d:37:80:49:b6:c8:c5:e1:8a:81:be:0b:3d:46:02:c5: 16:7a:91:81:c9:78:c8:4c:be:9e:d2:51:05:a1:47:77: f7:6e:86:43:04:fa:81:fd:c3:29:9c:35:33:e1:35:cd: 96:7e:54:fe:6c:fb:2f:76:8d:b2:30:d2:e6:79:43:df: da:36:8d:d9:48:19:df:87:96:c8:77:47:17:13:e0:35 Fingerprint (SHA-256): D0:27:06:61:70:7B:7E:CF:94:85:D9:A2:D3:03:3B:5E:D7:4D:9F:00:B3:F0:FE:9C:A1:05:49:02:8F:DE:70:EA Fingerprint (SHA1): E3:7D:56:E1:65:B0:3A:4E:FE:80:8E:6A:12:3C:67:CC:19:3A:97:55 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1203: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1204: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141604 (0x3caf9ba4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:29 2023 Not After : Wed Oct 18 14:16:29 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:de:bd:24:7b:7b:ce:55:8a:02:11:b6:8f:31:52:c6: 77:5b:39:43:88:c0:1e:6d:47:67:28:3e:5e:db:e9:4c: 8d:8c:9d:77:dd:68:54:f6:5c:30:d6:1e:dc:01:94:59: 91:01:ee:65:7a:a2:d3:24:65:b8:42:17:37:b8:86:dc: 58:0e:8e:0a:78:5a:45:c2:eb:cb:4d:15:e4:65:88:e6: b5:5f:96:e0:43:aa:2a:aa:ba:e0:9b:29:d3:75:7e:6f: 1d:4c:1e:e1:43:20:45:bd:29:da:95:6a:c9:bd:17:18: 50:10:e5:85:c4:9b:35:61:52:df:9d:e9:ea:8d:fa:3f: e0:41:b0:52:44:89:38:b1:f8:80:3a:bb:c9:44:75:79: d1:68:2c:ee:5f:8f:c8:bd:78:f2:48:49:a9:e4:e9:2a: 31:41:96:c4:47:97:eb:87:bf:1c:c2:1c:3e:92:e5:86: 3f:25:1f:c8:89:92:54:23:c7:f2:71:3a:da:24:ef:c3: 16:8d:b6:8e:7e:71:6a:cb:3e:d1:5b:b7:71:3f:7d:8a: b9:e5:6b:e9:51:5a:b2:95:31:62:86:c5:98:f4:77:f7: 61:9a:8f:ca:ce:47:33:1f:a4:a6:18:7e:e1:54:89:92: 7b:0c:64:e5:c9:10:1d:66:8e:0f:38:d4:92:27:04:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:fd:85:99:f0:24:ec:41:21:60:f8:fe:4b:90:df:06: d6:42:9f:dc:6c:f1:7d:69:38:6f:95:3f:25:f2:cc:0e: 6d:a8:fc:ba:96:67:33:ce:4a:0e:fc:8b:b6:53:98:15: 0a:56:e9:74:31:89:f3:d8:33:77:1b:7e:9d:f1:77:69: e7:1d:b6:d6:56:f7:ad:d4:1c:0d:00:9e:1e:9f:66:21: 70:1d:1c:ec:85:a5:0b:c1:6a:f2:29:62:66:88:6c:5b: d7:31:8e:f6:8d:1e:d6:01:78:5d:31:89:58:bd:34:03: 7f:7f:21:13:f9:b3:b4:bc:bf:eb:f3:a9:f9:64:1f:46: 52:56:30:0c:19:94:1b:39:e7:2f:dd:e7:b4:ce:57:6f: ec:67:b2:6b:4e:dd:4d:66:bf:48:98:7d:92:49:2b:e8: d9:78:bb:ce:61:1c:09:17:c8:06:c2:e6:f7:e0:38:24: 51:92:d6:09:30:4e:9d:d5:6e:9d:9f:2c:a0:ba:d1:3d: c7:91:2d:ae:31:07:d9:19:c6:a3:29:50:56:7c:80:a3: 41:57:50:9f:25:0a:7a:ed:16:9f:79:9b:ae:57:d4:0f: bc:d8:47:57:88:94:39:9f:f1:64:8e:e0:a5:81:51:e7: 23:a1:b7:46:8a:a3:9d:9d:3f:cc:2d:0a:ce:36:94:70 Fingerprint (SHA-256): 9C:AE:FF:D5:78:AA:EF:1D:CF:C1:31:E7:1E:6C:C3:BC:F1:A2:C2:D0:69:4F:6F:C7:19:D2:ED:EF:F8:1D:75:3E Fingerprint (SHA1): 51:72:E5:5F:48:7E:D8:AD:41:A4:3A:CA:CE:B1:06:6B:C9:4E:5B:1E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1205: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1206: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141605 (0x3caf9ba5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:16:29 2023 Not After : Wed Oct 18 14:16:29 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:01:d8:f4:d1:c0:5a:36:2a:4e:4b:4a:b0:c2:56:72: f7:0c:80:f6:39:0d:39:52:59:c3:3d:56:aa:bc:cc:4c: f3:36:72:85:e5:c7:16:f3:e1:a2:5d:8b:5a:00:91:e9: fa:2b:ea:0c:e6:00:65:7c:29:ec:41:51:19:28:f4:42: 27:ea:e9:df:c4:e2:ab:00:05:bf:ea:f5:51:2b:55:99: 60:c2:95:80:dd:da:17:8e:92:7c:b4:de:a0:47:ee:9c: 5e:31:ed:b7:e6:7a:93:39:aa:4c:0c:d2:02:52:ad:9a: 26:c3:b7:f1:a6:d8:88:b4:4d:73:94:46:52:37:22:f3: c1:b0:6d:43:55:6c:8f:bf:35:e3:c2:7e:e3:d7:31:ba: 42:ce:ba:f6:60:51:25:2b:a6:be:68:5a:6c:2b:f5:21: 06:8f:5b:3b:aa:f0:22:29:13:59:3c:8a:97:ae:88:9f: 86:e4:8d:6a:a5:a3:98:b2:98:f0:2a:38:1a:cf:15:3b: 99:90:58:d1:54:b5:5b:35:69:a8:69:6a:8c:e7:39:de: 9e:8b:fd:20:2f:ea:27:bb:26:42:ec:a5:ed:c0:33:06: 91:fb:3f:c0:21:cb:9c:6d:07:80:8b:30:67:b5:96:ae: ec:ec:43:a4:70:40:82:e6:55:67:97:bb:fa:cb:ba:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:f3:3b:bd:e1:8a:03:21:d3:bd:91:a1:54:92:93:99: d4:f0:0c:97:ff:3a:35:58:a3:50:0b:d1:dc:07:f1:aa: 49:08:24:25:c4:fa:80:8c:2b:2b:2f:b2:7e:23:f6:3b: 5b:64:11:d6:7e:fd:4b:50:38:95:fa:9a:a5:df:ba:59: 88:0f:1b:1e:5c:18:0b:b7:77:16:f3:f0:fd:0f:e2:82: 57:b1:0e:4c:7f:5f:4b:60:dd:b6:98:6c:9a:a7:11:9c: e3:18:7c:5a:3e:e2:56:8e:b9:3c:4d:e5:d2:56:ea:1e: f3:09:83:51:f4:d2:1c:e2:a5:62:f7:95:df:1c:51:56: 0d:ae:82:25:69:bd:66:ec:9f:11:ed:41:0e:76:be:71: 03:e9:78:cb:67:c9:97:63:3f:d8:94:1f:c8:53:02:c5: 05:41:1d:a0:b2:3d:6b:79:5a:f1:c0:36:a4:92:7f:e1: d6:6c:8b:01:51:2e:90:11:ec:31:df:e1:68:37:ad:fb: 83:c9:13:e3:38:30:56:f7:bf:d0:bf:18:e5:98:7d:aa: 46:33:55:75:ae:09:47:43:36:14:ca:2e:6b:f2:2d:63: 68:94:71:09:3c:73:dc:f4:27:f1:fe:8d:bd:10:f1:22: 96:98:84:a8:f9:f9:f7:ec:92:a4:a6:be:5c:e7:31:4b Fingerprint (SHA-256): 45:8F:29:E4:1A:0F:1B:A4:35:9D:16:01:EC:BD:D7:08:2B:13:77:1F:2A:47:0E:5D:8F:4F:72:D2:66:12:42:FB Fingerprint (SHA1): 6B:8F:62:1B:3E:DD:FA:DA:76:2B:83:CA:D3:2B:11:5A:A8:9B:C4:94 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1207: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1208: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1209: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1210: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1211: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141603 (0x3caf9ba3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:28 2023 Not After : Wed Oct 18 14:16:28 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:b9:12:f2:b2:a5:1a:db:d2:9d:35:35:40:c4:1d:62: 8a:a4:2a:fd:c3:14:d0:fc:6b:7f:f4:be:c6:ac:b1:9c: 55:22:c0:53:2b:b0:7d:91:9c:25:b8:eb:56:2d:3d:75: 6c:91:68:81:6d:34:5f:ab:22:90:a9:61:e5:bf:c6:a3: 80:67:dd:24:2e:05:b4:c4:65:e7:40:ce:aa:73:82:5a: 48:e5:f9:8e:22:fa:5f:84:d0:23:7c:44:2e:03:86:41: dd:73:14:f3:54:b5:01:51:fa:af:36:52:70:8c:26:7b: 26:ce:1f:b3:68:64:f3:69:25:c2:2e:84:31:d2:dc:99: 07:c5:4c:ff:c4:56:72:9e:f6:f4:24:d6:5f:ec:2b:18: ab:c1:b4:8e:8c:b5:fc:d2:32:68:2d:93:2c:04:37:77: 50:90:35:8a:95:96:a3:a3:ed:01:02:72:e6:e1:5c:b8: 6e:dc:8e:f8:46:91:0c:2d:db:f3:bd:3b:33:57:80:6c: 27:9d:83:d4:44:f5:9a:e4:64:67:1c:09:eb:dc:ea:3c: 65:d0:62:63:14:7d:fb:41:b8:81:fa:b9:ec:c5:b8:07: 60:5f:56:d2:b4:da:00:cb:75:e5:b3:14:f7:0b:11:56: ad:4d:73:00:bc:82:2e:36:0d:ca:52:5f:36:0a:53:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:cf:bf:a1:1a:4f:16:90:e5:87:e3:91:c0:28:c5:b0: 14:14:d7:f1:03:17:41:75:46:6d:4a:3d:12:50:8a:e7: a2:c2:a1:bb:18:b6:76:06:62:e0:06:18:44:ff:64:14: 4d:49:19:77:8a:bb:7a:46:b3:08:1a:e4:47:65:2a:5b: ed:5b:ce:6f:36:94:31:11:22:5e:bb:9f:d7:2e:ce:28: 07:28:9f:82:ee:be:b7:db:c6:ee:c6:e5:3f:ec:3c:91: b5:da:2e:3d:93:26:de:41:53:97:0a:29:ff:60:30:fc: 42:20:e7:30:08:09:2b:f5:bf:5e:12:11:92:1f:e7:87: 72:c5:ee:f0:f0:bc:81:d1:5e:30:d4:2b:6d:64:5e:98: 40:20:83:7e:bc:68:a6:36:72:d0:27:f1:be:85:02:48: 3c:17:8d:19:c5:f8:04:f8:61:8f:f1:d1:3f:11:3d:38: 9d:37:80:49:b6:c8:c5:e1:8a:81:be:0b:3d:46:02:c5: 16:7a:91:81:c9:78:c8:4c:be:9e:d2:51:05:a1:47:77: f7:6e:86:43:04:fa:81:fd:c3:29:9c:35:33:e1:35:cd: 96:7e:54:fe:6c:fb:2f:76:8d:b2:30:d2:e6:79:43:df: da:36:8d:d9:48:19:df:87:96:c8:77:47:17:13:e0:35 Fingerprint (SHA-256): D0:27:06:61:70:7B:7E:CF:94:85:D9:A2:D3:03:3B:5E:D7:4D:9F:00:B3:F0:FE:9C:A1:05:49:02:8F:DE:70:EA Fingerprint (SHA1): E3:7D:56:E1:65:B0:3A:4E:FE:80:8E:6A:12:3C:67:CC:19:3A:97:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1212: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1213: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141604 (0x3caf9ba4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:29 2023 Not After : Wed Oct 18 14:16:29 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:de:bd:24:7b:7b:ce:55:8a:02:11:b6:8f:31:52:c6: 77:5b:39:43:88:c0:1e:6d:47:67:28:3e:5e:db:e9:4c: 8d:8c:9d:77:dd:68:54:f6:5c:30:d6:1e:dc:01:94:59: 91:01:ee:65:7a:a2:d3:24:65:b8:42:17:37:b8:86:dc: 58:0e:8e:0a:78:5a:45:c2:eb:cb:4d:15:e4:65:88:e6: b5:5f:96:e0:43:aa:2a:aa:ba:e0:9b:29:d3:75:7e:6f: 1d:4c:1e:e1:43:20:45:bd:29:da:95:6a:c9:bd:17:18: 50:10:e5:85:c4:9b:35:61:52:df:9d:e9:ea:8d:fa:3f: e0:41:b0:52:44:89:38:b1:f8:80:3a:bb:c9:44:75:79: d1:68:2c:ee:5f:8f:c8:bd:78:f2:48:49:a9:e4:e9:2a: 31:41:96:c4:47:97:eb:87:bf:1c:c2:1c:3e:92:e5:86: 3f:25:1f:c8:89:92:54:23:c7:f2:71:3a:da:24:ef:c3: 16:8d:b6:8e:7e:71:6a:cb:3e:d1:5b:b7:71:3f:7d:8a: b9:e5:6b:e9:51:5a:b2:95:31:62:86:c5:98:f4:77:f7: 61:9a:8f:ca:ce:47:33:1f:a4:a6:18:7e:e1:54:89:92: 7b:0c:64:e5:c9:10:1d:66:8e:0f:38:d4:92:27:04:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:fd:85:99:f0:24:ec:41:21:60:f8:fe:4b:90:df:06: d6:42:9f:dc:6c:f1:7d:69:38:6f:95:3f:25:f2:cc:0e: 6d:a8:fc:ba:96:67:33:ce:4a:0e:fc:8b:b6:53:98:15: 0a:56:e9:74:31:89:f3:d8:33:77:1b:7e:9d:f1:77:69: e7:1d:b6:d6:56:f7:ad:d4:1c:0d:00:9e:1e:9f:66:21: 70:1d:1c:ec:85:a5:0b:c1:6a:f2:29:62:66:88:6c:5b: d7:31:8e:f6:8d:1e:d6:01:78:5d:31:89:58:bd:34:03: 7f:7f:21:13:f9:b3:b4:bc:bf:eb:f3:a9:f9:64:1f:46: 52:56:30:0c:19:94:1b:39:e7:2f:dd:e7:b4:ce:57:6f: ec:67:b2:6b:4e:dd:4d:66:bf:48:98:7d:92:49:2b:e8: d9:78:bb:ce:61:1c:09:17:c8:06:c2:e6:f7:e0:38:24: 51:92:d6:09:30:4e:9d:d5:6e:9d:9f:2c:a0:ba:d1:3d: c7:91:2d:ae:31:07:d9:19:c6:a3:29:50:56:7c:80:a3: 41:57:50:9f:25:0a:7a:ed:16:9f:79:9b:ae:57:d4:0f: bc:d8:47:57:88:94:39:9f:f1:64:8e:e0:a5:81:51:e7: 23:a1:b7:46:8a:a3:9d:9d:3f:cc:2d:0a:ce:36:94:70 Fingerprint (SHA-256): 9C:AE:FF:D5:78:AA:EF:1D:CF:C1:31:E7:1E:6C:C3:BC:F1:A2:C2:D0:69:4F:6F:C7:19:D2:ED:EF:F8:1D:75:3E Fingerprint (SHA1): 51:72:E5:5F:48:7E:D8:AD:41:A4:3A:CA:CE:B1:06:6B:C9:4E:5B:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1214: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1215: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141605 (0x3caf9ba5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:16:29 2023 Not After : Wed Oct 18 14:16:29 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:01:d8:f4:d1:c0:5a:36:2a:4e:4b:4a:b0:c2:56:72: f7:0c:80:f6:39:0d:39:52:59:c3:3d:56:aa:bc:cc:4c: f3:36:72:85:e5:c7:16:f3:e1:a2:5d:8b:5a:00:91:e9: fa:2b:ea:0c:e6:00:65:7c:29:ec:41:51:19:28:f4:42: 27:ea:e9:df:c4:e2:ab:00:05:bf:ea:f5:51:2b:55:99: 60:c2:95:80:dd:da:17:8e:92:7c:b4:de:a0:47:ee:9c: 5e:31:ed:b7:e6:7a:93:39:aa:4c:0c:d2:02:52:ad:9a: 26:c3:b7:f1:a6:d8:88:b4:4d:73:94:46:52:37:22:f3: c1:b0:6d:43:55:6c:8f:bf:35:e3:c2:7e:e3:d7:31:ba: 42:ce:ba:f6:60:51:25:2b:a6:be:68:5a:6c:2b:f5:21: 06:8f:5b:3b:aa:f0:22:29:13:59:3c:8a:97:ae:88:9f: 86:e4:8d:6a:a5:a3:98:b2:98:f0:2a:38:1a:cf:15:3b: 99:90:58:d1:54:b5:5b:35:69:a8:69:6a:8c:e7:39:de: 9e:8b:fd:20:2f:ea:27:bb:26:42:ec:a5:ed:c0:33:06: 91:fb:3f:c0:21:cb:9c:6d:07:80:8b:30:67:b5:96:ae: ec:ec:43:a4:70:40:82:e6:55:67:97:bb:fa:cb:ba:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:f3:3b:bd:e1:8a:03:21:d3:bd:91:a1:54:92:93:99: d4:f0:0c:97:ff:3a:35:58:a3:50:0b:d1:dc:07:f1:aa: 49:08:24:25:c4:fa:80:8c:2b:2b:2f:b2:7e:23:f6:3b: 5b:64:11:d6:7e:fd:4b:50:38:95:fa:9a:a5:df:ba:59: 88:0f:1b:1e:5c:18:0b:b7:77:16:f3:f0:fd:0f:e2:82: 57:b1:0e:4c:7f:5f:4b:60:dd:b6:98:6c:9a:a7:11:9c: e3:18:7c:5a:3e:e2:56:8e:b9:3c:4d:e5:d2:56:ea:1e: f3:09:83:51:f4:d2:1c:e2:a5:62:f7:95:df:1c:51:56: 0d:ae:82:25:69:bd:66:ec:9f:11:ed:41:0e:76:be:71: 03:e9:78:cb:67:c9:97:63:3f:d8:94:1f:c8:53:02:c5: 05:41:1d:a0:b2:3d:6b:79:5a:f1:c0:36:a4:92:7f:e1: d6:6c:8b:01:51:2e:90:11:ec:31:df:e1:68:37:ad:fb: 83:c9:13:e3:38:30:56:f7:bf:d0:bf:18:e5:98:7d:aa: 46:33:55:75:ae:09:47:43:36:14:ca:2e:6b:f2:2d:63: 68:94:71:09:3c:73:dc:f4:27:f1:fe:8d:bd:10:f1:22: 96:98:84:a8:f9:f9:f7:ec:92:a4:a6:be:5c:e7:31:4b Fingerprint (SHA-256): 45:8F:29:E4:1A:0F:1B:A4:35:9D:16:01:EC:BD:D7:08:2B:13:77:1F:2A:47:0E:5D:8F:4F:72:D2:66:12:42:FB Fingerprint (SHA1): 6B:8F:62:1B:3E:DD:FA:DA:76:2B:83:CA:D3:2B:11:5A:A8:9B:C4:94 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1216: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1217: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141603 (0x3caf9ba3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:28 2023 Not After : Wed Oct 18 14:16:28 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:b9:12:f2:b2:a5:1a:db:d2:9d:35:35:40:c4:1d:62: 8a:a4:2a:fd:c3:14:d0:fc:6b:7f:f4:be:c6:ac:b1:9c: 55:22:c0:53:2b:b0:7d:91:9c:25:b8:eb:56:2d:3d:75: 6c:91:68:81:6d:34:5f:ab:22:90:a9:61:e5:bf:c6:a3: 80:67:dd:24:2e:05:b4:c4:65:e7:40:ce:aa:73:82:5a: 48:e5:f9:8e:22:fa:5f:84:d0:23:7c:44:2e:03:86:41: dd:73:14:f3:54:b5:01:51:fa:af:36:52:70:8c:26:7b: 26:ce:1f:b3:68:64:f3:69:25:c2:2e:84:31:d2:dc:99: 07:c5:4c:ff:c4:56:72:9e:f6:f4:24:d6:5f:ec:2b:18: ab:c1:b4:8e:8c:b5:fc:d2:32:68:2d:93:2c:04:37:77: 50:90:35:8a:95:96:a3:a3:ed:01:02:72:e6:e1:5c:b8: 6e:dc:8e:f8:46:91:0c:2d:db:f3:bd:3b:33:57:80:6c: 27:9d:83:d4:44:f5:9a:e4:64:67:1c:09:eb:dc:ea:3c: 65:d0:62:63:14:7d:fb:41:b8:81:fa:b9:ec:c5:b8:07: 60:5f:56:d2:b4:da:00:cb:75:e5:b3:14:f7:0b:11:56: ad:4d:73:00:bc:82:2e:36:0d:ca:52:5f:36:0a:53:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:cf:bf:a1:1a:4f:16:90:e5:87:e3:91:c0:28:c5:b0: 14:14:d7:f1:03:17:41:75:46:6d:4a:3d:12:50:8a:e7: a2:c2:a1:bb:18:b6:76:06:62:e0:06:18:44:ff:64:14: 4d:49:19:77:8a:bb:7a:46:b3:08:1a:e4:47:65:2a:5b: ed:5b:ce:6f:36:94:31:11:22:5e:bb:9f:d7:2e:ce:28: 07:28:9f:82:ee:be:b7:db:c6:ee:c6:e5:3f:ec:3c:91: b5:da:2e:3d:93:26:de:41:53:97:0a:29:ff:60:30:fc: 42:20:e7:30:08:09:2b:f5:bf:5e:12:11:92:1f:e7:87: 72:c5:ee:f0:f0:bc:81:d1:5e:30:d4:2b:6d:64:5e:98: 40:20:83:7e:bc:68:a6:36:72:d0:27:f1:be:85:02:48: 3c:17:8d:19:c5:f8:04:f8:61:8f:f1:d1:3f:11:3d:38: 9d:37:80:49:b6:c8:c5:e1:8a:81:be:0b:3d:46:02:c5: 16:7a:91:81:c9:78:c8:4c:be:9e:d2:51:05:a1:47:77: f7:6e:86:43:04:fa:81:fd:c3:29:9c:35:33:e1:35:cd: 96:7e:54:fe:6c:fb:2f:76:8d:b2:30:d2:e6:79:43:df: da:36:8d:d9:48:19:df:87:96:c8:77:47:17:13:e0:35 Fingerprint (SHA-256): D0:27:06:61:70:7B:7E:CF:94:85:D9:A2:D3:03:3B:5E:D7:4D:9F:00:B3:F0:FE:9C:A1:05:49:02:8F:DE:70:EA Fingerprint (SHA1): E3:7D:56:E1:65:B0:3A:4E:FE:80:8E:6A:12:3C:67:CC:19:3A:97:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1218: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141603 (0x3caf9ba3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:28 2023 Not After : Wed Oct 18 14:16:28 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:b9:12:f2:b2:a5:1a:db:d2:9d:35:35:40:c4:1d:62: 8a:a4:2a:fd:c3:14:d0:fc:6b:7f:f4:be:c6:ac:b1:9c: 55:22:c0:53:2b:b0:7d:91:9c:25:b8:eb:56:2d:3d:75: 6c:91:68:81:6d:34:5f:ab:22:90:a9:61:e5:bf:c6:a3: 80:67:dd:24:2e:05:b4:c4:65:e7:40:ce:aa:73:82:5a: 48:e5:f9:8e:22:fa:5f:84:d0:23:7c:44:2e:03:86:41: dd:73:14:f3:54:b5:01:51:fa:af:36:52:70:8c:26:7b: 26:ce:1f:b3:68:64:f3:69:25:c2:2e:84:31:d2:dc:99: 07:c5:4c:ff:c4:56:72:9e:f6:f4:24:d6:5f:ec:2b:18: ab:c1:b4:8e:8c:b5:fc:d2:32:68:2d:93:2c:04:37:77: 50:90:35:8a:95:96:a3:a3:ed:01:02:72:e6:e1:5c:b8: 6e:dc:8e:f8:46:91:0c:2d:db:f3:bd:3b:33:57:80:6c: 27:9d:83:d4:44:f5:9a:e4:64:67:1c:09:eb:dc:ea:3c: 65:d0:62:63:14:7d:fb:41:b8:81:fa:b9:ec:c5:b8:07: 60:5f:56:d2:b4:da:00:cb:75:e5:b3:14:f7:0b:11:56: ad:4d:73:00:bc:82:2e:36:0d:ca:52:5f:36:0a:53:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:cf:bf:a1:1a:4f:16:90:e5:87:e3:91:c0:28:c5:b0: 14:14:d7:f1:03:17:41:75:46:6d:4a:3d:12:50:8a:e7: a2:c2:a1:bb:18:b6:76:06:62:e0:06:18:44:ff:64:14: 4d:49:19:77:8a:bb:7a:46:b3:08:1a:e4:47:65:2a:5b: ed:5b:ce:6f:36:94:31:11:22:5e:bb:9f:d7:2e:ce:28: 07:28:9f:82:ee:be:b7:db:c6:ee:c6:e5:3f:ec:3c:91: b5:da:2e:3d:93:26:de:41:53:97:0a:29:ff:60:30:fc: 42:20:e7:30:08:09:2b:f5:bf:5e:12:11:92:1f:e7:87: 72:c5:ee:f0:f0:bc:81:d1:5e:30:d4:2b:6d:64:5e:98: 40:20:83:7e:bc:68:a6:36:72:d0:27:f1:be:85:02:48: 3c:17:8d:19:c5:f8:04:f8:61:8f:f1:d1:3f:11:3d:38: 9d:37:80:49:b6:c8:c5:e1:8a:81:be:0b:3d:46:02:c5: 16:7a:91:81:c9:78:c8:4c:be:9e:d2:51:05:a1:47:77: f7:6e:86:43:04:fa:81:fd:c3:29:9c:35:33:e1:35:cd: 96:7e:54:fe:6c:fb:2f:76:8d:b2:30:d2:e6:79:43:df: da:36:8d:d9:48:19:df:87:96:c8:77:47:17:13:e0:35 Fingerprint (SHA-256): D0:27:06:61:70:7B:7E:CF:94:85:D9:A2:D3:03:3B:5E:D7:4D:9F:00:B3:F0:FE:9C:A1:05:49:02:8F:DE:70:EA Fingerprint (SHA1): E3:7D:56:E1:65:B0:3A:4E:FE:80:8E:6A:12:3C:67:CC:19:3A:97:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1219: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141604 (0x3caf9ba4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:29 2023 Not After : Wed Oct 18 14:16:29 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:de:bd:24:7b:7b:ce:55:8a:02:11:b6:8f:31:52:c6: 77:5b:39:43:88:c0:1e:6d:47:67:28:3e:5e:db:e9:4c: 8d:8c:9d:77:dd:68:54:f6:5c:30:d6:1e:dc:01:94:59: 91:01:ee:65:7a:a2:d3:24:65:b8:42:17:37:b8:86:dc: 58:0e:8e:0a:78:5a:45:c2:eb:cb:4d:15:e4:65:88:e6: b5:5f:96:e0:43:aa:2a:aa:ba:e0:9b:29:d3:75:7e:6f: 1d:4c:1e:e1:43:20:45:bd:29:da:95:6a:c9:bd:17:18: 50:10:e5:85:c4:9b:35:61:52:df:9d:e9:ea:8d:fa:3f: e0:41:b0:52:44:89:38:b1:f8:80:3a:bb:c9:44:75:79: d1:68:2c:ee:5f:8f:c8:bd:78:f2:48:49:a9:e4:e9:2a: 31:41:96:c4:47:97:eb:87:bf:1c:c2:1c:3e:92:e5:86: 3f:25:1f:c8:89:92:54:23:c7:f2:71:3a:da:24:ef:c3: 16:8d:b6:8e:7e:71:6a:cb:3e:d1:5b:b7:71:3f:7d:8a: b9:e5:6b:e9:51:5a:b2:95:31:62:86:c5:98:f4:77:f7: 61:9a:8f:ca:ce:47:33:1f:a4:a6:18:7e:e1:54:89:92: 7b:0c:64:e5:c9:10:1d:66:8e:0f:38:d4:92:27:04:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:fd:85:99:f0:24:ec:41:21:60:f8:fe:4b:90:df:06: d6:42:9f:dc:6c:f1:7d:69:38:6f:95:3f:25:f2:cc:0e: 6d:a8:fc:ba:96:67:33:ce:4a:0e:fc:8b:b6:53:98:15: 0a:56:e9:74:31:89:f3:d8:33:77:1b:7e:9d:f1:77:69: e7:1d:b6:d6:56:f7:ad:d4:1c:0d:00:9e:1e:9f:66:21: 70:1d:1c:ec:85:a5:0b:c1:6a:f2:29:62:66:88:6c:5b: d7:31:8e:f6:8d:1e:d6:01:78:5d:31:89:58:bd:34:03: 7f:7f:21:13:f9:b3:b4:bc:bf:eb:f3:a9:f9:64:1f:46: 52:56:30:0c:19:94:1b:39:e7:2f:dd:e7:b4:ce:57:6f: ec:67:b2:6b:4e:dd:4d:66:bf:48:98:7d:92:49:2b:e8: d9:78:bb:ce:61:1c:09:17:c8:06:c2:e6:f7:e0:38:24: 51:92:d6:09:30:4e:9d:d5:6e:9d:9f:2c:a0:ba:d1:3d: c7:91:2d:ae:31:07:d9:19:c6:a3:29:50:56:7c:80:a3: 41:57:50:9f:25:0a:7a:ed:16:9f:79:9b:ae:57:d4:0f: bc:d8:47:57:88:94:39:9f:f1:64:8e:e0:a5:81:51:e7: 23:a1:b7:46:8a:a3:9d:9d:3f:cc:2d:0a:ce:36:94:70 Fingerprint (SHA-256): 9C:AE:FF:D5:78:AA:EF:1D:CF:C1:31:E7:1E:6C:C3:BC:F1:A2:C2:D0:69:4F:6F:C7:19:D2:ED:EF:F8:1D:75:3E Fingerprint (SHA1): 51:72:E5:5F:48:7E:D8:AD:41:A4:3A:CA:CE:B1:06:6B:C9:4E:5B:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1220: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141604 (0x3caf9ba4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:29 2023 Not After : Wed Oct 18 14:16:29 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:de:bd:24:7b:7b:ce:55:8a:02:11:b6:8f:31:52:c6: 77:5b:39:43:88:c0:1e:6d:47:67:28:3e:5e:db:e9:4c: 8d:8c:9d:77:dd:68:54:f6:5c:30:d6:1e:dc:01:94:59: 91:01:ee:65:7a:a2:d3:24:65:b8:42:17:37:b8:86:dc: 58:0e:8e:0a:78:5a:45:c2:eb:cb:4d:15:e4:65:88:e6: b5:5f:96:e0:43:aa:2a:aa:ba:e0:9b:29:d3:75:7e:6f: 1d:4c:1e:e1:43:20:45:bd:29:da:95:6a:c9:bd:17:18: 50:10:e5:85:c4:9b:35:61:52:df:9d:e9:ea:8d:fa:3f: e0:41:b0:52:44:89:38:b1:f8:80:3a:bb:c9:44:75:79: d1:68:2c:ee:5f:8f:c8:bd:78:f2:48:49:a9:e4:e9:2a: 31:41:96:c4:47:97:eb:87:bf:1c:c2:1c:3e:92:e5:86: 3f:25:1f:c8:89:92:54:23:c7:f2:71:3a:da:24:ef:c3: 16:8d:b6:8e:7e:71:6a:cb:3e:d1:5b:b7:71:3f:7d:8a: b9:e5:6b:e9:51:5a:b2:95:31:62:86:c5:98:f4:77:f7: 61:9a:8f:ca:ce:47:33:1f:a4:a6:18:7e:e1:54:89:92: 7b:0c:64:e5:c9:10:1d:66:8e:0f:38:d4:92:27:04:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:fd:85:99:f0:24:ec:41:21:60:f8:fe:4b:90:df:06: d6:42:9f:dc:6c:f1:7d:69:38:6f:95:3f:25:f2:cc:0e: 6d:a8:fc:ba:96:67:33:ce:4a:0e:fc:8b:b6:53:98:15: 0a:56:e9:74:31:89:f3:d8:33:77:1b:7e:9d:f1:77:69: e7:1d:b6:d6:56:f7:ad:d4:1c:0d:00:9e:1e:9f:66:21: 70:1d:1c:ec:85:a5:0b:c1:6a:f2:29:62:66:88:6c:5b: d7:31:8e:f6:8d:1e:d6:01:78:5d:31:89:58:bd:34:03: 7f:7f:21:13:f9:b3:b4:bc:bf:eb:f3:a9:f9:64:1f:46: 52:56:30:0c:19:94:1b:39:e7:2f:dd:e7:b4:ce:57:6f: ec:67:b2:6b:4e:dd:4d:66:bf:48:98:7d:92:49:2b:e8: d9:78:bb:ce:61:1c:09:17:c8:06:c2:e6:f7:e0:38:24: 51:92:d6:09:30:4e:9d:d5:6e:9d:9f:2c:a0:ba:d1:3d: c7:91:2d:ae:31:07:d9:19:c6:a3:29:50:56:7c:80:a3: 41:57:50:9f:25:0a:7a:ed:16:9f:79:9b:ae:57:d4:0f: bc:d8:47:57:88:94:39:9f:f1:64:8e:e0:a5:81:51:e7: 23:a1:b7:46:8a:a3:9d:9d:3f:cc:2d:0a:ce:36:94:70 Fingerprint (SHA-256): 9C:AE:FF:D5:78:AA:EF:1D:CF:C1:31:E7:1E:6C:C3:BC:F1:A2:C2:D0:69:4F:6F:C7:19:D2:ED:EF:F8:1D:75:3E Fingerprint (SHA1): 51:72:E5:5F:48:7E:D8:AD:41:A4:3A:CA:CE:B1:06:6B:C9:4E:5B:1E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1221: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141605 (0x3caf9ba5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:16:29 2023 Not After : Wed Oct 18 14:16:29 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:01:d8:f4:d1:c0:5a:36:2a:4e:4b:4a:b0:c2:56:72: f7:0c:80:f6:39:0d:39:52:59:c3:3d:56:aa:bc:cc:4c: f3:36:72:85:e5:c7:16:f3:e1:a2:5d:8b:5a:00:91:e9: fa:2b:ea:0c:e6:00:65:7c:29:ec:41:51:19:28:f4:42: 27:ea:e9:df:c4:e2:ab:00:05:bf:ea:f5:51:2b:55:99: 60:c2:95:80:dd:da:17:8e:92:7c:b4:de:a0:47:ee:9c: 5e:31:ed:b7:e6:7a:93:39:aa:4c:0c:d2:02:52:ad:9a: 26:c3:b7:f1:a6:d8:88:b4:4d:73:94:46:52:37:22:f3: c1:b0:6d:43:55:6c:8f:bf:35:e3:c2:7e:e3:d7:31:ba: 42:ce:ba:f6:60:51:25:2b:a6:be:68:5a:6c:2b:f5:21: 06:8f:5b:3b:aa:f0:22:29:13:59:3c:8a:97:ae:88:9f: 86:e4:8d:6a:a5:a3:98:b2:98:f0:2a:38:1a:cf:15:3b: 99:90:58:d1:54:b5:5b:35:69:a8:69:6a:8c:e7:39:de: 9e:8b:fd:20:2f:ea:27:bb:26:42:ec:a5:ed:c0:33:06: 91:fb:3f:c0:21:cb:9c:6d:07:80:8b:30:67:b5:96:ae: ec:ec:43:a4:70:40:82:e6:55:67:97:bb:fa:cb:ba:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:f3:3b:bd:e1:8a:03:21:d3:bd:91:a1:54:92:93:99: d4:f0:0c:97:ff:3a:35:58:a3:50:0b:d1:dc:07:f1:aa: 49:08:24:25:c4:fa:80:8c:2b:2b:2f:b2:7e:23:f6:3b: 5b:64:11:d6:7e:fd:4b:50:38:95:fa:9a:a5:df:ba:59: 88:0f:1b:1e:5c:18:0b:b7:77:16:f3:f0:fd:0f:e2:82: 57:b1:0e:4c:7f:5f:4b:60:dd:b6:98:6c:9a:a7:11:9c: e3:18:7c:5a:3e:e2:56:8e:b9:3c:4d:e5:d2:56:ea:1e: f3:09:83:51:f4:d2:1c:e2:a5:62:f7:95:df:1c:51:56: 0d:ae:82:25:69:bd:66:ec:9f:11:ed:41:0e:76:be:71: 03:e9:78:cb:67:c9:97:63:3f:d8:94:1f:c8:53:02:c5: 05:41:1d:a0:b2:3d:6b:79:5a:f1:c0:36:a4:92:7f:e1: d6:6c:8b:01:51:2e:90:11:ec:31:df:e1:68:37:ad:fb: 83:c9:13:e3:38:30:56:f7:bf:d0:bf:18:e5:98:7d:aa: 46:33:55:75:ae:09:47:43:36:14:ca:2e:6b:f2:2d:63: 68:94:71:09:3c:73:dc:f4:27:f1:fe:8d:bd:10:f1:22: 96:98:84:a8:f9:f9:f7:ec:92:a4:a6:be:5c:e7:31:4b Fingerprint (SHA-256): 45:8F:29:E4:1A:0F:1B:A4:35:9D:16:01:EC:BD:D7:08:2B:13:77:1F:2A:47:0E:5D:8F:4F:72:D2:66:12:42:FB Fingerprint (SHA1): 6B:8F:62:1B:3E:DD:FA:DA:76:2B:83:CA:D3:2B:11:5A:A8:9B:C4:94 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1222: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141605 (0x3caf9ba5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:16:29 2023 Not After : Wed Oct 18 14:16:29 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:01:d8:f4:d1:c0:5a:36:2a:4e:4b:4a:b0:c2:56:72: f7:0c:80:f6:39:0d:39:52:59:c3:3d:56:aa:bc:cc:4c: f3:36:72:85:e5:c7:16:f3:e1:a2:5d:8b:5a:00:91:e9: fa:2b:ea:0c:e6:00:65:7c:29:ec:41:51:19:28:f4:42: 27:ea:e9:df:c4:e2:ab:00:05:bf:ea:f5:51:2b:55:99: 60:c2:95:80:dd:da:17:8e:92:7c:b4:de:a0:47:ee:9c: 5e:31:ed:b7:e6:7a:93:39:aa:4c:0c:d2:02:52:ad:9a: 26:c3:b7:f1:a6:d8:88:b4:4d:73:94:46:52:37:22:f3: c1:b0:6d:43:55:6c:8f:bf:35:e3:c2:7e:e3:d7:31:ba: 42:ce:ba:f6:60:51:25:2b:a6:be:68:5a:6c:2b:f5:21: 06:8f:5b:3b:aa:f0:22:29:13:59:3c:8a:97:ae:88:9f: 86:e4:8d:6a:a5:a3:98:b2:98:f0:2a:38:1a:cf:15:3b: 99:90:58:d1:54:b5:5b:35:69:a8:69:6a:8c:e7:39:de: 9e:8b:fd:20:2f:ea:27:bb:26:42:ec:a5:ed:c0:33:06: 91:fb:3f:c0:21:cb:9c:6d:07:80:8b:30:67:b5:96:ae: ec:ec:43:a4:70:40:82:e6:55:67:97:bb:fa:cb:ba:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 34:f3:3b:bd:e1:8a:03:21:d3:bd:91:a1:54:92:93:99: d4:f0:0c:97:ff:3a:35:58:a3:50:0b:d1:dc:07:f1:aa: 49:08:24:25:c4:fa:80:8c:2b:2b:2f:b2:7e:23:f6:3b: 5b:64:11:d6:7e:fd:4b:50:38:95:fa:9a:a5:df:ba:59: 88:0f:1b:1e:5c:18:0b:b7:77:16:f3:f0:fd:0f:e2:82: 57:b1:0e:4c:7f:5f:4b:60:dd:b6:98:6c:9a:a7:11:9c: e3:18:7c:5a:3e:e2:56:8e:b9:3c:4d:e5:d2:56:ea:1e: f3:09:83:51:f4:d2:1c:e2:a5:62:f7:95:df:1c:51:56: 0d:ae:82:25:69:bd:66:ec:9f:11:ed:41:0e:76:be:71: 03:e9:78:cb:67:c9:97:63:3f:d8:94:1f:c8:53:02:c5: 05:41:1d:a0:b2:3d:6b:79:5a:f1:c0:36:a4:92:7f:e1: d6:6c:8b:01:51:2e:90:11:ec:31:df:e1:68:37:ad:fb: 83:c9:13:e3:38:30:56:f7:bf:d0:bf:18:e5:98:7d:aa: 46:33:55:75:ae:09:47:43:36:14:ca:2e:6b:f2:2d:63: 68:94:71:09:3c:73:dc:f4:27:f1:fe:8d:bd:10:f1:22: 96:98:84:a8:f9:f9:f7:ec:92:a4:a6:be:5c:e7:31:4b Fingerprint (SHA-256): 45:8F:29:E4:1A:0F:1B:A4:35:9D:16:01:EC:BD:D7:08:2B:13:77:1F:2A:47:0E:5D:8F:4F:72:D2:66:12:42:FB Fingerprint (SHA1): 6B:8F:62:1B:3E:DD:FA:DA:76:2B:83:CA:D3:2B:11:5A:A8:9B:C4:94 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1223: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1224: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141608 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1225: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1226: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1227: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1228: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018141609 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1229: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1230: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1231: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1232: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018141610 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1233: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1234: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1235: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1236: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1018141611 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1237: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1238: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1239: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1240: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018141612 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1241: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1242: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1243: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1244: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018141613 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1245: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1246: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #1247: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1248: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1018141614 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1249: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1250: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1251: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #1252: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #1253: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1254: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #1255: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141608 (0x3caf9ba8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:16:32 2023 Not After : Wed Oct 18 14:16:32 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:ae:ed:65:7d:4e:21:a6:a5:f5:e9:d7:4c:f9:80:f4: 9f:be:d3:b5:a8:e2:f8:2b:98:39:eb:d1:b0:5a:21:e1: 7f:9a:de:4c:f0:a0:95:7f:f9:9b:1b:09:5f:91:e8:4a: f0:8a:4c:46:a9:fb:ef:4f:da:89:94:cf:11:82:da:4d: 4b:5a:25:14:1a:4e:78:6d:b0:54:c1:7e:8b:47:11:46: 8e:57:23:4c:94:1b:ae:dd:89:5d:d4:57:aa:7f:9f:7c: 0b:73:34:d5:7a:d3:84:e6:0d:a3:87:2d:43:39:ab:fa: 03:61:6d:e9:57:e5:3c:71:5a:0c:e4:f4:c9:65:bd:e0: 1d:6d:03:a4:48:f0:a1:3d:58:7b:38:70:97:57:c7:11: 80:50:cb:64:4d:aa:1f:4c:9b:82:79:32:47:97:5e:50: 33:7b:c0:df:99:1d:3a:db:4f:8d:c8:b8:9d:52:60:36: af:32:32:ed:20:10:fd:5d:6d:a7:12:86:c7:8e:92:30: f4:63:0a:7c:0f:2e:2e:11:3d:70:5c:db:38:d9:cb:94: 66:6a:cf:35:27:74:f2:f3:da:30:e0:91:03:b4:89:81: bc:10:59:79:2d:d1:80:15:a1:f5:91:ea:b5:4a:53:c9: d5:ea:2d:1c:40:95:35:42:e0:e4:32:67:c0:c5:80:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:41:fb:9e:42:86:97:4a:05:bb:0e:e2:2b:81:70:53: 2d:44:6c:fc:b6:3c:24:ea:fd:61:11:2c:1b:c5:6b:bf: a0:d8:0a:18:7a:bd:8b:c1:75:e7:af:e2:91:10:a3:29: 5a:ed:f0:13:95:03:a9:e2:aa:2b:02:b7:b9:47:13:2a: 3c:a1:8e:25:ac:5f:e5:fe:62:de:dc:42:c5:a4:b4:ec: 6f:c2:7e:28:19:d8:74:c2:f6:42:2e:cc:f2:4f:45:41: ca:63:bf:52:b9:83:e2:f5:d5:f4:bd:51:b1:bd:bc:fa: 72:19:25:52:0d:fc:91:73:93:18:a7:51:fc:1f:8f:08: 22:cb:46:87:55:6a:1a:b7:fc:c2:a8:dd:49:fd:af:64: 65:d1:9c:2b:0f:bf:64:e5:55:66:6e:18:bd:90:4e:a9: 9e:77:66:8e:b9:fe:16:91:16:14:93:23:bd:15:1d:43: 21:71:0b:53:dd:44:db:0c:33:31:c8:f4:78:1b:d9:4a: b0:49:27:17:bf:4a:89:c5:d7:f0:e0:7b:87:aa:e5:18: ab:52:11:0f:24:89:8a:a9:4d:d6:6c:82:4a:74:2a:4c: d4:2c:bd:94:9d:f9:67:c0:45:0e:e4:5f:67:cb:66:34: e4:25:6f:a4:eb:b4:a7:a1:3b:85:53:c2:c6:0a:8c:0c Fingerprint (SHA-256): 46:32:DB:2B:5C:6B:01:B7:56:22:20:25:1E:F9:7E:DB:EA:B5:7E:F1:66:0C:83:4C:35:A0:CE:31:1F:44:76:B8 Fingerprint (SHA1): 14:28:6C:85:B3:20:77:C0:E3:0C:9E:42:51:CB:31:9C:D7:93:56:21 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1256: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1257: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1258: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1259: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141608 (0x3caf9ba8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:16:32 2023 Not After : Wed Oct 18 14:16:32 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:ae:ed:65:7d:4e:21:a6:a5:f5:e9:d7:4c:f9:80:f4: 9f:be:d3:b5:a8:e2:f8:2b:98:39:eb:d1:b0:5a:21:e1: 7f:9a:de:4c:f0:a0:95:7f:f9:9b:1b:09:5f:91:e8:4a: f0:8a:4c:46:a9:fb:ef:4f:da:89:94:cf:11:82:da:4d: 4b:5a:25:14:1a:4e:78:6d:b0:54:c1:7e:8b:47:11:46: 8e:57:23:4c:94:1b:ae:dd:89:5d:d4:57:aa:7f:9f:7c: 0b:73:34:d5:7a:d3:84:e6:0d:a3:87:2d:43:39:ab:fa: 03:61:6d:e9:57:e5:3c:71:5a:0c:e4:f4:c9:65:bd:e0: 1d:6d:03:a4:48:f0:a1:3d:58:7b:38:70:97:57:c7:11: 80:50:cb:64:4d:aa:1f:4c:9b:82:79:32:47:97:5e:50: 33:7b:c0:df:99:1d:3a:db:4f:8d:c8:b8:9d:52:60:36: af:32:32:ed:20:10:fd:5d:6d:a7:12:86:c7:8e:92:30: f4:63:0a:7c:0f:2e:2e:11:3d:70:5c:db:38:d9:cb:94: 66:6a:cf:35:27:74:f2:f3:da:30:e0:91:03:b4:89:81: bc:10:59:79:2d:d1:80:15:a1:f5:91:ea:b5:4a:53:c9: d5:ea:2d:1c:40:95:35:42:e0:e4:32:67:c0:c5:80:05 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6f:41:fb:9e:42:86:97:4a:05:bb:0e:e2:2b:81:70:53: 2d:44:6c:fc:b6:3c:24:ea:fd:61:11:2c:1b:c5:6b:bf: a0:d8:0a:18:7a:bd:8b:c1:75:e7:af:e2:91:10:a3:29: 5a:ed:f0:13:95:03:a9:e2:aa:2b:02:b7:b9:47:13:2a: 3c:a1:8e:25:ac:5f:e5:fe:62:de:dc:42:c5:a4:b4:ec: 6f:c2:7e:28:19:d8:74:c2:f6:42:2e:cc:f2:4f:45:41: ca:63:bf:52:b9:83:e2:f5:d5:f4:bd:51:b1:bd:bc:fa: 72:19:25:52:0d:fc:91:73:93:18:a7:51:fc:1f:8f:08: 22:cb:46:87:55:6a:1a:b7:fc:c2:a8:dd:49:fd:af:64: 65:d1:9c:2b:0f:bf:64:e5:55:66:6e:18:bd:90:4e:a9: 9e:77:66:8e:b9:fe:16:91:16:14:93:23:bd:15:1d:43: 21:71:0b:53:dd:44:db:0c:33:31:c8:f4:78:1b:d9:4a: b0:49:27:17:bf:4a:89:c5:d7:f0:e0:7b:87:aa:e5:18: ab:52:11:0f:24:89:8a:a9:4d:d6:6c:82:4a:74:2a:4c: d4:2c:bd:94:9d:f9:67:c0:45:0e:e4:5f:67:cb:66:34: e4:25:6f:a4:eb:b4:a7:a1:3b:85:53:c2:c6:0a:8c:0c Fingerprint (SHA-256): 46:32:DB:2B:5C:6B:01:B7:56:22:20:25:1E:F9:7E:DB:EA:B5:7E:F1:66:0C:83:4C:35:A0:CE:31:1F:44:76:B8 Fingerprint (SHA1): 14:28:6C:85:B3:20:77:C0:E3:0C:9E:42:51:CB:31:9C:D7:93:56:21 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1260: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1261: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1262: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141615 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1263: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1264: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1265: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1266: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018141616 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1267: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1268: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #1269: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1270: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1018141617 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1271: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1272: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #1273: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1274: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1018141618 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1275: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1276: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1277: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1278: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1018141619 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1279: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1280: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #1281: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1282: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1018141620 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1283: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1284: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #1285: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1286: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1018141621 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1287: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1288: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1289: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1290: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1018141622 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1291: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1292: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #1293: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1294: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1018141623 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1295: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1296: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #1297: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1298: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1018141624 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1299: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1300: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1301: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1302: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1018141625 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1303: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1304: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #1305: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1306: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1018141626 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1307: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1308: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #1309: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1310: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1018141627 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1311: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1312: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1313: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1314: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1018141628 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1315: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1316: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #1317: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1318: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1018141629 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1319: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1320: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #1321: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1322: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1018141630 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1323: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1324: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #1325: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1326: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1018141631 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1327: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1328: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #1329: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1330: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1018141632 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1331: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1332: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #1333: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1334: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1018141633 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1335: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1336: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #1337: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1338: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1018141634 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1339: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1340: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #1341: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1342: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1018141635 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1343: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1344: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #1345: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1346: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1018141636 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1347: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1348: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #1349: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1350: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1018141637 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1351: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1352: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #1353: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1354: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1018141638 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1355: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1356: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #1357: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1358: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1018141639 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1359: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1360: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #1361: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1362: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1018141640 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1363: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1364: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #1365: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1366: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1018141641 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1367: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1368: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #1369: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1370: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1018141642 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1371: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1372: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #1373: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1374: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1018141643 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1375: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1376: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #1377: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1378: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1018141644 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1379: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1380: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1381: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141615 (0x3caf9baf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:16:35 2023 Not After : Wed Oct 18 14:16:35 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:49:77:03:6b:16:39:ea:6b:8a:5c:57:c5:79:2d:3f: 29:39:48:94:bd:41:24:70:48:e5:d1:c5:97:ca:0b:84: 31:7c:6b:8d:83:5a:09:2a:14:95:08:5d:b2:74:f9:35: 9a:51:b4:ff:06:64:95:46:6b:78:40:a4:e5:2c:0c:a8: ad:34:7a:ea:6d:00:85:4c:2f:31:8a:d4:47:fd:03:e5: 61:4c:ef:82:1d:7f:65:4a:85:cd:a9:5b:c6:ea:c3:57: 6b:b2:cd:a7:fd:28:f0:66:de:33:d3:8c:df:07:1e:05: b3:81:3f:8c:93:5b:63:a1:37:80:38:28:7c:0f:94:52: 4e:af:e2:7f:f5:9b:dd:30:5e:a6:87:3f:24:01:45:4a: 15:c2:8d:97:6b:3b:46:b9:1f:94:f0:e2:4b:ea:9a:c4: e8:1e:d5:cc:08:3d:b1:89:1d:be:eb:03:77:bb:6a:70: 2a:6e:26:92:b5:86:58:ea:86:b8:8e:d8:c2:23:10:23: c5:71:b3:47:1e:61:d4:cc:00:bd:ad:ae:e2:3b:ed:4a: bd:88:c6:e3:1b:47:c5:45:bb:70:2a:2c:e0:e9:8e:46: 2e:77:5e:a2:c6:ce:e0:22:93:65:3b:c6:f9:6e:14:09: 43:70:c1:4f:f0:ac:f8:b0:b3:4c:4f:05:b3:e8:d2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:d0:f6:a9:31:64:1c:95:10:84:a4:88:2b:a1:e5:0d: 9b:b4:c2:49:7a:d5:40:ac:41:7f:f1:20:d1:c6:6e:08: 40:56:0a:ea:c0:7e:12:fe:8d:50:f7:c2:ea:ae:3d:bf: 2d:a8:07:8c:e7:f7:48:89:a0:15:d5:a1:56:3e:ec:f9: 64:f8:59:9a:a2:23:05:98:30:42:04:25:b4:25:de:0a: dd:ed:0a:3f:3f:15:00:8b:c5:67:af:0b:58:b2:a2:85: 74:db:a2:c5:6c:7c:f3:fa:24:78:3b:0d:1a:57:bc:60: ce:04:4a:f0:67:56:7d:6c:59:bd:6d:fd:c3:45:4e:47: 6b:9b:0f:17:68:a1:93:7b:60:ee:62:1f:02:dc:7f:11: 91:73:4b:07:7e:8c:aa:ec:47:71:5d:49:15:15:91:d0: 15:d7:87:67:b3:e6:c4:47:65:d4:6a:91:f9:be:03:e0: b5:d9:99:ee:cb:ba:95:86:9d:7f:31:a7:3e:95:5a:93: 58:09:bb:cb:be:f0:bb:22:12:04:a3:62:93:72:08:b9: 4d:53:a1:23:4e:e0:c4:8a:e6:7e:6a:7c:37:23:2f:39: c0:37:86:02:2c:0c:15:d4:93:90:25:24:36:c3:a8:08: 00:fe:6b:68:59:b7:df:81:49:d7:b4:9f:4c:8a:45:b6 Fingerprint (SHA-256): DE:2B:D4:29:39:11:AB:E9:D3:FF:15:79:05:06:DF:17:94:81:F7:DC:C7:42:08:C5:8B:1D:B4:B9:0C:9F:43:F2 Fingerprint (SHA1): 84:86:15:B5:FD:B9:12:26:B4:01:1E:93:DC:14:97:A0:7A:A3:58:B6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1382: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1383: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141615 (0x3caf9baf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:16:35 2023 Not After : Wed Oct 18 14:16:35 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:49:77:03:6b:16:39:ea:6b:8a:5c:57:c5:79:2d:3f: 29:39:48:94:bd:41:24:70:48:e5:d1:c5:97:ca:0b:84: 31:7c:6b:8d:83:5a:09:2a:14:95:08:5d:b2:74:f9:35: 9a:51:b4:ff:06:64:95:46:6b:78:40:a4:e5:2c:0c:a8: ad:34:7a:ea:6d:00:85:4c:2f:31:8a:d4:47:fd:03:e5: 61:4c:ef:82:1d:7f:65:4a:85:cd:a9:5b:c6:ea:c3:57: 6b:b2:cd:a7:fd:28:f0:66:de:33:d3:8c:df:07:1e:05: b3:81:3f:8c:93:5b:63:a1:37:80:38:28:7c:0f:94:52: 4e:af:e2:7f:f5:9b:dd:30:5e:a6:87:3f:24:01:45:4a: 15:c2:8d:97:6b:3b:46:b9:1f:94:f0:e2:4b:ea:9a:c4: e8:1e:d5:cc:08:3d:b1:89:1d:be:eb:03:77:bb:6a:70: 2a:6e:26:92:b5:86:58:ea:86:b8:8e:d8:c2:23:10:23: c5:71:b3:47:1e:61:d4:cc:00:bd:ad:ae:e2:3b:ed:4a: bd:88:c6:e3:1b:47:c5:45:bb:70:2a:2c:e0:e9:8e:46: 2e:77:5e:a2:c6:ce:e0:22:93:65:3b:c6:f9:6e:14:09: 43:70:c1:4f:f0:ac:f8:b0:b3:4c:4f:05:b3:e8:d2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:d0:f6:a9:31:64:1c:95:10:84:a4:88:2b:a1:e5:0d: 9b:b4:c2:49:7a:d5:40:ac:41:7f:f1:20:d1:c6:6e:08: 40:56:0a:ea:c0:7e:12:fe:8d:50:f7:c2:ea:ae:3d:bf: 2d:a8:07:8c:e7:f7:48:89:a0:15:d5:a1:56:3e:ec:f9: 64:f8:59:9a:a2:23:05:98:30:42:04:25:b4:25:de:0a: dd:ed:0a:3f:3f:15:00:8b:c5:67:af:0b:58:b2:a2:85: 74:db:a2:c5:6c:7c:f3:fa:24:78:3b:0d:1a:57:bc:60: ce:04:4a:f0:67:56:7d:6c:59:bd:6d:fd:c3:45:4e:47: 6b:9b:0f:17:68:a1:93:7b:60:ee:62:1f:02:dc:7f:11: 91:73:4b:07:7e:8c:aa:ec:47:71:5d:49:15:15:91:d0: 15:d7:87:67:b3:e6:c4:47:65:d4:6a:91:f9:be:03:e0: b5:d9:99:ee:cb:ba:95:86:9d:7f:31:a7:3e:95:5a:93: 58:09:bb:cb:be:f0:bb:22:12:04:a3:62:93:72:08:b9: 4d:53:a1:23:4e:e0:c4:8a:e6:7e:6a:7c:37:23:2f:39: c0:37:86:02:2c:0c:15:d4:93:90:25:24:36:c3:a8:08: 00:fe:6b:68:59:b7:df:81:49:d7:b4:9f:4c:8a:45:b6 Fingerprint (SHA-256): DE:2B:D4:29:39:11:AB:E9:D3:FF:15:79:05:06:DF:17:94:81:F7:DC:C7:42:08:C5:8B:1D:B4:B9:0C:9F:43:F2 Fingerprint (SHA1): 84:86:15:B5:FD:B9:12:26:B4:01:1E:93:DC:14:97:A0:7A:A3:58:B6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1384: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1385: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1386: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1387: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141615 (0x3caf9baf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:16:35 2023 Not After : Wed Oct 18 14:16:35 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:49:77:03:6b:16:39:ea:6b:8a:5c:57:c5:79:2d:3f: 29:39:48:94:bd:41:24:70:48:e5:d1:c5:97:ca:0b:84: 31:7c:6b:8d:83:5a:09:2a:14:95:08:5d:b2:74:f9:35: 9a:51:b4:ff:06:64:95:46:6b:78:40:a4:e5:2c:0c:a8: ad:34:7a:ea:6d:00:85:4c:2f:31:8a:d4:47:fd:03:e5: 61:4c:ef:82:1d:7f:65:4a:85:cd:a9:5b:c6:ea:c3:57: 6b:b2:cd:a7:fd:28:f0:66:de:33:d3:8c:df:07:1e:05: b3:81:3f:8c:93:5b:63:a1:37:80:38:28:7c:0f:94:52: 4e:af:e2:7f:f5:9b:dd:30:5e:a6:87:3f:24:01:45:4a: 15:c2:8d:97:6b:3b:46:b9:1f:94:f0:e2:4b:ea:9a:c4: e8:1e:d5:cc:08:3d:b1:89:1d:be:eb:03:77:bb:6a:70: 2a:6e:26:92:b5:86:58:ea:86:b8:8e:d8:c2:23:10:23: c5:71:b3:47:1e:61:d4:cc:00:bd:ad:ae:e2:3b:ed:4a: bd:88:c6:e3:1b:47:c5:45:bb:70:2a:2c:e0:e9:8e:46: 2e:77:5e:a2:c6:ce:e0:22:93:65:3b:c6:f9:6e:14:09: 43:70:c1:4f:f0:ac:f8:b0:b3:4c:4f:05:b3:e8:d2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:d0:f6:a9:31:64:1c:95:10:84:a4:88:2b:a1:e5:0d: 9b:b4:c2:49:7a:d5:40:ac:41:7f:f1:20:d1:c6:6e:08: 40:56:0a:ea:c0:7e:12:fe:8d:50:f7:c2:ea:ae:3d:bf: 2d:a8:07:8c:e7:f7:48:89:a0:15:d5:a1:56:3e:ec:f9: 64:f8:59:9a:a2:23:05:98:30:42:04:25:b4:25:de:0a: dd:ed:0a:3f:3f:15:00:8b:c5:67:af:0b:58:b2:a2:85: 74:db:a2:c5:6c:7c:f3:fa:24:78:3b:0d:1a:57:bc:60: ce:04:4a:f0:67:56:7d:6c:59:bd:6d:fd:c3:45:4e:47: 6b:9b:0f:17:68:a1:93:7b:60:ee:62:1f:02:dc:7f:11: 91:73:4b:07:7e:8c:aa:ec:47:71:5d:49:15:15:91:d0: 15:d7:87:67:b3:e6:c4:47:65:d4:6a:91:f9:be:03:e0: b5:d9:99:ee:cb:ba:95:86:9d:7f:31:a7:3e:95:5a:93: 58:09:bb:cb:be:f0:bb:22:12:04:a3:62:93:72:08:b9: 4d:53:a1:23:4e:e0:c4:8a:e6:7e:6a:7c:37:23:2f:39: c0:37:86:02:2c:0c:15:d4:93:90:25:24:36:c3:a8:08: 00:fe:6b:68:59:b7:df:81:49:d7:b4:9f:4c:8a:45:b6 Fingerprint (SHA-256): DE:2B:D4:29:39:11:AB:E9:D3:FF:15:79:05:06:DF:17:94:81:F7:DC:C7:42:08:C5:8B:1D:B4:B9:0C:9F:43:F2 Fingerprint (SHA1): 84:86:15:B5:FD:B9:12:26:B4:01:1E:93:DC:14:97:A0:7A:A3:58:B6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1388: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1389: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1390: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1391: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141615 (0x3caf9baf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:16:35 2023 Not After : Wed Oct 18 14:16:35 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:49:77:03:6b:16:39:ea:6b:8a:5c:57:c5:79:2d:3f: 29:39:48:94:bd:41:24:70:48:e5:d1:c5:97:ca:0b:84: 31:7c:6b:8d:83:5a:09:2a:14:95:08:5d:b2:74:f9:35: 9a:51:b4:ff:06:64:95:46:6b:78:40:a4:e5:2c:0c:a8: ad:34:7a:ea:6d:00:85:4c:2f:31:8a:d4:47:fd:03:e5: 61:4c:ef:82:1d:7f:65:4a:85:cd:a9:5b:c6:ea:c3:57: 6b:b2:cd:a7:fd:28:f0:66:de:33:d3:8c:df:07:1e:05: b3:81:3f:8c:93:5b:63:a1:37:80:38:28:7c:0f:94:52: 4e:af:e2:7f:f5:9b:dd:30:5e:a6:87:3f:24:01:45:4a: 15:c2:8d:97:6b:3b:46:b9:1f:94:f0:e2:4b:ea:9a:c4: e8:1e:d5:cc:08:3d:b1:89:1d:be:eb:03:77:bb:6a:70: 2a:6e:26:92:b5:86:58:ea:86:b8:8e:d8:c2:23:10:23: c5:71:b3:47:1e:61:d4:cc:00:bd:ad:ae:e2:3b:ed:4a: bd:88:c6:e3:1b:47:c5:45:bb:70:2a:2c:e0:e9:8e:46: 2e:77:5e:a2:c6:ce:e0:22:93:65:3b:c6:f9:6e:14:09: 43:70:c1:4f:f0:ac:f8:b0:b3:4c:4f:05:b3:e8:d2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:d0:f6:a9:31:64:1c:95:10:84:a4:88:2b:a1:e5:0d: 9b:b4:c2:49:7a:d5:40:ac:41:7f:f1:20:d1:c6:6e:08: 40:56:0a:ea:c0:7e:12:fe:8d:50:f7:c2:ea:ae:3d:bf: 2d:a8:07:8c:e7:f7:48:89:a0:15:d5:a1:56:3e:ec:f9: 64:f8:59:9a:a2:23:05:98:30:42:04:25:b4:25:de:0a: dd:ed:0a:3f:3f:15:00:8b:c5:67:af:0b:58:b2:a2:85: 74:db:a2:c5:6c:7c:f3:fa:24:78:3b:0d:1a:57:bc:60: ce:04:4a:f0:67:56:7d:6c:59:bd:6d:fd:c3:45:4e:47: 6b:9b:0f:17:68:a1:93:7b:60:ee:62:1f:02:dc:7f:11: 91:73:4b:07:7e:8c:aa:ec:47:71:5d:49:15:15:91:d0: 15:d7:87:67:b3:e6:c4:47:65:d4:6a:91:f9:be:03:e0: b5:d9:99:ee:cb:ba:95:86:9d:7f:31:a7:3e:95:5a:93: 58:09:bb:cb:be:f0:bb:22:12:04:a3:62:93:72:08:b9: 4d:53:a1:23:4e:e0:c4:8a:e6:7e:6a:7c:37:23:2f:39: c0:37:86:02:2c:0c:15:d4:93:90:25:24:36:c3:a8:08: 00:fe:6b:68:59:b7:df:81:49:d7:b4:9f:4c:8a:45:b6 Fingerprint (SHA-256): DE:2B:D4:29:39:11:AB:E9:D3:FF:15:79:05:06:DF:17:94:81:F7:DC:C7:42:08:C5:8B:1D:B4:B9:0C:9F:43:F2 Fingerprint (SHA1): 84:86:15:B5:FD:B9:12:26:B4:01:1E:93:DC:14:97:A0:7A:A3:58:B6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1392: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141615 (0x3caf9baf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:16:35 2023 Not After : Wed Oct 18 14:16:35 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:49:77:03:6b:16:39:ea:6b:8a:5c:57:c5:79:2d:3f: 29:39:48:94:bd:41:24:70:48:e5:d1:c5:97:ca:0b:84: 31:7c:6b:8d:83:5a:09:2a:14:95:08:5d:b2:74:f9:35: 9a:51:b4:ff:06:64:95:46:6b:78:40:a4:e5:2c:0c:a8: ad:34:7a:ea:6d:00:85:4c:2f:31:8a:d4:47:fd:03:e5: 61:4c:ef:82:1d:7f:65:4a:85:cd:a9:5b:c6:ea:c3:57: 6b:b2:cd:a7:fd:28:f0:66:de:33:d3:8c:df:07:1e:05: b3:81:3f:8c:93:5b:63:a1:37:80:38:28:7c:0f:94:52: 4e:af:e2:7f:f5:9b:dd:30:5e:a6:87:3f:24:01:45:4a: 15:c2:8d:97:6b:3b:46:b9:1f:94:f0:e2:4b:ea:9a:c4: e8:1e:d5:cc:08:3d:b1:89:1d:be:eb:03:77:bb:6a:70: 2a:6e:26:92:b5:86:58:ea:86:b8:8e:d8:c2:23:10:23: c5:71:b3:47:1e:61:d4:cc:00:bd:ad:ae:e2:3b:ed:4a: bd:88:c6:e3:1b:47:c5:45:bb:70:2a:2c:e0:e9:8e:46: 2e:77:5e:a2:c6:ce:e0:22:93:65:3b:c6:f9:6e:14:09: 43:70:c1:4f:f0:ac:f8:b0:b3:4c:4f:05:b3:e8:d2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:d0:f6:a9:31:64:1c:95:10:84:a4:88:2b:a1:e5:0d: 9b:b4:c2:49:7a:d5:40:ac:41:7f:f1:20:d1:c6:6e:08: 40:56:0a:ea:c0:7e:12:fe:8d:50:f7:c2:ea:ae:3d:bf: 2d:a8:07:8c:e7:f7:48:89:a0:15:d5:a1:56:3e:ec:f9: 64:f8:59:9a:a2:23:05:98:30:42:04:25:b4:25:de:0a: dd:ed:0a:3f:3f:15:00:8b:c5:67:af:0b:58:b2:a2:85: 74:db:a2:c5:6c:7c:f3:fa:24:78:3b:0d:1a:57:bc:60: ce:04:4a:f0:67:56:7d:6c:59:bd:6d:fd:c3:45:4e:47: 6b:9b:0f:17:68:a1:93:7b:60:ee:62:1f:02:dc:7f:11: 91:73:4b:07:7e:8c:aa:ec:47:71:5d:49:15:15:91:d0: 15:d7:87:67:b3:e6:c4:47:65:d4:6a:91:f9:be:03:e0: b5:d9:99:ee:cb:ba:95:86:9d:7f:31:a7:3e:95:5a:93: 58:09:bb:cb:be:f0:bb:22:12:04:a3:62:93:72:08:b9: 4d:53:a1:23:4e:e0:c4:8a:e6:7e:6a:7c:37:23:2f:39: c0:37:86:02:2c:0c:15:d4:93:90:25:24:36:c3:a8:08: 00:fe:6b:68:59:b7:df:81:49:d7:b4:9f:4c:8a:45:b6 Fingerprint (SHA-256): DE:2B:D4:29:39:11:AB:E9:D3:FF:15:79:05:06:DF:17:94:81:F7:DC:C7:42:08:C5:8B:1D:B4:B9:0C:9F:43:F2 Fingerprint (SHA1): 84:86:15:B5:FD:B9:12:26:B4:01:1E:93:DC:14:97:A0:7A:A3:58:B6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1393: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1394: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141615 (0x3caf9baf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:16:35 2023 Not After : Wed Oct 18 14:16:35 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:49:77:03:6b:16:39:ea:6b:8a:5c:57:c5:79:2d:3f: 29:39:48:94:bd:41:24:70:48:e5:d1:c5:97:ca:0b:84: 31:7c:6b:8d:83:5a:09:2a:14:95:08:5d:b2:74:f9:35: 9a:51:b4:ff:06:64:95:46:6b:78:40:a4:e5:2c:0c:a8: ad:34:7a:ea:6d:00:85:4c:2f:31:8a:d4:47:fd:03:e5: 61:4c:ef:82:1d:7f:65:4a:85:cd:a9:5b:c6:ea:c3:57: 6b:b2:cd:a7:fd:28:f0:66:de:33:d3:8c:df:07:1e:05: b3:81:3f:8c:93:5b:63:a1:37:80:38:28:7c:0f:94:52: 4e:af:e2:7f:f5:9b:dd:30:5e:a6:87:3f:24:01:45:4a: 15:c2:8d:97:6b:3b:46:b9:1f:94:f0:e2:4b:ea:9a:c4: e8:1e:d5:cc:08:3d:b1:89:1d:be:eb:03:77:bb:6a:70: 2a:6e:26:92:b5:86:58:ea:86:b8:8e:d8:c2:23:10:23: c5:71:b3:47:1e:61:d4:cc:00:bd:ad:ae:e2:3b:ed:4a: bd:88:c6:e3:1b:47:c5:45:bb:70:2a:2c:e0:e9:8e:46: 2e:77:5e:a2:c6:ce:e0:22:93:65:3b:c6:f9:6e:14:09: 43:70:c1:4f:f0:ac:f8:b0:b3:4c:4f:05:b3:e8:d2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:d0:f6:a9:31:64:1c:95:10:84:a4:88:2b:a1:e5:0d: 9b:b4:c2:49:7a:d5:40:ac:41:7f:f1:20:d1:c6:6e:08: 40:56:0a:ea:c0:7e:12:fe:8d:50:f7:c2:ea:ae:3d:bf: 2d:a8:07:8c:e7:f7:48:89:a0:15:d5:a1:56:3e:ec:f9: 64:f8:59:9a:a2:23:05:98:30:42:04:25:b4:25:de:0a: dd:ed:0a:3f:3f:15:00:8b:c5:67:af:0b:58:b2:a2:85: 74:db:a2:c5:6c:7c:f3:fa:24:78:3b:0d:1a:57:bc:60: ce:04:4a:f0:67:56:7d:6c:59:bd:6d:fd:c3:45:4e:47: 6b:9b:0f:17:68:a1:93:7b:60:ee:62:1f:02:dc:7f:11: 91:73:4b:07:7e:8c:aa:ec:47:71:5d:49:15:15:91:d0: 15:d7:87:67:b3:e6:c4:47:65:d4:6a:91:f9:be:03:e0: b5:d9:99:ee:cb:ba:95:86:9d:7f:31:a7:3e:95:5a:93: 58:09:bb:cb:be:f0:bb:22:12:04:a3:62:93:72:08:b9: 4d:53:a1:23:4e:e0:c4:8a:e6:7e:6a:7c:37:23:2f:39: c0:37:86:02:2c:0c:15:d4:93:90:25:24:36:c3:a8:08: 00:fe:6b:68:59:b7:df:81:49:d7:b4:9f:4c:8a:45:b6 Fingerprint (SHA-256): DE:2B:D4:29:39:11:AB:E9:D3:FF:15:79:05:06:DF:17:94:81:F7:DC:C7:42:08:C5:8B:1D:B4:B9:0C:9F:43:F2 Fingerprint (SHA1): 84:86:15:B5:FD:B9:12:26:B4:01:1E:93:DC:14:97:A0:7A:A3:58:B6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1395: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1396: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1397: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1398: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141615 (0x3caf9baf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:16:35 2023 Not After : Wed Oct 18 14:16:35 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:49:77:03:6b:16:39:ea:6b:8a:5c:57:c5:79:2d:3f: 29:39:48:94:bd:41:24:70:48:e5:d1:c5:97:ca:0b:84: 31:7c:6b:8d:83:5a:09:2a:14:95:08:5d:b2:74:f9:35: 9a:51:b4:ff:06:64:95:46:6b:78:40:a4:e5:2c:0c:a8: ad:34:7a:ea:6d:00:85:4c:2f:31:8a:d4:47:fd:03:e5: 61:4c:ef:82:1d:7f:65:4a:85:cd:a9:5b:c6:ea:c3:57: 6b:b2:cd:a7:fd:28:f0:66:de:33:d3:8c:df:07:1e:05: b3:81:3f:8c:93:5b:63:a1:37:80:38:28:7c:0f:94:52: 4e:af:e2:7f:f5:9b:dd:30:5e:a6:87:3f:24:01:45:4a: 15:c2:8d:97:6b:3b:46:b9:1f:94:f0:e2:4b:ea:9a:c4: e8:1e:d5:cc:08:3d:b1:89:1d:be:eb:03:77:bb:6a:70: 2a:6e:26:92:b5:86:58:ea:86:b8:8e:d8:c2:23:10:23: c5:71:b3:47:1e:61:d4:cc:00:bd:ad:ae:e2:3b:ed:4a: bd:88:c6:e3:1b:47:c5:45:bb:70:2a:2c:e0:e9:8e:46: 2e:77:5e:a2:c6:ce:e0:22:93:65:3b:c6:f9:6e:14:09: 43:70:c1:4f:f0:ac:f8:b0:b3:4c:4f:05:b3:e8:d2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:d0:f6:a9:31:64:1c:95:10:84:a4:88:2b:a1:e5:0d: 9b:b4:c2:49:7a:d5:40:ac:41:7f:f1:20:d1:c6:6e:08: 40:56:0a:ea:c0:7e:12:fe:8d:50:f7:c2:ea:ae:3d:bf: 2d:a8:07:8c:e7:f7:48:89:a0:15:d5:a1:56:3e:ec:f9: 64:f8:59:9a:a2:23:05:98:30:42:04:25:b4:25:de:0a: dd:ed:0a:3f:3f:15:00:8b:c5:67:af:0b:58:b2:a2:85: 74:db:a2:c5:6c:7c:f3:fa:24:78:3b:0d:1a:57:bc:60: ce:04:4a:f0:67:56:7d:6c:59:bd:6d:fd:c3:45:4e:47: 6b:9b:0f:17:68:a1:93:7b:60:ee:62:1f:02:dc:7f:11: 91:73:4b:07:7e:8c:aa:ec:47:71:5d:49:15:15:91:d0: 15:d7:87:67:b3:e6:c4:47:65:d4:6a:91:f9:be:03:e0: b5:d9:99:ee:cb:ba:95:86:9d:7f:31:a7:3e:95:5a:93: 58:09:bb:cb:be:f0:bb:22:12:04:a3:62:93:72:08:b9: 4d:53:a1:23:4e:e0:c4:8a:e6:7e:6a:7c:37:23:2f:39: c0:37:86:02:2c:0c:15:d4:93:90:25:24:36:c3:a8:08: 00:fe:6b:68:59:b7:df:81:49:d7:b4:9f:4c:8a:45:b6 Fingerprint (SHA-256): DE:2B:D4:29:39:11:AB:E9:D3:FF:15:79:05:06:DF:17:94:81:F7:DC:C7:42:08:C5:8B:1D:B4:B9:0C:9F:43:F2 Fingerprint (SHA1): 84:86:15:B5:FD:B9:12:26:B4:01:1E:93:DC:14:97:A0:7A:A3:58:B6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1399: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141615 (0x3caf9baf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:16:35 2023 Not After : Wed Oct 18 14:16:35 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:49:77:03:6b:16:39:ea:6b:8a:5c:57:c5:79:2d:3f: 29:39:48:94:bd:41:24:70:48:e5:d1:c5:97:ca:0b:84: 31:7c:6b:8d:83:5a:09:2a:14:95:08:5d:b2:74:f9:35: 9a:51:b4:ff:06:64:95:46:6b:78:40:a4:e5:2c:0c:a8: ad:34:7a:ea:6d:00:85:4c:2f:31:8a:d4:47:fd:03:e5: 61:4c:ef:82:1d:7f:65:4a:85:cd:a9:5b:c6:ea:c3:57: 6b:b2:cd:a7:fd:28:f0:66:de:33:d3:8c:df:07:1e:05: b3:81:3f:8c:93:5b:63:a1:37:80:38:28:7c:0f:94:52: 4e:af:e2:7f:f5:9b:dd:30:5e:a6:87:3f:24:01:45:4a: 15:c2:8d:97:6b:3b:46:b9:1f:94:f0:e2:4b:ea:9a:c4: e8:1e:d5:cc:08:3d:b1:89:1d:be:eb:03:77:bb:6a:70: 2a:6e:26:92:b5:86:58:ea:86:b8:8e:d8:c2:23:10:23: c5:71:b3:47:1e:61:d4:cc:00:bd:ad:ae:e2:3b:ed:4a: bd:88:c6:e3:1b:47:c5:45:bb:70:2a:2c:e0:e9:8e:46: 2e:77:5e:a2:c6:ce:e0:22:93:65:3b:c6:f9:6e:14:09: 43:70:c1:4f:f0:ac:f8:b0:b3:4c:4f:05:b3:e8:d2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:d0:f6:a9:31:64:1c:95:10:84:a4:88:2b:a1:e5:0d: 9b:b4:c2:49:7a:d5:40:ac:41:7f:f1:20:d1:c6:6e:08: 40:56:0a:ea:c0:7e:12:fe:8d:50:f7:c2:ea:ae:3d:bf: 2d:a8:07:8c:e7:f7:48:89:a0:15:d5:a1:56:3e:ec:f9: 64:f8:59:9a:a2:23:05:98:30:42:04:25:b4:25:de:0a: dd:ed:0a:3f:3f:15:00:8b:c5:67:af:0b:58:b2:a2:85: 74:db:a2:c5:6c:7c:f3:fa:24:78:3b:0d:1a:57:bc:60: ce:04:4a:f0:67:56:7d:6c:59:bd:6d:fd:c3:45:4e:47: 6b:9b:0f:17:68:a1:93:7b:60:ee:62:1f:02:dc:7f:11: 91:73:4b:07:7e:8c:aa:ec:47:71:5d:49:15:15:91:d0: 15:d7:87:67:b3:e6:c4:47:65:d4:6a:91:f9:be:03:e0: b5:d9:99:ee:cb:ba:95:86:9d:7f:31:a7:3e:95:5a:93: 58:09:bb:cb:be:f0:bb:22:12:04:a3:62:93:72:08:b9: 4d:53:a1:23:4e:e0:c4:8a:e6:7e:6a:7c:37:23:2f:39: c0:37:86:02:2c:0c:15:d4:93:90:25:24:36:c3:a8:08: 00:fe:6b:68:59:b7:df:81:49:d7:b4:9f:4c:8a:45:b6 Fingerprint (SHA-256): DE:2B:D4:29:39:11:AB:E9:D3:FF:15:79:05:06:DF:17:94:81:F7:DC:C7:42:08:C5:8B:1D:B4:B9:0C:9F:43:F2 Fingerprint (SHA1): 84:86:15:B5:FD:B9:12:26:B4:01:1E:93:DC:14:97:A0:7A:A3:58:B6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1400: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141615 (0x3caf9baf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:16:35 2023 Not After : Wed Oct 18 14:16:35 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:49:77:03:6b:16:39:ea:6b:8a:5c:57:c5:79:2d:3f: 29:39:48:94:bd:41:24:70:48:e5:d1:c5:97:ca:0b:84: 31:7c:6b:8d:83:5a:09:2a:14:95:08:5d:b2:74:f9:35: 9a:51:b4:ff:06:64:95:46:6b:78:40:a4:e5:2c:0c:a8: ad:34:7a:ea:6d:00:85:4c:2f:31:8a:d4:47:fd:03:e5: 61:4c:ef:82:1d:7f:65:4a:85:cd:a9:5b:c6:ea:c3:57: 6b:b2:cd:a7:fd:28:f0:66:de:33:d3:8c:df:07:1e:05: b3:81:3f:8c:93:5b:63:a1:37:80:38:28:7c:0f:94:52: 4e:af:e2:7f:f5:9b:dd:30:5e:a6:87:3f:24:01:45:4a: 15:c2:8d:97:6b:3b:46:b9:1f:94:f0:e2:4b:ea:9a:c4: e8:1e:d5:cc:08:3d:b1:89:1d:be:eb:03:77:bb:6a:70: 2a:6e:26:92:b5:86:58:ea:86:b8:8e:d8:c2:23:10:23: c5:71:b3:47:1e:61:d4:cc:00:bd:ad:ae:e2:3b:ed:4a: bd:88:c6:e3:1b:47:c5:45:bb:70:2a:2c:e0:e9:8e:46: 2e:77:5e:a2:c6:ce:e0:22:93:65:3b:c6:f9:6e:14:09: 43:70:c1:4f:f0:ac:f8:b0:b3:4c:4f:05:b3:e8:d2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:d0:f6:a9:31:64:1c:95:10:84:a4:88:2b:a1:e5:0d: 9b:b4:c2:49:7a:d5:40:ac:41:7f:f1:20:d1:c6:6e:08: 40:56:0a:ea:c0:7e:12:fe:8d:50:f7:c2:ea:ae:3d:bf: 2d:a8:07:8c:e7:f7:48:89:a0:15:d5:a1:56:3e:ec:f9: 64:f8:59:9a:a2:23:05:98:30:42:04:25:b4:25:de:0a: dd:ed:0a:3f:3f:15:00:8b:c5:67:af:0b:58:b2:a2:85: 74:db:a2:c5:6c:7c:f3:fa:24:78:3b:0d:1a:57:bc:60: ce:04:4a:f0:67:56:7d:6c:59:bd:6d:fd:c3:45:4e:47: 6b:9b:0f:17:68:a1:93:7b:60:ee:62:1f:02:dc:7f:11: 91:73:4b:07:7e:8c:aa:ec:47:71:5d:49:15:15:91:d0: 15:d7:87:67:b3:e6:c4:47:65:d4:6a:91:f9:be:03:e0: b5:d9:99:ee:cb:ba:95:86:9d:7f:31:a7:3e:95:5a:93: 58:09:bb:cb:be:f0:bb:22:12:04:a3:62:93:72:08:b9: 4d:53:a1:23:4e:e0:c4:8a:e6:7e:6a:7c:37:23:2f:39: c0:37:86:02:2c:0c:15:d4:93:90:25:24:36:c3:a8:08: 00:fe:6b:68:59:b7:df:81:49:d7:b4:9f:4c:8a:45:b6 Fingerprint (SHA-256): DE:2B:D4:29:39:11:AB:E9:D3:FF:15:79:05:06:DF:17:94:81:F7:DC:C7:42:08:C5:8B:1D:B4:B9:0C:9F:43:F2 Fingerprint (SHA1): 84:86:15:B5:FD:B9:12:26:B4:01:1E:93:DC:14:97:A0:7A:A3:58:B6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1401: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141615 (0x3caf9baf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:16:35 2023 Not After : Wed Oct 18 14:16:35 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:49:77:03:6b:16:39:ea:6b:8a:5c:57:c5:79:2d:3f: 29:39:48:94:bd:41:24:70:48:e5:d1:c5:97:ca:0b:84: 31:7c:6b:8d:83:5a:09:2a:14:95:08:5d:b2:74:f9:35: 9a:51:b4:ff:06:64:95:46:6b:78:40:a4:e5:2c:0c:a8: ad:34:7a:ea:6d:00:85:4c:2f:31:8a:d4:47:fd:03:e5: 61:4c:ef:82:1d:7f:65:4a:85:cd:a9:5b:c6:ea:c3:57: 6b:b2:cd:a7:fd:28:f0:66:de:33:d3:8c:df:07:1e:05: b3:81:3f:8c:93:5b:63:a1:37:80:38:28:7c:0f:94:52: 4e:af:e2:7f:f5:9b:dd:30:5e:a6:87:3f:24:01:45:4a: 15:c2:8d:97:6b:3b:46:b9:1f:94:f0:e2:4b:ea:9a:c4: e8:1e:d5:cc:08:3d:b1:89:1d:be:eb:03:77:bb:6a:70: 2a:6e:26:92:b5:86:58:ea:86:b8:8e:d8:c2:23:10:23: c5:71:b3:47:1e:61:d4:cc:00:bd:ad:ae:e2:3b:ed:4a: bd:88:c6:e3:1b:47:c5:45:bb:70:2a:2c:e0:e9:8e:46: 2e:77:5e:a2:c6:ce:e0:22:93:65:3b:c6:f9:6e:14:09: 43:70:c1:4f:f0:ac:f8:b0:b3:4c:4f:05:b3:e8:d2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:d0:f6:a9:31:64:1c:95:10:84:a4:88:2b:a1:e5:0d: 9b:b4:c2:49:7a:d5:40:ac:41:7f:f1:20:d1:c6:6e:08: 40:56:0a:ea:c0:7e:12:fe:8d:50:f7:c2:ea:ae:3d:bf: 2d:a8:07:8c:e7:f7:48:89:a0:15:d5:a1:56:3e:ec:f9: 64:f8:59:9a:a2:23:05:98:30:42:04:25:b4:25:de:0a: dd:ed:0a:3f:3f:15:00:8b:c5:67:af:0b:58:b2:a2:85: 74:db:a2:c5:6c:7c:f3:fa:24:78:3b:0d:1a:57:bc:60: ce:04:4a:f0:67:56:7d:6c:59:bd:6d:fd:c3:45:4e:47: 6b:9b:0f:17:68:a1:93:7b:60:ee:62:1f:02:dc:7f:11: 91:73:4b:07:7e:8c:aa:ec:47:71:5d:49:15:15:91:d0: 15:d7:87:67:b3:e6:c4:47:65:d4:6a:91:f9:be:03:e0: b5:d9:99:ee:cb:ba:95:86:9d:7f:31:a7:3e:95:5a:93: 58:09:bb:cb:be:f0:bb:22:12:04:a3:62:93:72:08:b9: 4d:53:a1:23:4e:e0:c4:8a:e6:7e:6a:7c:37:23:2f:39: c0:37:86:02:2c:0c:15:d4:93:90:25:24:36:c3:a8:08: 00:fe:6b:68:59:b7:df:81:49:d7:b4:9f:4c:8a:45:b6 Fingerprint (SHA-256): DE:2B:D4:29:39:11:AB:E9:D3:FF:15:79:05:06:DF:17:94:81:F7:DC:C7:42:08:C5:8B:1D:B4:B9:0C:9F:43:F2 Fingerprint (SHA1): 84:86:15:B5:FD:B9:12:26:B4:01:1E:93:DC:14:97:A0:7A:A3:58:B6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1402: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141615 (0x3caf9baf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:16:35 2023 Not After : Wed Oct 18 14:16:35 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:49:77:03:6b:16:39:ea:6b:8a:5c:57:c5:79:2d:3f: 29:39:48:94:bd:41:24:70:48:e5:d1:c5:97:ca:0b:84: 31:7c:6b:8d:83:5a:09:2a:14:95:08:5d:b2:74:f9:35: 9a:51:b4:ff:06:64:95:46:6b:78:40:a4:e5:2c:0c:a8: ad:34:7a:ea:6d:00:85:4c:2f:31:8a:d4:47:fd:03:e5: 61:4c:ef:82:1d:7f:65:4a:85:cd:a9:5b:c6:ea:c3:57: 6b:b2:cd:a7:fd:28:f0:66:de:33:d3:8c:df:07:1e:05: b3:81:3f:8c:93:5b:63:a1:37:80:38:28:7c:0f:94:52: 4e:af:e2:7f:f5:9b:dd:30:5e:a6:87:3f:24:01:45:4a: 15:c2:8d:97:6b:3b:46:b9:1f:94:f0:e2:4b:ea:9a:c4: e8:1e:d5:cc:08:3d:b1:89:1d:be:eb:03:77:bb:6a:70: 2a:6e:26:92:b5:86:58:ea:86:b8:8e:d8:c2:23:10:23: c5:71:b3:47:1e:61:d4:cc:00:bd:ad:ae:e2:3b:ed:4a: bd:88:c6:e3:1b:47:c5:45:bb:70:2a:2c:e0:e9:8e:46: 2e:77:5e:a2:c6:ce:e0:22:93:65:3b:c6:f9:6e:14:09: 43:70:c1:4f:f0:ac:f8:b0:b3:4c:4f:05:b3:e8:d2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:d0:f6:a9:31:64:1c:95:10:84:a4:88:2b:a1:e5:0d: 9b:b4:c2:49:7a:d5:40:ac:41:7f:f1:20:d1:c6:6e:08: 40:56:0a:ea:c0:7e:12:fe:8d:50:f7:c2:ea:ae:3d:bf: 2d:a8:07:8c:e7:f7:48:89:a0:15:d5:a1:56:3e:ec:f9: 64:f8:59:9a:a2:23:05:98:30:42:04:25:b4:25:de:0a: dd:ed:0a:3f:3f:15:00:8b:c5:67:af:0b:58:b2:a2:85: 74:db:a2:c5:6c:7c:f3:fa:24:78:3b:0d:1a:57:bc:60: ce:04:4a:f0:67:56:7d:6c:59:bd:6d:fd:c3:45:4e:47: 6b:9b:0f:17:68:a1:93:7b:60:ee:62:1f:02:dc:7f:11: 91:73:4b:07:7e:8c:aa:ec:47:71:5d:49:15:15:91:d0: 15:d7:87:67:b3:e6:c4:47:65:d4:6a:91:f9:be:03:e0: b5:d9:99:ee:cb:ba:95:86:9d:7f:31:a7:3e:95:5a:93: 58:09:bb:cb:be:f0:bb:22:12:04:a3:62:93:72:08:b9: 4d:53:a1:23:4e:e0:c4:8a:e6:7e:6a:7c:37:23:2f:39: c0:37:86:02:2c:0c:15:d4:93:90:25:24:36:c3:a8:08: 00:fe:6b:68:59:b7:df:81:49:d7:b4:9f:4c:8a:45:b6 Fingerprint (SHA-256): DE:2B:D4:29:39:11:AB:E9:D3:FF:15:79:05:06:DF:17:94:81:F7:DC:C7:42:08:C5:8B:1D:B4:B9:0C:9F:43:F2 Fingerprint (SHA1): 84:86:15:B5:FD:B9:12:26:B4:01:1E:93:DC:14:97:A0:7A:A3:58:B6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1403: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141615 (0x3caf9baf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:16:35 2023 Not After : Wed Oct 18 14:16:35 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:49:77:03:6b:16:39:ea:6b:8a:5c:57:c5:79:2d:3f: 29:39:48:94:bd:41:24:70:48:e5:d1:c5:97:ca:0b:84: 31:7c:6b:8d:83:5a:09:2a:14:95:08:5d:b2:74:f9:35: 9a:51:b4:ff:06:64:95:46:6b:78:40:a4:e5:2c:0c:a8: ad:34:7a:ea:6d:00:85:4c:2f:31:8a:d4:47:fd:03:e5: 61:4c:ef:82:1d:7f:65:4a:85:cd:a9:5b:c6:ea:c3:57: 6b:b2:cd:a7:fd:28:f0:66:de:33:d3:8c:df:07:1e:05: b3:81:3f:8c:93:5b:63:a1:37:80:38:28:7c:0f:94:52: 4e:af:e2:7f:f5:9b:dd:30:5e:a6:87:3f:24:01:45:4a: 15:c2:8d:97:6b:3b:46:b9:1f:94:f0:e2:4b:ea:9a:c4: e8:1e:d5:cc:08:3d:b1:89:1d:be:eb:03:77:bb:6a:70: 2a:6e:26:92:b5:86:58:ea:86:b8:8e:d8:c2:23:10:23: c5:71:b3:47:1e:61:d4:cc:00:bd:ad:ae:e2:3b:ed:4a: bd:88:c6:e3:1b:47:c5:45:bb:70:2a:2c:e0:e9:8e:46: 2e:77:5e:a2:c6:ce:e0:22:93:65:3b:c6:f9:6e:14:09: 43:70:c1:4f:f0:ac:f8:b0:b3:4c:4f:05:b3:e8:d2:ef Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:d0:f6:a9:31:64:1c:95:10:84:a4:88:2b:a1:e5:0d: 9b:b4:c2:49:7a:d5:40:ac:41:7f:f1:20:d1:c6:6e:08: 40:56:0a:ea:c0:7e:12:fe:8d:50:f7:c2:ea:ae:3d:bf: 2d:a8:07:8c:e7:f7:48:89:a0:15:d5:a1:56:3e:ec:f9: 64:f8:59:9a:a2:23:05:98:30:42:04:25:b4:25:de:0a: dd:ed:0a:3f:3f:15:00:8b:c5:67:af:0b:58:b2:a2:85: 74:db:a2:c5:6c:7c:f3:fa:24:78:3b:0d:1a:57:bc:60: ce:04:4a:f0:67:56:7d:6c:59:bd:6d:fd:c3:45:4e:47: 6b:9b:0f:17:68:a1:93:7b:60:ee:62:1f:02:dc:7f:11: 91:73:4b:07:7e:8c:aa:ec:47:71:5d:49:15:15:91:d0: 15:d7:87:67:b3:e6:c4:47:65:d4:6a:91:f9:be:03:e0: b5:d9:99:ee:cb:ba:95:86:9d:7f:31:a7:3e:95:5a:93: 58:09:bb:cb:be:f0:bb:22:12:04:a3:62:93:72:08:b9: 4d:53:a1:23:4e:e0:c4:8a:e6:7e:6a:7c:37:23:2f:39: c0:37:86:02:2c:0c:15:d4:93:90:25:24:36:c3:a8:08: 00:fe:6b:68:59:b7:df:81:49:d7:b4:9f:4c:8a:45:b6 Fingerprint (SHA-256): DE:2B:D4:29:39:11:AB:E9:D3:FF:15:79:05:06:DF:17:94:81:F7:DC:C7:42:08:C5:8B:1D:B4:B9:0C:9F:43:F2 Fingerprint (SHA1): 84:86:15:B5:FD:B9:12:26:B4:01:1E:93:DC:14:97:A0:7A:A3:58:B6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1404: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1405: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1406: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141645 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1407: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1408: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #1409: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1410: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1018141646 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1411: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1412: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #1413: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1414: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1018141647 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1415: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1416: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #1417: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1418: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1018141648 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1419: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1420: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #1421: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1422: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1018141649 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1423: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1424: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #1425: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1426: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1018141650 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1427: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1428: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #1429: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1430: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1018141651 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1431: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1432: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1433: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141645 (0x3caf9bcd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:49 2023 Not After : Wed Oct 18 14:16:49 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:5b:a1:1f:7a:0c:77:7a:a1:d4:f2:ad:3f:da:45:1e: 85:0a:12:0b:15:29:5f:c0:ad:49:d0:14:17:9e:14:3e: f1:df:81:11:78:73:b5:ad:a4:cf:a9:39:04:68:13:51: 04:13:7b:4d:84:46:58:e6:07:33:aa:5d:52:0f:92:d6: 2a:23:83:15:91:9d:ef:1c:16:d4:4a:06:98:66:dc:24: 78:82:83:37:ea:c0:08:02:a7:4c:d7:e6:a2:2c:56:07: 85:d3:91:30:99:2d:ad:ff:f0:c3:d8:91:c7:07:34:9e: fa:73:c8:12:08:7f:d5:02:5d:53:cd:79:60:b5:14:e5: d1:cf:cf:0f:d0:64:7d:69:16:c4:e0:2c:c4:ad:07:17: 96:98:02:83:23:d0:0c:2e:b4:98:f6:33:3a:eb:a3:4f: e0:d0:9b:7f:dc:dc:b5:b7:b7:49:ca:b4:90:b4:60:03: f8:2c:92:e6:11:36:36:ae:72:25:c4:e2:cf:38:ab:cd: 8f:1f:0b:f2:3c:69:27:c8:cf:81:07:0d:24:6d:57:45: 90:a7:ed:f5:47:d3:56:53:6d:48:90:2c:b2:9e:89:ec: 2a:3e:06:a2:14:fc:ba:1d:1c:be:e1:bb:b6:30:07:9f: a3:40:64:ce:1c:85:95:94:35:d6:21:a2:5f:3a:f4:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:76:8b:6f:70:d7:48:37:d6:81:ce:02:6e:15:5e:24: 32:7a:e9:0e:fe:91:53:d7:2c:84:a7:dc:75:44:5d:0a: fd:b7:02:3d:d5:64:b9:09:f1:b4:46:56:81:64:6b:76: 9c:ba:90:ef:e2:e3:11:1e:97:17:fc:1d:a5:2b:67:03: bc:d2:e8:9c:6d:19:7f:a5:f3:fb:6b:fb:69:0b:84:35: 56:40:ad:a4:81:dd:6f:38:6c:3c:97:2e:82:cb:16:28: 8a:2a:af:3b:f6:42:f3:20:51:13:bc:b8:b8:c6:52:0b: fc:b2:d0:ce:0a:ff:5d:3d:14:eb:d9:0d:fa:d5:61:2a: 28:b0:d9:09:c4:36:9d:09:5f:87:2e:48:3f:7a:19:c4: 68:d1:b1:42:e3:5c:9b:a5:c2:89:0c:9a:87:50:d2:92: 3f:5c:c7:f6:12:d5:3a:15:b3:bb:27:46:ca:7e:08:e0: b3:65:b9:33:c9:b9:ec:94:12:0f:a3:95:39:52:ee:61: d0:7a:46:65:f5:45:c5:cf:05:c6:b3:40:d7:76:bc:36: e9:90:5b:27:74:b9:49:3c:09:80:a3:35:6b:1c:a3:3c: 04:eb:7f:b4:83:9f:9c:4a:bf:3b:6e:8b:b4:e0:18:d1: c6:1e:af:ad:a0:5d:0c:88:47:e0:e9:88:70:2b:5b:05 Fingerprint (SHA-256): 65:3A:0C:3F:3F:31:86:C5:F8:77:66:6B:C0:24:C9:E8:25:73:A3:D6:00:27:E7:23:75:4C:00:10:85:E4:8C:92 Fingerprint (SHA1): C8:AC:56:84:D9:3E:37:55:B2:8E:CC:EA:33:46:67:A3:66:D3:BB:06 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1434: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1435: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1436: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1437: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141645 (0x3caf9bcd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:49 2023 Not After : Wed Oct 18 14:16:49 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:5b:a1:1f:7a:0c:77:7a:a1:d4:f2:ad:3f:da:45:1e: 85:0a:12:0b:15:29:5f:c0:ad:49:d0:14:17:9e:14:3e: f1:df:81:11:78:73:b5:ad:a4:cf:a9:39:04:68:13:51: 04:13:7b:4d:84:46:58:e6:07:33:aa:5d:52:0f:92:d6: 2a:23:83:15:91:9d:ef:1c:16:d4:4a:06:98:66:dc:24: 78:82:83:37:ea:c0:08:02:a7:4c:d7:e6:a2:2c:56:07: 85:d3:91:30:99:2d:ad:ff:f0:c3:d8:91:c7:07:34:9e: fa:73:c8:12:08:7f:d5:02:5d:53:cd:79:60:b5:14:e5: d1:cf:cf:0f:d0:64:7d:69:16:c4:e0:2c:c4:ad:07:17: 96:98:02:83:23:d0:0c:2e:b4:98:f6:33:3a:eb:a3:4f: e0:d0:9b:7f:dc:dc:b5:b7:b7:49:ca:b4:90:b4:60:03: f8:2c:92:e6:11:36:36:ae:72:25:c4:e2:cf:38:ab:cd: 8f:1f:0b:f2:3c:69:27:c8:cf:81:07:0d:24:6d:57:45: 90:a7:ed:f5:47:d3:56:53:6d:48:90:2c:b2:9e:89:ec: 2a:3e:06:a2:14:fc:ba:1d:1c:be:e1:bb:b6:30:07:9f: a3:40:64:ce:1c:85:95:94:35:d6:21:a2:5f:3a:f4:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 00:76:8b:6f:70:d7:48:37:d6:81:ce:02:6e:15:5e:24: 32:7a:e9:0e:fe:91:53:d7:2c:84:a7:dc:75:44:5d:0a: fd:b7:02:3d:d5:64:b9:09:f1:b4:46:56:81:64:6b:76: 9c:ba:90:ef:e2:e3:11:1e:97:17:fc:1d:a5:2b:67:03: bc:d2:e8:9c:6d:19:7f:a5:f3:fb:6b:fb:69:0b:84:35: 56:40:ad:a4:81:dd:6f:38:6c:3c:97:2e:82:cb:16:28: 8a:2a:af:3b:f6:42:f3:20:51:13:bc:b8:b8:c6:52:0b: fc:b2:d0:ce:0a:ff:5d:3d:14:eb:d9:0d:fa:d5:61:2a: 28:b0:d9:09:c4:36:9d:09:5f:87:2e:48:3f:7a:19:c4: 68:d1:b1:42:e3:5c:9b:a5:c2:89:0c:9a:87:50:d2:92: 3f:5c:c7:f6:12:d5:3a:15:b3:bb:27:46:ca:7e:08:e0: b3:65:b9:33:c9:b9:ec:94:12:0f:a3:95:39:52:ee:61: d0:7a:46:65:f5:45:c5:cf:05:c6:b3:40:d7:76:bc:36: e9:90:5b:27:74:b9:49:3c:09:80:a3:35:6b:1c:a3:3c: 04:eb:7f:b4:83:9f:9c:4a:bf:3b:6e:8b:b4:e0:18:d1: c6:1e:af:ad:a0:5d:0c:88:47:e0:e9:88:70:2b:5b:05 Fingerprint (SHA-256): 65:3A:0C:3F:3F:31:86:C5:F8:77:66:6B:C0:24:C9:E8:25:73:A3:D6:00:27:E7:23:75:4C:00:10:85:E4:8C:92 Fingerprint (SHA1): C8:AC:56:84:D9:3E:37:55:B2:8E:CC:EA:33:46:67:A3:66:D3:BB:06 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1438: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1439: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1440: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1441: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141652 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1442: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1443: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1444: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1445: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018141653 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1446: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1447: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1448: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1449: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018141654 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1450: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1451: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1452: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1453: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018141655 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1454: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1455: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1456: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1457: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1458: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1459: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141652 (0x3caf9bd4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:53 2023 Not After : Wed Oct 18 14:16:53 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:7e:cb:3f:5f:cb:fd:f7:30:44:bf:53:00:66:c8:fd: f5:2f:19:5d:a7:1d:b3:49:87:c7:fc:72:f6:2c:97:4b: 9a:41:57:d0:3f:60:be:2e:9f:25:7a:29:7e:10:9a:69: d2:e0:e2:6e:86:1e:7e:e3:53:bd:f6:cc:9d:1d:47:37: 00:c0:c0:2a:be:a2:89:c2:9f:9e:33:8f:5b:1e:ba:9f: 2a:c3:6f:65:f4:84:9c:f4:6f:1e:3c:b6:40:59:66:d1: ef:fb:08:a8:24:6e:53:a4:ce:a8:69:b4:56:a8:90:d5: a6:ae:4d:ab:80:98:80:56:bf:59:20:9f:cd:f5:3d:6f: 66:4a:1f:8c:ac:e4:d5:c8:79:21:5c:b4:da:18:cd:fc: a9:fc:3e:48:52:72:4b:14:db:f2:67:52:a7:b6:79:30: a6:15:75:08:49:9e:c8:a4:36:a0:a2:b3:97:d1:30:ff: cf:03:e1:73:93:46:a4:ae:ba:18:ca:67:7f:bc:2e:26: 0b:43:89:ee:c9:3c:4b:3b:0b:00:e4:91:5c:3f:dc:41: 66:e2:f9:c0:6d:51:8f:91:9e:0c:70:6a:3b:f2:f9:69: 3f:33:20:d7:3c:73:69:c1:cf:07:1d:88:c7:61:dd:26: a5:27:69:26:f1:8f:68:8d:6c:c7:3a:82:d6:f6:6f:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:d4:f7:5f:47:f0:f4:22:59:87:30:2e:cd:30:64:9a: d3:02:45:3e:6d:ee:1c:fd:39:b9:28:27:88:12:b6:a9: 00:c7:5e:73:ae:c5:b9:f6:a6:cc:b8:73:f7:4f:65:46: 95:9b:06:02:a4:6d:08:17:28:33:c6:2e:45:07:04:4a: a7:74:e7:9c:42:1d:d0:8b:46:41:72:20:b1:45:e4:4d: 7a:b3:d6:bb:b6:ed:61:4c:71:1c:d4:70:08:19:4d:68: 27:0d:89:5f:4d:91:1e:ad:25:6b:29:b0:02:73:94:65: 32:fd:71:9f:5a:d0:03:06:ef:95:9c:45:2d:56:de:19: 4c:32:87:a9:44:8d:85:86:c5:08:01:b2:26:ca:48:8e: a1:d0:3c:4d:6b:b5:f2:ca:94:41:1f:fa:f6:b0:c4:05: af:36:cd:d4:39:f2:00:35:9f:f6:e6:4c:7b:81:4a:f9: ef:1c:79:9c:63:74:cb:d6:5f:2a:0b:c9:e7:20:59:42: 42:90:e3:e5:9b:ca:96:8f:3d:5a:cf:1d:69:fc:59:42: 61:d4:63:d8:d3:18:79:38:70:e8:95:c9:9d:7c:4d:5f: 43:ea:8c:20:6f:f5:47:ce:1d:7d:7d:73:0d:c5:ab:91: f7:07:43:41:95:a5:b8:53:44:0e:45:0a:79:7b:c1:b2 Fingerprint (SHA-256): AD:AD:41:A8:B8:8F:7A:30:8E:56:AD:A0:45:ED:C7:C2:16:AC:F5:4B:DA:50:47:1C:55:A7:26:FF:31:4C:1E:37 Fingerprint (SHA1): B2:6B:E5:16:67:1D:94:70:C9:F6:D4:C0:F9:56:FA:98:6B:7A:D6:27 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1460: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1461: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1462: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141653 (0x3caf9bd5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:53 2023 Not After : Wed Oct 18 14:16:53 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:e3:37:28:1f:53:ca:89:9e:aa:af:6e:be:ba:e2:39: 73:28:78:29:0d:c5:92:f1:cc:53:6a:c2:70:a0:ab:57: d2:f9:59:37:1d:f8:5d:26:a5:ba:fd:bf:64:47:a4:df: 7b:d0:c2:d4:64:1e:cc:e0:18:5c:ed:b8:47:57:5e:e5: 0b:96:16:96:47:ae:3a:fd:f9:c9:83:36:5c:d8:7b:49: ab:60:01:b9:94:f4:d9:91:93:3f:24:df:2c:d2:72:f3: c8:57:af:1d:70:b8:59:01:1a:4a:ca:f3:7b:b3:59:08: 6f:1c:dd:c0:9f:83:5c:a4:aa:91:7d:c8:ea:8d:d2:a0: 7a:df:3e:36:5a:14:db:cc:ad:7d:d2:fa:bd:ba:11:b9: a8:c1:ef:1c:c7:52:33:d9:6c:c2:e8:a0:d9:e4:c4:c8: 27:6c:a6:15:b9:0b:20:7d:eb:5a:1b:d5:a7:bf:01:f9: 40:e1:30:8a:40:e3:07:e7:55:50:b2:56:3b:56:67:b9: 66:53:21:ca:3d:3a:83:93:c7:79:7b:88:f4:f8:ec:f5: 94:dc:b1:81:80:61:30:4a:93:7c:33:86:aa:bd:56:a2: 62:f0:93:a7:c4:82:cc:0a:51:b1:7d:b9:1d:32:5f:52: 1e:27:70:9d:57:5d:11:58:19:28:2d:5a:4a:39:67:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:25:da:03:a5:ee:1d:18:e0:c6:72:78:9e:4b:75:13: 25:21:c6:23:94:83:86:5f:cf:4c:00:9b:82:44:6a:87: b2:fa:45:7d:b2:a3:2d:70:16:ea:33:4d:1e:61:65:30: 34:a3:6c:3e:45:7e:73:cd:43:28:f8:69:4b:91:ce:08: 9a:47:cf:05:b0:b1:cb:e5:3d:89:33:4d:a9:35:c2:0b: 51:d0:a8:90:51:ab:59:10:f7:43:e5:6d:87:e1:bb:a7: 1b:5c:46:99:c0:4e:26:ca:7f:20:ea:52:66:a7:99:57: 46:2d:d2:49:44:33:d3:42:b0:3a:f4:7d:6b:7b:ca:be: f9:98:a2:a0:93:23:ed:ec:09:dc:74:38:97:d2:64:4b: 3d:a8:3d:8e:57:89:4c:f6:5f:cd:49:4e:c8:5f:7d:fd: 18:c4:34:32:aa:dd:7f:d8:86:3d:3a:3c:55:95:c3:77: 1e:83:8e:4f:f1:1e:cb:34:df:f7:bd:1c:ee:64:48:a0: ff:8e:2d:c5:2e:49:5a:98:89:0b:86:cc:88:a1:65:e7: f5:12:5f:be:a0:23:61:c7:40:44:8b:40:c0:84:9b:7c: 99:c6:4e:93:34:c9:b1:2f:52:66:ef:27:8b:71:89:ef: a4:e1:54:df:69:89:60:aa:76:0d:79:cb:36:f5:c1:ae Fingerprint (SHA-256): 5D:EB:1D:F5:B9:57:64:09:F7:6F:3A:69:59:45:8F:B3:1A:28:80:2E:43:94:8F:98:AC:74:72:05:3D:CB:C0:B7 Fingerprint (SHA1): FF:50:D5:16:EB:BD:10:37:3B:F1:72:14:7C:32:5D:6B:05:0F:6B:6C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1463: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1464: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141654 (0x3caf9bd6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:16:54 2023 Not After : Wed Oct 18 14:16:54 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:39:bd:c1:d9:a8:68:71:46:3b:26:fd:da:9a:c6:97: 90:dd:6b:90:19:05:ef:e8:3f:12:6f:6e:4c:c5:46:8a: 3c:cb:a2:4e:f0:80:a0:d6:60:6c:25:1f:b0:a9:d6:13: 25:ed:ba:b7:c6:65:19:4b:2e:44:a1:6c:68:09:93:d3: 35:7d:62:f5:5d:1b:f5:ff:6f:eb:01:33:00:43:7f:c4: e5:b3:30:62:ca:dd:d7:91:5f:a8:bf:35:b2:f0:76:ce: e7:9c:9e:54:6d:81:b2:a7:63:d3:81:db:cc:dd:19:ce: 62:3c:c4:b9:39:1b:6f:65:98:40:c9:23:03:87:de:92: b5:82:dd:40:e2:1c:62:b6:84:91:f8:01:fd:94:f9:f7: 37:d9:12:3e:bf:0b:fe:71:e6:50:ee:09:64:fc:33:1f: 09:e7:a9:c1:3e:d1:bb:37:74:9d:e3:70:ac:3d:4e:3e: b7:68:53:e2:db:9d:5a:9d:c2:fa:b6:bf:a6:72:da:7e: 4f:16:f6:19:d2:6e:a3:63:89:84:4c:35:8a:ce:1b:2e: 06:d7:41:37:1e:2a:ed:76:3d:31:79:bd:cb:c6:5d:7d: 50:fb:3b:08:be:74:1b:0d:85:b3:03:57:8f:f8:f0:81: f5:8d:97:30:ac:8a:d1:39:94:4e:3f:8c:bb:c8:ef:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b4:ff:d7:23:dc:c3:56:c0:c5:c4:7e:04:82:45:2d:a3: 20:5d:b7:01:8b:53:5c:40:97:06:7a:d7:61:5a:62:08: 6d:d0:af:df:4e:9a:97:5e:78:00:1b:79:ba:be:c0:55: fb:35:00:a2:45:cf:ec:f1:2f:ca:49:bd:7c:bf:6e:e5: ac:f4:e7:69:9d:69:85:f6:b1:46:eb:e8:4a:16:24:78: 0a:25:6a:76:99:de:d3:b1:86:c9:73:dd:67:2d:c7:58: 08:6a:23:13:0f:65:81:e0:2d:74:0d:99:df:ef:e0:01: 31:51:95:1b:df:35:31:75:8f:23:d4:4c:9d:e5:bb:6b: bc:b4:84:e4:65:dd:dd:68:c5:9e:91:50:74:e9:0e:a4: 62:65:07:90:4a:0f:10:ba:af:6f:11:f6:7c:23:e5:c0: a7:d8:da:5a:64:50:00:f7:e3:17:58:44:aa:88:b2:9b: 0f:77:3b:38:18:98:48:4a:65:11:d3:87:f7:c3:c2:4d: 55:fe:a6:bd:32:7c:36:20:6a:ce:50:eb:85:a7:e8:0e: 6b:ee:7e:89:bd:5b:8c:f0:e6:45:4d:15:ed:b8:47:7e: 8c:b4:8f:e4:45:01:c8:ed:cc:59:5e:a9:a6:b8:59:98: 1f:99:3c:d7:bc:4f:28:cc:cf:4c:3c:bd:70:7a:7b:55 Fingerprint (SHA-256): 92:6E:2F:AE:3E:C0:45:2C:99:0B:8F:D5:6F:E8:3D:C4:01:15:E2:D5:B8:DE:58:4C:C6:27:64:26:E4:69:1D:67 Fingerprint (SHA1): 76:F6:3E:3D:F8:D1:C4:8A:C7:70:57:C2:E3:98:EF:00:0E:9F:B0:F6 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1465: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1466: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141656 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1467: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1468: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1469: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1470: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018141657 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1471: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1472: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1473: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1474: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018141658 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1475: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1476: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1477: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1478: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1018141659 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1479: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1480: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1481: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1482: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1018141660 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1483: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1484: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1485: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1486: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1487: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1488: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #1489: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141656 (0x3caf9bd8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:56 2023 Not After : Wed Oct 18 14:16:56 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:96:a2:75:68:22:07:b1:53:32:b3:13:12:f1:0a:7c: 96:c9:59:6e:0a:e6:b9:89:86:5d:51:13:91:54:3f:c5: 74:ac:1c:cc:b1:c4:13:93:50:b4:2d:5d:4c:b2:29:82: 12:a5:6a:1a:ff:0c:e0:2d:87:cd:f2:c6:53:ab:c4:86: b5:2a:94:73:c4:7b:e8:1e:36:5e:f2:97:c0:6b:95:f5: 31:4f:b5:b1:d6:fd:a6:aa:eb:f6:d1:86:9b:d4:69:1d: 77:4c:63:f9:9e:40:05:f6:b5:72:71:4e:fa:44:8a:79: 69:65:5e:5f:de:92:af:b9:b4:a0:ac:c8:43:70:9b:21: 2d:88:c9:e9:58:58:e5:0c:b3:57:ca:28:fc:be:f6:f5: fb:ee:cd:44:b3:36:19:5b:a8:8e:51:59:f5:90:11:82: 7d:e8:80:9e:dc:db:4d:14:e4:69:14:e3:d2:66:81:51: cf:cb:b6:6d:74:a2:6e:b3:75:1d:24:6a:fb:20:26:89: 5b:ba:6b:66:a9:4f:c2:c3:d2:75:31:63:bf:52:bf:f5: 06:1a:88:6f:73:29:24:02:a1:26:bc:87:68:bb:21:42: 0d:72:54:95:0a:5d:fc:bf:90:b4:8e:52:3e:3a:ce:79: 5e:49:2a:32:55:7e:f9:d5:b7:93:9e:ae:49:82:1b:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b7:41:92:ec:33:d5:da:c5:a2:45:a2:fc:9a:f9:36:e5: cc:62:37:3f:d2:cb:7b:2b:4f:c4:87:27:16:0f:26:7f: 20:80:17:e7:6d:6a:9e:8d:c9:d6:2d:6d:c8:1c:6a:3c: e2:55:a3:2f:28:e8:7d:d5:59:fa:12:09:e3:32:9b:6e: ca:5b:46:48:74:92:ed:ba:31:f7:88:5d:a1:b2:e6:7f: f5:7d:2d:7c:71:83:82:3f:e8:59:bd:e7:c9:32:58:9c: 53:29:f5:84:8f:de:9c:0b:aa:31:d8:23:01:9b:b8:e6: 75:37:62:51:7f:d8:0d:c6:4a:34:c7:8b:86:90:97:ca: 5a:33:4a:88:17:0e:d7:4e:e0:bf:08:7a:6c:f8:6d:74: 78:d3:a2:30:fd:ef:56:ef:78:29:0d:d5:31:b1:12:c5: 71:58:fa:13:41:6b:a4:02:95:2d:13:ae:54:07:d6:df: 7a:a0:49:dc:e8:ad:ec:08:ea:91:49:ea:c5:38:56:d4: c1:d9:6b:ea:ae:30:94:76:b2:a1:7d:61:a5:a1:72:d2: 12:df:4b:2b:3e:a0:26:ac:49:47:6e:92:ea:6a:e3:8c: 8c:51:82:ff:9e:3d:18:92:73:4d:fb:53:f4:50:ab:c6: 85:29:35:aa:11:45:34:f4:53:32:5f:27:cf:5d:04:68 Fingerprint (SHA-256): 93:4D:78:FB:40:D7:E9:F5:CB:53:EF:89:0A:AA:8D:01:99:7B:48:5B:53:06:15:E1:45:65:73:FC:A0:94:23:67 Fingerprint (SHA1): 98:94:F6:79:59:89:32:8E:D2:7B:11:42:81:4B:4F:8C:C8:85:53:6A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1490: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1491: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141657 (0x3caf9bd9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:56 2023 Not After : Wed Oct 18 14:16:56 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:15:c0:80:60:69:a7:87:9d:28:58:7b:4e:cc:fc:30: 6f:4f:9a:85:30:0a:7a:c7:b0:50:a2:50:e0:87:a8:ad: 90:11:50:8f:e5:d0:13:d9:0d:68:fd:19:23:34:a3:3c: 3a:0c:1f:db:94:41:17:05:25:d8:90:69:4d:12:cb:89: ec:6f:be:d4:44:01:3c:32:4c:64:3e:01:e7:9e:ff:e5: b3:51:4a:70:af:d1:82:1b:7e:1d:43:4f:75:b2:ab:de: 20:ad:b2:fe:45:3d:07:a1:28:b6:9e:f5:2e:66:b4:9a: 66:93:22:df:a6:c4:d4:cf:58:85:99:ef:43:45:9e:dc: 12:09:14:89:d6:da:bb:6b:be:e7:44:c8:81:4b:6a:23: bf:57:9a:c0:c3:d6:65:62:43:9a:e6:d0:91:3b:14:47: c8:e5:ed:53:be:53:67:84:ca:4b:eb:e2:18:f2:62:c3: 63:04:95:f8:0a:0b:cf:49:33:16:0d:b4:2d:db:aa:96: 4e:74:26:e3:57:fa:63:9d:e0:88:3d:28:23:53:31:c2: ae:29:04:72:b6:0e:1a:f6:28:21:6f:bb:24:b7:ee:7b: 13:0a:c0:d2:09:16:f8:8a:9e:45:6f:0a:59:86:e8:19: f4:5b:5c:33:24:d4:13:5c:00:87:6d:ea:90:c2:2d:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:56:c9:7b:12:3d:4c:4c:71:dd:58:ce:6f:00:46:3a: 87:5d:7f:af:fd:4a:2a:1c:c1:00:9a:c3:b5:a2:ed:14: 34:f1:ca:24:c8:7b:b7:fb:df:56:b2:30:3f:d0:55:7b: 2f:52:4f:6d:00:83:95:2e:5c:32:36:c1:a9:a6:54:9a: a5:81:2b:57:38:7d:6b:5e:0e:83:e6:80:8f:e5:d6:90: 1d:51:f6:90:95:06:46:a4:e3:24:07:c9:9e:d5:c9:29: b6:ca:6b:57:29:b4:a1:75:aa:2f:f4:72:46:b4:39:3e: c5:02:11:c0:5c:26:a1:41:fe:df:c5:21:6c:b6:cf:cc: f1:0b:c7:65:0a:a7:b8:e2:3d:2c:87:25:df:52:a1:f1: 44:6f:86:0f:23:4b:fe:48:cc:e3:af:3c:a1:6a:99:94: 01:73:a4:27:c6:61:22:b2:7e:36:60:fe:01:e6:32:e2: 17:12:ac:d2:a8:6e:02:15:0f:0d:44:07:14:e7:4b:b8: 2e:35:56:bf:2b:fd:f0:14:10:a2:a5:66:f3:6d:97:c1: cd:ed:e8:a4:d4:6a:d2:41:fe:b4:62:76:4c:e0:5e:40: 5e:39:e9:3b:99:46:d3:b6:c2:ff:ca:ed:ff:9f:7e:57: b4:be:fe:1f:12:99:06:94:c6:5a:54:b7:07:51:09:65 Fingerprint (SHA-256): 4C:8C:3F:92:31:EE:DF:39:17:65:A0:02:E7:C2:61:1C:FF:03:E5:B4:6C:4C:73:3A:E6:59:A5:B9:DF:E3:7A:16 Fingerprint (SHA1): B5:6C:79:59:8A:DE:BB:D7:78:5B:F6:82:20:1D:81:90:62:1B:8D:F3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1492: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1493: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1494: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141658 (0x3caf9bda) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:16:57 2023 Not After : Wed Oct 18 14:16:57 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:e6:05:63:0a:04:e5:ab:cf:02:19:98:49:a3:e3:b0: 6e:ee:8b:a1:48:12:be:cd:f9:40:32:1f:e6:3d:04:ea: e5:ac:5f:72:da:b0:60:93:94:70:0d:69:71:62:fe:ad: aa:e0:a6:46:65:ff:e2:a8:80:2d:95:be:f2:98:19:68: 16:ef:65:55:04:ad:06:f9:61:7e:d5:6e:b6:53:dc:0e: 21:b9:32:68:8d:6b:79:2a:4b:37:f7:57:30:34:3a:fe: ba:67:46:0a:9f:77:84:e6:6f:ae:be:ce:d2:0b:5d:8d: 42:50:62:6a:a8:5d:61:d8:46:9c:89:e4:35:43:7f:62: a4:81:56:7e:f7:cf:e6:40:3c:bb:1e:b1:9b:cc:95:85: f3:33:ec:a4:15:1c:d2:82:30:67:af:8b:1d:4f:66:17: ce:ba:29:e8:74:fe:3d:9f:6a:5e:ee:90:b3:5c:99:96: ee:03:52:e2:a4:45:fa:d7:37:fd:59:ee:8b:4f:96:59: 63:e1:6a:13:f2:ec:c8:75:be:d0:cb:ae:80:50:f4:69: c4:06:ed:c2:9c:bc:a1:d0:03:15:07:b2:aa:69:11:64: 8b:5c:7b:38:a1:3d:a7:ec:38:20:1a:0e:e6:b2:72:4e: 48:30:ea:63:75:6c:26:da:29:dd:57:a4:08:2c:54:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ad:ff:f9:d8:a8:a3:04:8a:78:ae:b3:2c:9d:c8:ec:15: 2b:1e:2d:7a:c7:23:a9:2f:01:54:a8:38:ea:ca:7b:75: d9:d4:b2:1f:2d:08:91:46:fd:37:7e:5d:d9:e4:c5:47: 8e:6f:7b:51:36:5a:3b:45:b6:dd:bb:e5:e0:2b:8c:4b: 16:13:60:47:44:d4:e6:28:7c:8a:f1:2d:20:99:e1:d3: e7:00:50:cd:8f:a5:92:8a:21:96:2f:52:b0:31:ba:94: bb:c4:2f:6e:df:05:9b:08:ed:23:c5:56:66:f1:59:73: 4b:4a:ff:87:f3:c6:2e:0c:1c:9a:ca:86:83:80:47:8b: 8e:24:83:ba:78:b9:0d:f9:3f:a0:65:38:8d:c3:a9:07: 08:26:36:70:8e:cf:64:63:4c:59:76:08:72:fc:2a:9e: 4c:2a:1c:0f:f5:b2:87:2e:7b:67:88:8e:fd:62:f2:1c: d1:4e:b7:64:97:3d:f6:fe:48:2c:97:ec:e0:73:39:4f: b7:ef:1d:64:df:57:35:32:d3:40:fe:fd:c5:1e:97:de: 08:6c:96:c2:a2:4a:cb:4d:3a:07:97:ef:09:eb:bf:b3: cd:6f:8e:4a:58:96:78:fe:ac:71:3d:85:84:59:9d:7f: 4e:bc:9f:c1:8e:dc:59:7e:64:44:39:8e:a0:13:2d:ac Fingerprint (SHA-256): 76:7F:95:A5:ED:21:20:98:4B:B2:42:1D:8A:0C:06:04:7D:FD:78:CC:B8:FA:65:1B:D5:46:87:C3:01:1A:6A:77 Fingerprint (SHA1): 00:3B:72:C5:C2:9A:C8:99:93:E1:93:C5:A3:E5:19:D2:21:F3:92:AA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1495: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1496: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141661 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1497: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1498: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1499: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1500: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018141662 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1501: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1502: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1503: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1504: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018141663 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA1Root-1018141424.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1505: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1506: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1507: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1508: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018141664 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1509: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1510: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #1511: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141661 (0x3caf9bdd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:16:59 2023 Not After : Wed Oct 18 14:16:59 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:22:3b:5c:ab:aa:e3:79:8a:41:21:36:a7:b2:d9:7b: 22:3b:6c:e1:30:89:cd:61:73:a0:2e:c5:3c:e1:c7:37: 6b:e2:6b:7f:18:f9:08:0e:2d:82:a0:91:53:c9:31:15: 3d:88:15:d2:88:99:42:3f:d8:1d:fc:8a:6f:7b:fe:fb: ed:01:34:a3:11:8c:49:d8:95:fb:23:36:1b:61:a9:9d: f1:d5:27:7d:e5:2e:43:d2:51:d8:3b:50:2d:3e:63:33: 51:55:a9:f2:05:f9:26:ab:7b:c3:5c:f2:59:8f:f3:84: 85:24:3e:5f:4b:d7:29:a8:a1:3b:86:0a:92:69:28:75: c8:25:81:f5:b1:1a:15:aa:32:5b:1c:57:ef:75:b3:4a: 39:c9:0b:9c:c5:a9:85:ec:17:a0:6b:6b:70:b9:47:9c: df:41:4f:39:bd:c5:5c:6f:70:41:bf:d4:2b:7c:8c:d7: a2:ad:77:76:3a:07:e1:a2:17:10:e1:c2:6a:74:77:e5: 41:89:3a:c0:48:92:18:9e:7b:d4:8a:8d:5a:c9:f7:41: 4a:a7:91:5f:8a:50:2b:19:fe:87:2f:be:c8:f4:cb:ce: cf:dd:30:75:92:44:68:36:76:c8:14:b0:73:04:c1:02: b1:8d:86:a3:f8:83:19:2f:73:79:0c:73:33:0b:10:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:0b:0e:6f:dd:23:12:5d:04:25:dd:19:02:25:3e:fa: d1:ab:d4:43:ac:40:cf:cf:8d:dc:ca:70:48:d1:26:3b: bd:e6:e4:a4:35:f5:b0:19:52:1c:c8:bd:d9:9a:42:a7: 1e:db:e6:ee:67:9e:64:6a:e2:05:3d:27:e3:f9:11:3a: 43:f5:02:de:e6:63:62:43:0a:06:32:c1:4e:1c:eb:27: 94:f8:e0:b7:83:d4:bc:3c:55:3c:34:5d:61:f1:f9:fe: f2:82:c6:54:be:d4:da:b5:da:fb:4a:5c:b8:80:c9:2b: 63:a5:d7:1f:29:26:75:de:65:58:21:fa:dc:53:38:ac: f2:0f:59:f8:a9:15:cc:79:d9:b5:48:ae:ac:40:1a:72: 35:92:ba:c4:33:cc:6b:e9:d1:35:9a:f7:09:f9:38:d2: 83:b2:36:72:03:f8:70:91:19:8f:00:74:c7:2a:47:bf: 46:8f:7a:af:67:dd:9b:c9:ba:44:48:3f:20:9a:62:da: 45:b8:7a:39:fb:0a:47:e2:e2:f3:04:26:5d:ff:58:2b: 6a:52:57:e1:de:b2:42:30:b2:0f:09:c9:4a:5f:bc:18: 7c:50:24:ec:b7:86:eb:42:d1:a4:2e:44:9f:0e:5f:b2: 8b:23:c7:68:0b:de:08:b2:1d:82:66:48:95:b7:95:95 Fingerprint (SHA-256): C0:F2:15:76:33:AE:EB:41:96:23:A3:F6:EE:3B:6B:40:2E:86:F0:81:70:45:D8:06:07:3F:39:84:33:02:FE:13 Fingerprint (SHA1): E5:23:37:55:4F:CA:9E:64:26:C0:53:2A:7F:C0:A5:52:3B:C0:43:84 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1512: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1513: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141665 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1514: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1515: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1516: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141666 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1517: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1518: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1519: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1520: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018141667 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1521: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1522: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018141668 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1523: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1524: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1525: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1526: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1527: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018141669 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-Bridge-1018141425.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1528: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1529: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1530: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1531: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018141670 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1532: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1533: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1534: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1535: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141666 (0x3caf9be2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:17:01 2023 Not After : Wed Oct 18 14:17:01 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:07:de:9d:ab:3a:84:33:72:38:ee:0d:c8:27:56:9b: fd:6b:39:3a:26:ef:47:4e:f1:65:3c:43:72:cd:cd:6a: 2e:17:1d:13:48:24:d8:b3:e7:84:bc:fd:70:a9:ab:ff: 34:de:02:d9:b1:3f:18:d2:54:32:29:16:11:7c:dc:38: ba:4e:02:df:c8:3b:dd:a1:3b:9f:c2:b6:89:48:cf:a5: 97:98:28:af:47:bc:23:3f:28:d8:c6:31:54:1c:34:9e: c6:95:99:ce:4d:17:5d:85:bb:f4:0c:d3:a7:71:15:20: d6:52:8d:3c:b1:f9:d3:aa:21:67:48:7e:14:f6:00:2e: c1:37:07:1c:16:77:ad:d9:3e:a7:10:30:e6:9d:88:21: 1b:e6:b3:c2:20:ee:ba:4f:4d:cc:18:40:26:a9:33:31: 9f:f2:05:41:a2:92:21:ff:2e:70:12:4f:d7:8f:ab:33: 6e:90:19:f1:0a:5e:60:ce:37:37:55:5d:16:f6:35:4b: 7a:7d:8b:ff:d4:0a:3c:dc:d4:5b:16:26:d6:3c:67:0e: 25:3c:e2:91:6e:b6:c4:93:2b:43:ae:af:74:ad:e9:02: d7:97:0e:81:55:e5:d7:4f:91:6a:f0:81:5a:46:b6:00: 4a:fa:43:d3:d5:80:2e:5d:cf:c4:4e:a8:37:70:7f:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:2f:52:6b:fe:45:8e:17:8f:0d:75:ae:ca:5f:b7:69: 5c:c4:d4:3e:83:aa:4b:a2:6e:68:bb:f4:84:50:b6:32: 4e:a0:9e:e1:74:e0:a3:89:23:d8:6f:ca:5b:13:6a:d6: 48:fe:40:8f:b7:48:00:c7:8d:a6:c9:86:4c:8d:af:37: ed:bb:70:da:1d:5c:2e:47:bf:6a:85:dc:12:83:94:f5: dd:6b:79:c8:f6:b3:43:61:11:01:f9:1c:71:a9:46:6e: 88:c6:a4:92:d2:8f:d2:75:13:7b:df:c2:44:e3:7b:99: bc:b8:7e:1a:75:20:a7:c1:87:bd:ab:d9:5d:b2:14:f0: 0f:22:41:5e:10:7d:37:b8:7b:8e:f7:98:54:a4:3c:3f: 64:f3:70:64:e6:a2:07:46:d2:c1:cb:b7:d3:b7:78:d1: fa:c2:ec:91:0a:fa:20:27:43:c4:c1:09:42:00:54:10: 3b:bc:f9:3f:46:82:5b:30:b6:91:c2:d9:20:2e:34:ff: 36:12:17:ca:aa:1c:85:2d:36:0b:58:4e:16:83:06:40: af:7c:3a:02:ae:f3:66:46:4e:d1:1f:b5:a1:36:a0:1e: 6a:49:de:ea:d2:25:02:02:e4:8a:45:3d:fd:05:36:ec: 09:a9:27:24:c5:85:c0:94:87:b7:08:e7:f3:d9:07:a7 Fingerprint (SHA-256): A7:9B:8E:79:44:2A:42:E5:B4:E5:34:C3:5D:3B:15:E5:6C:B4:DC:06:CB:5A:BB:4C:CF:F8:2D:83:3A:A7:83:81 Fingerprint (SHA1): FE:B8:99:AF:87:3B:A3:44:16:C5:A0:64:33:B5:74:19:BB:2E:C8:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1536: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141666 (0x3caf9be2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:17:01 2023 Not After : Wed Oct 18 14:17:01 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:07:de:9d:ab:3a:84:33:72:38:ee:0d:c8:27:56:9b: fd:6b:39:3a:26:ef:47:4e:f1:65:3c:43:72:cd:cd:6a: 2e:17:1d:13:48:24:d8:b3:e7:84:bc:fd:70:a9:ab:ff: 34:de:02:d9:b1:3f:18:d2:54:32:29:16:11:7c:dc:38: ba:4e:02:df:c8:3b:dd:a1:3b:9f:c2:b6:89:48:cf:a5: 97:98:28:af:47:bc:23:3f:28:d8:c6:31:54:1c:34:9e: c6:95:99:ce:4d:17:5d:85:bb:f4:0c:d3:a7:71:15:20: d6:52:8d:3c:b1:f9:d3:aa:21:67:48:7e:14:f6:00:2e: c1:37:07:1c:16:77:ad:d9:3e:a7:10:30:e6:9d:88:21: 1b:e6:b3:c2:20:ee:ba:4f:4d:cc:18:40:26:a9:33:31: 9f:f2:05:41:a2:92:21:ff:2e:70:12:4f:d7:8f:ab:33: 6e:90:19:f1:0a:5e:60:ce:37:37:55:5d:16:f6:35:4b: 7a:7d:8b:ff:d4:0a:3c:dc:d4:5b:16:26:d6:3c:67:0e: 25:3c:e2:91:6e:b6:c4:93:2b:43:ae:af:74:ad:e9:02: d7:97:0e:81:55:e5:d7:4f:91:6a:f0:81:5a:46:b6:00: 4a:fa:43:d3:d5:80:2e:5d:cf:c4:4e:a8:37:70:7f:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2d:2f:52:6b:fe:45:8e:17:8f:0d:75:ae:ca:5f:b7:69: 5c:c4:d4:3e:83:aa:4b:a2:6e:68:bb:f4:84:50:b6:32: 4e:a0:9e:e1:74:e0:a3:89:23:d8:6f:ca:5b:13:6a:d6: 48:fe:40:8f:b7:48:00:c7:8d:a6:c9:86:4c:8d:af:37: ed:bb:70:da:1d:5c:2e:47:bf:6a:85:dc:12:83:94:f5: dd:6b:79:c8:f6:b3:43:61:11:01:f9:1c:71:a9:46:6e: 88:c6:a4:92:d2:8f:d2:75:13:7b:df:c2:44:e3:7b:99: bc:b8:7e:1a:75:20:a7:c1:87:bd:ab:d9:5d:b2:14:f0: 0f:22:41:5e:10:7d:37:b8:7b:8e:f7:98:54:a4:3c:3f: 64:f3:70:64:e6:a2:07:46:d2:c1:cb:b7:d3:b7:78:d1: fa:c2:ec:91:0a:fa:20:27:43:c4:c1:09:42:00:54:10: 3b:bc:f9:3f:46:82:5b:30:b6:91:c2:d9:20:2e:34:ff: 36:12:17:ca:aa:1c:85:2d:36:0b:58:4e:16:83:06:40: af:7c:3a:02:ae:f3:66:46:4e:d1:1f:b5:a1:36:a0:1e: 6a:49:de:ea:d2:25:02:02:e4:8a:45:3d:fd:05:36:ec: 09:a9:27:24:c5:85:c0:94:87:b7:08:e7:f3:d9:07:a7 Fingerprint (SHA-256): A7:9B:8E:79:44:2A:42:E5:B4:E5:34:C3:5D:3B:15:E5:6C:B4:DC:06:CB:5A:BB:4C:CF:F8:2D:83:3A:A7:83:81 Fingerprint (SHA1): FE:B8:99:AF:87:3B:A3:44:16:C5:A0:64:33:B5:74:19:BB:2E:C8:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1537: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1538: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141671 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1539: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1540: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1541: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141672 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1542: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1543: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1544: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1545: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018141673 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1546: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1547: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018141674 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1548: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1549: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1550: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1551: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1552: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018141675 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-Bridge-1018141426.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1553: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1554: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1555: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1556: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018141676 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1557: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1558: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1559: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1560: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018141677 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-BridgeNavy-1018141427.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1561: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1562: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1563: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1564: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018141678 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1565: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1566: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1567: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1568: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141672 (0x3caf9be8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:17:04 2023 Not After : Wed Oct 18 14:17:04 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:c9:3c:e0:9a:f2:21:48:2a:77:cc:60:d5:54:60:fa: 65:d3:4a:35:3f:ce:d0:7e:c5:d5:b2:64:55:b3:58:2b: 74:65:8d:27:9b:d7:09:28:8f:fb:f4:95:60:31:0a:4d: 85:92:10:76:cd:47:7f:49:9f:30:4a:4d:fb:d5:72:14: fd:78:c6:46:4d:ac:ec:1e:2d:80:d0:41:dd:08:25:4a: 29:88:bf:e9:20:7d:f2:e2:49:c7:f9:da:e4:ae:84:ac: 96:21:b9:9b:ce:8c:b2:27:c4:07:05:bc:63:b0:e8:e6: 93:e8:86:2c:8f:95:e7:87:9c:cd:ee:82:86:c8:e0:d4: f0:bc:49:44:6e:ae:26:7c:f8:58:9b:c2:dd:c5:8b:4b: d6:1d:b0:9e:d9:da:ee:07:a0:20:fc:31:54:5a:22:19: df:a3:8c:8b:53:05:88:0b:57:6c:07:6c:a4:77:61:d0: 6e:64:4a:bf:6c:30:9d:56:86:a8:39:5d:2b:fd:63:ac: a1:a6:79:3d:f5:89:18:7c:93:92:45:8d:2a:b9:aa:19: 7a:ec:ad:53:a9:53:ea:b9:17:b9:0c:4e:8f:bb:0e:42: 0f:10:e7:c0:3d:01:94:3e:d3:56:97:04:41:06:8c:2c: 92:23:52:6c:99:60:ee:9a:8c:20:6e:e6:cc:28:27:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:63:96:fd:6b:cc:63:55:da:07:b1:17:06:77:df:b7: 3c:97:cb:bc:ea:50:7f:57:0a:18:30:9b:c0:91:c9:e7: 42:3e:77:e7:d5:25:c5:79:9c:57:5f:a0:ea:ad:44:c8: a6:90:dd:aa:fa:70:08:72:d7:b5:7c:60:3d:fb:58:dd: 16:11:f1:8c:ac:57:ff:bd:73:67:2d:90:ac:27:a1:2b: d9:6f:6a:6d:06:32:58:89:ff:52:1f:46:75:63:d2:8c: e0:c7:35:4b:bf:d1:90:83:7b:b7:f4:03:cd:22:da:31: 06:d4:3e:e2:11:10:96:69:e1:86:32:85:27:98:7f:f3: f8:57:5c:89:04:98:af:d9:79:ed:a1:2f:53:f8:85:13: f8:c9:b0:2d:0e:a2:d3:54:19:f4:32:2b:13:d7:2c:0d: 7d:f1:76:32:06:fd:9e:a7:38:61:f8:33:af:f6:26:6a: 8a:5c:e9:4c:3a:82:48:be:cd:f0:cc:42:e1:17:e2:ff: 80:36:1b:8d:f2:17:50:3c:cb:96:12:d2:eb:8f:9e:94: 8f:d4:a6:d2:b5:27:3f:bb:70:cd:09:6e:75:8d:da:9d: cd:eb:9a:32:3b:82:ee:22:e8:e9:77:00:93:da:5c:f7: 6c:3f:24:62:fe:3c:16:e0:93:98:f3:52:23:ed:74:de Fingerprint (SHA-256): 54:1B:27:06:7B:86:4A:B6:84:9D:32:13:F7:3F:A3:C0:2A:79:44:3F:F6:19:5C:E2:62:D2:F8:B2:D5:25:13:D2 Fingerprint (SHA1): D7:34:66:76:1C:CD:53:4A:A1:82:F8:EB:CC:1E:20:71:AC:B1:18:8D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1569: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141672 (0x3caf9be8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:17:04 2023 Not After : Wed Oct 18 14:17:04 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:c9:3c:e0:9a:f2:21:48:2a:77:cc:60:d5:54:60:fa: 65:d3:4a:35:3f:ce:d0:7e:c5:d5:b2:64:55:b3:58:2b: 74:65:8d:27:9b:d7:09:28:8f:fb:f4:95:60:31:0a:4d: 85:92:10:76:cd:47:7f:49:9f:30:4a:4d:fb:d5:72:14: fd:78:c6:46:4d:ac:ec:1e:2d:80:d0:41:dd:08:25:4a: 29:88:bf:e9:20:7d:f2:e2:49:c7:f9:da:e4:ae:84:ac: 96:21:b9:9b:ce:8c:b2:27:c4:07:05:bc:63:b0:e8:e6: 93:e8:86:2c:8f:95:e7:87:9c:cd:ee:82:86:c8:e0:d4: f0:bc:49:44:6e:ae:26:7c:f8:58:9b:c2:dd:c5:8b:4b: d6:1d:b0:9e:d9:da:ee:07:a0:20:fc:31:54:5a:22:19: df:a3:8c:8b:53:05:88:0b:57:6c:07:6c:a4:77:61:d0: 6e:64:4a:bf:6c:30:9d:56:86:a8:39:5d:2b:fd:63:ac: a1:a6:79:3d:f5:89:18:7c:93:92:45:8d:2a:b9:aa:19: 7a:ec:ad:53:a9:53:ea:b9:17:b9:0c:4e:8f:bb:0e:42: 0f:10:e7:c0:3d:01:94:3e:d3:56:97:04:41:06:8c:2c: 92:23:52:6c:99:60:ee:9a:8c:20:6e:e6:cc:28:27:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:63:96:fd:6b:cc:63:55:da:07:b1:17:06:77:df:b7: 3c:97:cb:bc:ea:50:7f:57:0a:18:30:9b:c0:91:c9:e7: 42:3e:77:e7:d5:25:c5:79:9c:57:5f:a0:ea:ad:44:c8: a6:90:dd:aa:fa:70:08:72:d7:b5:7c:60:3d:fb:58:dd: 16:11:f1:8c:ac:57:ff:bd:73:67:2d:90:ac:27:a1:2b: d9:6f:6a:6d:06:32:58:89:ff:52:1f:46:75:63:d2:8c: e0:c7:35:4b:bf:d1:90:83:7b:b7:f4:03:cd:22:da:31: 06:d4:3e:e2:11:10:96:69:e1:86:32:85:27:98:7f:f3: f8:57:5c:89:04:98:af:d9:79:ed:a1:2f:53:f8:85:13: f8:c9:b0:2d:0e:a2:d3:54:19:f4:32:2b:13:d7:2c:0d: 7d:f1:76:32:06:fd:9e:a7:38:61:f8:33:af:f6:26:6a: 8a:5c:e9:4c:3a:82:48:be:cd:f0:cc:42:e1:17:e2:ff: 80:36:1b:8d:f2:17:50:3c:cb:96:12:d2:eb:8f:9e:94: 8f:d4:a6:d2:b5:27:3f:bb:70:cd:09:6e:75:8d:da:9d: cd:eb:9a:32:3b:82:ee:22:e8:e9:77:00:93:da:5c:f7: 6c:3f:24:62:fe:3c:16:e0:93:98:f3:52:23:ed:74:de Fingerprint (SHA-256): 54:1B:27:06:7B:86:4A:B6:84:9D:32:13:F7:3F:A3:C0:2A:79:44:3F:F6:19:5C:E2:62:D2:F8:B2:D5:25:13:D2 Fingerprint (SHA1): D7:34:66:76:1C:CD:53:4A:A1:82:F8:EB:CC:1E:20:71:AC:B1:18:8D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1570: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #1571: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141671 (0x3caf9be7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:17:03 2023 Not After : Wed Oct 18 14:17:03 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:82:1b:69:0a:01:4d:5e:0d:9c:eb:dd:76:19:19:cd: c7:3f:bf:bf:a3:08:ec:05:4a:3a:71:f7:5a:39:14:5b: 5d:45:50:dd:4c:4d:98:4b:ad:74:16:37:ad:30:bc:16: 27:f5:a9:9f:65:77:4e:b9:35:cf:a5:c1:29:40:07:d4: 69:0a:f8:37:24:c6:7f:cd:e4:08:ba:31:f6:be:66:4d: 1e:14:f8:66:fe:e7:f7:2a:ee:ac:89:d2:85:dd:39:7f: 8a:c7:55:a3:94:9d:96:f5:8f:f1:31:20:7f:12:b1:17: f3:4c:02:8d:24:85:27:c4:fa:3a:8f:98:1f:6c:5a:69: 94:67:4f:c7:9b:4a:29:da:9c:43:a8:72:d1:c8:b0:85: 7b:4b:d5:d1:c7:63:8b:10:94:eb:5e:52:cc:c6:0b:53: 6a:5c:8d:19:74:82:25:58:f4:8d:1e:e4:e2:18:ce:60: 7a:1d:38:4c:d9:f3:f0:52:53:e6:78:c1:ab:2e:33:f2: 1c:90:e3:45:da:01:b5:92:39:15:72:2a:1a:86:6e:2d: 09:76:5d:da:39:af:b6:65:41:cf:69:3f:06:dd:3f:73: 56:40:36:00:5e:5a:c6:35:f4:43:90:e9:71:77:43:e5: 4c:15:11:ec:13:ab:57:46:0a:39:de:ef:97:d0:2a:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 49:55:7b:86:a3:ac:9b:07:b7:2f:e2:1f:eb:44:61:bc: cf:18:d3:6f:54:99:be:78:3e:b8:5f:81:2b:bb:44:ec: aa:75:92:a0:ff:f2:87:28:88:f7:17:04:88:3c:13:fb: ac:73:9b:c2:6f:e9:c4:c8:cf:ee:3a:39:1f:3c:23:02: 59:4d:21:bd:3e:14:9e:91:2a:4e:76:b2:7b:c9:fe:c2: 4b:ed:90:98:ca:85:83:94:f7:50:00:41:48:b7:05:67: 63:bc:57:ff:75:03:f7:76:67:3d:ac:f9:6b:4e:c6:cd: 1b:e5:02:e0:d4:ad:48:57:42:44:e7:8a:82:67:26:43: d7:5b:59:b1:97:20:19:95:a0:73:7b:fa:fb:30:fe:34: aa:d8:05:b9:a9:47:4e:dd:b5:1b:f5:78:a4:14:64:63: 18:6d:95:e8:a3:d4:ab:5a:60:72:4b:34:04:cd:6a:c1: 76:ef:84:d4:87:dc:16:30:20:13:11:49:b7:1f:7a:17: 29:cf:65:59:e1:32:9f:62:7c:43:2f:fe:90:7f:49:28: da:ad:35:38:d7:4e:b2:12:3c:3b:17:9f:91:61:19:03: 17:2b:38:99:54:e0:2a:11:8a:f5:36:1f:56:13:3f:7f: cd:78:1b:8c:d8:51:9f:ea:3b:0c:fe:ae:af:cc:d4:93 Fingerprint (SHA-256): F4:12:0B:A7:C0:4D:1E:22:90:45:B3:BD:68:A3:41:56:6C:11:69:3D:08:88:6F:18:7D:4A:04:09:B1:2B:80:2B Fingerprint (SHA1): 02:DE:27:D7:F6:57:F7:1F:A4:94:F4:A4:B2:39:C8:4C:1A:67:E0:19 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1572: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141672 (0x3caf9be8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:17:04 2023 Not After : Wed Oct 18 14:17:04 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:c9:3c:e0:9a:f2:21:48:2a:77:cc:60:d5:54:60:fa: 65:d3:4a:35:3f:ce:d0:7e:c5:d5:b2:64:55:b3:58:2b: 74:65:8d:27:9b:d7:09:28:8f:fb:f4:95:60:31:0a:4d: 85:92:10:76:cd:47:7f:49:9f:30:4a:4d:fb:d5:72:14: fd:78:c6:46:4d:ac:ec:1e:2d:80:d0:41:dd:08:25:4a: 29:88:bf:e9:20:7d:f2:e2:49:c7:f9:da:e4:ae:84:ac: 96:21:b9:9b:ce:8c:b2:27:c4:07:05:bc:63:b0:e8:e6: 93:e8:86:2c:8f:95:e7:87:9c:cd:ee:82:86:c8:e0:d4: f0:bc:49:44:6e:ae:26:7c:f8:58:9b:c2:dd:c5:8b:4b: d6:1d:b0:9e:d9:da:ee:07:a0:20:fc:31:54:5a:22:19: df:a3:8c:8b:53:05:88:0b:57:6c:07:6c:a4:77:61:d0: 6e:64:4a:bf:6c:30:9d:56:86:a8:39:5d:2b:fd:63:ac: a1:a6:79:3d:f5:89:18:7c:93:92:45:8d:2a:b9:aa:19: 7a:ec:ad:53:a9:53:ea:b9:17:b9:0c:4e:8f:bb:0e:42: 0f:10:e7:c0:3d:01:94:3e:d3:56:97:04:41:06:8c:2c: 92:23:52:6c:99:60:ee:9a:8c:20:6e:e6:cc:28:27:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:63:96:fd:6b:cc:63:55:da:07:b1:17:06:77:df:b7: 3c:97:cb:bc:ea:50:7f:57:0a:18:30:9b:c0:91:c9:e7: 42:3e:77:e7:d5:25:c5:79:9c:57:5f:a0:ea:ad:44:c8: a6:90:dd:aa:fa:70:08:72:d7:b5:7c:60:3d:fb:58:dd: 16:11:f1:8c:ac:57:ff:bd:73:67:2d:90:ac:27:a1:2b: d9:6f:6a:6d:06:32:58:89:ff:52:1f:46:75:63:d2:8c: e0:c7:35:4b:bf:d1:90:83:7b:b7:f4:03:cd:22:da:31: 06:d4:3e:e2:11:10:96:69:e1:86:32:85:27:98:7f:f3: f8:57:5c:89:04:98:af:d9:79:ed:a1:2f:53:f8:85:13: f8:c9:b0:2d:0e:a2:d3:54:19:f4:32:2b:13:d7:2c:0d: 7d:f1:76:32:06:fd:9e:a7:38:61:f8:33:af:f6:26:6a: 8a:5c:e9:4c:3a:82:48:be:cd:f0:cc:42:e1:17:e2:ff: 80:36:1b:8d:f2:17:50:3c:cb:96:12:d2:eb:8f:9e:94: 8f:d4:a6:d2:b5:27:3f:bb:70:cd:09:6e:75:8d:da:9d: cd:eb:9a:32:3b:82:ee:22:e8:e9:77:00:93:da:5c:f7: 6c:3f:24:62:fe:3c:16:e0:93:98:f3:52:23:ed:74:de Fingerprint (SHA-256): 54:1B:27:06:7B:86:4A:B6:84:9D:32:13:F7:3F:A3:C0:2A:79:44:3F:F6:19:5C:E2:62:D2:F8:B2:D5:25:13:D2 Fingerprint (SHA1): D7:34:66:76:1C:CD:53:4A:A1:82:F8:EB:CC:1E:20:71:AC:B1:18:8D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1573: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141672 (0x3caf9be8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:17:04 2023 Not After : Wed Oct 18 14:17:04 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:c9:3c:e0:9a:f2:21:48:2a:77:cc:60:d5:54:60:fa: 65:d3:4a:35:3f:ce:d0:7e:c5:d5:b2:64:55:b3:58:2b: 74:65:8d:27:9b:d7:09:28:8f:fb:f4:95:60:31:0a:4d: 85:92:10:76:cd:47:7f:49:9f:30:4a:4d:fb:d5:72:14: fd:78:c6:46:4d:ac:ec:1e:2d:80:d0:41:dd:08:25:4a: 29:88:bf:e9:20:7d:f2:e2:49:c7:f9:da:e4:ae:84:ac: 96:21:b9:9b:ce:8c:b2:27:c4:07:05:bc:63:b0:e8:e6: 93:e8:86:2c:8f:95:e7:87:9c:cd:ee:82:86:c8:e0:d4: f0:bc:49:44:6e:ae:26:7c:f8:58:9b:c2:dd:c5:8b:4b: d6:1d:b0:9e:d9:da:ee:07:a0:20:fc:31:54:5a:22:19: df:a3:8c:8b:53:05:88:0b:57:6c:07:6c:a4:77:61:d0: 6e:64:4a:bf:6c:30:9d:56:86:a8:39:5d:2b:fd:63:ac: a1:a6:79:3d:f5:89:18:7c:93:92:45:8d:2a:b9:aa:19: 7a:ec:ad:53:a9:53:ea:b9:17:b9:0c:4e:8f:bb:0e:42: 0f:10:e7:c0:3d:01:94:3e:d3:56:97:04:41:06:8c:2c: 92:23:52:6c:99:60:ee:9a:8c:20:6e:e6:cc:28:27:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0e:63:96:fd:6b:cc:63:55:da:07:b1:17:06:77:df:b7: 3c:97:cb:bc:ea:50:7f:57:0a:18:30:9b:c0:91:c9:e7: 42:3e:77:e7:d5:25:c5:79:9c:57:5f:a0:ea:ad:44:c8: a6:90:dd:aa:fa:70:08:72:d7:b5:7c:60:3d:fb:58:dd: 16:11:f1:8c:ac:57:ff:bd:73:67:2d:90:ac:27:a1:2b: d9:6f:6a:6d:06:32:58:89:ff:52:1f:46:75:63:d2:8c: e0:c7:35:4b:bf:d1:90:83:7b:b7:f4:03:cd:22:da:31: 06:d4:3e:e2:11:10:96:69:e1:86:32:85:27:98:7f:f3: f8:57:5c:89:04:98:af:d9:79:ed:a1:2f:53:f8:85:13: f8:c9:b0:2d:0e:a2:d3:54:19:f4:32:2b:13:d7:2c:0d: 7d:f1:76:32:06:fd:9e:a7:38:61:f8:33:af:f6:26:6a: 8a:5c:e9:4c:3a:82:48:be:cd:f0:cc:42:e1:17:e2:ff: 80:36:1b:8d:f2:17:50:3c:cb:96:12:d2:eb:8f:9e:94: 8f:d4:a6:d2:b5:27:3f:bb:70:cd:09:6e:75:8d:da:9d: cd:eb:9a:32:3b:82:ee:22:e8:e9:77:00:93:da:5c:f7: 6c:3f:24:62:fe:3c:16:e0:93:98:f3:52:23:ed:74:de Fingerprint (SHA-256): 54:1B:27:06:7B:86:4A:B6:84:9D:32:13:F7:3F:A3:C0:2A:79:44:3F:F6:19:5C:E2:62:D2:F8:B2:D5:25:13:D2 Fingerprint (SHA1): D7:34:66:76:1C:CD:53:4A:A1:82:F8:EB:CC:1E:20:71:AC:B1:18:8D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1574: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1575: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141679 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1576: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1577: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1578: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141680 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1579: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1580: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #1581: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1582: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1018141681 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1583: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1584: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #1585: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1586: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1018141682 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1587: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1588: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1589: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1590: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1018141683 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1591: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1592: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1018141684 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1593: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1594: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #1595: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1596: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1597: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018141685 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1598: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1599: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1600: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1601: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018141686 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1602: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1603: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1604: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1605: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018141687 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1606: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1607: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1608: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1609: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018141688 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1610: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1611: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1612: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141679 (0x3caf9bef) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:17:07 2023 Not After : Wed Oct 18 14:17:07 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:6d:30:9a:30:cb:35:3f:e3:48:5e:ca:11:b6:f1:12: af:dd:d3:db:4d:df:84:88:84:ed:d9:1a:7b:d3:4d:79: 9d:3f:45:6a:8c:13:15:28:12:7f:a8:05:75:65:7e:42: 12:a0:d8:76:45:28:70:48:df:25:6b:f5:b5:bc:c4:b2: 1f:4c:d5:2f:dd:aa:40:28:d8:53:3f:51:94:78:2f:75: b4:22:1c:1e:93:90:1c:3f:29:bc:fe:07:90:93:5e:c5: dc:0e:1c:38:b7:d3:1e:32:e7:32:18:35:0c:cb:ea:21: 3f:bc:2b:e7:78:cf:cd:00:01:9b:60:7f:ca:1c:ff:39: da:cf:77:00:31:55:6e:34:f4:a3:dd:fa:a6:85:3d:9b: 84:3a:ad:ea:a5:24:b2:4d:fe:04:1c:fc:c1:28:b9:de: a1:66:cf:13:33:84:26:86:37:9f:ff:f1:69:aa:c1:f9: cd:93:ff:84:db:65:14:1f:fd:cd:18:98:ca:e8:09:21: 84:df:fd:bc:d5:c6:3e:1a:cc:e8:1d:d5:ac:0f:28:80: d6:53:51:39:c1:a1:1c:59:cc:f1:49:cb:3b:0a:1f:18: 58:eb:b5:92:41:c5:5d:74:25:25:a6:c0:69:72:b9:d1: 17:5f:af:1f:59:b9:9d:89:7e:d3:96:17:9d:7b:71:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 64:a3:79:b8:85:fb:d4:47:8f:b5:77:94:17:63:82:aa: 88:33:4d:f0:25:1e:18:a7:da:54:23:f6:f9:8c:4d:d1: c5:41:75:ac:d7:0d:88:2e:87:be:87:32:69:ca:50:90: 26:ec:71:25:5b:27:e1:6a:30:38:30:b2:47:d7:19:66: 47:28:a1:74:69:48:d0:1c:43:3e:4e:fd:07:bc:eb:ed: 7d:a6:dd:77:a8:21:1b:66:6b:fa:10:a0:2a:f3:16:88: e3:d7:1a:ca:d5:6c:7f:c5:76:59:71:9d:35:49:39:8e: e8:36:38:83:28:db:bd:d9:7a:91:87:5a:b0:b2:82:eb: 88:ba:71:cc:7d:8b:11:dd:0c:c4:52:fd:a4:1c:37:cf: b9:25:d6:d3:68:d9:32:74:c9:e9:e4:64:44:32:5e:eb: 4a:0f:72:fc:b4:7d:ec:aa:1c:1e:28:17:e5:e7:a6:92: 69:23:c3:57:4c:1d:52:db:41:c5:9d:b3:ad:ed:58:7f: cc:20:b3:69:ba:b9:f3:43:4d:3e:96:28:90:4d:da:15: e7:af:33:f3:3c:6f:4e:a9:55:68:cc:ca:58:5b:e0:f0: 0e:a6:e2:bc:91:8a:3d:15:c9:39:14:fc:67:60:b2:5f: 00:f4:96:54:72:c7:47:e4:81:a1:73:9f:16:39:f2:f2 Fingerprint (SHA-256): 4B:DE:C5:09:63:97:0E:96:0E:60:10:23:65:6A:B7:61:F8:79:EC:40:DE:CA:A3:DF:26:45:F5:A3:9E:0B:D3:FA Fingerprint (SHA1): F1:FC:67:1B:40:30:EE:60:E7:42:27:62:83:E8:06:E4:0E:08:65:12 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #1613: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1614: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1615: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1616: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1617: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1618: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1619: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1620: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1621: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141680 (0x3caf9bf0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:17:07 2023 Not After : Wed Oct 18 14:17:07 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:62:9b:ae:7f:19:08:63:1b:6c:8b:df:ac:1b:ea:18: c5:7c:e5:a4:28:70:59:f8:12:94:e6:0d:bd:d3:28:ce: e0:a6:7a:1b:b0:b2:d6:09:55:fd:3d:16:13:80:09:a8: 2e:30:10:76:1a:b0:e4:ac:cb:d5:3e:93:ad:3a:66:4f: ff:30:85:32:69:aa:4d:76:ca:d5:32:d0:4a:0c:9c:af: 6a:e3:38:e6:63:e7:7c:c5:d6:b1:56:11:8d:99:fb:f2: 25:0a:59:6e:44:d9:70:f1:9e:09:88:2e:1e:44:54:9a: fa:05:ee:5b:2f:4c:33:be:e1:d5:23:2f:5a:72:b3:04: 4a:8f:ba:f4:9e:ca:c8:e6:97:87:b0:22:7c:d5:4c:b0: 92:27:b4:bf:55:5c:c6:d3:4f:1e:bb:3a:e6:eb:12:ae: 04:83:e4:21:94:c5:f3:b3:5b:37:15:d5:7c:1c:fa:82: ea:76:50:dd:a6:33:67:1b:df:da:c7:d2:63:51:d7:92: 90:12:74:26:87:43:43:de:de:3a:48:56:c9:e7:93:ec: 89:0f:28:8e:12:21:c3:88:f5:fc:d6:c1:a0:72:57:31: e6:a9:ee:45:11:1e:b1:bb:71:d4:19:cf:7c:3a:8c:c0: 8f:dd:40:6a:fc:59:21:b5:5f:86:24:cb:a0:68:71:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:5b:a7:37:1c:26:41:19:12:6d:85:3d:ce:24:16:20: 45:13:ee:6c:9f:b8:64:92:67:a9:aa:d6:e5:2b:2b:69: 89:02:9e:f7:92:55:44:8e:fc:42:bc:47:3c:c3:34:33: 70:8e:a9:20:59:c0:9e:21:3f:dc:6a:02:21:e8:cb:57: 25:c5:d1:fe:98:a5:02:ac:e4:ac:50:c5:13:ed:dd:8a: 51:d0:d8:5c:6b:2f:cf:6e:be:2d:26:a8:84:00:e1:bd: a9:f2:ea:99:9f:eb:44:eb:85:2d:05:ee:cf:c0:b3:24: 85:04:42:36:c3:44:2a:80:9e:ed:47:e7:04:40:a2:24: 4b:ce:0c:48:fa:4b:04:e5:f9:e7:37:8a:c5:c6:79:c5: 68:24:6e:78:94:f5:89:ac:14:ef:b0:1e:a9:b0:86:df: 33:68:7e:89:06:1f:90:39:4e:ef:54:ba:94:6b:fd:d4: 83:92:ae:e5:31:58:06:4f:14:30:b3:1b:03:08:23:12: 4e:42:93:2b:a4:14:99:4f:58:3f:d2:3f:ca:57:35:4f: 51:64:32:ab:c6:27:26:e6:e5:d4:39:06:78:c2:51:93: 45:e7:54:da:f6:68:27:bc:0e:ad:42:70:3d:0e:7b:2b: b4:a0:c8:69:ca:c6:54:ae:ab:5e:5b:5d:83:1a:d5:be Fingerprint (SHA-256): CB:DE:98:5B:C6:22:89:DE:78:3E:24:43:72:AC:0D:9C:2E:A4:9F:53:0E:28:95:E8:07:C2:F0:19:E2:33:95:C8 Fingerprint (SHA1): 8E:99:5F:4D:12:C2:39:D6:FA:9F:12:C2:B4:C6:7D:F2:3D:56:06:05 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #1622: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1623: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1624: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1625: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1626: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1627: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1628: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #1629: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #1630: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #1631: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #1632: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #1633: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #1634: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #1635: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1636: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1637: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #1638: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1639: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1640: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141689 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1641: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1642: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1643: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1644: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018141690 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1645: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1646: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1647: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1648: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018141691 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1649: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1650: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1651: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1652: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1018141692 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1653: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1654: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1655: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1656: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018141693 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1657: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1658: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1659: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1660: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1018141694 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1661: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1662: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1663: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1664: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1018141695 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1665: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1666: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #1667: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1668: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1018141696 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1669: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1670: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1671: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1672: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1018141697 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1673: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1674: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1675: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141689 (0x3caf9bf9) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:17:11 2023 Not After : Wed Oct 18 14:17:11 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 2e:d9:3f:5c:8b:76:eb:06:00:ef:51:b1:91:d2:d1:0e: 32:8b:4f:4c:a0:26:2e:80:f9:e1:c7:b3:0e:a0:03:fd: 31:96:91:6f:f5:86:84:b6:67:f2:d5:fb:f9:ec:b3:b6: d6:2f:dd:e2:a9:15:df:fe:ac:19:3f:35:39:a0:b2:d3: 6b:07:7f:86:46:92:f2:7c:0e:ba:f6:95:2f:7f:bc:2d: df:08:24:92:82:7d:11:38:29:6e:1a:88:3b:93:9a:a9: 55:60:f5:d4:13:a1:60:c4:e1:0a:2e:88:2d:0a:ed:a6: 77:8f:99:9d:fb:30:53:54:0d:76:a2:5b:cb:f1:61:27: bf:db:d6:85:cb:56:3f:75:df:85:7c:49:22:74:95:d7: c4:29:b5:f1:98:d7:6d:ee:84:0c:88:18:1e:ea:28:92: 3d:ab:15:d1:25:cd:fd:2a:fa:92:c3:50:1d:28:67:ee: 25:2c:e0:bd:42:75:3b:3e:46:bf:99:1e:86:22:08:f9: 16:8b:35:72:72:9b:44:b0:5d:8c:2e:85:a7:9d:66:97: 16:de:e9:a8:fa:62:e6:db:b1:6a:2e:ad:a7:c5:eb:7e: 4a:04:e3:3c:55:df:0a:ee:99:eb:44:b7:4d:f8:e4:27: cd:2a:68:09:c5:0b:75:0c:15:d0:21:5c:df:82:73:7e Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:d8:1b:39:d8:7b:80:cb:5b:85:1a:b7: da:42:6b:57:fc:57:d0:d3:21:2c:ca:ba:2d:e5:3d:8e: a3:02:1c:44:5a:85:a3:68:d2:31:80:71:48:44:8a:12: 7e:41:52:f4:b1:c9:b1:1f:8e:00:24:b8:cd:9d:de Fingerprint (SHA-256): 93:F4:60:10:B5:34:3B:C4:74:3A:27:C9:5A:8E:F5:61:C1:5E:C4:49:D9:E8:61:AE:8D:DE:88:9A:7A:3F:99:B4 Fingerprint (SHA1): 10:73:2A:8A:74:B6:F1:78:CA:FE:BE:BA:57:2A:50:28:93:9C:E6:60 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1676: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141689 (0x3caf9bf9) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:17:11 2023 Not After : Wed Oct 18 14:17:11 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 2e:d9:3f:5c:8b:76:eb:06:00:ef:51:b1:91:d2:d1:0e: 32:8b:4f:4c:a0:26:2e:80:f9:e1:c7:b3:0e:a0:03:fd: 31:96:91:6f:f5:86:84:b6:67:f2:d5:fb:f9:ec:b3:b6: d6:2f:dd:e2:a9:15:df:fe:ac:19:3f:35:39:a0:b2:d3: 6b:07:7f:86:46:92:f2:7c:0e:ba:f6:95:2f:7f:bc:2d: df:08:24:92:82:7d:11:38:29:6e:1a:88:3b:93:9a:a9: 55:60:f5:d4:13:a1:60:c4:e1:0a:2e:88:2d:0a:ed:a6: 77:8f:99:9d:fb:30:53:54:0d:76:a2:5b:cb:f1:61:27: bf:db:d6:85:cb:56:3f:75:df:85:7c:49:22:74:95:d7: c4:29:b5:f1:98:d7:6d:ee:84:0c:88:18:1e:ea:28:92: 3d:ab:15:d1:25:cd:fd:2a:fa:92:c3:50:1d:28:67:ee: 25:2c:e0:bd:42:75:3b:3e:46:bf:99:1e:86:22:08:f9: 16:8b:35:72:72:9b:44:b0:5d:8c:2e:85:a7:9d:66:97: 16:de:e9:a8:fa:62:e6:db:b1:6a:2e:ad:a7:c5:eb:7e: 4a:04:e3:3c:55:df:0a:ee:99:eb:44:b7:4d:f8:e4:27: cd:2a:68:09:c5:0b:75:0c:15:d0:21:5c:df:82:73:7e Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:d8:1b:39:d8:7b:80:cb:5b:85:1a:b7: da:42:6b:57:fc:57:d0:d3:21:2c:ca:ba:2d:e5:3d:8e: a3:02:1c:44:5a:85:a3:68:d2:31:80:71:48:44:8a:12: 7e:41:52:f4:b1:c9:b1:1f:8e:00:24:b8:cd:9d:de Fingerprint (SHA-256): 93:F4:60:10:B5:34:3B:C4:74:3A:27:C9:5A:8E:F5:61:C1:5E:C4:49:D9:E8:61:AE:8D:DE:88:9A:7A:3F:99:B4 Fingerprint (SHA1): 10:73:2A:8A:74:B6:F1:78:CA:FE:BE:BA:57:2A:50:28:93:9C:E6:60 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1677: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141689 (0x3caf9bf9) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:17:11 2023 Not After : Wed Oct 18 14:17:11 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 2e:d9:3f:5c:8b:76:eb:06:00:ef:51:b1:91:d2:d1:0e: 32:8b:4f:4c:a0:26:2e:80:f9:e1:c7:b3:0e:a0:03:fd: 31:96:91:6f:f5:86:84:b6:67:f2:d5:fb:f9:ec:b3:b6: d6:2f:dd:e2:a9:15:df:fe:ac:19:3f:35:39:a0:b2:d3: 6b:07:7f:86:46:92:f2:7c:0e:ba:f6:95:2f:7f:bc:2d: df:08:24:92:82:7d:11:38:29:6e:1a:88:3b:93:9a:a9: 55:60:f5:d4:13:a1:60:c4:e1:0a:2e:88:2d:0a:ed:a6: 77:8f:99:9d:fb:30:53:54:0d:76:a2:5b:cb:f1:61:27: bf:db:d6:85:cb:56:3f:75:df:85:7c:49:22:74:95:d7: c4:29:b5:f1:98:d7:6d:ee:84:0c:88:18:1e:ea:28:92: 3d:ab:15:d1:25:cd:fd:2a:fa:92:c3:50:1d:28:67:ee: 25:2c:e0:bd:42:75:3b:3e:46:bf:99:1e:86:22:08:f9: 16:8b:35:72:72:9b:44:b0:5d:8c:2e:85:a7:9d:66:97: 16:de:e9:a8:fa:62:e6:db:b1:6a:2e:ad:a7:c5:eb:7e: 4a:04:e3:3c:55:df:0a:ee:99:eb:44:b7:4d:f8:e4:27: cd:2a:68:09:c5:0b:75:0c:15:d0:21:5c:df:82:73:7e Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:d8:1b:39:d8:7b:80:cb:5b:85:1a:b7: da:42:6b:57:fc:57:d0:d3:21:2c:ca:ba:2d:e5:3d:8e: a3:02:1c:44:5a:85:a3:68:d2:31:80:71:48:44:8a:12: 7e:41:52:f4:b1:c9:b1:1f:8e:00:24:b8:cd:9d:de Fingerprint (SHA-256): 93:F4:60:10:B5:34:3B:C4:74:3A:27:C9:5A:8E:F5:61:C1:5E:C4:49:D9:E8:61:AE:8D:DE:88:9A:7A:3F:99:B4 Fingerprint (SHA1): 10:73:2A:8A:74:B6:F1:78:CA:FE:BE:BA:57:2A:50:28:93:9C:E6:60 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1678: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141689 (0x3caf9bf9) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:17:11 2023 Not After : Wed Oct 18 14:17:11 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 2e:d9:3f:5c:8b:76:eb:06:00:ef:51:b1:91:d2:d1:0e: 32:8b:4f:4c:a0:26:2e:80:f9:e1:c7:b3:0e:a0:03:fd: 31:96:91:6f:f5:86:84:b6:67:f2:d5:fb:f9:ec:b3:b6: d6:2f:dd:e2:a9:15:df:fe:ac:19:3f:35:39:a0:b2:d3: 6b:07:7f:86:46:92:f2:7c:0e:ba:f6:95:2f:7f:bc:2d: df:08:24:92:82:7d:11:38:29:6e:1a:88:3b:93:9a:a9: 55:60:f5:d4:13:a1:60:c4:e1:0a:2e:88:2d:0a:ed:a6: 77:8f:99:9d:fb:30:53:54:0d:76:a2:5b:cb:f1:61:27: bf:db:d6:85:cb:56:3f:75:df:85:7c:49:22:74:95:d7: c4:29:b5:f1:98:d7:6d:ee:84:0c:88:18:1e:ea:28:92: 3d:ab:15:d1:25:cd:fd:2a:fa:92:c3:50:1d:28:67:ee: 25:2c:e0:bd:42:75:3b:3e:46:bf:99:1e:86:22:08:f9: 16:8b:35:72:72:9b:44:b0:5d:8c:2e:85:a7:9d:66:97: 16:de:e9:a8:fa:62:e6:db:b1:6a:2e:ad:a7:c5:eb:7e: 4a:04:e3:3c:55:df:0a:ee:99:eb:44:b7:4d:f8:e4:27: cd:2a:68:09:c5:0b:75:0c:15:d0:21:5c:df:82:73:7e Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:d8:1b:39:d8:7b:80:cb:5b:85:1a:b7: da:42:6b:57:fc:57:d0:d3:21:2c:ca:ba:2d:e5:3d:8e: a3:02:1c:44:5a:85:a3:68:d2:31:80:71:48:44:8a:12: 7e:41:52:f4:b1:c9:b1:1f:8e:00:24:b8:cd:9d:de Fingerprint (SHA-256): 93:F4:60:10:B5:34:3B:C4:74:3A:27:C9:5A:8E:F5:61:C1:5E:C4:49:D9:E8:61:AE:8D:DE:88:9A:7A:3F:99:B4 Fingerprint (SHA1): 10:73:2A:8A:74:B6:F1:78:CA:FE:BE:BA:57:2A:50:28:93:9C:E6:60 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #1679: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1680: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 10 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1681: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1682: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1683: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1684: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1685: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1686: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1687: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1688: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1689: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1690: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1691: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1692: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1693: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1694: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #1695: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1696: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1697: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1698: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1699: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1700: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1701: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1702: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1703: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1704: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1705: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1706: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018141717Z nextupdate=20241018141717Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 14:17:17 2023 Next Update: Fri Oct 18 14:17:17 2024 CRL Extensions: chains.sh: #1707: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018141717Z nextupdate=20241018141717Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:17:17 2023 Next Update: Fri Oct 18 14:17:17 2024 CRL Extensions: chains.sh: #1708: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018141717Z nextupdate=20241018141717Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 14:17:17 2023 Next Update: Fri Oct 18 14:17:17 2024 CRL Extensions: chains.sh: #1709: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018141717Z nextupdate=20241018141717Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 14:17:17 2023 Next Update: Fri Oct 18 14:17:17 2024 CRL Extensions: chains.sh: #1710: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018141718Z addcert 14 20231018141718Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 14:17:18 2023 Next Update: Fri Oct 18 14:17:17 2024 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Wed Oct 18 14:17:18 2023 CRL Extensions: chains.sh: #1711: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018141719Z addcert 15 20231018141719Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:17:19 2023 Next Update: Fri Oct 18 14:17:17 2024 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Wed Oct 18 14:17:19 2023 CRL Extensions: chains.sh: #1712: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1713: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1714: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1715: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #1716: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #1717: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #1718: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #1719: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #1720: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #1721: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:17:14 2023 Not After : Wed Oct 18 14:17:14 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:a0:8b:ea:e0:f4:8e:46:2f:c3:f3:61:1c:6c:d6:e7: 25:0b:d5:ec:66:c0:c6:33:41:62:d4:49:3e:1c:42:fe: d8:7a:e2:ec:69:3b:86:70:c1:9e:18:05:d3:fe:78:af: dd:9d:f7:64:f4:c0:f3:88:cf:c4:69:7b:37:77:bd:27: 01:38:20:fe:b8:d2:a0:54:02:74:30:f2:55:05:25:3e: b7:43:88:06:0a:90:71:dc:bd:6a:c6:bd:0b:04:3b:b5: 8a:39:31:f0:15:41:9e:54:a1:13:a1:d6:61:97:a4:1e: 37:f6:ad:bc:48:f7:0d:85:39:e0:69:34:c5:c1:05:8c: d3:d7:68:e5:87:27:ad:8a:37:ab:0e:cf:8a:55:f6:5e: 1f:61:31:88:ff:5a:ee:1f:04:1f:42:1b:db:71:51:9c: 34:0c:c5:c2:12:de:60:32:59:7a:1b:5c:c9:20:d6:c9: a8:ed:31:54:f7:fe:f1:7d:ea:22:da:96:76:62:c7:7d: 4b:37:72:4c:10:58:fa:ab:76:b5:3b:21:55:f1:a9:41: fd:71:cb:b5:55:4e:5f:84:6c:f2:33:00:f2:8a:b4:79: 91:8f:06:10:39:95:a2:6a:9f:b4:3b:1c:bd:79:6f:42: 13:8d:43:c9:22:d0:d2:13:65:06:fb:7a:2a:a5:b5:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:a4:44:ed:75:c8:e4:d8:16:15:25:23:88:63:30:ee: 99:19:b5:1d:63:6d:9f:d3:61:1b:57:3c:92:47:2e:63: f9:cd:21:4d:80:7d:dc:d5:86:17:00:a5:73:e2:7d:08: d6:08:43:ea:9a:4f:15:fd:3f:c9:bf:46:8a:c2:9e:05: 9c:ee:8a:8b:2d:87:af:3e:ba:2a:f0:a8:ac:86:c9:6f: 29:89:07:5b:be:7a:64:d1:bf:01:18:44:d1:6e:d5:c4: dd:6e:57:92:ae:81:99:32:b5:e4:91:b0:63:7e:32:40: 29:cc:82:93:c0:d9:c4:35:09:d4:4a:cd:c8:28:e8:79: cb:e6:37:43:39:e4:c6:36:1b:ae:e1:3a:33:7b:1a:67: bc:c1:74:67:97:f7:a2:ce:73:21:df:b3:2e:42:d0:69: 33:7f:7e:1a:10:26:fc:a5:f5:3b:ca:50:31:f8:62:8b: f4:4f:e6:ea:41:fb:71:b2:17:62:d4:6d:15:9f:3a:e0: 42:01:47:16:90:31:83:68:a6:5c:e8:74:44:dd:0f:84: f8:5b:31:de:9b:e5:f7:92:6e:2a:54:96:96:0f:91:0d: b7:3d:d7:81:5c:1f:fe:8f:06:a0:44:32:14:26:4a:50: 67:eb:f1:60:d6:30:f0:94:47:9f:99:38:e0:cb:20:fc Fingerprint (SHA-256): 34:C3:5E:61:0D:AD:D8:F9:55:61:93:C5:B1:48:2E:B6:96:78:72:5E:F5:D8:DF:2B:3D:76:6E:C8:70:0C:BD:36 Fingerprint (SHA1): 1D:CB:B7:F3:9E:34:FC:0A:35:E7:E5:C2:07:4D:14:1C:80:E6:1C:7A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1722: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1723: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:17:14 2023 Not After : Wed Oct 18 14:17:14 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d7:a0:8b:ea:e0:f4:8e:46:2f:c3:f3:61:1c:6c:d6:e7: 25:0b:d5:ec:66:c0:c6:33:41:62:d4:49:3e:1c:42:fe: d8:7a:e2:ec:69:3b:86:70:c1:9e:18:05:d3:fe:78:af: dd:9d:f7:64:f4:c0:f3:88:cf:c4:69:7b:37:77:bd:27: 01:38:20:fe:b8:d2:a0:54:02:74:30:f2:55:05:25:3e: b7:43:88:06:0a:90:71:dc:bd:6a:c6:bd:0b:04:3b:b5: 8a:39:31:f0:15:41:9e:54:a1:13:a1:d6:61:97:a4:1e: 37:f6:ad:bc:48:f7:0d:85:39:e0:69:34:c5:c1:05:8c: d3:d7:68:e5:87:27:ad:8a:37:ab:0e:cf:8a:55:f6:5e: 1f:61:31:88:ff:5a:ee:1f:04:1f:42:1b:db:71:51:9c: 34:0c:c5:c2:12:de:60:32:59:7a:1b:5c:c9:20:d6:c9: a8:ed:31:54:f7:fe:f1:7d:ea:22:da:96:76:62:c7:7d: 4b:37:72:4c:10:58:fa:ab:76:b5:3b:21:55:f1:a9:41: fd:71:cb:b5:55:4e:5f:84:6c:f2:33:00:f2:8a:b4:79: 91:8f:06:10:39:95:a2:6a:9f:b4:3b:1c:bd:79:6f:42: 13:8d:43:c9:22:d0:d2:13:65:06:fb:7a:2a:a5:b5:f7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:a4:44:ed:75:c8:e4:d8:16:15:25:23:88:63:30:ee: 99:19:b5:1d:63:6d:9f:d3:61:1b:57:3c:92:47:2e:63: f9:cd:21:4d:80:7d:dc:d5:86:17:00:a5:73:e2:7d:08: d6:08:43:ea:9a:4f:15:fd:3f:c9:bf:46:8a:c2:9e:05: 9c:ee:8a:8b:2d:87:af:3e:ba:2a:f0:a8:ac:86:c9:6f: 29:89:07:5b:be:7a:64:d1:bf:01:18:44:d1:6e:d5:c4: dd:6e:57:92:ae:81:99:32:b5:e4:91:b0:63:7e:32:40: 29:cc:82:93:c0:d9:c4:35:09:d4:4a:cd:c8:28:e8:79: cb:e6:37:43:39:e4:c6:36:1b:ae:e1:3a:33:7b:1a:67: bc:c1:74:67:97:f7:a2:ce:73:21:df:b3:2e:42:d0:69: 33:7f:7e:1a:10:26:fc:a5:f5:3b:ca:50:31:f8:62:8b: f4:4f:e6:ea:41:fb:71:b2:17:62:d4:6d:15:9f:3a:e0: 42:01:47:16:90:31:83:68:a6:5c:e8:74:44:dd:0f:84: f8:5b:31:de:9b:e5:f7:92:6e:2a:54:96:96:0f:91:0d: b7:3d:d7:81:5c:1f:fe:8f:06:a0:44:32:14:26:4a:50: 67:eb:f1:60:d6:30:f0:94:47:9f:99:38:e0:cb:20:fc Fingerprint (SHA-256): 34:C3:5E:61:0D:AD:D8:F9:55:61:93:C5:B1:48:2E:B6:96:78:72:5E:F5:D8:DF:2B:3D:76:6E:C8:70:0C:BD:36 Fingerprint (SHA1): 1D:CB:B7:F3:9E:34:FC:0A:35:E7:E5:C2:07:4D:14:1C:80:E6:1C:7A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1724: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1725: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1726: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141698 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1727: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1728: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1729: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1730: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1018141699 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1731: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1732: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1733: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018141455.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1734: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018141428.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1735: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1736: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1737: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018141455.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1738: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1018141700 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1739: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1740: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1741: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018141455.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1742: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018141429.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1743: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1744: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1745: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1746: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1018141701 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1747: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1748: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1749: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018141455.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1750: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018141430.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1751: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1752: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1753: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018141455.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1754: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018141431.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1755: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1756: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018141722Z nextupdate=20241018141722Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 14:17:22 2023 Next Update: Fri Oct 18 14:17:22 2024 CRL Extensions: chains.sh: #1757: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018141722Z nextupdate=20241018141722Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:17:22 2023 Next Update: Fri Oct 18 14:17:22 2024 CRL Extensions: chains.sh: #1758: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018141722Z nextupdate=20241018141722Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 14:17:22 2023 Next Update: Fri Oct 18 14:17:22 2024 CRL Extensions: chains.sh: #1759: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018141723Z nextupdate=20241018141723Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 14:17:23 2023 Next Update: Fri Oct 18 14:17:23 2024 CRL Extensions: chains.sh: #1760: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018141724Z addcert 20 20231018141724Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:17:24 2023 Next Update: Fri Oct 18 14:17:22 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 14:17:24 2023 CRL Extensions: chains.sh: #1761: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018141725Z addcert 40 20231018141725Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:17:25 2023 Next Update: Fri Oct 18 14:17:22 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 14:17:24 2023 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Wed Oct 18 14:17:25 2023 CRL Extensions: chains.sh: #1762: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1763: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1764: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1765: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141698 (0x3caf9c02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:17:20 2023 Not After : Wed Oct 18 14:17:20 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:25:82:a3:dd:59:37:26:59:2c:fa:16:9d:a4:3f:3e: 35:9a:59:61:5a:02:2c:a2:af:a5:e3:2d:d1:2d:85:30: 95:83:22:d0:22:8a:09:ee:7d:22:d6:0b:22:11:8d:e8: c7:89:f0:75:a4:48:a7:d6:83:4d:16:b1:26:76:63:34: ac:74:f4:95:bc:4a:0d:3e:d0:65:e8:5b:1b:4c:78:48: 62:9e:25:71:a6:8b:4e:57:a5:1a:8f:91:60:90:b1:26: 8b:26:39:40:1a:44:63:93:3f:78:b9:3c:f7:9e:60:a6: 51:05:c0:ea:42:c2:84:26:cd:ad:3d:6a:0b:48:ec:1b: 6b:c9:17:9d:c3:b7:ba:55:af:ce:f6:6d:16:e3:24:59: 17:0b:4b:88:59:01:82:46:8d:b7:58:0f:26:91:29:20: 2b:6b:5b:ac:13:78:19:b3:c6:fa:d6:08:7b:28:1f:45: 6f:d6:17:f8:e2:9f:53:0b:28:90:a7:a3:9f:f1:41:10: 12:d4:24:ec:ce:9f:02:ff:b1:5c:58:48:5a:5f:da:93: dc:bc:6c:94:63:b0:d5:b3:dc:c8:74:c6:c7:29:66:41: f8:ad:d1:a6:9c:8c:d0:7e:46:32:94:67:81:24:88:56: 98:63:bd:82:29:51:fc:ff:c4:cc:b1:e8:de:d3:dd:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:a6:51:5e:24:05:38:d1:19:43:71:90:5f:a2:ef:11: 76:05:3a:95:48:59:b8:0f:8b:16:1d:f5:15:fe:8f:c7: ad:b6:a6:2a:54:81:fc:67:bd:3d:80:89:f4:99:31:f6: 3d:75:4a:f1:5e:d8:23:b8:22:42:b7:4f:f6:49:6f:f4: 98:0b:ae:42:d2:06:e7:98:19:e8:8f:7b:13:8c:74:bb: d1:98:9f:ef:54:ed:1d:f3:be:b3:d6:d0:67:39:04:f8: 3f:48:32:af:56:b8:0c:2c:53:a8:f3:32:63:3a:20:b3: 78:e9:29:8e:c3:4b:e8:41:90:47:95:01:d7:7c:95:e9: f2:c9:27:9b:1b:83:13:1f:8b:2f:14:05:ee:b2:a2:d4: 3f:d5:2d:b0:7b:c7:96:19:93:9b:a5:f6:01:2b:fb:84: 76:32:ef:f6:1a:8a:5c:83:fb:5c:0f:51:28:65:4e:bb: 03:ca:36:61:2a:ff:d0:55:9c:c6:cc:15:15:ff:0a:a6: 93:b5:a9:77:0f:1e:2e:e2:a2:64:3d:43:66:de:af:92: 33:65:b7:ac:61:13:7a:be:2a:fc:8d:e8:65:4f:9b:64: 52:ac:a2:85:2d:83:5a:9a:25:65:0e:c8:0c:50:d4:25: c3:de:dc:e2:07:71:dc:ad:3e:de:50:bd:90:72:0d:1c Fingerprint (SHA-256): 31:CB:43:92:F4:E8:E4:DC:37:AD:57:0F:C0:CF:C6:24:CF:67:7B:C1:24:2F:5D:BC:11:69:B8:8A:97:05:5F:C9 Fingerprint (SHA1): 0F:D9:24:EA:45:D1:99:CB:FA:08:B1:BB:70:95:FF:AC:4F:CA:5C:31 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1766: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1767: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141698 (0x3caf9c02) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:17:20 2023 Not After : Wed Oct 18 14:17:20 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:25:82:a3:dd:59:37:26:59:2c:fa:16:9d:a4:3f:3e: 35:9a:59:61:5a:02:2c:a2:af:a5:e3:2d:d1:2d:85:30: 95:83:22:d0:22:8a:09:ee:7d:22:d6:0b:22:11:8d:e8: c7:89:f0:75:a4:48:a7:d6:83:4d:16:b1:26:76:63:34: ac:74:f4:95:bc:4a:0d:3e:d0:65:e8:5b:1b:4c:78:48: 62:9e:25:71:a6:8b:4e:57:a5:1a:8f:91:60:90:b1:26: 8b:26:39:40:1a:44:63:93:3f:78:b9:3c:f7:9e:60:a6: 51:05:c0:ea:42:c2:84:26:cd:ad:3d:6a:0b:48:ec:1b: 6b:c9:17:9d:c3:b7:ba:55:af:ce:f6:6d:16:e3:24:59: 17:0b:4b:88:59:01:82:46:8d:b7:58:0f:26:91:29:20: 2b:6b:5b:ac:13:78:19:b3:c6:fa:d6:08:7b:28:1f:45: 6f:d6:17:f8:e2:9f:53:0b:28:90:a7:a3:9f:f1:41:10: 12:d4:24:ec:ce:9f:02:ff:b1:5c:58:48:5a:5f:da:93: dc:bc:6c:94:63:b0:d5:b3:dc:c8:74:c6:c7:29:66:41: f8:ad:d1:a6:9c:8c:d0:7e:46:32:94:67:81:24:88:56: 98:63:bd:82:29:51:fc:ff:c4:cc:b1:e8:de:d3:dd:e7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 91:a6:51:5e:24:05:38:d1:19:43:71:90:5f:a2:ef:11: 76:05:3a:95:48:59:b8:0f:8b:16:1d:f5:15:fe:8f:c7: ad:b6:a6:2a:54:81:fc:67:bd:3d:80:89:f4:99:31:f6: 3d:75:4a:f1:5e:d8:23:b8:22:42:b7:4f:f6:49:6f:f4: 98:0b:ae:42:d2:06:e7:98:19:e8:8f:7b:13:8c:74:bb: d1:98:9f:ef:54:ed:1d:f3:be:b3:d6:d0:67:39:04:f8: 3f:48:32:af:56:b8:0c:2c:53:a8:f3:32:63:3a:20:b3: 78:e9:29:8e:c3:4b:e8:41:90:47:95:01:d7:7c:95:e9: f2:c9:27:9b:1b:83:13:1f:8b:2f:14:05:ee:b2:a2:d4: 3f:d5:2d:b0:7b:c7:96:19:93:9b:a5:f6:01:2b:fb:84: 76:32:ef:f6:1a:8a:5c:83:fb:5c:0f:51:28:65:4e:bb: 03:ca:36:61:2a:ff:d0:55:9c:c6:cc:15:15:ff:0a:a6: 93:b5:a9:77:0f:1e:2e:e2:a2:64:3d:43:66:de:af:92: 33:65:b7:ac:61:13:7a:be:2a:fc:8d:e8:65:4f:9b:64: 52:ac:a2:85:2d:83:5a:9a:25:65:0e:c8:0c:50:d4:25: c3:de:dc:e2:07:71:dc:ad:3e:de:50:bd:90:72:0d:1c Fingerprint (SHA-256): 31:CB:43:92:F4:E8:E4:DC:37:AD:57:0F:C0:CF:C6:24:CF:67:7B:C1:24:2F:5D:BC:11:69:B8:8A:97:05:5F:C9 Fingerprint (SHA1): 0F:D9:24:EA:45:D1:99:CB:FA:08:B1:BB:70:95:FF:AC:4F:CA:5C:31 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1768: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1769: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1770: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141702 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1771: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1772: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1773: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1774: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018141703 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1775: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1776: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1777: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1778: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018141704 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1779: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1780: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1781: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1782: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1018141705 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1783: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1784: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #1785: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -m 1018141706 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1786: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #1787: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #1788: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1789: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1018141707 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1790: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1791: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1792: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1793: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1018141708 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cu_data === Certutil input data === === chains.sh: #1794: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1795: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #1796: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #1797: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #1798: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141702 (0x3caf9c06) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:17:25 2023 Not After : Wed Oct 18 14:17:25 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:1d:45:90:1f:96:e1:2a:16:64:8e:7d:73:57:86:5a: e0:20:a2:fe:57:6a:c3:8b:f5:1d:1e:2d:58:30:be:35: dd:18:75:2e:49:6b:76:2a:de:7e:33:94:64:e7:33:c0: 2e:1e:ce:d0:4d:d7:89:2a:a2:3e:31:7a:8a:25:8e:c3: a8:8f:a3:ce:1f:35:25:9e:c2:18:01:4d:69:7c:ac:f3: 64:3c:25:f2:a6:ec:62:dc:5f:47:dc:85:0c:af:3b:4f: ca:62:5c:a1:c5:b3:68:3b:96:8c:0c:6a:0c:19:9f:e5: 51:eb:db:fe:74:4f:db:34:a3:35:1d:9a:b6:89:3a:b6: ba:32:4a:3f:66:68:35:82:c5:88:25:6e:2a:35:59:5f: 9c:fd:0c:d9:a6:f4:0a:aa:2d:1d:28:63:e3:57:86:00: 22:2e:75:eb:b3:ad:42:48:bf:03:41:43:b9:c3:9f:cc: 26:5b:51:06:e7:7c:f7:1c:8a:84:ff:3f:9c:4d:61:af: 1a:4b:a6:2e:32:f9:26:5b:a3:1c:55:73:00:03:59:94: d8:8e:16:93:60:49:58:5d:8c:ca:54:c2:c6:d3:59:5c: 03:91:5a:71:98:4f:c0:dd:d7:bc:99:b4:37:a7:7e:88: fd:14:80:33:e8:fa:e9:e4:45:96:d7:6c:b0:ad:fe:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d7:61:b4:08:b1:d4:d0:08:04:08:4c:27:9b:23:47: 8f:e0:13:bd:c2:63:aa:9a:d7:83:7f:9a:64:59:cd:5a: a2:3e:7f:83:97:62:98:6b:e2:b5:96:0c:9b:67:a6:5e: d0:4a:11:25:83:b1:a9:bf:05:57:82:00:50:5e:0f:9a: 08:e8:1b:f6:f1:ef:71:50:2f:89:f0:26:67:7d:7a:83: 1c:e2:60:9b:a2:15:9b:e3:b2:b8:7e:13:5a:0c:22:c9: af:f9:ad:26:5e:54:7b:86:3e:25:ed:ae:2b:8f:26:40: 79:04:b2:a0:16:8c:1b:31:77:15:5c:e3:b0:d4:b4:ca: 2b:81:e3:9a:fe:c5:86:ab:dc:75:60:d9:41:fa:fd:45: f7:52:6e:08:71:ee:cd:a4:60:fb:e5:da:55:e3:68:51: 82:78:cc:63:84:5b:98:7f:75:82:ca:cb:88:37:4d:ad: 06:1f:01:88:0e:32:fc:0a:da:f1:71:82:48:4a:93:8d: 92:b6:39:cb:4e:72:83:10:05:43:49:aa:68:ef:28:06: 97:44:48:1d:3b:bc:aa:6c:35:fb:f3:5e:77:7a:ba:0c: da:69:91:d4:af:db:ee:52:9b:66:b2:b0:ad:86:54:c0: f3:8c:03:e3:d7:35:c5:b4:85:2c:8d:a1:b3:81:fe:19 Fingerprint (SHA-256): 78:0E:BA:B9:66:C0:82:99:1C:E7:A6:97:CB:35:36:CE:58:79:21:83:7E:8A:2A:99:BD:A0:D6:5C:69:58:C1:74 Fingerprint (SHA1): 08:44:F5:5C:76:E5:3B:01:7D:5B:24:34:0C:FF:7D:65:48:89:87:0C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1799: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141704 (0x3caf9c08) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:17:26 2023 Not After : Wed Oct 18 14:17:26 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:71:a1:1c:66:8b:b1:91:52:10:64:76:90:13:6c:92: 64:45:4c:02:14:71:c4:ab:a4:5f:de:a7:11:82:10:5a: 90:6d:54:ce:92:11:67:8f:f4:ca:43:cd:25:02:a2:0f: ab:c9:c0:43:ea:3c:21:3c:c4:04:62:2c:29:89:09:af: 06:98:e2:ab:6c:f3:74:1a:f4:07:e4:ac:39:d5:d2:3a: 26:9e:60:ba:be:ed:03:0f:40:f0:56:c0:ce:1c:8b:12: d2:97:37:73:24:ee:bc:14:c1:de:5f:89:9c:71:a3:b7: c3:cf:bc:b8:d9:16:08:3e:9b:a3:29:cc:04:98:d9:07: 3f:51:43:79:84:9d:d4:7e:63:97:f2:29:48:e9:ec:59: 20:49:2a:f9:36:0f:13:3d:80:c7:82:f0:c2:41:1f:56: 3a:84:25:3c:44:25:87:db:fd:0e:9f:8d:30:ae:c9:9a: 35:2d:0c:06:16:0e:4f:b1:12:70:90:be:7c:23:e4:c0: 2c:60:7c:d4:89:ac:c1:5c:4e:67:a9:6c:52:d7:d1:2b: ea:99:0c:96:1b:7c:18:55:ae:20:ba:bf:bc:e9:30:00: 20:5b:b7:2c:7c:3b:56:c4:35:4c:f9:8e:d5:f3:55:ac: 9a:06:cf:5f:c4:6d:4f:67:0e:c3:f4:c7:37:c7:4a:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:3b:b7:be:a8:06:22:1e:1e:d9:6b:58:6d:58:cc:63: 85:d2:f6:e1:46:1f:09:f8:da:38:cc:41:f3:1e:d8:22: 75:41:76:1f:26:f7:8f:18:36:7f:c7:5f:1d:0d:db:c1: 38:27:9a:48:39:63:72:0a:0f:a6:7c:6b:ed:82:6f:f9: 46:20:f2:ff:23:7a:18:b8:77:be:f1:e9:2a:25:4a:f6: 37:96:05:db:68:83:21:cf:cb:65:17:a3:8f:62:27:66: b7:40:18:d0:f2:3f:eb:13:9e:56:70:54:47:b2:7b:5d: 56:5c:b9:c0:bb:8b:1e:21:a7:f4:87:ab:88:44:bb:5c: 2f:99:2c:6e:68:9a:d1:32:e1:cd:fb:3f:b0:51:d9:db: 39:e8:84:e9:22:3e:ce:76:c8:7f:c1:c3:b3:16:b2:40: b0:a2:db:0d:31:91:1e:1a:28:0d:3c:a2:8a:13:d5:1e: 96:3f:15:5a:e4:c8:70:82:a2:32:2d:f5:77:b7:bc:27: eb:21:54:4e:08:1a:da:a0:21:b2:19:f9:ff:a5:a8:8c: 54:4a:f2:38:a7:3d:a2:57:b8:ee:cc:fa:35:3a:97:32: 86:0a:ec:a6:67:b0:e3:88:12:9e:7c:66:7f:7a:b5:33: 11:20:4d:7e:09:b9:87:b2:cb:b9:61:61:61:cc:6f:ba Fingerprint (SHA-256): 1A:62:D0:65:2D:AA:48:8E:B0:5A:3A:58:52:05:1F:82:2F:4B:92:A7:52:74:CD:DE:7E:16:88:C5:6D:D4:39:4B Fingerprint (SHA1): 68:B8:C3:60:E6:6A:B2:1A:F1:F9:3A:C4:94:B2:7A:D8:43:EC:40:9A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1800: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141702 (0x3caf9c06) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:17:25 2023 Not After : Wed Oct 18 14:17:25 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:1d:45:90:1f:96:e1:2a:16:64:8e:7d:73:57:86:5a: e0:20:a2:fe:57:6a:c3:8b:f5:1d:1e:2d:58:30:be:35: dd:18:75:2e:49:6b:76:2a:de:7e:33:94:64:e7:33:c0: 2e:1e:ce:d0:4d:d7:89:2a:a2:3e:31:7a:8a:25:8e:c3: a8:8f:a3:ce:1f:35:25:9e:c2:18:01:4d:69:7c:ac:f3: 64:3c:25:f2:a6:ec:62:dc:5f:47:dc:85:0c:af:3b:4f: ca:62:5c:a1:c5:b3:68:3b:96:8c:0c:6a:0c:19:9f:e5: 51:eb:db:fe:74:4f:db:34:a3:35:1d:9a:b6:89:3a:b6: ba:32:4a:3f:66:68:35:82:c5:88:25:6e:2a:35:59:5f: 9c:fd:0c:d9:a6:f4:0a:aa:2d:1d:28:63:e3:57:86:00: 22:2e:75:eb:b3:ad:42:48:bf:03:41:43:b9:c3:9f:cc: 26:5b:51:06:e7:7c:f7:1c:8a:84:ff:3f:9c:4d:61:af: 1a:4b:a6:2e:32:f9:26:5b:a3:1c:55:73:00:03:59:94: d8:8e:16:93:60:49:58:5d:8c:ca:54:c2:c6:d3:59:5c: 03:91:5a:71:98:4f:c0:dd:d7:bc:99:b4:37:a7:7e:88: fd:14:80:33:e8:fa:e9:e4:45:96:d7:6c:b0:ad:fe:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d7:61:b4:08:b1:d4:d0:08:04:08:4c:27:9b:23:47: 8f:e0:13:bd:c2:63:aa:9a:d7:83:7f:9a:64:59:cd:5a: a2:3e:7f:83:97:62:98:6b:e2:b5:96:0c:9b:67:a6:5e: d0:4a:11:25:83:b1:a9:bf:05:57:82:00:50:5e:0f:9a: 08:e8:1b:f6:f1:ef:71:50:2f:89:f0:26:67:7d:7a:83: 1c:e2:60:9b:a2:15:9b:e3:b2:b8:7e:13:5a:0c:22:c9: af:f9:ad:26:5e:54:7b:86:3e:25:ed:ae:2b:8f:26:40: 79:04:b2:a0:16:8c:1b:31:77:15:5c:e3:b0:d4:b4:ca: 2b:81:e3:9a:fe:c5:86:ab:dc:75:60:d9:41:fa:fd:45: f7:52:6e:08:71:ee:cd:a4:60:fb:e5:da:55:e3:68:51: 82:78:cc:63:84:5b:98:7f:75:82:ca:cb:88:37:4d:ad: 06:1f:01:88:0e:32:fc:0a:da:f1:71:82:48:4a:93:8d: 92:b6:39:cb:4e:72:83:10:05:43:49:aa:68:ef:28:06: 97:44:48:1d:3b:bc:aa:6c:35:fb:f3:5e:77:7a:ba:0c: da:69:91:d4:af:db:ee:52:9b:66:b2:b0:ad:86:54:c0: f3:8c:03:e3:d7:35:c5:b4:85:2c:8d:a1:b3:81:fe:19 Fingerprint (SHA-256): 78:0E:BA:B9:66:C0:82:99:1C:E7:A6:97:CB:35:36:CE:58:79:21:83:7E:8A:2A:99:BD:A0:D6:5C:69:58:C1:74 Fingerprint (SHA1): 08:44:F5:5C:76:E5:3B:01:7D:5B:24:34:0C:FF:7D:65:48:89:87:0C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1801: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #1802: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141702 (0x3caf9c06) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:17:25 2023 Not After : Wed Oct 18 14:17:25 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:1d:45:90:1f:96:e1:2a:16:64:8e:7d:73:57:86:5a: e0:20:a2:fe:57:6a:c3:8b:f5:1d:1e:2d:58:30:be:35: dd:18:75:2e:49:6b:76:2a:de:7e:33:94:64:e7:33:c0: 2e:1e:ce:d0:4d:d7:89:2a:a2:3e:31:7a:8a:25:8e:c3: a8:8f:a3:ce:1f:35:25:9e:c2:18:01:4d:69:7c:ac:f3: 64:3c:25:f2:a6:ec:62:dc:5f:47:dc:85:0c:af:3b:4f: ca:62:5c:a1:c5:b3:68:3b:96:8c:0c:6a:0c:19:9f:e5: 51:eb:db:fe:74:4f:db:34:a3:35:1d:9a:b6:89:3a:b6: ba:32:4a:3f:66:68:35:82:c5:88:25:6e:2a:35:59:5f: 9c:fd:0c:d9:a6:f4:0a:aa:2d:1d:28:63:e3:57:86:00: 22:2e:75:eb:b3:ad:42:48:bf:03:41:43:b9:c3:9f:cc: 26:5b:51:06:e7:7c:f7:1c:8a:84:ff:3f:9c:4d:61:af: 1a:4b:a6:2e:32:f9:26:5b:a3:1c:55:73:00:03:59:94: d8:8e:16:93:60:49:58:5d:8c:ca:54:c2:c6:d3:59:5c: 03:91:5a:71:98:4f:c0:dd:d7:bc:99:b4:37:a7:7e:88: fd:14:80:33:e8:fa:e9:e4:45:96:d7:6c:b0:ad:fe:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d7:61:b4:08:b1:d4:d0:08:04:08:4c:27:9b:23:47: 8f:e0:13:bd:c2:63:aa:9a:d7:83:7f:9a:64:59:cd:5a: a2:3e:7f:83:97:62:98:6b:e2:b5:96:0c:9b:67:a6:5e: d0:4a:11:25:83:b1:a9:bf:05:57:82:00:50:5e:0f:9a: 08:e8:1b:f6:f1:ef:71:50:2f:89:f0:26:67:7d:7a:83: 1c:e2:60:9b:a2:15:9b:e3:b2:b8:7e:13:5a:0c:22:c9: af:f9:ad:26:5e:54:7b:86:3e:25:ed:ae:2b:8f:26:40: 79:04:b2:a0:16:8c:1b:31:77:15:5c:e3:b0:d4:b4:ca: 2b:81:e3:9a:fe:c5:86:ab:dc:75:60:d9:41:fa:fd:45: f7:52:6e:08:71:ee:cd:a4:60:fb:e5:da:55:e3:68:51: 82:78:cc:63:84:5b:98:7f:75:82:ca:cb:88:37:4d:ad: 06:1f:01:88:0e:32:fc:0a:da:f1:71:82:48:4a:93:8d: 92:b6:39:cb:4e:72:83:10:05:43:49:aa:68:ef:28:06: 97:44:48:1d:3b:bc:aa:6c:35:fb:f3:5e:77:7a:ba:0c: da:69:91:d4:af:db:ee:52:9b:66:b2:b0:ad:86:54:c0: f3:8c:03:e3:d7:35:c5:b4:85:2c:8d:a1:b3:81:fe:19 Fingerprint (SHA-256): 78:0E:BA:B9:66:C0:82:99:1C:E7:A6:97:CB:35:36:CE:58:79:21:83:7E:8A:2A:99:BD:A0:D6:5C:69:58:C1:74 Fingerprint (SHA1): 08:44:F5:5C:76:E5:3B:01:7D:5B:24:34:0C:FF:7D:65:48:89:87:0C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1803: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141704 (0x3caf9c08) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:17:26 2023 Not After : Wed Oct 18 14:17:26 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:71:a1:1c:66:8b:b1:91:52:10:64:76:90:13:6c:92: 64:45:4c:02:14:71:c4:ab:a4:5f:de:a7:11:82:10:5a: 90:6d:54:ce:92:11:67:8f:f4:ca:43:cd:25:02:a2:0f: ab:c9:c0:43:ea:3c:21:3c:c4:04:62:2c:29:89:09:af: 06:98:e2:ab:6c:f3:74:1a:f4:07:e4:ac:39:d5:d2:3a: 26:9e:60:ba:be:ed:03:0f:40:f0:56:c0:ce:1c:8b:12: d2:97:37:73:24:ee:bc:14:c1:de:5f:89:9c:71:a3:b7: c3:cf:bc:b8:d9:16:08:3e:9b:a3:29:cc:04:98:d9:07: 3f:51:43:79:84:9d:d4:7e:63:97:f2:29:48:e9:ec:59: 20:49:2a:f9:36:0f:13:3d:80:c7:82:f0:c2:41:1f:56: 3a:84:25:3c:44:25:87:db:fd:0e:9f:8d:30:ae:c9:9a: 35:2d:0c:06:16:0e:4f:b1:12:70:90:be:7c:23:e4:c0: 2c:60:7c:d4:89:ac:c1:5c:4e:67:a9:6c:52:d7:d1:2b: ea:99:0c:96:1b:7c:18:55:ae:20:ba:bf:bc:e9:30:00: 20:5b:b7:2c:7c:3b:56:c4:35:4c:f9:8e:d5:f3:55:ac: 9a:06:cf:5f:c4:6d:4f:67:0e:c3:f4:c7:37:c7:4a:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:3b:b7:be:a8:06:22:1e:1e:d9:6b:58:6d:58:cc:63: 85:d2:f6:e1:46:1f:09:f8:da:38:cc:41:f3:1e:d8:22: 75:41:76:1f:26:f7:8f:18:36:7f:c7:5f:1d:0d:db:c1: 38:27:9a:48:39:63:72:0a:0f:a6:7c:6b:ed:82:6f:f9: 46:20:f2:ff:23:7a:18:b8:77:be:f1:e9:2a:25:4a:f6: 37:96:05:db:68:83:21:cf:cb:65:17:a3:8f:62:27:66: b7:40:18:d0:f2:3f:eb:13:9e:56:70:54:47:b2:7b:5d: 56:5c:b9:c0:bb:8b:1e:21:a7:f4:87:ab:88:44:bb:5c: 2f:99:2c:6e:68:9a:d1:32:e1:cd:fb:3f:b0:51:d9:db: 39:e8:84:e9:22:3e:ce:76:c8:7f:c1:c3:b3:16:b2:40: b0:a2:db:0d:31:91:1e:1a:28:0d:3c:a2:8a:13:d5:1e: 96:3f:15:5a:e4:c8:70:82:a2:32:2d:f5:77:b7:bc:27: eb:21:54:4e:08:1a:da:a0:21:b2:19:f9:ff:a5:a8:8c: 54:4a:f2:38:a7:3d:a2:57:b8:ee:cc:fa:35:3a:97:32: 86:0a:ec:a6:67:b0:e3:88:12:9e:7c:66:7f:7a:b5:33: 11:20:4d:7e:09:b9:87:b2:cb:b9:61:61:61:cc:6f:ba Fingerprint (SHA-256): 1A:62:D0:65:2D:AA:48:8E:B0:5A:3A:58:52:05:1F:82:2F:4B:92:A7:52:74:CD:DE:7E:16:88:C5:6D:D4:39:4B Fingerprint (SHA1): 68:B8:C3:60:E6:6A:B2:1A:F1:F9:3A:C4:94:B2:7A:D8:43:EC:40:9A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1804: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #1805: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #1806: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #1807: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141702 (0x3caf9c06) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:17:25 2023 Not After : Wed Oct 18 14:17:25 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:1d:45:90:1f:96:e1:2a:16:64:8e:7d:73:57:86:5a: e0:20:a2:fe:57:6a:c3:8b:f5:1d:1e:2d:58:30:be:35: dd:18:75:2e:49:6b:76:2a:de:7e:33:94:64:e7:33:c0: 2e:1e:ce:d0:4d:d7:89:2a:a2:3e:31:7a:8a:25:8e:c3: a8:8f:a3:ce:1f:35:25:9e:c2:18:01:4d:69:7c:ac:f3: 64:3c:25:f2:a6:ec:62:dc:5f:47:dc:85:0c:af:3b:4f: ca:62:5c:a1:c5:b3:68:3b:96:8c:0c:6a:0c:19:9f:e5: 51:eb:db:fe:74:4f:db:34:a3:35:1d:9a:b6:89:3a:b6: ba:32:4a:3f:66:68:35:82:c5:88:25:6e:2a:35:59:5f: 9c:fd:0c:d9:a6:f4:0a:aa:2d:1d:28:63:e3:57:86:00: 22:2e:75:eb:b3:ad:42:48:bf:03:41:43:b9:c3:9f:cc: 26:5b:51:06:e7:7c:f7:1c:8a:84:ff:3f:9c:4d:61:af: 1a:4b:a6:2e:32:f9:26:5b:a3:1c:55:73:00:03:59:94: d8:8e:16:93:60:49:58:5d:8c:ca:54:c2:c6:d3:59:5c: 03:91:5a:71:98:4f:c0:dd:d7:bc:99:b4:37:a7:7e:88: fd:14:80:33:e8:fa:e9:e4:45:96:d7:6c:b0:ad:fe:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d7:61:b4:08:b1:d4:d0:08:04:08:4c:27:9b:23:47: 8f:e0:13:bd:c2:63:aa:9a:d7:83:7f:9a:64:59:cd:5a: a2:3e:7f:83:97:62:98:6b:e2:b5:96:0c:9b:67:a6:5e: d0:4a:11:25:83:b1:a9:bf:05:57:82:00:50:5e:0f:9a: 08:e8:1b:f6:f1:ef:71:50:2f:89:f0:26:67:7d:7a:83: 1c:e2:60:9b:a2:15:9b:e3:b2:b8:7e:13:5a:0c:22:c9: af:f9:ad:26:5e:54:7b:86:3e:25:ed:ae:2b:8f:26:40: 79:04:b2:a0:16:8c:1b:31:77:15:5c:e3:b0:d4:b4:ca: 2b:81:e3:9a:fe:c5:86:ab:dc:75:60:d9:41:fa:fd:45: f7:52:6e:08:71:ee:cd:a4:60:fb:e5:da:55:e3:68:51: 82:78:cc:63:84:5b:98:7f:75:82:ca:cb:88:37:4d:ad: 06:1f:01:88:0e:32:fc:0a:da:f1:71:82:48:4a:93:8d: 92:b6:39:cb:4e:72:83:10:05:43:49:aa:68:ef:28:06: 97:44:48:1d:3b:bc:aa:6c:35:fb:f3:5e:77:7a:ba:0c: da:69:91:d4:af:db:ee:52:9b:66:b2:b0:ad:86:54:c0: f3:8c:03:e3:d7:35:c5:b4:85:2c:8d:a1:b3:81:fe:19 Fingerprint (SHA-256): 78:0E:BA:B9:66:C0:82:99:1C:E7:A6:97:CB:35:36:CE:58:79:21:83:7E:8A:2A:99:BD:A0:D6:5C:69:58:C1:74 Fingerprint (SHA1): 08:44:F5:5C:76:E5:3B:01:7D:5B:24:34:0C:FF:7D:65:48:89:87:0C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1808: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141706 (0x3caf9c0a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 14:17:27 2023 Not After : Wed Oct 18 14:17:27 2073 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: db:cf:b4:b8:f3:33:48:ed:23:59:e5:27:9d:42:3e:c2: 37:d3:88:bf:dd:2a:66:21:46:3a:59:cb:63:ab:9a:0e: 88:ad:76:50:56:f3:5f:1d:f1:f4:bb:8b:21:29:ed:d0: 93:8f:d7:64:a6:36:b4:c6:d9:11:d3:83:ee:c0:ba:76: f9:6d:26:e7:5b:15:a1:a8:fd:36:90:cb:6a:fc:2f:97: c2:c2:e5:85:f5:82:bd:ad:d5:d9:90:42:2d:62:ca:b4: cf:b6:0d:a1:ff:74:8d:fd:de:b7:a9:75:35:a4:d9:0c: 76:7e:96:50:8c:e7:d1:bd:37:3f:35:ea:82:d5:e1:3b: 36:d6:dc:d0:0a:71:f1:c5:e6:91:c8:70:b1:6c:92:83: 74:e0:4e:71:34:61:61:39:00:38:5b:5e:e0:a0:c4:db: a8:3c:c6:6d:90:bc:36:fa:52:98:77:2b:89:15:57:68: 27:7a:54:e1:2a:d8:20:62:c5:20:99:e4:1c:e1:3e:4e: 56:71:2a:a3:76:c4:11:6d:a6:f7:bf:4f:9b:33:09:f8: 56:55:61:80:7f:ff:c8:65:0c:8b:e4:40:8c:a8:af:54: 7b:5a:50:55:96:6e:9a:a6:30:14:64:eb:8a:26:a4:16: 6e:01:5e:c1:aa:d5:cd:47:02:eb:73:10:1a:48:54:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:88:3d:a4:ad:11:82:ee:86:fd:f4:65:54:1d:57:f1: c3:35:6f:93:45:70:ac:d5:7c:d6:8f:dd:35:0f:ca:d5: aa:38:fe:ce:12:c7:4f:73:94:d3:75:09:54:80:f2:55: 2c:b5:d0:bf:f4:6b:f8:bf:09:ec:ad:45:51:d9:8c:98: 21:ba:09:8a:f0:87:9d:97:90:f2:21:2a:3c:74:0e:38: a3:d2:fe:f5:40:7a:e3:35:d5:6a:54:88:88:ce:03:ac: 6b:af:a3:75:70:47:c5:d4:e0:6c:82:f8:fe:da:23:65: 0e:12:07:14:35:bf:d2:d4:4b:f4:a0:d4:62:80:7e:35: d3:59:bf:30:84:d0:22:22:a9:73:ba:da:ca:72:d4:56: 80:59:2d:8d:b9:de:ec:2c:d3:d9:04:ee:88:b4:a1:33: af:76:5a:66:0a:cb:4e:cb:85:1f:2e:e1:fb:e0:7b:e4: 71:c9:a9:07:cf:d2:d2:aa:ef:13:17:f5:d5:49:0a:0b: 46:b1:6e:ac:92:7b:09:21:a2:c1:0d:b0:56:ad:96:49: 82:cd:db:b0:6c:17:97:d5:8a:60:53:55:ed:e0:a0:33: e1:a2:84:34:ac:45:c1:5c:99:f7:15:a5:68:33:18:7e: fa:26:ec:93:05:d5:0c:76:18:89:b6:26:e6:a5:8c:51 Fingerprint (SHA-256): 66:41:4F:F8:E0:5C:C3:2E:0E:01:31:D6:B1:D1:F0:C2:18:7D:CC:D7:18:C0:C8:36:5B:C3:10:34:C3:28:07:15 Fingerprint (SHA1): C0:B6:AF:C4:BE:71:D0:65:8D:5D:E5:6E:3E:ED:A5:21:B8:A6:B3:70 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #1809: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141702 (0x3caf9c06) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:17:25 2023 Not After : Wed Oct 18 14:17:25 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:1d:45:90:1f:96:e1:2a:16:64:8e:7d:73:57:86:5a: e0:20:a2:fe:57:6a:c3:8b:f5:1d:1e:2d:58:30:be:35: dd:18:75:2e:49:6b:76:2a:de:7e:33:94:64:e7:33:c0: 2e:1e:ce:d0:4d:d7:89:2a:a2:3e:31:7a:8a:25:8e:c3: a8:8f:a3:ce:1f:35:25:9e:c2:18:01:4d:69:7c:ac:f3: 64:3c:25:f2:a6:ec:62:dc:5f:47:dc:85:0c:af:3b:4f: ca:62:5c:a1:c5:b3:68:3b:96:8c:0c:6a:0c:19:9f:e5: 51:eb:db:fe:74:4f:db:34:a3:35:1d:9a:b6:89:3a:b6: ba:32:4a:3f:66:68:35:82:c5:88:25:6e:2a:35:59:5f: 9c:fd:0c:d9:a6:f4:0a:aa:2d:1d:28:63:e3:57:86:00: 22:2e:75:eb:b3:ad:42:48:bf:03:41:43:b9:c3:9f:cc: 26:5b:51:06:e7:7c:f7:1c:8a:84:ff:3f:9c:4d:61:af: 1a:4b:a6:2e:32:f9:26:5b:a3:1c:55:73:00:03:59:94: d8:8e:16:93:60:49:58:5d:8c:ca:54:c2:c6:d3:59:5c: 03:91:5a:71:98:4f:c0:dd:d7:bc:99:b4:37:a7:7e:88: fd:14:80:33:e8:fa:e9:e4:45:96:d7:6c:b0:ad:fe:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2e:d7:61:b4:08:b1:d4:d0:08:04:08:4c:27:9b:23:47: 8f:e0:13:bd:c2:63:aa:9a:d7:83:7f:9a:64:59:cd:5a: a2:3e:7f:83:97:62:98:6b:e2:b5:96:0c:9b:67:a6:5e: d0:4a:11:25:83:b1:a9:bf:05:57:82:00:50:5e:0f:9a: 08:e8:1b:f6:f1:ef:71:50:2f:89:f0:26:67:7d:7a:83: 1c:e2:60:9b:a2:15:9b:e3:b2:b8:7e:13:5a:0c:22:c9: af:f9:ad:26:5e:54:7b:86:3e:25:ed:ae:2b:8f:26:40: 79:04:b2:a0:16:8c:1b:31:77:15:5c:e3:b0:d4:b4:ca: 2b:81:e3:9a:fe:c5:86:ab:dc:75:60:d9:41:fa:fd:45: f7:52:6e:08:71:ee:cd:a4:60:fb:e5:da:55:e3:68:51: 82:78:cc:63:84:5b:98:7f:75:82:ca:cb:88:37:4d:ad: 06:1f:01:88:0e:32:fc:0a:da:f1:71:82:48:4a:93:8d: 92:b6:39:cb:4e:72:83:10:05:43:49:aa:68:ef:28:06: 97:44:48:1d:3b:bc:aa:6c:35:fb:f3:5e:77:7a:ba:0c: da:69:91:d4:af:db:ee:52:9b:66:b2:b0:ad:86:54:c0: f3:8c:03:e3:d7:35:c5:b4:85:2c:8d:a1:b3:81:fe:19 Fingerprint (SHA-256): 78:0E:BA:B9:66:C0:82:99:1C:E7:A6:97:CB:35:36:CE:58:79:21:83:7E:8A:2A:99:BD:A0:D6:5C:69:58:C1:74 Fingerprint (SHA1): 08:44:F5:5C:76:E5:3B:01:7D:5B:24:34:0C:FF:7D:65:48:89:87:0C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1810: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #1811: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1812: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1813: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1814: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1815: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018141707 (0x3caf9c0b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 14:17:27 2023 Not After : Wed Oct 18 14:17:27 2028 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e2:1b:f8:48:e7:64:83:d4:9d:a4:59:74:b5:52:48:4a: 4b:b7:25:72:00:27:19:50:50:60:a8:23:72:a5:9c:43: c9:70:67:fa:d7:33:e7:06:47:b8:30:e8:25:4c:8b:59: 61:cb:8a:09:c0:22:17:3a:39:ce:cb:b6:c5:46:b0:50: be:41:78:3d:b5:20:23:78:a9:80:7d:4a:f2:02:3f:82: ec:70:13:7e:65:a3:27:04:9f:db:94:62:6f:ce:d0:88: 6a:77:11:17:a0:0f:42:8d:94:80:11:40:40:4d:d2:28: ae:e5:d1:81:a6:47:c3:2f:4a:31:a1:5b:d4:b1:a9:e1: 13:ea:48:9f:32:a4:04:14:eb:18:23:c8:71:38:71:7c: 52:e1:e0:0a:be:fc:b8:d5:5a:40:43:b8:fb:2e:5c:91: a8:8b:d8:5a:59:f9:7c:cc:1f:9e:73:19:eb:e6:72:88: c4:5e:8c:47:a6:eb:13:63:2a:e6:bd:a4:01:55:da:13: 8d:94:97:6b:4d:a8:77:f9:17:13:c5:f7:89:b4:63:b1: 3b:8b:34:d5:12:1c:3e:0f:36:f9:39:91:9f:8d:e6:d1: 5b:41:e9:66:17:9b:6c:c0:46:8f:2a:c8:f1:39:a2:f6: aa:6a:71:b6:3f:18:4c:c1:cc:7e:24:91:4b:b7:5b:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:0e:40:d7:33:45:f3:7e:38:ad:58:3c:b8:ad:c9:4b: b2:6b:af:84:06:69:1a:ec:40:db:cf:26:68:fe:ab:37: a7:80:20:7e:77:c9:95:da:ac:cf:51:0e:58:39:05:54: 28:32:bc:ac:7c:c4:49:4b:5a:22:ef:fc:99:02:5c:46: d9:b1:b0:26:74:86:e0:09:0e:57:a9:d1:ce:e4:af:f2: cc:90:7e:9f:03:13:78:b5:0e:77:8a:14:6e:03:0d:e0: db:ba:89:82:f5:f1:75:fa:59:21:6c:20:54:b4:dc:c0: 4a:36:c3:19:a4:fc:96:ce:cd:1e:14:b9:83:3c:30:42: f9:7a:ab:00:99:e9:66:e2:19:79:40:c7:46:56:77:43: 20:f3:f3:f8:1f:b7:1a:82:8f:e9:11:7a:82:a4:e0:f5: 6e:54:74:38:e5:7e:d3:a4:4c:e3:66:47:fc:90:6a:93: ee:75:b7:ed:58:30:48:a7:27:64:b5:00:12:b7:24:15: 4f:e0:4d:81:4d:8b:0b:a2:26:52:7c:c6:9d:2d:6e:e3: fc:c6:c9:c7:15:ce:af:a1:bd:ce:9c:0e:4a:3a:9b:e0: 3d:4b:72:89:40:98:6b:1e:a9:3e:f0:ca:da:2f:06:92: fc:78:d5:6a:92:e7:2b:85:47:9f:76:c9:ed:c4:55:73 Fingerprint (SHA-256): 3F:69:82:62:02:8D:71:05:33:C6:03:14:81:FF:07:F1:C9:E0:E4:2F:B6:D3:FE:B1:0A:69:6F:7A:28:7A:70:DD Fingerprint (SHA1): 4E:4C:6B:BC:DF:87:AF:09:C4:84:53:3A:35:06:4F:E2:D4:9A:C5:C0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1816: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1817: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1818: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1819: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1820: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1821: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1822: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1823: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1824: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1825: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1826: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1827: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1828: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1829: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1830: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bar.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1831: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=site.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1832: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=Honest Achmed,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1833: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=OtherOrg,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1834: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1835: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=testfoo.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1836: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test3.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1837: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1838: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1839: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1840: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1841: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 9745 at Wed Oct 18 14:17:30 UTC 2023 kill -USR1 9745 httpserv: normal termination httpserv -b -p 10007 2>/dev/null; httpserv with PID 9745 killed at Wed Oct 18 14:17:30 UTC 2023 TIMESTAMP chains END: Wed Oct 18 14:17:30 UTC 2023 Running tests for ec TIMESTAMP ec BEGIN: Wed Oct 18 14:17:30 UTC 2023 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Wed Oct 18 14:17:30 UTC 2023 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Wed Oct 18 14:17:30 UTC 2023 Running ec tests for ectest TIMESTAMP ectest BEGIN: Wed Oct 18 14:17:30 UTC 2023 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #5: pk11 ec tests - PASSED TIMESTAMP ectest END: Wed Oct 18 14:17:30 UTC 2023 TIMESTAMP ec END: Wed Oct 18 14:17:30 UTC 2023 Running tests for %{do_gtests} TIMESTAMP %{do_gtests} BEGIN: Wed Oct 18 14:17:30 UTC 2023 ./all.sh: line 134: ./%{do_gtests}.sh: No such file or directory ./all.sh: line 134: cd: /builddir/build/BUILD/nss-3.90/nss/tests/%{do_gtests}: No such file or directory TIMESTAMP %{do_gtests} END: Wed Oct 18 14:17:30 UTC 2023 Running tests for %{do_ssl_gtests} TIMESTAMP %{do_ssl_gtests} BEGIN: Wed Oct 18 14:17:30 UTC 2023 ./all.sh: line 134: ./%{do_ssl_gtests}.sh: No such file or directory ./all.sh: line 134: cd: /builddir/build/BUILD/nss-3.90/nss/tests/%{do_ssl_gtests}: No such file or directory TIMESTAMP %{do_ssl_gtests} END: Wed Oct 18 14:17:30 UTC 2023 %{do_ssl_gtests}.sh: Testing with PKIX =============================== Running tests for libpkix TIMESTAMP libpkix BEGIN: Wed Oct 18 14:17:30 UTC 2023 TIMESTAMP libpkix END: Wed Oct 18 14:17:30 UTC 2023 Running tests for cert TIMESTAMP cert BEGIN: Wed Oct 18 14:17:30 UTC 2023 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #79: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #80: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #81: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #82: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #84: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #85: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #86: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #108: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #109: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/clientCA-ec.ca.cert cert.sh: #110: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/clientCA-dsa.ca.cert cert.sh: #111: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #113: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #114: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/clientCA.ca.cert cert.sh: #115: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #116: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k 48a4fcd29876857bafeb800be6718a4bffd8fbca -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k b4219e66a2ea1573fe46f9e02894898de6a715ca -s CN=orphan -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:09:39:67:ac:83:4a:f5:47:22:72:af:30:e0:cc:79: 35:e5:75:71:b2:b9:dd:60:9c:54:56:02:ea:40:cd:38: d1:fa:5e:de:fc:02:a3:40:1f:30:1d:4b:dc:71:ab:ed: 34:47:ee:62:94:37:be:13:e4:8e:4d:64:f2:98:69:11: d4:e7:0e:a6:12:be:e9:af:a8:8b:52:8e:15:99:da:88: 08:ac:94:c4:a1:32:8c:85:ae:3d:51:07:f4:0f:83:8e: f0:be:98:7d:5b:f6:f7:3c:47:f9:74:0b:f2:c6:c1:92: 40:5c:f1:ae:0c:50:3b:c8:e9:44:29:57:75:9d:b7:5d: d1:5d:3c:ee:d2:de:db:bc:c2:b2:b1:14:a2:dc:31:c9: a3:0c:9a:57:4c:eb:03:f7:36:99:af:ba:25:dc:8b:1a: f9:55:cc:31:c0:45:69:e2:52:8d:a9:5b:6f:4f:d2:c0: 92:c7:8f:4a:64:00:08:01:cb:6c:64:0f:ba:25:cc:d1: fb:24:d9:2e:e9:b6:50:41:38:90:88:23:ba:db:53:9c: 4c:e0:44:35:de:4d:c2:1a:a1:75:56:41:0c:a7:25:fb: 71:ed:59:5b:f9:93:28:4e:f0:f1:24:a5:35:fb:cf:fe: bd:18:e5:06:4f:e8:bb:b7:5d:92:5c:2e:64:14:d7:19 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:8d:74:94:3a:7f:28:f7:3d:a3:af:b6:16:6a:25:60: 42:dd:70:54:24:7a:ed:cd:d3:12:ce:bd:9f:8c:f6:32: 72:2b:d1:28:78:93:15:65:3d:15:f2:90:95:6c:99:0a: ff:76:fd:33:6a:ae:76:bf:ae:8f:4a:4a:91:86:a9:3d: 80:0c:d5:01:5d:1a:6c:2a:c4:1a:f9:dc:38:9d:4b:99: 61:61:dd:e8:99:29:ff:ae:30:55:7b:8c:5c:92:4b:e1: bc:0e:07:1e:2d:21:73:0b:74:d1:5f:f3:3a:d5:23:39: 53:85:6a:0d:b7:87:00:af:02:61:20:93:e8:75:cd:91: 83:9e:b1:c7:ac:8d:1b:9e:f7:f7:0e:f1:26:a7:8d:9f: 51:b7:2a:e6:7a:cc:0b:7e:cb:e6:4f:42:cc:5e:f2:d9: 0f:50:34:e6:e2:83:36:4e:d4:d1:8d:27:ab:15:4e:e0: 81:04:53:7b:3a:c4:71:bf:96:f4:7c:9b:40:f3:fd:7f: 93:49:16:1e:96:d5:14:ec:b7:ed:4c:bc:aa:9a:db:0a: 76:b4:c1:98:3e:e4:31:14:60:7f:19:9d:95:23:b1:35: 96:79:fc:d2:c3:6e:e7:b9:db:59:7e:e2:45:d7:84:8c: c4:76:ab:61:c0:1e:f4:24:44:d2:cf:a1:df:f9:1f:c2 Fingerprint (SHA-256): DC:33:52:FE:60:35:F5:ED:DC:AA:93:F0:FD:8F:4E:22:D9:74:2E:94:91:DF:C1:BC:F7:D2:2B:9D:EE:F7:75:2E Fingerprint (SHA1): 3D:B9:93:F1:80:EC:B8:36:51:D1:D8:C7:A1:92:E3:A6:66:3E:E1:B1 cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw cert.sh: #289: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #290: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #291: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Setting invalid database password in FIPS mode -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw -@ ../tests.fipsbadpw Failed to change password. certutil: Could not set password for the slot: SEC_ERROR_INVALID_PASSWORD: Password entered is invalid. Please pick a different one. cert.sh: #292: Setting invalid database password in FIPS mode - PASSED cert.sh: Attempt to generate a key with exponent of 3 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #293: Attempt to generate a key with exponent of 3 (too small) - PASSED cert.sh: Attempt to generate a key with exponent of 17 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #294: Attempt to generate a key with exponent of 17 (too small) - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@example.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #295: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw cert.sh: #296: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #297: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #298: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw cert.sh: #308: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #309: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #310: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #311: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #312: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #313: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #314: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #315: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #316: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #317: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #318: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #319: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #320: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #321: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #322: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #323: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #324: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #325: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #326: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #327: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #328: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #329: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #330: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:c9:bd Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:17:50 2023 Not After : Thu Jan 18 14:17:50 2024 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9a:37:2e:ce:7c:70:c6:2d:0d:8b:6b:4a:ad:b2:86:f9: d6:60:e5:43:88:f6:0f:cf:ff:a4:1f:f2:ab:68:45:49: e0:53:6f:2b:b0:4d:53:b4:7c:76:31:5c:68:4f:31:e3: f0:53:b5:52:77:d4:34:18:77:70:7f:04:fc:72:d8:6d: 82:59:c9:a6:5b:6d:df:f6:aa:c1:c0:a9:81:65:78:53: 91:96:b9:df:81:99:41:e0:b1:2c:e3:2b:4c:de:93:f3: b3:cf:ff:a2:b2:92:3a:25:2b:5f:49:dc:fc:ed:b8:ad: 71:b0:9a:da:ee:34:68:95:17:aa:38:db:5c:de:a2:d1: 5e:20:0e:9a:c4:8f:e7:63:ad:9e:ee:9e:48:76:c7:71: d4:1e:73:d3:8e:22:7f:30:47:1b:1e:b7:5e:9c:18:e0: 4c:77:53:36:8d:7b:b0:29:ef:6c:2d:46:ef:d8:e1:b3: c0:dd:db:d2:33:a9:3e:ad:a0:5f:6c:03:a6:ba:79:3b: 7e:32:92:ce:8f:00:33:d4:60:a7:47:87:ef:13:96:d9: 1e:05:82:21:e3:66:64:c9:07:80:e0:4f:88:02:45:68: ab:8e:23:83:18:21:45:f5:fe:93:79:a2:e5:69:16:54: f1:26:f1:27:8b:ba:68:e6:96:00:d7:5b:ad:5d:0f:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:70:35:e4:4c:f6:50:32:0d:9c:c7:73:ec:55:50:2e: c1:84:ee:89:a9:50:fc:c0:73:57:77:ee:e3:44:73:f2: 76:02:a2:a9:9d:12:28:e5:24:05:60:45:fb:80:ab:f8: 96:f8:53:39:e4:60:d5:17:30:24:34:e5:78:93:32:05: 13:0d:76:d6:ce:b0:54:1a:a0:98:9c:cc:f0:32:2f:db: a1:52:dc:c0:21:42:d0:d9:27:0b:b7:8f:06:e1:2b:cc: fe:44:db:c7:15:ea:57:3c:9b:ef:40:35:ce:1b:c6:50: d8:a0:17:1d:b5:c1:87:9f:89:28:f0:55:56:ac:c8:b4: 86:74:be:01:74:45:3f:1c:d1:e0:dc:07:5a:47:b0:66: c4:57:66:cd:56:d6:2e:69:d3:e1:9c:29:d4:71:64:ab: d1:ce:94:e4:fe:95:e5:ee:41:0c:aa:b1:a8:c5:4f:3a: df:6b:eb:04:a8:d1:de:ec:59:05:5c:ca:8c:24:0a:62: 89:c3:9d:58:b0:2a:5a:aa:dc:14:fd:d2:64:a6:dd:af: c7:cd:4c:f7:04:aa:ca:d6:cd:f3:c3:a0:82:f0:0b:e7: 08:98:e8:17:79:5e:09:ac:e8:d1:fd:f9:99:6d:ec:e7: 00:ec:3e:f1:05:a9:bd:46:b9:db:26:57:39:20:e4:13 Fingerprint (SHA-256): EC:14:3D:8B:DE:09:69:34:56:F4:74:85:6E:44:C5:BF:FC:EE:35:B5:DE:10:D4:BD:E5:4D:39:1F:8A:AE:CF:FA Fingerprint (SHA1): 2C:0F:5C:48:99:E8:DF:C7:1D:78:80:7F:2A:AD:D6:24:54:A6:2F:59 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:c9:be Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:17:51 2023 Not After : Thu Jan 18 14:17:51 2024 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:58:07:cb:42:58:45:0c:3d:d2:ef:eb:ed:14:1c:6e: f1:ca:5f:6d:ac:3c:8d:4d:d1:aa:21:0b:c4:20:04:ad: 28:2a:96:04:61:19:f5:14:53:c2:16:83:6c:62:9c:7e: 66:a0:bb:f0:6a:40:9d:9b:b8:1a:c2:d7:36:39:b7:52: c5:0b:8b:e6:7a:ed:6d:f1:c0:58:3b:2f:97:68:23:a3: 7d:e7:eb:3c:0b:12:f0:95:78:92:3d:2a:df:ad:0e:08: 7b:3e:86:b1:6a:a2:52:d0:b7:66:47:66:44:5e:41:df: 1c:01:1c:69:93:f3:e8:20:b1:c3:4b:81:e6:10:65:6f: 88:36:91:48:fb:8c:2d:72:b9:d7:92:4b:a4:6b:87:3c: 7d:27:16:b8:6a:7a:24:63:e9:a3:b7:65:be:b0:f3:63: 2f:7a:b0:b8:98:da:52:1b:b2:0b:17:e3:85:7e:31:19: 8f:e4:1e:7e:dd:d4:70:c1:57:b6:b0:67:ac:83:2f:3d: f0:20:15:3f:66:0e:4a:30:8e:b6:1b:9a:df:29:d5:f8: 7b:51:ec:76:12:10:6a:aa:88:35:03:32:36:c3:b4:cd: 9e:1c:36:5c:41:07:f1:d2:b1:f6:cf:19:ae:81:75:6b: f5:06:5b:2a:28:23:ff:0d:c0:8f:ae:26:b7:e2:4f:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:e3:52:43:ff:65:cb:1d:54:f2:7a:b1:c0:09:30:4f: 01:6e:92:a8:e6:60:4c:f6:29:6a:ff:ae:52:f5:c9:a9: 21:61:ad:02:f1:d1:aa:e7:b8:49:d2:42:3c:0b:cb:d0: d6:77:16:0d:d9:bc:bb:8e:c6:1f:0b:07:c6:88:71:35: b4:d5:3c:d3:ee:3c:c5:b1:02:05:b9:74:1d:4d:05:8b: 8a:62:bc:cc:44:28:39:3c:fb:cc:20:fc:59:d2:bd:23: 0c:be:d4:10:72:b1:9a:cf:77:40:dc:ac:09:d8:cb:a4: 08:ab:d7:4d:8a:03:c5:d3:46:e6:40:47:fc:a0:1d:45: b9:dd:18:f1:ac:2f:11:40:4d:7b:28:5f:d0:74:73:e0: 20:5a:3f:7e:a7:fa:34:a1:a4:7d:dd:0b:1d:de:75:5c: cf:02:ef:f8:e8:63:8d:7d:11:e3:25:7e:c3:17:66:f6: 51:ca:6c:e8:8f:c0:70:9a:e2:08:14:3c:51:5c:57:1d: cf:85:46:dd:99:40:1f:fe:07:73:a2:49:20:39:77:f5: 7a:e3:c7:fa:1d:88:37:d4:1a:10:85:a7:2d:f9:ec:0c: df:0c:b9:58:98:8e:db:cc:7f:1f:cc:77:56:6b:6b:60: 96:3c:79:71:36:1e:86:54:a3:92:10:cb:56:41:5e:d3 Fingerprint (SHA-256): 22:3F:F6:B9:3F:A5:9C:B7:C2:30:E5:34:9D:DD:B0:CD:19:F5:E0:2C:F9:EF:2A:46:55:66:28:2E:F2:DE:51:E6 Fingerprint (SHA1): E8:E6:DE:25:8B:32:C2:E8:05:B6:33:D3:A4:A6:13:F8:74:3B:C0:08 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:c9:be Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:17:51 2023 Not After : Thu Jan 18 14:17:51 2024 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:f9:53:f0:ee:6a:66:a5:16:a5:76:67:0b:a9:c9:b1: f8:17:6f:4d:92:fe:1c:34:ba:18:7c:d8:e5:25:67:f4: ed:a8:32:e9:bf:a1:f2:8d:b1:bf:dd:ee:03:49:a8:ec: 85:f2:35:2f:ca:e8:40:20:47:df:30:36:d6:93:17:ea: 20:18:73:81:b7:a2:84:e9:fa:6e:92:8b:c1:cc:40:63: 6e:bb:ed:93:4d:44:55:71:f1:fe:ec:0f:25:82:37:57: f7:3f:53:63:f3:fb:8e:a7:ef:50:84:6f:bc:67:af:31: dc:28:6b:f9:21:e7:d8:e4:f7:f6:35:cb:1c:89:c4:f2: 77:0e:90:58:62:ab:f1:37:2e:0e:f5:05:4d:6e:7b:21: 57:b0:fc:f4:13:f2:2f:c6:cc:a5:37:c9:1e:9e:21:e0: af:4b:83:87:d6:e2:9a:09:3c:be:0c:af:f8:d4:1b:ef: 68:9d:8e:30:46:82:da:54:ec:ec:c7:d4:68:9e:45:7f: 4b:36:e2:84:a6:a0:85:bf:7e:5a:74:dd:8e:8c:45:cf: 38:52:b7:dc:03:c6:ad:8f:39:a4:ae:80:52:1d:5e:89: 58:30:1a:86:56:05:13:a9:17:5d:17:95:48:58:7a:00: 6e:2b:01:2f:70:51:76:46:55:d7:3e:01:0f:38:7f:39 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:c4:f7:47:87:80:ae:dd:ab:10:09:ed:db:4a:66:97: aa:dd:46:4a:a8:31:00:9f:ec:93:ce:91:f7:ef:9d:43: 50:3b:78:5e:28:43:75:fa:b3:2a:a6:59:05:a4:aa:9c: a7:0f:10:5f:2d:7c:76:a7:43:07:7b:8a:b6:e0:a4:38: b6:4b:40:83:f8:c5:75:2c:2d:06:25:7e:51:12:b3:eb: c0:cc:51:2e:a9:99:21:dd:5b:d7:a3:a9:eb:e5:31:5f: 7a:91:c1:a5:c7:6b:ff:5e:7b:18:24:74:d8:a6:4a:ff: c4:1e:e6:60:64:cf:cf:89:84:2b:33:8e:69:3e:5f:b2: 34:9d:7b:07:f3:60:9d:10:fa:bd:d8:99:f7:dd:23:db: db:39:1f:9a:c6:f2:28:5e:72:93:5a:33:e0:66:7d:7e: d8:5f:8a:aa:9e:90:a7:5b:f2:af:69:0d:25:dc:36:ce: 78:7e:10:e4:ee:1a:61:94:15:bf:8d:c3:f9:dd:c1:c7: f5:33:23:e5:42:8c:f4:e1:c3:bc:12:6c:65:ee:dc:09: 13:b1:0f:11:22:6f:5a:97:79:a9:46:ae:95:92:5f:21: a4:c3:49:c4:28:95:7a:0f:ae:3d:3b:bd:ee:bc:2f:10: 25:3b:79:de:94:25:93:d4:35:93:55:35:76:70:16:8d Fingerprint (SHA-256): 4B:29:A3:3C:81:98:3C:F6:38:78:97:14:AE:F7:9C:F8:91:AC:7A:CA:A1:DC:1C:95:68:C7:FE:4C:A5:2F:D3:44 Fingerprint (SHA1): 97:CC:9B:87:F6:CD:DE:95:34:43:0A:ED:B4:E7:E1:A0:31:93:43:68 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:c9:bf Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:17:52 2023 Not After : Thu Jan 18 14:17:52 2024 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:90:85:10:62:6e:ec:b9:4b:e4:88:2f:63:f3:76:04: 82:eb:42:ea:c2:32:b9:31:7e:6f:31:a5:0c:f3:0b:14: 37:4e:37:d5:f5:c1:9c:2e:8b:9f:1c:a8:72:2b:c2:6f: 15:3d:28:c2:7c:3f:80:fc:32:09:f9:8b:a9:02:4e:62: 94:11:04:41:3f:04:02:c1:ce:10:2f:f7:80:d3:93:e2: a1:fa:37:af:f2:35:97:0d:d6:6d:45:85:e6:fa:a4:1f: 4c:e1:f3:62:04:db:37:75:11:67:6c:8c:8e:14:bd:9b: 48:82:82:9d:91:fc:e5:cc:db:5f:9b:f5:1c:c2:e9:ef: 4a:17:0b:10:b8:36:86:4a:14:02:99:6a:07:52:81:c9: 12:6c:15:0f:fc:9c:7c:fb:70:cd:12:26:7a:29:28:42: b1:ea:3f:26:e6:29:1e:cd:25:85:53:7b:32:ac:05:c4: 58:84:8b:b1:a9:5d:88:54:97:21:b2:0f:33:3f:50:dc: 7e:d0:b1:45:24:6f:9b:0b:2b:f3:ec:c6:33:80:76:35: b7:1a:63:da:23:f1:44:82:d8:f0:99:72:d2:39:67:1f: 45:2f:06:c3:74:90:bb:f3:3c:6a:36:71:85:d0:62:a1: e6:d9:57:88:2a:9a:be:f6:71:50:ee:09:71:58:c5:29 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:66:87:30:bf:66:f9:75:12:ee:fa:0c:38:dc:79:b0: 07:eb:2e:c5:3d:a2:32:bc:50:1d:a4:dd:b0:84:25:a0: 78:46:07:35:b6:f8:e8:22:75:52:d1:1f:ca:3d:f4:99: b2:61:f5:60:35:f7:8d:fa:fc:f7:1f:14:14:82:d5:85: 84:7c:81:ff:6e:d2:95:3b:11:1a:a8:73:65:7f:5e:f7: 8a:ba:a8:72:8c:3c:c3:50:4e:27:1a:ed:bf:a9:e7:8c: 96:fe:74:2a:78:5d:b4:c8:d2:33:e6:0f:71:51:b8:0c: 3c:42:ea:5e:e2:cf:c0:51:fc:14:da:2a:eb:ed:1f:bd: 09:e2:b7:e2:79:7e:90:9a:54:4f:70:7f:c1:17:9a:70: 2a:5d:1e:c2:f7:96:5a:3c:5a:dc:5f:27:c9:47:1b:17: e1:d1:70:94:ff:67:22:ae:d8:37:89:5d:e3:ce:45:f9: 94:b3:32:6c:5b:a7:fb:37:83:a7:cc:76:65:09:a2:20: a3:d2:75:a2:c9:6b:c2:27:44:ce:0f:d0:95:36:c4:15: 8b:cc:ac:54:45:5c:38:30:97:47:fe:42:d1:b4:23:78: 0e:53:05:b9:4c:9a:0f:c4:b9:55:bd:75:31:33:f7:de: 91:b3:45:de:59:21:d4:87:c7:92:89:2e:df:79:69:2a Fingerprint (SHA-256): 36:05:0B:9A:C0:B6:B3:E2:7D:5D:B1:0D:AD:D2:0C:D8:5A:20:AC:4A:FA:71:D9:8B:5E:BA:98:D1:19:C5:3E:47 Fingerprint (SHA1): 39:2A:C3:39:55:92:D8:13:6F:C0:DF:2A:11:09:33:5A:A4:A5:3F:FC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:c9:c1 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:17:52 2023 Not After : Thu Jan 18 14:17:52 2024 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:23:b4:71:ce:34:0d:e5:30:a8:51:9d:39:74:61:64: 89:dc:08:cb:95:69:39:55:b1:9f:0a:ca:0c:94:30:9e: 51:34:e9:4b:91:02:31:e2:79:ec:6a:f8:b4:9d:f1:cb: c0:31:23:d5:5a:d9:eb:92:c4:c3:25:a6:ee:58:af:61: fc:e3:65:24:22:22:52:c0:d2:98:c2:7e:21:7c:07:68: 20:e0:ab:9e:4d:e0:52:8a:b0:15:16:79:27:bd:bb:9c: 5f:ef:5f:7b:2e:e4:04:34:4b:cf:a7:82:25:7b:39:8f: 92:37:92:ef:02:3e:8c:c0:a5:39:e7:36:3f:88:ec:92: e8:53:83:ed:73:43:62:db:80:ed:55:39:75:09:0d:0e: 66:6b:8a:cd:bf:44:f7:f3:32:b7:ea:7b:6f:e8:ad:a4: cb:db:76:84:76:d1:f8:f4:06:ed:aa:54:cc:e5:04:75: 3e:9b:dd:f9:ba:79:16:a2:73:d0:c4:5b:17:88:f6:dc: d1:57:19:84:1b:14:de:12:c7:71:49:c6:77:61:12:48: a7:73:80:96:ed:44:ef:db:db:16:a4:d4:92:bb:a1:11: 42:7f:ee:27:56:dd:fb:4c:73:cb:41:ef:bd:12:44:43: 75:ce:53:66:19:6b:80:db:3a:14:cd:d6:f3:bd:60:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:44:c7:b5:b6:8d:0c:67:2a:24:93:4c:40:61:4f:9e: 8b:36:0e:a4:73:84:66:01:c1:9a:9c:ef:00:96:6f:f0: 90:53:ba:2b:c8:f8:2d:55:bf:70:7d:32:a2:fa:b9:f3: 67:ba:45:98:75:a2:af:be:f3:95:b2:51:42:55:65:5e: 72:de:eb:19:8f:3b:c5:a9:f6:4d:50:4c:34:52:e0:6e: e5:b4:3a:66:3e:4b:b7:00:cd:7a:a0:62:52:3b:1a:c3: f7:ee:3d:4d:6e:03:e6:3c:f9:d3:0f:15:4a:eb:62:4c: 0c:13:7e:da:e1:6c:bd:5d:d4:f2:38:fb:b8:d1:51:9d: cb:6b:3e:dc:d2:a9:74:2a:00:fc:59:d6:f0:96:60:0f: 33:f0:47:d4:d6:9b:87:62:0a:85:d1:f7:56:b3:e2:f6: 59:47:28:3b:91:73:22:de:94:a0:4b:49:81:f4:38:5a: 1d:ad:27:2c:c5:18:8a:28:20:66:00:90:5f:e8:f4:a0: d4:d2:dd:dc:44:78:78:46:ad:03:a8:51:13:ac:ad:7a: b8:37:0e:57:10:d4:1a:5b:4d:c2:33:f9:84:bb:79:ea: dc:40:a4:11:d1:20:d1:d0:36:43:a2:09:7b:56:4d:a9: cb:91:21:5b:2e:e5:3c:0e:b9:d1:8d:e9:18:38:c1:5f Fingerprint (SHA-256): D2:6E:41:B8:A5:00:33:98:1B:AD:14:15:0C:69:AD:D7:C9:C4:C1:27:23:30:25:DC:D8:5C:24:95:8D:A0:90:50 Fingerprint (SHA1): 0B:38:55:0D:9B:39:CB:19:40:66:A8:69:FB:F2:60:29:A7:7D:24:7D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:c9:c2 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:17:53 2023 Not After : Thu Jan 18 14:17:53 2024 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:f5:e3:d7:1c:ed:9b:57:c9:09:52:1f:b3:74:76:a6: f2:0f:4e:92:98:48:aa:54:35:bc:5e:d8:e6:3b:6b:37: 00:df:50:e0:80:7e:8f:83:91:a4:fc:f6:26:ad:2c:36: 4a:be:d3:95:40:ff:db:4c:62:56:a4:96:ee:39:6f:8e: 6d:45:29:74:50:c9:cb:df:9d:7a:e6:ec:93:2b:c0:1a: cc:02:d5:ef:0d:3f:f9:f1:4c:29:45:31:c5:e4:cf:81: dc:f5:c0:b1:8b:c9:49:e3:2d:27:b7:ea:82:0c:b1:36: 8a:c3:f8:4e:d1:a2:7d:a8:fa:75:d2:e4:12:96:2c:80: 17:bb:c1:a6:f2:8f:e8:1e:9d:20:22:a0:53:12:37:ce: 76:f7:a0:11:84:0c:31:78:a0:c9:74:9f:f2:8f:ac:76: c8:76:03:f7:6a:03:50:9a:ad:50:fb:91:ab:8f:ed:c4: 0e:32:5f:06:9d:e4:4c:19:e8:44:c5:4f:2a:c6:60:53: 1b:6b:d4:cc:e2:69:9e:ff:68:49:32:95:5d:fb:e7:b3: 2d:a1:db:69:db:7e:33:c9:5b:a1:d2:b5:42:cf:af:31: 70:04:ce:66:b4:6e:69:c9:fb:c9:25:43:79:b5:d2:13: f8:ef:a4:b5:82:e6:b9:a7:b4:be:c2:5b:ab:40:2d:4b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 24:b9:aa:1d:bc:5f:38:9a:1d:94:68:51:74:e7:c4:7d: b6:53:af:3d:ab:73:bf:b7:76:b5:9e:81:ab:5f:f0:73: 81:e6:30:3f:ff:33:33:8b:6a:81:1c:ff:86:9b:42:05: 17:68:8a:b5:75:4d:66:09:3e:16:b7:c7:06:33:2f:1d: 35:d0:d7:c0:3c:7f:cc:75:0d:a1:0c:99:1d:e2:fb:10: b7:84:22:fa:80:88:82:0f:84:1e:30:56:50:4e:a5:67: 17:9f:ae:36:1d:39:55:0a:c5:90:ea:21:9e:fc:02:04: 86:55:dd:1f:0c:b7:a4:34:45:68:6b:0c:15:1a:90:9c: 5c:ce:91:77:9c:51:a3:01:7e:c2:cf:c7:03:7f:af:2e: c5:c1:c0:b7:f8:fe:7a:84:d0:70:f3:d2:9d:9e:3d:4b: 75:82:1a:8f:ba:57:e6:d3:fb:d6:14:fc:a6:c0:e0:c6: ca:60:7a:7f:5c:a7:55:f8:8d:58:d2:02:82:7a:bc:c9: fe:aa:00:0b:26:b1:24:da:84:4a:41:12:5c:c9:bc:01: 15:ae:7f:c0:fe:1b:72:97:f7:96:5b:21:9a:b5:9b:f2: 67:13:cf:c3:e5:4a:53:3d:43:75:ed:46:a7:00:d7:cd: ea:1d:67:07:d4:90:7f:20:71:d3:bc:3c:13:78:9e:97 Fingerprint (SHA-256): 4C:DC:56:72:88:F7:FC:52:42:66:81:23:C1:97:86:A7:82:28:EA:49:D3:9A:F8:C4:79:D4:D2:56:A5:81:EF:E2 Fingerprint (SHA1): 4D:E5:8F:62:15:AB:C1:35:89:AC:5E:3D:E1:48:3F:54:6E:0F:07:9D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:c9:c3 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:17:54 2023 Not After : Thu Jan 18 14:17:54 2024 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:51:96:b7:39:c0:0d:b8:b9:06:2b:e4:59:52:00:d4: 64:16:c8:b5:ed:c1:b5:b2:dc:b0:b0:5b:33:8e:de:a5: fd:68:68:c4:da:c9:8d:11:e0:f4:0a:3d:2e:42:fa:33: a4:3d:98:a5:a2:0a:84:56:53:18:77:e8:44:54:76:f7: dd:1e:be:ac:bd:67:cc:2e:44:c9:ad:2e:7a:d4:e6:10: 87:20:d2:b8:ca:39:b2:3b:d8:c2:37:e3:8b:ba:e6:d4: 5b:b3:b1:4a:4d:f3:e7:bf:77:2f:b6:ee:3f:f3:5e:62: 52:c3:46:95:f7:e9:83:37:89:2d:d8:88:5b:b0:09:53: b0:35:fb:81:18:2a:ef:c9:54:b6:00:4c:53:f7:c0:4e: 35:7f:20:91:77:1f:da:d8:7e:9d:fe:7c:cf:ac:4e:32: 97:b3:0e:23:90:1b:1d:e8:a1:c8:5c:c6:43:b5:d4:12: e6:57:f3:16:07:8b:32:15:50:12:09:f6:ed:ce:66:df: 21:84:8e:e3:38:0d:bb:98:73:75:81:7d:c1:d2:3c:b8: 41:9a:ea:68:56:1c:83:ec:5c:2f:a8:06:34:c7:e0:f8: f4:9d:9a:5c:fd:d5:c0:79:3e:e3:65:42:ad:bc:e2:11: de:cb:a6:3c:26:6f:4d:25:87:bf:b9:c6:ea:03:aa:1b Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:d1:77:4b:72:7f:ac:af:e3:a0:73:b0:f3:4d:d9:41: b7:7e:3f:06:cd:03:b5:69:12:e6:74:31:36:83:df:b0: 61:2e:f0:5e:73:69:fe:bc:c2:8a:d3:9b:9a:77:92:93: 46:df:91:62:c8:5e:fe:5d:ee:69:a9:8d:11:74:22:d1: 77:83:d4:79:2f:a6:93:41:4f:3a:ea:09:12:f4:0b:56: a1:ba:62:4d:be:e9:90:69:2c:0e:c2:07:22:a3:c5:7f: 07:c9:bf:d1:9d:2d:bf:a6:97:77:79:26:fc:26:6f:43: 50:aa:80:b7:eb:a9:3b:68:b4:2b:c6:32:de:ec:4e:ce: 8d:75:4a:b9:03:33:36:da:0c:8d:ab:78:40:81:f7:39: 6b:91:a2:73:91:33:46:94:f0:a3:03:b6:62:82:5a:a0: 8f:04:bf:fb:1d:17:a7:cb:36:de:62:b8:9e:f8:d1:42: 0d:0a:8a:ec:15:cc:b1:e3:c0:a8:98:44:aa:fb:22:22: 61:86:69:db:53:63:98:55:ed:b1:2a:c7:4a:61:21:f2: 7e:dd:be:53:c9:24:d1:72:84:4f:5e:0b:8b:b5:bd:cc: db:ac:de:fc:20:83:7e:6d:58:0c:c9:c4:f1:d5:d9:85: 5e:7c:45:ff:27:d1:e5:ff:81:98:c5:90:95:90:62:a8 Fingerprint (SHA-256): 6B:F0:2A:C2:68:45:F0:3E:EF:E3:1F:E4:B8:DE:BB:F6:EF:73:C7:32:09:62:74:EE:D6:D3:DD:AF:B7:FD:C8:41 Fingerprint (SHA1): 22:63:AC:54:5F:10:58:FB:90:5D:C4:08:57:59:C7:4E:26:B2:48:D9 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #337: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:c9:c4 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:17:54 2023 Not After : Thu Jan 18 14:17:54 2024 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:de:fb:4b:3e:4d:53:96:37:70:b0:07:b4:6b:ab:01: f5:69:46:49:08:24:74:d2:3d:42:7d:3a:40:d9:6f:eb: 98:ba:67:9d:88:b6:71:69:61:4a:12:b2:14:e3:57:c8: 0d:61:76:bf:ce:46:6d:5e:37:8a:db:80:71:1f:21:3f: 73:11:ef:8a:08:85:cb:08:d0:a2:a3:b1:68:fd:bd:57: 25:b6:41:27:c2:d4:d9:56:dd:f9:da:9d:36:ed:53:82: 7d:8c:b6:f7:5f:61:3b:df:e0:21:c2:01:ad:9b:c9:ab: af:9d:34:fa:49:1e:fc:99:1b:08:17:1a:ec:84:66:1a: 54:bd:45:63:ac:c8:7b:42:43:54:24:8c:44:4e:8d:d2: 02:5a:12:2e:fa:ba:39:3b:55:9d:d6:83:5d:38:b1:0d: 9b:60:81:f6:81:e1:cb:25:e9:35:62:d5:3f:36:46:37: 6a:89:38:e6:50:78:4f:2a:d0:ff:ab:c9:a2:0d:da:e6: 28:8b:3c:c4:8d:78:3a:a6:27:2a:9d:82:ca:b0:54:58: 2b:01:c4:3c:99:b0:16:0a:b9:2a:69:b7:e2:56:cc:fa: 8f:5e:a0:8c:38:d2:5d:d7:d7:d9:ff:ba:b3:c1:2b:7d: 8f:2f:41:98:81:bb:cd:4d:60:6f:b4:53:22:75:5b:05 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:97:5b:be:28:b5:93:dc:76:77:67:ad:65:21:50:33: 4a:46:00:6d:89:d0:c0:d2:01:c0:9d:de:d7:81:06:2f: e4:92:95:04:b8:ef:31:77:4e:65:df:f4:f5:d4:cf:f1: ac:cf:12:93:1e:8a:cd:af:d7:1e:3b:6b:b9:05:f1:c7: 4f:9a:d0:5c:4b:c6:cf:21:f7:5b:a5:d4:b8:64:eb:df: 1b:10:57:19:71:1d:ed:0d:de:bc:78:43:10:10:8a:eb: da:83:0d:aa:ec:bb:5f:a4:6f:fb:cf:67:7e:cf:02:44: 3a:bb:0f:91:8f:34:f0:b6:f0:91:5c:4b:13:77:67:04: 2b:8d:6a:64:7c:18:29:6d:de:17:c2:6c:fa:7b:f8:3b: da:60:be:91:e4:c0:e8:5b:a8:27:64:92:a4:1e:7b:dc: b4:ae:0d:45:66:be:19:2a:53:83:99:2f:30:7b:bc:9f: 5a:23:af:a2:63:74:f3:e6:ab:f7:5c:38:6a:ae:8b:6b: 75:ea:9d:43:de:0b:d8:0e:7f:cd:a6:28:c2:c9:ea:1b: 1d:59:58:26:50:c9:ea:3c:22:9b:21:23:55:da:00:c7: c5:cf:7e:86:22:73:91:a4:0b:20:3b:d9:a0:39:6e:ff: 1e:d4:f8:ad:2f:24:69:45:07:6b:7f:b4:2e:9b:10:3b Fingerprint (SHA-256): 63:F5:03:5B:58:E8:70:34:59:25:6C:B1:08:E5:6E:B5:F7:1B:77:DE:87:D6:EF:D1:48:7D:F5:4B:E5:DD:11:D4 Fingerprint (SHA1): 19:D7:D4:27:0A:6D:39:68:0D:9E:81:8E:41:36:AB:80:1C:69:C6:10 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #338: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:c9:c4 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:17:55 2023 Not After : Thu Jan 18 14:17:55 2024 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:da:0e:7f:8d:57:f4:18:f1:ff:d1:cd:e5:e5:52:45: 58:6c:9f:61:cb:0f:64:ec:6d:73:38:ef:73:b5:8d:d4: 60:56:a3:c5:ff:d0:c5:4c:cd:2c:ed:7e:18:12:93:4e: 7b:55:cf:ca:d5:43:2f:42:4c:40:82:14:2a:8e:65:d7: 97:8f:95:a5:78:8f:a3:56:53:0c:94:f5:fb:18:78:6c: 7f:8d:e2:66:2e:88:a2:74:21:f9:c6:05:ec:1a:bb:e7: a7:35:66:e3:d7:72:22:13:30:7b:89:ae:d6:fd:10:15: 40:1c:cc:8e:5a:a7:56:b0:de:29:63:70:90:ad:41:45: 98:75:f3:06:74:f5:77:25:48:f0:bd:97:60:55:14:f5: ff:31:74:46:ae:73:92:b5:2e:59:0e:bf:77:a5:f4:1f: c3:e3:6c:a3:6c:1b:1d:7d:6c:68:cb:81:cc:00:c8:24: 81:2a:11:1d:45:24:45:3e:8f:d0:f0:af:a5:29:36:35: 76:16:a1:f4:ca:f8:a8:8a:53:e2:40:57:75:ed:b8:29: 12:9f:6e:7d:69:82:a4:a4:d6:df:80:16:3a:e7:82:ad: d5:25:18:65:6e:af:39:f5:20:4d:89:f8:60:de:47:35: df:ba:81:5c:87:4c:da:8a:20:9f:f8:86:eb:9c:6c:f1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:f1:f1:2e:9f:0b:fd:15:d7:b5:6a:ee:9d:33:80:02: e0:17:f4:3d:81:69:04:c5:a6:92:54:ea:aa:17:e2:0e: f8:bd:1d:d5:79:a4:89:5f:66:7d:09:20:e1:42:f1:48: e1:cb:38:68:92:96:59:c7:be:7e:4f:28:30:cb:e0:e2: dd:83:67:16:4c:fa:b9:c8:a4:12:0f:1a:2b:ab:8e:cd: d9:05:c6:45:95:eb:53:d8:8b:62:74:eb:45:fa:cb:9f: 67:87:a0:b5:1e:6b:33:47:a5:54:12:34:a6:1c:7d:6d: 61:25:e3:65:da:a9:33:40:50:3e:31:8c:ad:4b:c2:20: d3:f4:96:0f:a8:4c:6e:eb:8b:8a:71:68:0e:74:db:80: 84:91:33:13:75:23:db:c0:3c:39:e4:f9:e8:f9:fa:ab: e3:ef:05:66:73:93:fb:0b:b3:fd:c6:e1:5c:7b:33:28: c6:c9:3b:64:99:6a:dc:a2:58:b9:19:d3:5c:35:1d:5c: 06:1c:e1:fc:62:59:47:eb:64:7f:8a:5f:20:61:e6:91: f4:d7:29:1f:cc:91:53:f9:3a:17:2a:66:45:d6:ef:cd: c8:4a:eb:6e:6c:72:d7:e4:66:c1:c6:30:cf:28:8f:b5: c7:0c:c5:dc:f5:0d:d7:02:56:87:37:67:8c:47:06:36 Fingerprint (SHA-256): 68:2C:C7:E6:E5:4B:ED:B7:AE:58:40:03:CD:A0:39:17:BF:2B:F9:D1:E7:4A:3C:1B:EF:29:6C:DF:73:41:A8:64 Fingerprint (SHA1): 45:94:C4:30:19:36:1E:27:14:46:70:D7:2D:7A:97:A7:8F:3F:7B:35 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #339: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:c9:c6 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:17:55 2023 Not After : Thu Jan 18 14:17:55 2024 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:e8:e1:81:3e:ed:14:1a:a8:01:14:ab:92:5c:06:20: 58:25:f4:50:17:ba:38:23:9d:60:f2:e4:a1:eb:6a:ec: 6a:64:1a:b5:dd:d7:e6:3f:58:dd:1d:50:bb:73:47:b5: 22:cf:95:70:9c:d6:a0:03:ee:60:45:a3:31:87:79:2e: 9e:af:cd:2b:b8:92:df:ab:d6:26:66:dc:79:6f:88:95: 79:40:a0:5f:86:7f:60:40:6a:6d:29:af:5a:bb:27:5e: ac:1f:42:0e:ed:cc:5c:4f:6a:28:ac:1a:55:5c:b4:38: 7e:f1:49:0a:6d:b8:8f:0c:b8:de:4f:0a:b7:96:f7:8c: fa:68:9e:f2:76:1d:4f:1f:d7:85:64:05:69:30:a9:79: b5:07:8b:49:b8:5f:4e:0c:0a:f9:c2:02:08:b1:37:49: 33:e4:d0:87:06:5c:c1:2a:89:e1:e6:f8:6d:db:b7:c8: f7:d4:d0:fc:14:ae:a7:a0:aa:6f:73:5c:e1:3b:dc:c9: 35:80:59:f1:2c:6f:c5:1f:9a:1f:a7:fe:aa:74:33:00: c4:8d:b4:c6:76:06:24:e8:75:2f:fb:53:25:60:75:6b: 0a:c6:f3:c8:07:21:59:68:63:86:f6:cb:e3:9a:f8:aa: f1:6f:2e:bf:47:ce:bb:aa:88:97:4c:45:77:96:57:81 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9f:6c:a5:e9:f7:c2:52:46:0b:4a:18:1d:f4:0b:97:71: 5b:8e:65:10:a7:d9:6e:e7:26:f4:51:fb:51:05:e8:6e: 74:4a:e1:96:73:f4:38:f6:82:72:c4:61:56:a5:40:8c: 62:59:a1:de:0a:16:f2:c6:59:ef:da:81:97:40:13:69: 95:c5:0d:4c:20:05:aa:0e:ea:4c:2c:e7:58:9e:b9:d3: 9a:4a:34:42:bc:5d:68:ad:e6:c0:75:fd:6c:65:03:3b: 09:f2:be:75:66:04:b0:a4:5d:41:21:03:ab:a7:0e:02: 00:40:3d:b6:c3:91:e5:b5:2d:2e:06:0b:11:04:83:5a: b2:fa:a7:5b:a2:6a:f7:e5:a6:c3:ac:2c:a8:fa:5a:a5: 80:ad:19:92:d8:37:55:e0:f8:b2:43:ec:be:0d:fd:84: f4:48:c5:fa:31:34:23:e8:b3:92:e4:48:43:9a:9b:26: cb:da:d4:e7:d6:ac:7a:86:35:3f:77:6f:d1:54:4d:d9: 68:7d:b2:7c:fb:af:3b:1c:72:3e:07:13:a5:bb:1b:43: 95:ab:f1:fb:58:52:b3:cc:39:d2:fc:c6:df:62:88:e4: 92:b1:5c:49:d8:b7:dd:24:39:2d:0a:ec:f7:94:ff:60: 94:a0:48:5a:e3:a8:73:49:99:6e:ac:aa:ff:aa:9f:e5 Fingerprint (SHA-256): 43:F4:95:00:FD:A4:4D:8C:6C:8A:C5:03:B6:FB:CA:9B:22:71:42:58:4E:02:C1:4C:CB:E5:08:E8:C8:14:71:0F Fingerprint (SHA1): FE:7E:26:8C:E8:FF:FE:03:36:28:3A:5A:7A:04:0A:14:4C:30:A5:5E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:c9:c6 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Wed Oct 18 14:17:55 2023 Not After : Thu Jan 18 14:17:55 2024 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:b6:ae:43:37:08:82:ca:fd:bf:a3:39:1b:cb:03:50: bc:c8:aa:7d:50:68:49:57:4c:de:b4:1a:a9:57:ae:7b: ca:00:9d:c9:74:1c:25:bc:c5:45:f5:14:13:cc:c9:3e: 7a:da:c6:27:e5:71:db:64:a0:03:9a:9e:dd:f8:69:9a: d6:cc:97:bf:b2:98:0e:6b:36:09:7f:31:82:17:d2:62: 8f:92:54:2d:d3:80:6a:dc:56:da:fa:cb:8c:eb:f9:d7: 12:c8:0c:a7:da:1d:b8:f4:e3:21:9e:e9:3b:23:5c:ed: 04:d2:0f:7b:4e:a7:40:5c:57:0c:d5:81:63:bb:7f:89: 54:7e:bf:9c:47:74:fa:2d:cd:8c:66:4a:12:49:25:fd: a3:84:dc:a4:d9:bd:2b:87:d1:1a:0a:66:71:2a:02:ea: 2f:7b:fb:91:12:fa:73:36:36:91:9e:a5:e2:af:ff:97: 01:db:f3:3b:9a:89:58:a5:1c:b0:2c:49:e3:cd:b0:0a: 1e:d6:f7:a2:12:e8:0a:bf:15:9a:ff:5b:b4:4b:b9:ea: ba:0b:6e:7c:4a:0a:bd:5e:67:30:2c:c5:27:1a:3a:7c: ba:47:08:8b:38:ed:43:ab:e4:6a:56:83:e6:9f:76:77: f6:6f:eb:ec:29:ef:2a:2d:25:65:be:10:59:e2:5a:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:6c:b6:00:e0:a6:c8:c0:08:8c:71:1c:8d:be:45:64: 21:75:f9:c0:66:d6:62:8e:0f:65:75:b7:ce:3f:66:08: 0d:67:2c:75:1b:7c:4a:6a:5e:c2:01:9f:72:6b:ac:4f: 1b:70:ec:84:2f:10:1d:4c:ff:4d:07:66:4f:a0:a8:29: 2c:68:ca:67:69:57:2c:1a:3a:a1:01:3b:7f:a9:52:c1: b1:8c:5b:e4:19:92:7c:3b:16:53:a0:a9:76:6a:78:77: a6:68:a2:6a:c2:7c:b5:48:27:2b:88:a7:7a:e6:4e:af: bc:64:30:90:c0:b2:70:88:fe:bf:d1:08:26:a5:29:e6: e5:fc:ce:0e:c2:c1:68:2c:95:e1:ea:d9:52:9a:b3:e4: 93:7d:50:ea:2a:da:5d:91:53:03:dd:2c:b8:fc:86:d4: ef:61:64:1b:d1:cf:d8:50:c9:be:a7:81:be:59:e5:7f: 3a:b7:0a:4d:a4:65:7b:79:5b:53:44:7b:31:f5:ef:6e: de:63:58:e3:74:63:c7:9a:87:b0:24:4d:69:b3:1e:8e: b6:02:9e:c9:70:57:d9:2b:63:7d:d5:3d:a6:cd:21:cd: 68:64:a6:35:75:57:c8:62:28:e6:b8:44:75:96:96:b1: e0:15:c4:e1:07:00:cd:62:98:de:81:c6:f6:83:54:00 Fingerprint (SHA-256): A8:8D:4A:48:2B:0C:67:68:B0:91:6B:2C:E5:FC:A2:F9:3B:2D:BF:0E:0F:36:A5:2F:EB:B3:5D:1F:A3:21:9A:C2 Fingerprint (SHA1): 80:92:3B:3C:CC:D3:D8:FA:0D:26:83:F0:90:D8:19:A0:73:8C:A3:F7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #341: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #342: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #343: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #344: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:c9:c9 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed Oct 18 14:17:57 2023 Not After : Thu Jan 18 14:17:57 2024 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a7:7f:b7:16:f9:cc:40:0b:a8:e7:9c:de:84:91:67:64: c0:27:35:51:f1:db:14:ce:9b:8f:03:25:1e:1f:c3:d9: 55:46:69:f0:d8:d1:f8:49:1d:09:01:25:23:c2:20:ec: ea:d8:e5:f1:99:e0:bf:26:03:dd:10:f2:4e:eb:0d:71: d2:80:ec:cd:00:1b:16:45:d3:08:eb:6f:c7:a8:dc:e7: df:a9:8e:a6:e9:2b:7e:a2:18:65:94:ab:26:7f:32:73: 95:9f:95:ee:8b:5c:31:a6:ec:cf:95:76:6c:99:2b:15: 56:b7:27:ae:c8:33:cb:62:86:c8:a0:d9:c1:94:ac:89: 9e:58:11:04:b2:7f:c4:db:d1:cc:24:c2:69:ba:ac:6a: a4:d8:a5:21:55:63:71:29:e4:df:ad:49:c5:3d:7f:c0: e8:db:07:34:08:5c:34:66:67:56:d2:fa:b9:9c:2e:ee: 61:56:50:99:43:be:de:f9:e3:a5:7e:63:3c:b7:ce:95: 4b:75:18:e3:c0:b7:01:7f:23:89:aa:cf:dd:59:ac:26: 32:b9:0b:ac:59:b0:ef:ae:85:3e:89:22:7a:1e:83:f1: 97:43:62:bb:a8:cb:2d:f5:da:60:ab:16:c6:be:34:96: 30:a3:b5:5a:ba:ea:18:b4:e6:8a:52:2f:b8:85:62:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:e8:c9:a9:8e:ca:e4:2e:21:4e:66:ff:52:a4:4a:3a: 0f:2d:84:52:0b:b7:0e:21:30:08:8a:26:79:5d:a8:6e: 00:a6:22:a6:00:14:c9:b8:e6:0d:52:26:90:40:3b:22: 67:ed:17:b3:04:52:bf:60:8f:be:36:88:51:1c:ed:eb: 6a:4f:5b:f2:c9:46:e4:75:9c:d9:ca:d0:b7:03:c0:ed: 57:4d:f5:7d:04:0e:41:c2:1f:e6:36:75:fc:ed:ae:89: c3:89:43:13:13:5e:51:8e:21:0f:97:db:18:96:18:aa: ad:6d:09:88:bd:a6:59:d4:3a:04:37:66:4e:9b:c9:e4: 29:9e:b9:14:9c:61:90:c0:b9:7d:90:1d:eb:4b:ca:3b: 98:b6:60:77:19:29:6f:42:06:f1:fe:f5:ff:96:b1:1e: 51:11:e4:17:08:7e:09:f3:74:d6:01:5e:00:67:a8:d3: a6:d9:75:ce:5a:70:0b:4b:2b:76:05:65:da:e7:a5:9e: 6b:70:84:fd:69:f9:fd:51:39:2b:c6:77:58:19:6b:7d: 24:da:49:1b:ca:78:40:2c:db:e1:3e:7d:87:99:81:20: 6d:5e:41:7c:9c:65:91:9d:39:ed:f5:6c:e8:77:6a:46: eb:78:2a:0a:88:61:07:22:b7:29:a0:0e:89:22:60:f5 Fingerprint (SHA-256): A2:B0:20:73:50:D2:C8:F1:0F:1B:12:B1:D1:B3:18:8A:AD:F7:5B:40:D6:7F:18:D5:ED:AA:D7:EE:62:4A:1D:98 Fingerprint (SHA1): 5A:E6:0D:20:97:D1:63:90:D3:A0:26:0F:E0:9B:AE:5A:5B:D4:7D:86 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #345: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der cert.sh: #346: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #347: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #348: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #349: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #350: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der: error 0: Success cert.sh: #351: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #352: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:c9:cc Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed Oct 18 14:17:58 2023 Not After : Thu Jan 18 14:17:58 2024 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:a8:5b:2d:d8:33:ea:e3:f1:75:49:63:3a:72:d9:67: d4:20:ec:43:a4:5c:37:db:06:e3:20:21:f4:ec:f8:b4: ef:56:cd:ee:34:2e:8e:d9:6e:bd:86:b3:ae:14:ec:0b: 8e:df:c6:0d:16:a9:96:ea:86:83:28:11:74:b1:88:42: 4d:3f:81:6d:23:2e:15:30:93:1e:19:92:d3:63:4d:22: 26:7e:02:bf:49:7d:13:bb:f2:34:da:66:69:8e:c5:96: 32:0e:c6:fd:a7:fc:f9:35:27:28:86:d7:ca:c6:13:c6: 82:ec:30:ec:31:f1:64:ce:b3:c2:a2:9d:f1:6b:1e:12: a7:be:c0:32:4d:19:b8:ce:2e:0e:0a:76:db:68:87:f2: 7a:b2:06:c7:b3:6a:9e:6b:b1:bf:70:35:9b:b1:10:42: 71:52:7e:38:c0:8b:b8:89:f6:b5:23:57:17:81:39:ef: 12:4c:4d:5a:5e:8b:db:8e:32:c4:dd:4a:25:d5:d8:93: 82:13:6f:58:92:e8:7a:92:85:e9:63:c8:ae:e1:8a:9e: 11:19:74:4a:a8:64:f1:3a:53:d3:c9:8f:75:51:a5:21: 91:1c:ea:bc:a7:14:25:68:82:7f:37:85:58:3b:19:eb: 21:d4:74:81:98:0c:9b:12:25:0d:d0:d8:e7:72:35:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c6:30:d1:a2:2a:fd:45:94:44:92:25:ea:0d:0c:24:a7: b9:c2:11:54:bf:a7:ac:21:03:12:ff:93:37:99:18:dc: d4:5f:a1:c8:f7:d9:91:80:6a:29:b5:e2:b8:18:98:f4: de:91:c8:fb:12:e4:65:33:f1:ab:b3:ab:a9:b0:58:67: 55:1c:2f:94:78:c6:49:85:25:d8:84:1c:26:2b:37:0f: 56:d5:6d:e3:ae:f4:df:8d:d9:36:61:35:ea:c4:5e:db: 0d:ef:4a:98:a2:1f:81:a2:d3:d5:8c:d9:5a:b9:7d:96: eb:8b:eb:28:ba:c1:1a:40:90:20:fe:02:c5:77:e4:a2: f8:0f:4a:27:48:74:bf:35:b2:88:ce:ad:85:70:17:2f: d7:85:b3:c6:95:54:4c:02:0b:5f:8d:cd:e8:e0:a8:0a: 7e:a5:3f:a0:17:a6:a2:0d:15:f6:4d:4f:fc:a9:54:96: 72:81:fa:6d:18:76:6b:97:ae:8f:11:4b:d0:ab:73:44: 24:94:41:49:c9:c5:a3:3c:7a:85:c6:c3:c4:2f:af:fe: 05:7b:fa:f0:62:17:30:26:8f:61:6c:67:e5:2d:5d:58: ce:d1:0f:f3:d0:59:1a:33:ae:21:8b:74:c6:39:f4:27: 8f:14:74:d1:ce:08:2d:ff:5c:7d:4c:43:33:80:1a:32 Fingerprint (SHA-256): 92:96:0C:2A:DB:8F:ED:4E:D2:0E:6F:15:7A:49:66:8D:54:88:22:14:AB:91:7A:2F:52:58:38:63:A6:A8:17:89 Fingerprint (SHA1): B2:CC:48:8D:61:34:9C:56:A4:92:6D:2F:E8:F1:A7:57:23:1C:EF:4E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #353: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #354: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #355: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw cert.sh: #356: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #357: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #358: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dbpass -o root.cert cert.sh: #359: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #360: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #361: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #362: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #363: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #364: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA.ca.cert cert.sh: #365: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #366: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #367: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #369: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #372: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #375: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #378: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #381: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #383: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #384: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw cert.sh: #386: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #387: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -o root.cert cert.sh: #388: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #389: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #390: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #391: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #392: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #394: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #395: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #396: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #397: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #400: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #401: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #402: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #403: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #404: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #405: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw cert.sh: #406: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #407: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #408: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #409: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #410: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #411: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #412: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #413: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #414: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #417: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #422: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #427: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #432: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #437: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #441: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #442: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #443: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #444: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #445: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #446: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #449: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #454: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #458: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #459: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #460: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #461: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #462: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #463: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> rsa 898c455c4b7d34bbf0425338642e88add36e778d NSS Certificate DB:localhost-sni.localdomain < 1> rsa ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 2> dsa c729be9637e0d0952c2ee2a96a1e7560ee631d03 NSS Certificate DB:localhost-sni.localdomain-dsamixed < 3> ec a3975d7a0dbc2aa77040e6e5447e97b243022586 NSS Certificate DB:localhost-sni.localdomain-ecmixed < 4> rsa 8072189a1ea99a8664cccce9eaddea712ee61bef NSS Certificate DB:localhost.localdomain < 5> ec e76493c1a25dcef8ba62334d0d3d083e61d7aa3f NSS Certificate DB:localhost.localdomain-ec < 6> dsa 20cabf8a8f6b6b74575f7b36aeafc89cd525c1f4 NSS Certificate DB:localhost-sni.localdomain-dsa < 7> rsa b4219e66a2ea1573fe46f9e02894898de6a715ca (orphan) < 8> ec 1b7f10a923ebcaf451af3ba83e53ac839dea504b NSS Certificate DB:localhost-sni.localdomain-ec < 9> dsa 9e6b3c8c3d3abb04203592d1c2d33f675c71d0f9 NSS Certificate DB:localhost.localdomain-dsa <10> dsa afe9a7db52e81fbe9a973d1894f868ced7fe38de NSS Certificate DB:localhost.localdomain-dsamixed <11> ec 2ca78a173eced7cb6eb16ed6eb846ef5657946d6 NSS Certificate DB:localhost.localdomain-ecmixed cert.sh: #464: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #465: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #466: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #467: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #468: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #469: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #470: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #471: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #472: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #473: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #474: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #475: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #476: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #477: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #478: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #479: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #480: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #481: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #482: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #483: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #484: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #485: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #486: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #487: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #488: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #489: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #490: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #491: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #492: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #493: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #494: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #495: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #496: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #497: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #498: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #499: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #500: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #501: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #502: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #503: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #504: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #505: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #506: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #507: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #508: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #509: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #510: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #511: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #512: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #513: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #514: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #515: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #516: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #517: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #518: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #519: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #520: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #521: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #522: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #523: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #524: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #525: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #526: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #527: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #528: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #529: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #530: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #531: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #532: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #533: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #534: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #535: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #536: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #537: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #538: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #539: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #540: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #541: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #542: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #543: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #544: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #545: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #546: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #547: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #548: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #549: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #550: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #551: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #552: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #553: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #554: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #555: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #556: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #557: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #558: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #559: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #560: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #561: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #562: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #563: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #564: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #565: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #566: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #567: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #568: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #569: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #570: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #571: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #572: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #573: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #574: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #575: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #576: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #577: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #578: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #579: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #580: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #581: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #582: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #583: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #584: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #585: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #586: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #587: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #588: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #589: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #590: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #591: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #592: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #593: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #594: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #595: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #596: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #597: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #598: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #599: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #600: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #601: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #602: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #603: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #604: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #605: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #606: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #607: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #608: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #609: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #610: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #611: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #612: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #613: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #614: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #615: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #616: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #617: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #618: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #619: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #620: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #621: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #622: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #623: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #624: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #625: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #626: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #627: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #628: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #629: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #630: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #631: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #632: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #633: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #634: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #635: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #636: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #637: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #638: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #639: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #640: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #641: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #642: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #643: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #644: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #645: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #646: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #647: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #648: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #649: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #650: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #651: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #652: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #653: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #654: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #655: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #656: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #657: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #658: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #659: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #660: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #661: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #662: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #663: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #664: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #665: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #666: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #667: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #668: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #669: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #670: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #671: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #672: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #673: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #674: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #675: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #676: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #677: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #678: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #679: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #680: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #681: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #682: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #683: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #684: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #685: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #686: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #687: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #688: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #689: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #690: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #691: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #692: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #693: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #694: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #695: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #696: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #697: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #698: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #699: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #700: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #701: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #702: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #703: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #704: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #705: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #706: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #707: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #708: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #709: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #710: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #711: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #712: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #713: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #714: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #715: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #716: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh: Verify large rsa pss signature -------------- vfychain -a Leaf-bogus-dsa.crt Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=decodeECorDSASignature-testCase/taviso [Certificate Authority]: ERROR -8156: Issuer certificate is invalid. cert.sh: #717: Verify large dsa signature - PASSED cert.sh: Verify large rsa pss signature -------------- vfychain -a Leaf-bogus-rsa-pss.crt Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. taviso@google.com [Certificate Authority]: ERROR -8156: Issuer certificate is invalid. cert.sh: #718: Verify large rsa pss signature - PASSED cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Wed Oct 18 14:18:29 UTC 2023 Running tests for tools TIMESTAMP tools BEGIN: Wed Oct 18 14:18:29 UTC 2023 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c5:08:68:e3:98:dd:aa:e3:48:3e:30:83:d9:00:b2:d7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f3:38:a0:b8:ee:1b:76:fd:dc:a0:9e:45:e2:e8:3c:27 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 14:17:34 2023 Not After : Wed Oct 18 14:17:34 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:69:32:a9:90:0d:c7:76:2a:5e:c2:07:2b:08:aa: 73:75:4f:c7:ed:f2:e5:3b:38:dd:9b:79:e7:35:39:60: da:62:c7:28:54:da:3a:91:7b:e0:00:f8:33:04:81:3b: f1:cb:92:3e:21:7c:d1:4f:22:0e:a7:02:4e:5a:16:db: bc:5d:00:01:90:24:ba:fb:9f:c3:40:37:d7:43:1c:c5: 74:1b:35:46:a6:50:cc:49:ee:15:61:e2:cd:91:8a:3b: 46:cf:c8:61:b3:45:43:c6:b5:51:e2:80:1c:0f:db:ef: 71:57:b5:c8:2f:c0:d8:f6:41:8a:c2:73:53:b9:02:1b: 1c:06:35:d6:70 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:1b:d9:5e:f3:40:34:95:e9:01:21: 5f:25:44:7b:cd:6c:eb:a1:7d:3b:d5:b3:fd:96:bd:ca: 73:89:16:e0:9d:2b:38:d7:e5:78:d5:2f:24:92:0d:8b: 79:2e:a9:e6:ee:f3:45:d8:06:6b:09:c0:ef:36:cd:6b: 4b:19:5f:93:ad:ec:fb:02:42:00:d2:6e:68:e2:6e:5f: 48:45:70:e2:24:e9:ae:f2:24:7b:e4:47:43:49:aa:92: 5d:06:20:53:4f:2a:85:61:d0:87:5b:7f:52:9b:a4:67: f7:60:ce:55:53:90:9c:27:28:55:ca:4f:1a:71:61:7a: d2:45:f8:8e:d6:69:c3:9c:79:03:e2 Fingerprint (SHA-256): C9:03:D2:65:80:D4:A8:6E:5C:C6:36:65:63:C4:70:CF:F0:AB:49:17:2D:7E:E5:EB:22:E9:78:B3:5B:52:31:F9 Fingerprint (SHA1): 6F:D8:1C:08:93:7D:F4:39:35:F0:18:CB:D9:79:1C:76:94:90:EA:93 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:83:6e:43:a2:e9:c2:a9:9b:0d:f8:ab:22:92:6b:0e: 46:40:1d:d5:4b:d0:ef:80:a6:9b:e1:a1:68:ea:32:f1: 6c:78:98:b9:6b:0e:06:7b:fc:55:5e:11:eb:28:4e:6e: a7:4e:23:6f:d4:84:27:fd:95:b5:cc:2a:de:64:10:42: fe:04:07:a4:a1:ec:f9:e4:24:77:ce:5e:56:e8:73:73: 1b:07:5a:32:a8:86:04:89:1e:97:e2:8f:0e:7d:89:68: 18 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:2e:22:86:40:77:2e:11:29:9a:0f: 2c:de:ba:f4:5e:76:4e:b9:61:3a:c5:34:70:5f:35:0f: 3a:5f:d3:0f:23:05:be:9e:ed:7e:23:75:0b:f5:57:28: 1d:42:c8:47:e6:6b:15:8a:de:f7:f3:d6:de:01:bb:c4: 24:b3:4c:88:eb:ad:81:02:42:01:61:a2:9e:d2:ec:50: 7f:33:a0:4c:53:97:cf:d7:06:23:2f:64:72:ad:2a:1b: 4b:57:00:bd:f9:79:50:4d:92:0c:63:35:cf:10:ff:82: 37:5c:c0:21:ca:39:1a:a5:f7:ec:69:58:d1:18:51:63: 57:24:83:e2:ae:e0:bc:79:2c:04:82 Fingerprint (SHA-256): 1A:E8:01:43:7B:40:83:20:5B:A9:F1:6D:08:54:40:E3:5D:0D:2B:3B:1F:EF:29:54:DB:79:4D:40:1A:20:5D:0D Fingerprint (SHA1): FB:43:D3:76:6F:EB:C1:8D:FE:31:D6:F8:31:B0:C9:99:0B:6B:AD:59 Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED tools.sh: Exporting Alice's email EC cert & key with long pw------ pk12util -o Alice-ec-long.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.longpw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting Alice's email EC cert & key with long pw (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #10: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key with long pw----- pk12util -i Alice-ec-long.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.longpw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #11: Importing Alice's email EC cert & key with long pw (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file with long pw ------------ pk12util -l Alice-ec-long.p12 -w ../tests.longpw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8f:3a:c7:43:6d:77:43:dd:34:45:b6:86:85:11:ad:af Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 14:17:34 2023 Not After : Wed Oct 18 14:17:34 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:69:32:a9:90:0d:c7:76:2a:5e:c2:07:2b:08:aa: 73:75:4f:c7:ed:f2:e5:3b:38:dd:9b:79:e7:35:39:60: da:62:c7:28:54:da:3a:91:7b:e0:00:f8:33:04:81:3b: f1:cb:92:3e:21:7c:d1:4f:22:0e:a7:02:4e:5a:16:db: bc:5d:00:01:90:24:ba:fb:9f:c3:40:37:d7:43:1c:c5: 74:1b:35:46:a6:50:cc:49:ee:15:61:e2:cd:91:8a:3b: 46:cf:c8:61:b3:45:43:c6:b5:51:e2:80:1c:0f:db:ef: 71:57:b5:c8:2f:c0:d8:f6:41:8a:c2:73:53:b9:02:1b: 1c:06:35:d6:70 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:1b:d9:5e:f3:40:34:95:e9:01:21: 5f:25:44:7b:cd:6c:eb:a1:7d:3b:d5:b3:fd:96:bd:ca: 73:89:16:e0:9d:2b:38:d7:e5:78:d5:2f:24:92:0d:8b: 79:2e:a9:e6:ee:f3:45:d8:06:6b:09:c0:ef:36:cd:6b: 4b:19:5f:93:ad:ec:fb:02:42:00:d2:6e:68:e2:6e:5f: 48:45:70:e2:24:e9:ae:f2:24:7b:e4:47:43:49:aa:92: 5d:06:20:53:4f:2a:85:61:d0:87:5b:7f:52:9b:a4:67: f7:60:ce:55:53:90:9c:27:28:55:ca:4f:1a:71:61:7a: d2:45:f8:8e:d6:69:c3:9c:79:03:e2 Fingerprint (SHA-256): C9:03:D2:65:80:D4:A8:6E:5C:C6:36:65:63:C4:70:CF:F0:AB:49:17:2D:7E:E5:EB:22:E9:78:B3:5B:52:31:F9 Fingerprint (SHA1): 6F:D8:1C:08:93:7D:F4:39:35:F0:18:CB:D9:79:1C:76:94:90:EA:93 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:83:6e:43:a2:e9:c2:a9:9b:0d:f8:ab:22:92:6b:0e: 46:40:1d:d5:4b:d0:ef:80:a6:9b:e1:a1:68:ea:32:f1: 6c:78:98:b9:6b:0e:06:7b:fc:55:5e:11:eb:28:4e:6e: a7:4e:23:6f:d4:84:27:fd:95:b5:cc:2a:de:64:10:42: fe:04:07:a4:a1:ec:f9:e4:24:77:ce:5e:56:e8:73:73: 1b:07:5a:32:a8:86:04:89:1e:97:e2:8f:0e:7d:89:68: 18 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:2e:22:86:40:77:2e:11:29:9a:0f: 2c:de:ba:f4:5e:76:4e:b9:61:3a:c5:34:70:5f:35:0f: 3a:5f:d3:0f:23:05:be:9e:ed:7e:23:75:0b:f5:57:28: 1d:42:c8:47:e6:6b:15:8a:de:f7:f3:d6:de:01:bb:c4: 24:b3:4c:88:eb:ad:81:02:42:01:61:a2:9e:d2:ec:50: 7f:33:a0:4c:53:97:cf:d7:06:23:2f:64:72:ad:2a:1b: 4b:57:00:bd:f9:79:50:4d:92:0c:63:35:cf:10:ff:82: 37:5c:c0:21:ca:39:1a:a5:f7:ec:69:58:d1:18:51:63: 57:24:83:e2:ae:e0:bc:79:2c:04:82 Fingerprint (SHA-256): 1A:E8:01:43:7B:40:83:20:5B:A9:F1:6D:08:54:40:E3:5D:0D:2B:3B:1F:EF:29:54:DB:79:4D:40:1A:20:5D:0D Fingerprint (SHA1): FB:43:D3:76:6F:EB:C1:8D:FE:31:D6:F8:31:B0:C9:99:0B:6B:AD:59 Friendly Name: Alice-ec tools.sh: #12: Listing Alice's pk12 EC file with long pw (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ec:72:75:88:5c:19:77:98:a2:02:ff:38:14:94:f7:e7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #17: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 78:2a:91:33:c7:16:6b:ac:09:9b:75:eb:c4:3b:0e:a8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #21: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5a:c3:d2:92:4c:71:8a:34:62:0d:9a:11:22:ef:74:26 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #25: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #26: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 1f:32:94:01:76:05:06:1e:88:96:a0:3e:e1:de:fe:03 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #29: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #30: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 55:df:e9:8f:30:82:11:9f:56:d0:41:b7:1d:f3:fc:c9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:c3:75:41:1e:52:fc:e4:ef:89:32:33:93:56:3f: e7:dc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #33: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #34: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: f2:db:73:88:05:1e:f7:fc:c7:ca:f4:4c:af:8e:1d:ec Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #37: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #38: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6b:2b:07:13:a4:36:a8:30:a0:7c:a7:e5:73:01:43:61 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 6d:ca:3b:56:6d:13:ad:f9:f8:93:c4:41:0e:5d:02:5c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: e1:3c:2b:66:11:de:99:01:b6:37:58:41:19:a5:48:81 Iteration Count: 600000 (0x927c0) tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 62:0a:da:b0:20:43:60:dc:52:8c:7c:b5:e4:6f:23:53 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 0b:75:04:20:cb:48:d9:89:8e:fa:59:16:f7:2f:66:6b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #57: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 85:f4:55:4a:05:ed:34:b2:b8:47:23:db:1b:26:30:2f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #61: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ef:eb:d7:9d:87:bf:5c:4f:a8:c3:a7:db:45:f8:ae:fd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #65: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #66: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 54:8c:44:53:b6:5d:13:eb:ab:b5:2d:8f:b3:ec:b3:83 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #69: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #70: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 02:b4:19:01:a4:b6:2b:ad:fd:07:7f:d3:6c:8a:fa:bf Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:94:3b:65:c9:17:eb:f8:ea:d3:7c:e6:ca:2a:ed: 5d:dd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #73: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #74: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 0a:f1:5b:08:22:65:ec:86:d8:d8:a8:93:e2:fc:d1:ab Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #77: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #78: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8a:9e:16:46:04:09:1d:85:4c:b3:09:aa:b9:a4:29:58 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: f0:01:48:08:a7:e5:fe:20:1c:b4:20:45:e8:17:b8:11 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 82:bc:5e:10:dc:fb:f0:18:a1:6a:a7:4e:8e:84:10:24 Iteration Count: 600000 (0x927c0) tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #89: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 43:6a:93:17:f8:97:e3:6b:c7:8d:71:ae:5e:8f:60:78 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #93: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5d:14:be:3f:d9:da:77:41:62:82:f4:92:28:f0:11:c1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #97: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #98: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 1e:0c:3f:e2:93:04:e3:e2:38:0b:81:17:8f:a5:95:a0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #101: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #102: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 78:e0:85:68:51:b2:e9:24:05:9b:2f:c8:52:a0:bf:15 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:7d:d8:51:10:d2:ce:78:39:7b:ef:70:9c:9e:fc: 92:fe Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #105: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #106: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 5d:e7:ed:0c:70:9b:0c:68:78:99:fa:f9:b9:20:16:af Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #109: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #110: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 98:af:32:b7:84:a0:35:de:aa:31:13:ba:c9:72:16:19 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: e4:db:5a:cf:56:8b:43:ae:9a:ec:60:fe:aa:c7:5b:57 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a0:82:94:49:da:98:ef:d2:5f:45:53:90:4f:28:31:8d Iteration Count: 600000 (0x927c0) tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 54:e4:ca:f8:20:50:c1:94:0c:dd:ca:51:f3:61:d8:6a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #125: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f6:8c:d1:d8:ce:13:f9:0d:f5:8b:f5:da:6c:42:29:2f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 63:a1:2d:f7:d5:8e:c0:ef:13:a8:24:a3:31:26:6c:21 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c1:92:83:f2:a9:2a:3e:97:ae:25:82:43:95:c1:bb:e4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #137: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #138: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 6f:13:59:ae:f7:8b:20:8d:42:0a:b1:85:3a:40:33:54 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #141: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #142: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1d:06:ff:d3:d8:5b:74:c4:ee:ba:24:43:23:a2:c5:b2 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:bb:24:58:c9:b4:62:22:e7:7f:e3:55:4a:6d:3a: 94:41 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #145: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #146: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: f4:00:1e:4c:6a:6a:b0:a0:a6:0e:72:41:25:af:14:5c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #149: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #150: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: df:ca:b6:7e:11:30:e3:2b:96:66:11:22:fd:9d:f4:4b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 47:74:e0:e6:db:a2:fd:16:4c:af:93:f2:43:22:1c:c1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: ad:0c:12:9f:19:91:d1:86:28:ca:d9:43:44:4b:e6:08 Iteration Count: 600000 (0x927c0) tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #161: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: a4:c1:3c:49:db:e4:7f:dd:d4:d1:3c:66:35:5b:81:77 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #165: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: cb:a0:87:65:ec:4d:fb:fe:d2:74:ed:0f:74:55:cd:d8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 58:09:04:6d:e4:2b:cd:cb:72:f3:88:df:e7:53:50:46 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a1:57:be:f2:08:d2:13:2e:57:de:82:cb:59:61:13:80 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #177: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #178: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 9b:22:70:85:fd:63:6e:62:27:60:9f:45:53:f9:e2:b5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #181: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #182: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 80:ea:22:45:a2:45:53:12:dd:d8:5e:7d:bb:8d:5e:84 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:c9:09:12:03:33:19:65:70:3d:aa:26:0c:0f:88: 16:f8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #185: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #186: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 26:3a:dc:a0:bc:22:98:30:a3:d8:b1:97:9c:eb:d2:7d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #189: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #190: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c4:06:b5:98:16:ac:2e:c9:ab:25:a4:7c:86:3e:fd:12 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 1f:16:eb:57:fd:2c:0e:05:e3:1d:8b:fb:40:b1:81:c0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: b6:a7:e3:7f:57:14:e0:48:e5:e2:6e:a6:b1:e9:74:d8 Iteration Count: 600000 (0x927c0) tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #201: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 78:d0:56:f2:d0:8a:2a:ce:4c:4a:5b:2d:0a:79:06:df Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #205: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 21:e0:f3:11:fb:14:35:b3:af:ec:be:af:05:b4:2d:24 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #209: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #210: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 16:6f:18:6b:20:a0:f6:70:3e:42:04:6a:53:b7:05:71 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #213: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #214: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8e:5a:3f:5a:a8:1e:05:79:90:89:d8:73:c8:96:a1:d0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:67:00:62:83:f5:bf:9b:ab:fe:a9:b5:68:99:76: 5b:19 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #217: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #218: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 25:b6:4f:c2:71:0d:7f:43:aa:b6:49:6a:5b:16:ad:dc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #222: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 10:4d:c8:ce:91:c1:5a:65:bd:1b:ab:ec:e3:18:11:f3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9c:8b:52:bb:c9:f5:30:d6:c7:70:bb:c0:17:92:8a:11 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6d:4c:9f:cf:e9:8d:02:94:c0:64:eb:1d:6c:3d:8f:43 Iteration Count: 600000 (0x927c0) tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b9:e3:93:b7:98:c7:0e:a4:b2:a7:97:52:2d:27:51:43 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #237: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a0:8a:ae:d7:b0:75:18:be:8d:89:f5:eb:6e:9c:9c:55 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: bf:9b:98:cb:d2:cb:5d:87:d7:c0:87:e6:46:4c:63:85 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 33:63:63:eb:de:5c:f4:6f:c1:d4:c4:16:6e:82:8c:4d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #249: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #250: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 71:fd:19:a8:91:08:0c:08:42:1c:7d:96:55:bc:cb:39 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #253: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #254: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ec:d5:e5:6b:30:90:25:00:f9:3c:18:09:08:29:81:b7 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ec:66:63:49:d2:24:0b:20:33:8c:c3:b1:a5:62: a3:ca Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #258: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 95:ca:7d:0f:d9:df:ba:13:87:b8:29:e1:ef:6a:3b:03 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #261: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #262: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fc:fa:38:6d:8e:ed:75:34:67:e7:8d:d0:c8:95:95:07 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 53:80:6e:98:df:b5:b2:6f:a6:e3:f7:3b:88:cb:7f:0e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: b4:aa:b9:ee:37:2a:fb:f8:4a:ed:a9:f7:ac:0f:a1:b9 Iteration Count: 600000 (0x927c0) tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #273: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: da:38:62:da:58:26:57:01:31:41:dc:9b:1f:96:14:19 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #277: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 0a:6a:7e:76:9d:e8:bf:12:67:51:73:e6:ef:86:22:e2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: af:e7:6b:12:18:27:ea:1b:ee:97:17:df:ef:7c:3b:ca Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 30:e6:3e:c3:e6:bf:3e:1b:9b:36:e4:6a:08:d6:68:f9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #289: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #290: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: b6:df:53:09:f4:4b:10:36:09:75:14:f7:21:45:29:0f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #294: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4d:16:88:04:9b:9c:65:5d:8c:c3:41:25:fe:65:4f:0e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:07:bc:43:14:cf:88:f5:d8:c3:f3:05:20:0d:0f: eb:ec Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #297: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #298: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: e0:de:f5:ca:6f:43:37:4e:a1:c5:dc:3b:e3:11:8a:5d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #301: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #302: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c3:d2:fd:72:e0:f5:d6:2a:8c:f2:63:e2:03:d7:3d:8c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: a0:ea:49:90:4a:38:a2:0b:33:df:d6:46:ba:4f:8f:81 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 24:e9:1b:31:13:67:82:ee:75:0e:ad:e6:6c:f3:e0:09 Iteration Count: 600000 (0x927c0) tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #313: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 80:b6:94:9e:c0:70:ea:76:f4:59:fc:3a:3d:a2:51:ad Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #318: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 04:0a:f0:fa:17:2d:ea:df:e6:db:e6:a4:81:dd:63:32 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #321: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #322: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 88:49:00:13:2f:10:b3:6a:45:6a:5b:5e:63:dc:33:cf Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #325: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #326: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8f:20:92:26:1f:85:1f:9d:78:d0:ea:29:e2:6d:12:e5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #330: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 57:87:e7:f8:74:65:98:fe:2b:9f:97:97:57:87:f6:25 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #333: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #334: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 62:44:c0:f8:18:f4:f6:ac:e5:f3:29:c2:f4:8c:e4:34 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:32:10:54:fa:85:1a:a4:0d:39:8e:54:65:fa:df: d3:b5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #337: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #338: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 19:aa:6a:fc:09:10:b2:b2:fa:c7:c3:9c:04:94:ee:d3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #342: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a0:6a:9a:15:31:bf:0a:35:91:5c:f8:bb:72:4f:f4:fd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #345: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: e5:7a:5a:1a:e2:ad:3e:d1:11:ad:8f:d3:eb:bf:40:dc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #349: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 8a:2e:7f:d8:db:5b:24:27:d3:96:55:b9:e3:ea:48:89 Iteration Count: 600000 (0x927c0) tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [RC2-CBC:RC2-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #354: Verifying p12 file generated with [RC2-CBC:RC2-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 77:c2:84:87:e6:14:ab:b0:53:ab:67:2b:8b:f9:90:5a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #358: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c0:e1:9d:f9:8e:71:13:15:a3:68:3c:c8:3d:52:35:cc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #361: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #362: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 23:b4:dc:3a:5e:48:1d:ab:9c:2e:c3:c7:dd:e7:f2:5a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #366: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2f:a2:ec:48:e0:7f:a4:06:7f:7b:38:3b:4a:59:b0:fd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #369: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #370: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9d:e5:16:33:81:ee:61:d2:ac:a3:d1:e4:16:1c:30:29 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #373: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #374: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 54:7c:9d:0f:b2:00:b6:4f:f4:c1:70:46:5c:7e:c5:58 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ef:10:76:c0:66:d1:32:b2:2c:c5:0e:d5:c9:3e: de:a4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #378: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 58:fc:fd:42:db:b5:1d:bd:fb:f5:b0:ed:b0:26:c8:3a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #381: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #382: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cf:77:f3:9a:66:ba:24:60:37:78:5e:3e:38:fb:bd:ab Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #385: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b9:2d:91:16:f6:e9:b2:f5:a7:2b:72:bc:23:3b:38:26 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #389: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 06:c6:37:c1:e5:bf:71:9c:8f:54:ab:82:89:e1:46:60 Iteration Count: 600000 (0x927c0) tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #393: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #394: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 33:97:bc:43:04:27:69:04:52:f6:78:1f:c9:94:a0:d6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #397: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #398: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 46:96:cc:dc:2b:ce:25:3e:d5:d1:82:4e:b3:9c:47:a2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #401: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #402: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 30:34:25:dc:a0:32:c7:b6:12:59:17:9f:8d:a9:2a:03 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:31:8e:91:60:06:c8:42:d5:8e:bb:df:20:e0:6d: 06:c9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #405: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #406: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a9:e4:28:13:df:a5:5d:50:65:33:aa:29:9d:d5:58:c3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #409: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0a:4a:0d:94:42:40:4c:8c:d9:4b:73:d7:fe:01:ab:99 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:e6:bf:4b:a8:0e:ad:78:95:6c:c9:43:49:2e:7b: 0f:74 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #413: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7b:f0:74:da:10:f6:7f:00:77:a5:d9:31:f6:de:05:ef Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ef:57:92:a8:ba:8b:6d:c4:f2:fc:a4:ea:87:15: 83:48 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #417: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #418: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 98:8a:35:fc:1b:17:51:32:5b:0b:25:8a:0f:fc:6b:30 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:0b:ed:03:21:08:8e:ba:d8:08:b4:07:6f:65:c0: ba:28 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #421: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #422: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 64:f4:6f:39:c7:26:e8:fa:45:18:90:19:e0:79:5f:58 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #425: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5d:ee:f1:84:e2:f1:2d:c7:23:c9:b9:2d:e0:ad:95:1d Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:cf:5f:53:91:1c:59:63:de:da:e6:51:79:dc:83: 41:dc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #429: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 28:18:aa:ae:5f:e9:c8:aa:56:56:53:12:6d:f9:d6:7a Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:e3:d6:a4:5c:a2:d1:c6:4d:f7:38:94:d9:bc:6b: 77:83 tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #433: Exporting with [AES-128-CBC:AES-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #434: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4e:c3:d3:c9:fa:ad:44:8b:25:42:18:a6:4c:7e:76:92 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: AES-128-CBC Args: 04:10:ed:c4:56:02:ac:3f:2b:04:56:98:68:98:de:b0: 53:86 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #437: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #438: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d1:1e:33:d0:40:9c:93:21:5b:3d:0c:25:58:78:90:a9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #441: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #442: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4c:7d:ad:2f:9e:e0:15:50:29:5f:88:46:a8:90:a5:e0 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:ed:ce:1b:aa:8d:06:34:43:af:49:75:c9:b1:49: 6c:2c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #445: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #446: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 07:05:9f:f9:f4:a4:c8:c7:6b:31:b0:e2:33:96:0f:29 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #449: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9f:91:b7:69:a9:98:cf:c2:6d:09:fa:7a:d6:da:ba:ae Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:f1:18:18:13:ca:ef:54:74:55:bb:93:55:08:34: df:03 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #453: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ac:61:87:b5:c0:d4:ec:02:4d:4a:e9:a6:70:b9:36:d9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:dc:ce:62:14:b7:ee:f2:31:8d:d8:67:c6:97:a5: 40:1a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #457: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #458: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9f:b9:70:b8:f1:e9:6f:15:94:59:06:66:4a:9f:c5:dd Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:7e:a5:3f:03:ad:42:2c:16:ea:5e:f5:d4:66:18: 12:51 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #461: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #462: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 76:31:48:42:31:69:5c:a3:30:ab:c2:7d:18:54:7c:d6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #465: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fc:75:62:60:be:19:96:60:3a:d7:76:ee:7a:a6:2f:69 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:b8:f1:a5:de:99:89:78:83:b8:bf:61:95:a3:32: c4:89 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #469: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 96:37:ed:fd:a2:2b:f6:79:e4:7d:c2:22:59:3a:98:f4 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:0a:31:fd:1f:a4:4c:35:73:1b:17:fd:a5:31:d4: 52:7b tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #473: Exporting with [AES-192-CBC:AES-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #474: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 78:2c:00:8e:73:43:11:4c:de:93:60:26:5e:c9:c5:64 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: AES-192-CBC Args: 04:10:2b:a4:6b:9d:51:b4:97:35:d6:99:4a:46:d2:09: ae:02 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #477: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #478: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f2:83:3c:d9:e0:2a:9e:64:8e:0e:18:2f:51:69:35:18 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #481: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #482: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 25:b5:8e:a6:c8:35:e4:3e:5e:2d:46:5e:22:c0:43:60 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:a6:c3:25:20:0b:d9:4a:4b:fd:a0:1a:c6:0d:fb: 49:46 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #485: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #486: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b4:fb:0b:25:bd:91:ca:f7:64:2c:47:64:dc:4c:01:02 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #489: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #490: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 60:c2:95:0c:e7:3a:72:2e:61:d9:2c:22:f0:8c:0b:de Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:5c:0e:48:83:6c:65:55:84:ab:e1:85:83:65:0b: 2a:c5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #493: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #494: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0d:2b:cf:b2:ab:d7:02:b2:4a:30:35:5b:81:99:a6:5f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #497: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9b:54:55:f9:b9:9e:1e:a7:2d:4c:09:6a:0b:3a:e5:dc Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:54:ba:12:1d:b2:dd:bc:5d:86:25:7a:ae:48:e6: 5c:58 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #501: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b2:73:97:7e:ea:57:f5:73:d7:1f:29:41:ec:09:ab:0c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:71:a9:f0:be:74:54:88:92:56:e6:99:8b:b8:28: da:e7 tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #505: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #506: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: be:1d:33:53:a9:9b:70:09:c0:d4:cc:b1:48:cf:52:be Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:06:5f:67:89:2e:0e:09:75:6d:88:ab:db:6e:6d: f9:a1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #509: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #510: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 8c:77:73:1c:89:6c:2e:c5:91:47:c4:b1:cc:3b:b1:4f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #513: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #514: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 84:66:ca:23:78:c4:c9:19:60:35:1e:22:cd:0a:27:10 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:df:9a:36:8e:37:9d:31:ab:eb:7c:c3:61:20:5e: 2b:d3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #517: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #518: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 7c:e5:db:ed:7a:b9:e4:9c:b1:c2:b2:7c:61:fe:06:c9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #521: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #522: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 72:51:c9:61:42:4b:f4:b2:af:d2:9d:31:81:a1:9b:c9 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:b5:bc:e3:79:6f:c9:7b:c8:56:33:ba:55:a3:31: a3:4e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #525: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #526: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 80:62:3b:4a:89:b6:28:7b:c3:d1:9f:f2:c2:03:92:72 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:21:ba:74:be:93:e9:e6:6e:45:03:cc:46:22:cc: 52:14 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #529: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #530: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cd:3a:23:62:fa:9f:e2:0f:b2:28:6d:39:35:c7:1c:e7 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:54:c0:93:28:80:36:e3:9a:5e:cc:dc:76:e8:8b: 96:a0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #533: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #534: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 97:37:26:4d:04:b7:1d:f7:d9:6a:84:f5:cd:c9:70:de Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #537: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 41:a3:2b:f9:a3:93:95:dd:0e:10:88:80:dd:63:73:27 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:38:c1:77:28:c0:d1:08:55:0c:30:4b:00:84:0f: 35:1b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #541: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6c:9f:9d:81:98:b1:56:92:b3:15:21:92:91:59:73:cd Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:ef:a5:3f:18:59:b8:ec:f8:10:3f:f7:a8:26:f0: 13:9a tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #545: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #546: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 47:e1:23:7f:d5:13:35:07:01:f5:73:dc:13:d3:4b:e1 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-128-CBC Args: 04:10:82:64:a6:3c:f0:0b:83:2a:d1:d2:ce:70:09:8f: 26:7b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #550: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 90:28:1c:25:59:ab:62:be:d9:d4:80:9c:b9:71:af:dc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #553: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #554: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 80:8a:27:79:cb:9f:db:f5:0d:47:36:c9:2a:e3:e7:dc Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:bd:0e:58:2a:6e:3a:a5:78:f6:20:19:38:a6:7c: 93:3b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #557: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #558: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c1:c8:e4:a7:52:2a:79:88:eb:83:69:e5:14:2a:f9:9d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #561: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #562: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 64:d6:ba:26:fd:44:dd:4f:1b:4c:19:e2:f5:80:01:a4 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:b1:d2:7b:c4:5f:57:95:30:0e:e1:9f:96:c4:9f: 47:79 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #565: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #566: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 60:6e:a8:aa:cf:ad:87:5b:f0:27:7a:98:9a:c1:e8:e9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:3e:0a:2b:e2:f7:bc:0b:bd:1e:48:69:a2:fa:9d: ff:e5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #569: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #570: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8b:9c:5d:cd:f8:33:45:cb:6c:43:6c:6a:c2:fd:91:d4 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:fd:2f:8a:3d:f8:bb:a4:2b:04:97:da:cc:1c:2d: eb:88 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #573: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #574: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f7:25:ba:e9:24:07:77:94:7c:cb:b7:eb:65:2c:71:0a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #577: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d4:c8:c9:0a:56:1a:06:e5:5e:3c:a1:70:a0:99:c2:0d Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:2e:a9:75:68:84:80:39:6c:4a:d8:89:c2:43:80: 1f:7e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #581: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7d:4d:74:65:a0:b4:a1:4a:e9:53:75:71:b7:65:47:4f Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:93:8c:c3:85:fb:16:8a:00:83:a4:bb:d4:06:b5: 53:26 tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #585: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #586: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c8:37:7b:2e:43:09:7d:2a:72:50:ee:75:30:25:64:74 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-192-CBC Args: 04:10:78:c0:19:8a:ff:cb:57:63:c7:cb:d3:cf:bf:a7: 77:f2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #590: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 63:be:89:5f:62:57:b8:a7:45:d0:7e:f2:6e:f7:47:84 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #593: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #594: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: bb:23:e0:dc:37:02:09:9e:49:71:fe:92:3b:70:a1:15 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:70:bb:e3:3a:37:6b:f2:e1:8a:a4:e7:7c:73:1b: 72:3b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #597: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #598: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c1:03:2d:8b:33:7a:2a:03:1f:27:39:70:f6:70:ef:04 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #602: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 47:9d:6f:27:1b:0a:19:f3:da:e1:2e:74:22:40:5f:69 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:22:23:5e:be:94:a2:2b:f1:2a:65:23:21:6b:0f: a9:a4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #605: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #606: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 5d:1d:74:87:08:54:72:11:ff:d4:f9:2a:25:04:82:0c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:2e:df:e6:28:11:01:e2:35:b6:3b:51:ce:27:d0: c4:5a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #609: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #610: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ad:61:3d:f2:f8:a1:1f:83:21:80:75:ba:31:29:e7:67 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:d6:18:3e:53:dc:c0:ac:ca:03:fa:e5:10:68:98: 6d:68 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #614: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f6:e5:05:4d:e0:56:2b:87:a7:01:86:10:76:8a:57:92 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #617: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c1:83:2a:d5:a9:c6:ea:a0:2d:01:b1:46:06:9d:0f:df Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:d3:5a:ed:a5:dc:8a:f5:4a:75:90:fc:36:7c:9e: 18:45 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #621: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e0:a7:01:36:a2:18:6a:99:00:2c:d8:8f:7a:b7:1f:22 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:73:36:14:49:37:eb:07:2a:6e:37:5c:a0:af:a6: 91:e7 tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #626: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a6:e4:b6:6c:ea:0e:4c:5b:7e:9f:08:e9:4a:2e:90:78 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-256-CBC Args: 04:10:4a:b4:ea:27:fa:a3:e0:99:bc:9e:19:5b:96:1e: fb:3f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: a2:2f:be:48:84:a3:b1:f1:71:1a:fd:14:8e:60:81:56 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f5:ce:98:83:20:bf:47:b5:c7:78:41:ed:9c:64:73:5f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 9e:47:f3:40:e5:91:97:d3:d7:ff:2a:a7:29:43:00:6e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 44:4e:e3:4a:88:57:26:5c:8f:c2:0e:20:02:39:ed:a9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: bb:90:2c:d7:c2:21:a9:7b:b5:d6:02:8c:df:9d:41:3b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f7:1e:09:34:41:16:8f:8f:13:dd:31:d9:03:f8:69:b6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1f:58:74:97:2e:fb:d1:c6:ce:91:7d:5f:cc:b0:59:ff Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 04:8d:9f:fa:86:f7:c5:9b:6f:12:c4:d8:8f:db:85:51 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1a:d4:e0:b6:b0:22:e0:7f:48:5f:9c:a6:04:8d:75:a0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: dd:ab:26:3f:e5:74:ca:e0:e2:4d:8d:1a:9b:fd:78:8f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #669: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #670: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fb:67:0d:73:07:bb:7f:79:30:7a:45:a9:f9:89:76:45 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #674: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: be:12:2a:dc:d9:ea:24:49:a8:7a:8e:80:4f:24:de:94 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9c:4d:52:d5:85:ee:1b:7d:8e:e2:3e:ea:c3:a3:e3:dc Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:39:15:b9:fe:b4:36:68:1a:74:13:49:75:6c:de: 77:49 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c0:57:40:c8:fd:13:a1:e4:3e:ad:4d:5b:a6:3a:4c:09 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:7a:d3:ae:ce:81:8e:c1:72:7e:ef:47:41:f1:77: 46:83 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 94:92:5d:80:0f:4e:8f:20:33:86:f2:a6:d3:bb:49:56 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:06:c9:64:dd:9b:b5:56:65:e5:f5:e9:02:45:28: ec:3c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #689: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #690: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c9:57:b9:51:0b:4c:8b:b9:25:44:de:01:97:64:eb:cf Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:8e:55:8e:93:42:2d:97:f7:7b:7a:ac:50:1d:f7: a4:23 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #693: Exporting with [AES-256-CBC:AES-256-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #694: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 09:fb:87:6a:0b:23:ca:12:99:79:2d:d8:43:65:03:f1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:2b:4f:e9:83:7c:bb:fc:2d:0c:c1:da:4d:20:e2: 6c:92 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #698: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 16:2a:41:da:95:40:18:2c:ca:81:c7:ea:a5:d7:73:70 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b7:39:d4:f4:18:07:9c:46:41:c6:3c:81:e5:d6: 59:2d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #701: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c2:5f:f5:3a:c5:81:eb:88:b8:fc:ad:7f:b3:fd:47:19 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #705: Exporting with [default:default:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2b:2a:82:50:5f:a7:ac:7e:48:ee:4b:92:d5:f3:38:d8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #710: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: da:cd:7a:b3:89:ce:95:2a:54:5c:1d:bf:e6:b8:98:8b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #711: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #712: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #713: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #714: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5a:1e:e3:e8:a5:69:3d:d9:31:84:6f:fa:19:72:21:64 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #715: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #717: Exporting with [default:default:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #718: Verifying p12 file generated with [default:default:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2e:ac:68:5c:9e:47:c1:f3:55:18:5b:0f:42:7f:7b:95 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting with [default:default:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #722: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d9:87:14:c6:4b:50:cf:fb:b7:c5:74:bb:98:04:cf:4d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:30 2023 Not After : Wed Oct 18 14:17:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:c9:53:ae:ba:70:1f:2f:0b:bf:22:4a:ee:da:41:24: 85:75:56:74:c3:9d:b1:2e:dd:9f:9d:01:cd:e3:f1:fa: f6:8a:49:a3:8d:a5:25:77:12:67:5a:66:d0:6c:0c:d9: 17:df:67:e1:83:47:c6:1b:0e:10:30:eb:35:9a:f0:ad: e3:31:da:11:ff:1c:e8:1c:25:38:64:9a:c6:5f:38:f3: 75:a0:dd:c8:36:1d:39:4b:42:97:df:6d:5c:73:68:ac: b3:5c:3a:ad:12:b0:b5:8d:e8:56:f6:30:81:d5:2e:88: 5f:97:21:20:ac:3a:82:ca:59:71:ce:cd:29:ca:e0:98: aa:2f:11:c1:fd:d3:cc:a4:a6:c6:cd:84:e7:24:33:43: be:e0:11:1b:f9:5c:51:b4:05:87:3f:55:08:bb:e8:cf: b8:31:82:32:16:c4:f7:b1:49:f2:cf:42:df:b5:65:40: 9d:36:6a:89:0d:49:fb:3a:73:20:5c:9f:4c:d5:62:bc: 53:5a:c7:fe:14:df:9a:2a:c2:48:0b:4e:3c:93:e5:32: 81:70:73:ac:e3:14:06:ef:5e:72:20:ba:46:3a:d1:a4: 4b:7d:da:f7:de:ab:77:f3:74:bf:23:6a:38:35:2b:99: 02:be:fc:4a:07:fe:f5:89:a3:f7:cc:68:65:10:13:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 41:ac:d4:ab:10:10:06:14:d3:3e:8b:2a:1b:e5:b0:2e: 38:bb:40:ce:f2:4e:e5:30:8c:64:fc:6c:88:19:78:7a: a9:92:9c:5a:a6:a9:53:06:7c:9f:74:ef:1d:eb:99:a1: b5:ad:0d:27:f0:cd:d1:87:f2:73:16:18:e2:fc:c5:54: bd:b7:36:2b:0b:a4:a0:73:bf:8c:3e:7e:ae:f2:89:52: e8:86:f1:67:41:a5:6d:55:b0:bc:24:ba:71:6d:a2:ec: 95:5f:67:79:cd:be:b6:d7:c7:9c:6d:be:ad:44:cc:c1: 10:72:7e:55:65:a6:7c:b1:24:37:d2:86:87:3e:e4:8a: da:23:48:d6:d6:41:ae:1b:3f:4b:a2:e5:4f:e6:c5:fc: d8:bf:e7:9b:12:05:53:86:b7:ac:69:52:6a:e4:5e:3d: b7:51:30:c3:d7:f8:bf:77:c8:8c:6d:6f:03:45:7d:f8: 02:28:4e:c8:3b:82:38:ef:25:3f:58:ec:52:d1:71:a3: 79:10:b5:04:b0:13:26:85:08:95:9e:c2:34:a0:30:f3: 3c:03:e7:f8:df:e2:bd:59:69:21:f0:51:9f:d5:5a:7a: b9:4f:03:b1:a4:f2:82:b6:d4:02:36:fa:aa:17:c4:f9: 38:c1:72:ba:85:53:61:12:5c:02:d9:33:83:51:18:ab Fingerprint (SHA-256): 69:3E:8B:D4:FB:98:50:D2:21:CA:22:44:65:31:98:43:F6:29:D7:1C:B2:4C:1A:D6:27:AB:F3:83:73:E2:EB:F1 Fingerprint (SHA1): 5E:D9:2D:23:CA:8E:6E:10:92:B3:94:BA:F6:A8:76:A2:3A:6B:AE:99 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 14:17:45 2023 Not After : Wed Oct 18 14:17:45 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:8f:14:03:26:83:31:27:9a:d0:fa:9d:e9:99:f5:08: f9:b1:c3:2f:9e:95:2a:13:47:ae:85:1e:c0:1d:7c:68: 36:2d:c0:bc:6d:ff:c7:51:48:10:f2:76:63:a0:1f:60: 25:d2:3c:9e:90:24:22:5e:34:fd:f7:de:91:8d:3c:3d: 2f:5f:38:2e:e9:a2:ed:ca:a1:56:48:96:6f:62:35:88: 35:79:fd:00:99:7a:1d:fb:40:23:25:d9:80:f7:ec:74: d8:be:58:9b:ca:0e:83:00:9b:14:28:67:55:9c:ce:a8: cf:82:2e:d3:af:c3:81:c4:a5:e9:88:c4:99:17:d3:c4: 83:35:6c:70:0c:94:c1:aa:0e:25:32:21:bb:07:dd:15: f2:b7:48:c4:c2:be:71:47:bb:79:11:63:22:f6:94:d5: a9:e1:e1:1b:1b:e3:eb:97:ba:9b:23:ad:4a:35:41:18: 04:40:d3:f8:21:92:20:df:a5:04:56:14:12:16:60:10: 83:8f:a4:f2:b9:5a:3b:c7:7f:b8:30:81:51:cb:5f:d2: 21:15:f5:b7:3f:2f:1a:7a:df:19:62:4f:07:2a:3f:27: 7a:77:b3:4c:1d:e8:ab:86:49:83:c7:dc:b0:8a:2d:f5: cc:37:61:ae:a3:39:8d:e5:8d:86:dd:a1:8e:76:54:1b Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:ea:11:20:61:dc:da:49:a0:8a:36:61:52:40:b8:6b: 96:52:fa:ca:17:a7:b6:da:fa:81:22:a6:7b:cb:20:e3: 52:1a:dd:15:76:2c:c9:e9:c7:de:c9:8a:d6:b8:ab:3e: 11:a3:d8:5b:71:68:b5:d3:8a:b2:5d:b8:14:00:d0:d3: 89:db:3a:e3:77:a5:c9:aa:94:4a:a1:24:d3:9a:27:73: 6e:f1:f7:e9:da:63:24:1c:80:60:8a:eb:46:8f:67:ef: d9:27:36:bc:df:f1:85:43:6f:a0:67:1a:ee:fb:d8:ea: b9:2a:c4:28:aa:f1:46:43:5c:90:1a:27:cd:e7:d9:79: 88:8f:2f:f6:7b:63:5b:04:c8:af:52:47:35:1f:eb:9d: 7e:4e:71:4d:aa:c6:14:24:57:ce:eb:dc:7c:3c:36:b8: 2b:87:6a:c7:45:05:70:f6:a0:3d:b9:f0:3b:c9:fa:be: be:77:b7:c3:e4:fd:78:d1:5e:76:23:af:8a:20:cd:f3: 03:2d:8d:5c:59:70:f3:0e:24:70:34:20:d5:b1:b1:f0: 5d:35:5e:67:1f:a2:3f:ce:71:40:05:a7:a1:36:d6:1c: 7a:d6:9e:eb:97:dd:30:83:70:76:9e:dc:95:87:fe:9d: dc:39:46:de:9a:5b:5a:49:2d:f6:b3:c2:63:3c:44:64 Fingerprint (SHA-256): B9:01:DF:92:92:B2:BE:7E:A8:42:FE:05:2F:82:C6:6F:48:41:86:64:49:5B:B0:6E:20:9C:A0:13:40:23:19:B0 Fingerprint (SHA1): D7:E9:24:D8:CA:AA:45:25:47:D7:98:97:8B:1A:68:58:7C:AF:C1:AF Friendly Name: Alice tools.sh: #723: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #724: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #725: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #726: Exporting with [default:none:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #727: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #728: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #729: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #730: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #731: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #732: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #733: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #734: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #735: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #736: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #737: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #738: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #739: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Wed Oct 18 14:35:23 UTC 2023 Running tests for fips TIMESTAMP fips BEGIN: Wed Oct 18 14:35:23 UTC 2023 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Internal%20Crypto%20Services;library-version=3.90 slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB uri: pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 2. RootCerts library name: /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Builtin%20Object%20Cryptoki%20Modu;library-version=2.60 slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token uri: pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 ----------------------------------------------------------- FIPS mode enabled. fips.sh: #1: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 8c6153280956763363869df0bc245043ea535bb4 NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #3: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #4: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #7: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #11: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #13: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 8c6153280956763363869df0bc245043ea535bb4 FIPS_PUB_140_Test_Certificate fips.sh: #14: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #15: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #16: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #17: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #18: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 8c6153280956763363869df0bc245043ea535bb4 FIPS_PUB_140_Test_Certificate fips.sh: #19: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 99. **** **** ALL TESTS PASSED **** fips.sh: #20: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 97. **** **** ALL TESTS PASSED **** fips.sh: #21: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi-testlib.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib64/libsoftokn3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle Changing byte 0x00074e38 (478776): from 00 (0) to 20 (32) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/fips/mangle dbtest -r -d ../fips fips.sh: #22: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Wed Oct 18 14:35:38 UTC 2023 Running tests for ssl TIMESTAMP ssl BEGIN: Wed Oct 18 14:35:38 UTC 2023 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 953 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 953 found at Wed Oct 18 14:35:38 UTC 2023 selfserv_9997 with PID 953 started at Wed Oct 18 14:35:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 953 at Wed Oct 18 14:35:38 UTC 2023 kill -USR1 953 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 953 killed at Wed Oct 18 14:35:38 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1005 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1005 found at Wed Oct 18 14:35:38 UTC 2023 selfserv_9997 with PID 1005 started at Wed Oct 18 14:35:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1005 at Wed Oct 18 14:35:39 UTC 2023 kill -USR1 1005 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1005 killed at Wed Oct 18 14:35:39 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1058 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1058 found at Wed Oct 18 14:35:39 UTC 2023 selfserv_9997 with PID 1058 started at Wed Oct 18 14:35:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1058 at Wed Oct 18 14:35:39 UTC 2023 kill -USR1 1058 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1058 killed at Wed Oct 18 14:35:39 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1125 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1125 found at Wed Oct 18 14:35:39 UTC 2023 selfserv_9997 with PID 1125 started at Wed Oct 18 14:35:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1125 at Wed Oct 18 14:35:39 UTC 2023 kill -USR1 1125 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1125 killed at Wed Oct 18 14:35:39 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1198 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1198 found at Wed Oct 18 14:35:39 UTC 2023 selfserv_9997 with PID 1198 started at Wed Oct 18 14:35:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1198 at Wed Oct 18 14:35:39 UTC 2023 kill -USR1 1198 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1198 killed at Wed Oct 18 14:35:39 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1252 found at Wed Oct 18 14:35:39 UTC 2023 selfserv_9997 with PID 1252 started at Wed Oct 18 14:35:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1252 at Wed Oct 18 14:35:39 UTC 2023 kill -USR1 1252 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1252 killed at Wed Oct 18 14:35:39 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1327 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1327 found at Wed Oct 18 14:35:40 UTC 2023 selfserv_9997 with PID 1327 started at Wed Oct 18 14:35:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1327 at Wed Oct 18 14:35:40 UTC 2023 kill -USR1 1327 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1327 killed at Wed Oct 18 14:35:40 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1385 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1385 found at Wed Oct 18 14:35:40 UTC 2023 selfserv_9997 with PID 1385 started at Wed Oct 18 14:35:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1385 at Wed Oct 18 14:35:40 UTC 2023 kill -USR1 1385 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1385 killed at Wed Oct 18 14:35:40 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1438 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1438 found at Wed Oct 18 14:35:40 UTC 2023 selfserv_9997 with PID 1438 started at Wed Oct 18 14:35:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1438 at Wed Oct 18 14:35:40 UTC 2023 kill -USR1 1438 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1438 killed at Wed Oct 18 14:35:40 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1504 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1504 found at Wed Oct 18 14:35:40 UTC 2023 selfserv_9997 with PID 1504 started at Wed Oct 18 14:35:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1504 at Wed Oct 18 14:35:40 UTC 2023 kill -USR1 1504 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1504 killed at Wed Oct 18 14:35:40 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1556 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1556 found at Wed Oct 18 14:35:40 UTC 2023 selfserv_9997 with PID 1556 started at Wed Oct 18 14:35:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1556 at Wed Oct 18 14:35:40 UTC 2023 kill -USR1 1556 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1556 killed at Wed Oct 18 14:35:40 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1608 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1608 found at Wed Oct 18 14:35:40 UTC 2023 selfserv_9997 with PID 1608 started at Wed Oct 18 14:35:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1608 at Wed Oct 18 14:35:41 UTC 2023 kill -USR1 1608 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1608 killed at Wed Oct 18 14:35:41 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1682 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1682 found at Wed Oct 18 14:35:41 UTC 2023 selfserv_9997 with PID 1682 started at Wed Oct 18 14:35:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1682 at Wed Oct 18 14:35:41 UTC 2023 kill -USR1 1682 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1682 killed at Wed Oct 18 14:35:41 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1734 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1734 found at Wed Oct 18 14:35:41 UTC 2023 selfserv_9997 with PID 1734 started at Wed Oct 18 14:35:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1734 at Wed Oct 18 14:35:41 UTC 2023 kill -USR1 1734 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1734 killed at Wed Oct 18 14:35:41 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1786 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1786 found at Wed Oct 18 14:35:41 UTC 2023 selfserv_9997 with PID 1786 started at Wed Oct 18 14:35:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1786 at Wed Oct 18 14:35:41 UTC 2023 kill -USR1 1786 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1786 killed at Wed Oct 18 14:35:41 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1852 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1852 found at Wed Oct 18 14:35:41 UTC 2023 selfserv_9997 with PID 1852 started at Wed Oct 18 14:35:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1852 at Wed Oct 18 14:35:41 UTC 2023 kill -USR1 1852 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1852 killed at Wed Oct 18 14:35:41 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1906 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1906 found at Wed Oct 18 14:35:42 UTC 2023 selfserv_9997 with PID 1906 started at Wed Oct 18 14:35:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1906 at Wed Oct 18 14:35:42 UTC 2023 kill -USR1 1906 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1906 killed at Wed Oct 18 14:35:42 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1958 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1958 found at Wed Oct 18 14:35:42 UTC 2023 selfserv_9997 with PID 1958 started at Wed Oct 18 14:35:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1958 at Wed Oct 18 14:35:42 UTC 2023 kill -USR1 1958 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1958 killed at Wed Oct 18 14:35:42 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2024 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2024 found at Wed Oct 18 14:35:42 UTC 2023 selfserv_9997 with PID 2024 started at Wed Oct 18 14:35:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2024 at Wed Oct 18 14:35:43 UTC 2023 kill -USR1 2024 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2024 killed at Wed Oct 18 14:35:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2077 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2077 found at Wed Oct 18 14:35:43 UTC 2023 selfserv_9997 with PID 2077 started at Wed Oct 18 14:35:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2077 at Wed Oct 18 14:35:43 UTC 2023 kill -USR1 2077 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2077 killed at Wed Oct 18 14:35:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2129 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2129 found at Wed Oct 18 14:35:43 UTC 2023 selfserv_9997 with PID 2129 started at Wed Oct 18 14:35:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2129 at Wed Oct 18 14:35:43 UTC 2023 kill -USR1 2129 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2129 killed at Wed Oct 18 14:35:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2196 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2196 found at Wed Oct 18 14:35:43 UTC 2023 selfserv_9997 with PID 2196 started at Wed Oct 18 14:35:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2196 at Wed Oct 18 14:35:43 UTC 2023 kill -USR1 2196 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2196 killed at Wed Oct 18 14:35:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2248 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2248 found at Wed Oct 18 14:35:43 UTC 2023 selfserv_9997 with PID 2248 started at Wed Oct 18 14:35:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2248 at Wed Oct 18 14:35:43 UTC 2023 kill -USR1 2248 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2248 killed at Wed Oct 18 14:35:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2300 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2300 found at Wed Oct 18 14:35:43 UTC 2023 selfserv_9997 with PID 2300 started at Wed Oct 18 14:35:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2300 at Wed Oct 18 14:35:44 UTC 2023 kill -USR1 2300 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2300 killed at Wed Oct 18 14:35:44 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2366 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2366 found at Wed Oct 18 14:35:44 UTC 2023 selfserv_9997 with PID 2366 started at Wed Oct 18 14:35:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 2366 at Wed Oct 18 14:35:44 UTC 2023 kill -USR1 2366 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2366 killed at Wed Oct 18 14:35:44 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2418 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2418 found at Wed Oct 18 14:35:44 UTC 2023 selfserv_9997 with PID 2418 started at Wed Oct 18 14:35:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2418 at Wed Oct 18 14:35:44 UTC 2023 kill -USR1 2418 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2418 killed at Wed Oct 18 14:35:44 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2471 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2471 found at Wed Oct 18 14:35:44 UTC 2023 selfserv_9997 with PID 2471 started at Wed Oct 18 14:35:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 2471 at Wed Oct 18 14:35:44 UTC 2023 kill -USR1 2471 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2471 killed at Wed Oct 18 14:35:44 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2537 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2537 found at Wed Oct 18 14:35:44 UTC 2023 selfserv_9997 with PID 2537 started at Wed Oct 18 14:35:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 2537 at Wed Oct 18 14:35:44 UTC 2023 kill -USR1 2537 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2537 killed at Wed Oct 18 14:35:44 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2589 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2589 found at Wed Oct 18 14:35:44 UTC 2023 selfserv_9997 with PID 2589 started at Wed Oct 18 14:35:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 2589 at Wed Oct 18 14:35:45 UTC 2023 kill -USR1 2589 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2589 killed at Wed Oct 18 14:35:45 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2642 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2642 found at Wed Oct 18 14:35:45 UTC 2023 selfserv_9997 with PID 2642 started at Wed Oct 18 14:35:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 2642 at Wed Oct 18 14:35:45 UTC 2023 kill -USR1 2642 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2642 killed at Wed Oct 18 14:35:45 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2708 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2708 found at Wed Oct 18 14:35:45 UTC 2023 selfserv_9997 with PID 2708 started at Wed Oct 18 14:35:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 2708 at Wed Oct 18 14:35:45 UTC 2023 kill -USR1 2708 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2708 killed at Wed Oct 18 14:35:45 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2760 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2760 found at Wed Oct 18 14:35:45 UTC 2023 selfserv_9997 with PID 2760 started at Wed Oct 18 14:35:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 2760 at Wed Oct 18 14:35:45 UTC 2023 kill -USR1 2760 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2760 killed at Wed Oct 18 14:35:45 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2812 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2812 found at Wed Oct 18 14:35:45 UTC 2023 selfserv_9997 with PID 2812 started at Wed Oct 18 14:35:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 2812 at Wed Oct 18 14:35:45 UTC 2023 kill -USR1 2812 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2812 killed at Wed Oct 18 14:35:45 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2878 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2878 found at Wed Oct 18 14:35:45 UTC 2023 selfserv_9997 with PID 2878 started at Wed Oct 18 14:35:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 2878 at Wed Oct 18 14:35:45 UTC 2023 kill -USR1 2878 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2878 killed at Wed Oct 18 14:35:45 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2932 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2932 found at Wed Oct 18 14:35:45 UTC 2023 selfserv_9997 with PID 2932 started at Wed Oct 18 14:35:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2932 at Wed Oct 18 14:35:45 UTC 2023 kill -USR1 2932 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2932 killed at Wed Oct 18 14:35:45 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2984 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2984 found at Wed Oct 18 14:35:46 UTC 2023 selfserv_9997 with PID 2984 started at Wed Oct 18 14:35:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 2984 at Wed Oct 18 14:35:46 UTC 2023 kill -USR1 2984 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2984 killed at Wed Oct 18 14:35:46 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3050 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3050 found at Wed Oct 18 14:35:46 UTC 2023 selfserv_9997 with PID 3050 started at Wed Oct 18 14:35:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3050 at Wed Oct 18 14:35:46 UTC 2023 kill -USR1 3050 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3050 killed at Wed Oct 18 14:35:46 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3102 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3102 found at Wed Oct 18 14:35:46 UTC 2023 selfserv_9997 with PID 3102 started at Wed Oct 18 14:35:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3102 at Wed Oct 18 14:35:46 UTC 2023 kill -USR1 3102 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3102 killed at Wed Oct 18 14:35:46 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3154 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3154 found at Wed Oct 18 14:35:46 UTC 2023 selfserv_9997 with PID 3154 started at Wed Oct 18 14:35:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3154 at Wed Oct 18 14:35:47 UTC 2023 kill -USR1 3154 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3154 killed at Wed Oct 18 14:35:47 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3220 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3220 found at Wed Oct 18 14:35:47 UTC 2023 selfserv_9997 with PID 3220 started at Wed Oct 18 14:35:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3220 at Wed Oct 18 14:35:47 UTC 2023 kill -USR1 3220 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3220 killed at Wed Oct 18 14:35:47 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3272 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3272 found at Wed Oct 18 14:35:47 UTC 2023 selfserv_9997 with PID 3272 started at Wed Oct 18 14:35:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3272 at Wed Oct 18 14:35:47 UTC 2023 kill -USR1 3272 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3272 killed at Wed Oct 18 14:35:47 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3325 found at Wed Oct 18 14:35:47 UTC 2023 selfserv_9997 with PID 3325 started at Wed Oct 18 14:35:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3325 at Wed Oct 18 14:35:47 UTC 2023 kill -USR1 3325 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3325 killed at Wed Oct 18 14:35:47 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3391 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3391 found at Wed Oct 18 14:35:47 UTC 2023 selfserv_9997 with PID 3391 started at Wed Oct 18 14:35:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3391 at Wed Oct 18 14:35:47 UTC 2023 kill -USR1 3391 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3391 killed at Wed Oct 18 14:35:47 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3443 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3443 found at Wed Oct 18 14:35:47 UTC 2023 selfserv_9997 with PID 3443 started at Wed Oct 18 14:35:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3443 at Wed Oct 18 14:35:48 UTC 2023 kill -USR1 3443 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3443 killed at Wed Oct 18 14:35:48 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3495 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3495 found at Wed Oct 18 14:35:48 UTC 2023 selfserv_9997 with PID 3495 started at Wed Oct 18 14:35:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3495 at Wed Oct 18 14:35:48 UTC 2023 kill -USR1 3495 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3495 killed at Wed Oct 18 14:35:48 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3561 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3561 found at Wed Oct 18 14:35:48 UTC 2023 selfserv_9997 with PID 3561 started at Wed Oct 18 14:35:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3561 at Wed Oct 18 14:35:48 UTC 2023 kill -USR1 3561 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3561 killed at Wed Oct 18 14:35:48 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3613 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3613 found at Wed Oct 18 14:35:48 UTC 2023 selfserv_9997 with PID 3613 started at Wed Oct 18 14:35:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3613 at Wed Oct 18 14:35:48 UTC 2023 kill -USR1 3613 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3613 killed at Wed Oct 18 14:35:48 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3665 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3665 found at Wed Oct 18 14:35:48 UTC 2023 selfserv_9997 with PID 3665 started at Wed Oct 18 14:35:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3665 at Wed Oct 18 14:35:49 UTC 2023 kill -USR1 3665 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3665 killed at Wed Oct 18 14:35:49 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3731 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3731 found at Wed Oct 18 14:35:49 UTC 2023 selfserv_9997 with PID 3731 started at Wed Oct 18 14:35:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3731 at Wed Oct 18 14:35:49 UTC 2023 kill -USR1 3731 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3731 killed at Wed Oct 18 14:35:49 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3783 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3783 found at Wed Oct 18 14:35:49 UTC 2023 selfserv_9997 with PID 3783 started at Wed Oct 18 14:35:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3783 at Wed Oct 18 14:35:49 UTC 2023 kill -USR1 3783 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3783 killed at Wed Oct 18 14:35:49 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3835 found at Wed Oct 18 14:35:49 UTC 2023 selfserv_9997 with PID 3835 started at Wed Oct 18 14:35:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3835 at Wed Oct 18 14:35:49 UTC 2023 kill -USR1 3835 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3835 killed at Wed Oct 18 14:35:49 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3902 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3902 found at Wed Oct 18 14:35:49 UTC 2023 selfserv_9997 with PID 3902 started at Wed Oct 18 14:35:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3902 at Wed Oct 18 14:35:50 UTC 2023 kill -USR1 3902 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3902 killed at Wed Oct 18 14:35:50 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3954 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3954 found at Wed Oct 18 14:35:50 UTC 2023 selfserv_9997 with PID 3954 started at Wed Oct 18 14:35:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3954 at Wed Oct 18 14:35:50 UTC 2023 kill -USR1 3954 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3954 killed at Wed Oct 18 14:35:50 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4006 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4006 found at Wed Oct 18 14:35:50 UTC 2023 selfserv_9997 with PID 4006 started at Wed Oct 18 14:35:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4006 at Wed Oct 18 14:35:50 UTC 2023 kill -USR1 4006 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4006 killed at Wed Oct 18 14:35:50 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4072 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4072 found at Wed Oct 18 14:35:50 UTC 2023 selfserv_9997 with PID 4072 started at Wed Oct 18 14:35:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4072 at Wed Oct 18 14:35:50 UTC 2023 kill -USR1 4072 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4072 killed at Wed Oct 18 14:35:50 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4124 found at Wed Oct 18 14:35:50 UTC 2023 selfserv_9997 with PID 4124 started at Wed Oct 18 14:35:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4124 at Wed Oct 18 14:35:51 UTC 2023 kill -USR1 4124 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4124 killed at Wed Oct 18 14:35:51 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4176 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4176 found at Wed Oct 18 14:35:51 UTC 2023 selfserv_9997 with PID 4176 started at Wed Oct 18 14:35:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4176 at Wed Oct 18 14:35:51 UTC 2023 kill -USR1 4176 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4176 killed at Wed Oct 18 14:35:51 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4242 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4242 found at Wed Oct 18 14:35:51 UTC 2023 selfserv_9997 with PID 4242 started at Wed Oct 18 14:35:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4242 at Wed Oct 18 14:35:51 UTC 2023 kill -USR1 4242 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4242 killed at Wed Oct 18 14:35:51 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4294 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4294 found at Wed Oct 18 14:35:51 UTC 2023 selfserv_9997 with PID 4294 started at Wed Oct 18 14:35:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4294 at Wed Oct 18 14:35:52 UTC 2023 kill -USR1 4294 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4294 killed at Wed Oct 18 14:35:52 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4347 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4347 found at Wed Oct 18 14:35:52 UTC 2023 selfserv_9997 with PID 4347 started at Wed Oct 18 14:35:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4347 at Wed Oct 18 14:35:52 UTC 2023 kill -USR1 4347 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4347 killed at Wed Oct 18 14:35:52 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4413 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4413 found at Wed Oct 18 14:35:52 UTC 2023 selfserv_9997 with PID 4413 started at Wed Oct 18 14:35:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4413 at Wed Oct 18 14:35:52 UTC 2023 kill -USR1 4413 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4413 killed at Wed Oct 18 14:35:52 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4465 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4465 found at Wed Oct 18 14:35:52 UTC 2023 selfserv_9997 with PID 4465 started at Wed Oct 18 14:35:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4465 at Wed Oct 18 14:35:52 UTC 2023 kill -USR1 4465 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4465 killed at Wed Oct 18 14:35:52 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4517 found at Wed Oct 18 14:35:52 UTC 2023 selfserv_9997 with PID 4517 started at Wed Oct 18 14:35:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4517 at Wed Oct 18 14:35:52 UTC 2023 kill -USR1 4517 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4517 killed at Wed Oct 18 14:35:52 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4583 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4583 found at Wed Oct 18 14:35:53 UTC 2023 selfserv_9997 with PID 4583 started at Wed Oct 18 14:35:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4583 at Wed Oct 18 14:35:53 UTC 2023 kill -USR1 4583 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4583 killed at Wed Oct 18 14:35:53 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4635 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4635 found at Wed Oct 18 14:35:53 UTC 2023 selfserv_9997 with PID 4635 started at Wed Oct 18 14:35:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4635 at Wed Oct 18 14:35:53 UTC 2023 kill -USR1 4635 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4635 killed at Wed Oct 18 14:35:53 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4687 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4687 found at Wed Oct 18 14:35:53 UTC 2023 selfserv_9997 with PID 4687 started at Wed Oct 18 14:35:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4687 at Wed Oct 18 14:35:54 UTC 2023 kill -USR1 4687 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4687 killed at Wed Oct 18 14:35:54 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4753 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4753 found at Wed Oct 18 14:35:54 UTC 2023 selfserv_9997 with PID 4753 started at Wed Oct 18 14:35:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4753 at Wed Oct 18 14:35:54 UTC 2023 kill -USR1 4753 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4753 killed at Wed Oct 18 14:35:54 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4805 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4805 found at Wed Oct 18 14:35:54 UTC 2023 selfserv_9997 with PID 4805 started at Wed Oct 18 14:35:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4805 at Wed Oct 18 14:35:54 UTC 2023 kill -USR1 4805 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4805 killed at Wed Oct 18 14:35:54 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4857 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4857 found at Wed Oct 18 14:35:54 UTC 2023 selfserv_9997 with PID 4857 started at Wed Oct 18 14:35:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4857 at Wed Oct 18 14:35:54 UTC 2023 kill -USR1 4857 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4857 killed at Wed Oct 18 14:35:54 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4923 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4923 found at Wed Oct 18 14:35:54 UTC 2023 selfserv_9997 with PID 4923 started at Wed Oct 18 14:35:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4923 at Wed Oct 18 14:35:54 UTC 2023 kill -USR1 4923 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4923 killed at Wed Oct 18 14:35:54 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4975 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4975 found at Wed Oct 18 14:35:54 UTC 2023 selfserv_9997 with PID 4975 started at Wed Oct 18 14:35:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4975 at Wed Oct 18 14:35:55 UTC 2023 kill -USR1 4975 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4975 killed at Wed Oct 18 14:35:55 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5027 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5027 found at Wed Oct 18 14:35:55 UTC 2023 selfserv_9997 with PID 5027 started at Wed Oct 18 14:35:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5027 at Wed Oct 18 14:35:55 UTC 2023 kill -USR1 5027 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5027 killed at Wed Oct 18 14:35:55 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5093 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5093 found at Wed Oct 18 14:35:55 UTC 2023 selfserv_9997 with PID 5093 started at Wed Oct 18 14:35:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5093 at Wed Oct 18 14:35:55 UTC 2023 kill -USR1 5093 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5093 killed at Wed Oct 18 14:35:55 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5145 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5145 found at Wed Oct 18 14:35:55 UTC 2023 selfserv_9997 with PID 5145 started at Wed Oct 18 14:35:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5145 at Wed Oct 18 14:35:56 UTC 2023 kill -USR1 5145 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5145 killed at Wed Oct 18 14:35:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5197 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5197 found at Wed Oct 18 14:35:56 UTC 2023 selfserv_9997 with PID 5197 started at Wed Oct 18 14:35:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5197 at Wed Oct 18 14:35:56 UTC 2023 kill -USR1 5197 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5197 killed at Wed Oct 18 14:35:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5264 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5264 found at Wed Oct 18 14:35:56 UTC 2023 selfserv_9997 with PID 5264 started at Wed Oct 18 14:35:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5264 at Wed Oct 18 14:35:56 UTC 2023 kill -USR1 5264 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5264 killed at Wed Oct 18 14:35:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5316 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5316 found at Wed Oct 18 14:35:56 UTC 2023 selfserv_9997 with PID 5316 started at Wed Oct 18 14:35:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5316 at Wed Oct 18 14:35:56 UTC 2023 kill -USR1 5316 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5316 killed at Wed Oct 18 14:35:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5368 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5368 found at Wed Oct 18 14:35:56 UTC 2023 selfserv_9997 with PID 5368 started at Wed Oct 18 14:35:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5368 at Wed Oct 18 14:35:56 UTC 2023 kill -USR1 5368 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5368 killed at Wed Oct 18 14:35:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5434 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5434 found at Wed Oct 18 14:35:56 UTC 2023 selfserv_9997 with PID 5434 started at Wed Oct 18 14:35:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5434 at Wed Oct 18 14:35:57 UTC 2023 kill -USR1 5434 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5434 killed at Wed Oct 18 14:35:57 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5486 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5486 found at Wed Oct 18 14:35:57 UTC 2023 selfserv_9997 with PID 5486 started at Wed Oct 18 14:35:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5486 at Wed Oct 18 14:35:57 UTC 2023 kill -USR1 5486 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5486 killed at Wed Oct 18 14:35:57 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5538 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5538 found at Wed Oct 18 14:35:57 UTC 2023 selfserv_9997 with PID 5538 started at Wed Oct 18 14:35:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5538 at Wed Oct 18 14:35:57 UTC 2023 kill -USR1 5538 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5538 killed at Wed Oct 18 14:35:57 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5604 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5604 found at Wed Oct 18 14:35:57 UTC 2023 selfserv_9997 with PID 5604 started at Wed Oct 18 14:35:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5604 at Wed Oct 18 14:35:57 UTC 2023 kill -USR1 5604 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5604 killed at Wed Oct 18 14:35:57 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5656 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5656 found at Wed Oct 18 14:35:58 UTC 2023 selfserv_9997 with PID 5656 started at Wed Oct 18 14:35:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5656 at Wed Oct 18 14:35:58 UTC 2023 kill -USR1 5656 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5656 killed at Wed Oct 18 14:35:58 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5708 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5708 found at Wed Oct 18 14:35:58 UTC 2023 selfserv_9997 with PID 5708 started at Wed Oct 18 14:35:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5708 at Wed Oct 18 14:35:58 UTC 2023 kill -USR1 5708 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5708 killed at Wed Oct 18 14:35:58 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5774 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5774 found at Wed Oct 18 14:35:58 UTC 2023 selfserv_9997 with PID 5774 started at Wed Oct 18 14:35:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5774 at Wed Oct 18 14:35:58 UTC 2023 kill -USR1 5774 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5774 killed at Wed Oct 18 14:35:58 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5826 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5826 found at Wed Oct 18 14:35:58 UTC 2023 selfserv_9997 with PID 5826 started at Wed Oct 18 14:35:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5826 at Wed Oct 18 14:35:58 UTC 2023 kill -USR1 5826 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5826 killed at Wed Oct 18 14:35:58 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:35:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5878 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5878 found at Wed Oct 18 14:35:59 UTC 2023 selfserv_9997 with PID 5878 started at Wed Oct 18 14:35:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5878 at Wed Oct 18 14:35:59 UTC 2023 kill -USR1 5878 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5878 killed at Wed Oct 18 14:35:59 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5944 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5944 found at Wed Oct 18 14:35:59 UTC 2023 selfserv_9997 with PID 5944 started at Wed Oct 18 14:35:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5944 at Wed Oct 18 14:35:59 UTC 2023 kill -USR1 5944 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5944 killed at Wed Oct 18 14:35:59 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5996 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5996 found at Wed Oct 18 14:35:59 UTC 2023 selfserv_9997 with PID 5996 started at Wed Oct 18 14:35:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5996 at Wed Oct 18 14:35:59 UTC 2023 kill -USR1 5996 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5996 killed at Wed Oct 18 14:35:59 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6048 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6048 found at Wed Oct 18 14:35:59 UTC 2023 selfserv_9997 with PID 6048 started at Wed Oct 18 14:35:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6048 at Wed Oct 18 14:35:59 UTC 2023 kill -USR1 6048 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6048 killed at Wed Oct 18 14:35:59 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6114 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6114 found at Wed Oct 18 14:35:59 UTC 2023 selfserv_9997 with PID 6114 started at Wed Oct 18 14:35:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6114 at Wed Oct 18 14:35:59 UTC 2023 kill -USR1 6114 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6114 killed at Wed Oct 18 14:35:59 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:35:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:35:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6166 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6166 found at Wed Oct 18 14:35:59 UTC 2023 selfserv_9997 with PID 6166 started at Wed Oct 18 14:35:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6166 at Wed Oct 18 14:36:00 UTC 2023 kill -USR1 6166 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6166 killed at Wed Oct 18 14:36:00 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6218 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6218 found at Wed Oct 18 14:36:00 UTC 2023 selfserv_9997 with PID 6218 started at Wed Oct 18 14:36:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6218 at Wed Oct 18 14:36:00 UTC 2023 kill -USR1 6218 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6218 killed at Wed Oct 18 14:36:00 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6284 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6284 found at Wed Oct 18 14:36:00 UTC 2023 selfserv_9997 with PID 6284 started at Wed Oct 18 14:36:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6284 at Wed Oct 18 14:36:00 UTC 2023 kill -USR1 6284 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6284 killed at Wed Oct 18 14:36:00 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6336 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6336 found at Wed Oct 18 14:36:00 UTC 2023 selfserv_9997 with PID 6336 started at Wed Oct 18 14:36:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6336 at Wed Oct 18 14:36:00 UTC 2023 kill -USR1 6336 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6336 killed at Wed Oct 18 14:36:00 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6388 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6388 found at Wed Oct 18 14:36:00 UTC 2023 selfserv_9997 with PID 6388 started at Wed Oct 18 14:36:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6388 at Wed Oct 18 14:36:00 UTC 2023 kill -USR1 6388 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6388 killed at Wed Oct 18 14:36:00 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6454 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6454 found at Wed Oct 18 14:36:00 UTC 2023 selfserv_9997 with PID 6454 started at Wed Oct 18 14:36:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6454 at Wed Oct 18 14:36:01 UTC 2023 kill -USR1 6454 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6454 killed at Wed Oct 18 14:36:01 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6506 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6506 found at Wed Oct 18 14:36:01 UTC 2023 selfserv_9997 with PID 6506 started at Wed Oct 18 14:36:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6506 at Wed Oct 18 14:36:01 UTC 2023 kill -USR1 6506 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6506 killed at Wed Oct 18 14:36:01 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6558 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6558 found at Wed Oct 18 14:36:01 UTC 2023 selfserv_9997 with PID 6558 started at Wed Oct 18 14:36:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6558 at Wed Oct 18 14:36:01 UTC 2023 kill -USR1 6558 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6558 killed at Wed Oct 18 14:36:01 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6624 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6624 found at Wed Oct 18 14:36:01 UTC 2023 selfserv_9997 with PID 6624 started at Wed Oct 18 14:36:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6624 at Wed Oct 18 14:36:01 UTC 2023 kill -USR1 6624 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6624 killed at Wed Oct 18 14:36:01 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6676 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6676 found at Wed Oct 18 14:36:01 UTC 2023 selfserv_9997 with PID 6676 started at Wed Oct 18 14:36:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6676 at Wed Oct 18 14:36:02 UTC 2023 kill -USR1 6676 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6676 killed at Wed Oct 18 14:36:02 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6728 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6728 found at Wed Oct 18 14:36:02 UTC 2023 selfserv_9997 with PID 6728 started at Wed Oct 18 14:36:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6728 at Wed Oct 18 14:36:02 UTC 2023 kill -USR1 6728 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6728 killed at Wed Oct 18 14:36:02 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6794 found at Wed Oct 18 14:36:02 UTC 2023 selfserv_9997 with PID 6794 started at Wed Oct 18 14:36:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6794 at Wed Oct 18 14:36:02 UTC 2023 kill -USR1 6794 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6794 killed at Wed Oct 18 14:36:02 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6846 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6846 found at Wed Oct 18 14:36:02 UTC 2023 selfserv_9997 with PID 6846 started at Wed Oct 18 14:36:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6846 at Wed Oct 18 14:36:02 UTC 2023 kill -USR1 6846 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6846 killed at Wed Oct 18 14:36:02 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6898 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6898 found at Wed Oct 18 14:36:02 UTC 2023 selfserv_9997 with PID 6898 started at Wed Oct 18 14:36:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6898 at Wed Oct 18 14:36:02 UTC 2023 kill -USR1 6898 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6898 killed at Wed Oct 18 14:36:02 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6964 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6964 found at Wed Oct 18 14:36:02 UTC 2023 selfserv_9997 with PID 6964 started at Wed Oct 18 14:36:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6964 at Wed Oct 18 14:36:03 UTC 2023 kill -USR1 6964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6964 killed at Wed Oct 18 14:36:03 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7016 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7016 found at Wed Oct 18 14:36:03 UTC 2023 selfserv_9997 with PID 7016 started at Wed Oct 18 14:36:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7016 at Wed Oct 18 14:36:03 UTC 2023 kill -USR1 7016 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7016 killed at Wed Oct 18 14:36:03 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7068 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7068 found at Wed Oct 18 14:36:03 UTC 2023 selfserv_9997 with PID 7068 started at Wed Oct 18 14:36:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7068 at Wed Oct 18 14:36:03 UTC 2023 kill -USR1 7068 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7068 killed at Wed Oct 18 14:36:03 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7134 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7134 found at Wed Oct 18 14:36:03 UTC 2023 selfserv_9997 with PID 7134 started at Wed Oct 18 14:36:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #109: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7134 at Wed Oct 18 14:36:03 UTC 2023 kill -USR1 7134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7134 killed at Wed Oct 18 14:36:03 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7186 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7186 found at Wed Oct 18 14:36:03 UTC 2023 selfserv_9997 with PID 7186 started at Wed Oct 18 14:36:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7186 at Wed Oct 18 14:36:03 UTC 2023 kill -USR1 7186 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7186 killed at Wed Oct 18 14:36:03 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7238 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7238 found at Wed Oct 18 14:36:03 UTC 2023 selfserv_9997 with PID 7238 started at Wed Oct 18 14:36:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #111: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7238 at Wed Oct 18 14:36:03 UTC 2023 kill -USR1 7238 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7238 killed at Wed Oct 18 14:36:03 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7304 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7304 found at Wed Oct 18 14:36:04 UTC 2023 selfserv_9997 with PID 7304 started at Wed Oct 18 14:36:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #112: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 7304 at Wed Oct 18 14:36:04 UTC 2023 kill -USR1 7304 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7304 killed at Wed Oct 18 14:36:04 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7356 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7356 found at Wed Oct 18 14:36:04 UTC 2023 selfserv_9997 with PID 7356 started at Wed Oct 18 14:36:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #113: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7356 at Wed Oct 18 14:36:04 UTC 2023 kill -USR1 7356 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7356 killed at Wed Oct 18 14:36:04 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7408 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7408 found at Wed Oct 18 14:36:04 UTC 2023 selfserv_9997 with PID 7408 started at Wed Oct 18 14:36:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #114: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 7408 at Wed Oct 18 14:36:04 UTC 2023 kill -USR1 7408 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7408 killed at Wed Oct 18 14:36:04 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7474 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7474 found at Wed Oct 18 14:36:04 UTC 2023 selfserv_9997 with PID 7474 started at Wed Oct 18 14:36:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #115: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 7474 at Wed Oct 18 14:36:04 UTC 2023 kill -USR1 7474 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7474 killed at Wed Oct 18 14:36:04 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7526 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7526 found at Wed Oct 18 14:36:04 UTC 2023 selfserv_9997 with PID 7526 started at Wed Oct 18 14:36:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #116: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 7526 at Wed Oct 18 14:36:04 UTC 2023 kill -USR1 7526 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7526 killed at Wed Oct 18 14:36:04 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7578 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7578 found at Wed Oct 18 14:36:04 UTC 2023 selfserv_9997 with PID 7578 started at Wed Oct 18 14:36:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #117: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 7578 at Wed Oct 18 14:36:04 UTC 2023 kill -USR1 7578 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7578 killed at Wed Oct 18 14:36:04 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7644 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7644 found at Wed Oct 18 14:36:04 UTC 2023 selfserv_9997 with PID 7644 started at Wed Oct 18 14:36:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #118: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 7644 at Wed Oct 18 14:36:05 UTC 2023 kill -USR1 7644 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7644 killed at Wed Oct 18 14:36:05 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7696 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7696 found at Wed Oct 18 14:36:05 UTC 2023 selfserv_9997 with PID 7696 started at Wed Oct 18 14:36:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7696 at Wed Oct 18 14:36:05 UTC 2023 kill -USR1 7696 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7696 killed at Wed Oct 18 14:36:05 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7748 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7748 found at Wed Oct 18 14:36:05 UTC 2023 selfserv_9997 with PID 7748 started at Wed Oct 18 14:36:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #120: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 7748 at Wed Oct 18 14:36:05 UTC 2023 kill -USR1 7748 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7748 killed at Wed Oct 18 14:36:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7814 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7814 found at Wed Oct 18 14:36:05 UTC 2023 selfserv_9997 with PID 7814 started at Wed Oct 18 14:36:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #121: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7814 at Wed Oct 18 14:36:05 UTC 2023 kill -USR1 7814 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7814 killed at Wed Oct 18 14:36:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7867 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7867 found at Wed Oct 18 14:36:05 UTC 2023 selfserv_9997 with PID 7867 started at Wed Oct 18 14:36:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7867 at Wed Oct 18 14:36:05 UTC 2023 kill -USR1 7867 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7867 killed at Wed Oct 18 14:36:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7919 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7919 found at Wed Oct 18 14:36:05 UTC 2023 selfserv_9997 with PID 7919 started at Wed Oct 18 14:36:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #123: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7919 at Wed Oct 18 14:36:05 UTC 2023 kill -USR1 7919 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7919 killed at Wed Oct 18 14:36:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7986 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7986 found at Wed Oct 18 14:36:05 UTC 2023 selfserv_9997 with PID 7986 started at Wed Oct 18 14:36:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #124: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 7986 at Wed Oct 18 14:36:06 UTC 2023 kill -USR1 7986 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7986 killed at Wed Oct 18 14:36:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8038 found at Wed Oct 18 14:36:06 UTC 2023 selfserv_9997 with PID 8038 started at Wed Oct 18 14:36:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #125: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8038 at Wed Oct 18 14:36:06 UTC 2023 kill -USR1 8038 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8038 killed at Wed Oct 18 14:36:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8090 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8090 found at Wed Oct 18 14:36:06 UTC 2023 selfserv_9997 with PID 8090 started at Wed Oct 18 14:36:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #126: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 8090 at Wed Oct 18 14:36:06 UTC 2023 kill -USR1 8090 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8090 killed at Wed Oct 18 14:36:06 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8156 found at Wed Oct 18 14:36:06 UTC 2023 selfserv_9997 with PID 8156 started at Wed Oct 18 14:36:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #127: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 8156 at Wed Oct 18 14:36:06 UTC 2023 kill -USR1 8156 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8156 killed at Wed Oct 18 14:36:06 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8208 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8208 found at Wed Oct 18 14:36:06 UTC 2023 selfserv_9997 with PID 8208 started at Wed Oct 18 14:36:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #128: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 8208 at Wed Oct 18 14:36:06 UTC 2023 kill -USR1 8208 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8208 killed at Wed Oct 18 14:36:06 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8260 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8260 found at Wed Oct 18 14:36:06 UTC 2023 selfserv_9997 with PID 8260 started at Wed Oct 18 14:36:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #129: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 8260 at Wed Oct 18 14:36:06 UTC 2023 kill -USR1 8260 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8260 killed at Wed Oct 18 14:36:06 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8326 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8326 found at Wed Oct 18 14:36:06 UTC 2023 selfserv_9997 with PID 8326 started at Wed Oct 18 14:36:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #130: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 8326 at Wed Oct 18 14:36:06 UTC 2023 kill -USR1 8326 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8326 killed at Wed Oct 18 14:36:06 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8378 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8378 found at Wed Oct 18 14:36:06 UTC 2023 selfserv_9997 with PID 8378 started at Wed Oct 18 14:36:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8378 at Wed Oct 18 14:36:07 UTC 2023 kill -USR1 8378 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8378 killed at Wed Oct 18 14:36:07 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8430 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8430 found at Wed Oct 18 14:36:07 UTC 2023 selfserv_9997 with PID 8430 started at Wed Oct 18 14:36:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #132: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 8430 at Wed Oct 18 14:36:07 UTC 2023 kill -USR1 8430 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8430 killed at Wed Oct 18 14:36:07 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8496 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8496 found at Wed Oct 18 14:36:07 UTC 2023 selfserv_9997 with PID 8496 started at Wed Oct 18 14:36:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8496 at Wed Oct 18 14:36:07 UTC 2023 kill -USR1 8496 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8496 killed at Wed Oct 18 14:36:07 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8548 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8548 found at Wed Oct 18 14:36:07 UTC 2023 selfserv_9997 with PID 8548 started at Wed Oct 18 14:36:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8548 at Wed Oct 18 14:36:07 UTC 2023 kill -USR1 8548 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8548 killed at Wed Oct 18 14:36:07 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8600 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8600 found at Wed Oct 18 14:36:07 UTC 2023 selfserv_9997 with PID 8600 started at Wed Oct 18 14:36:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8600 at Wed Oct 18 14:36:07 UTC 2023 kill -USR1 8600 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8600 killed at Wed Oct 18 14:36:07 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8666 found at Wed Oct 18 14:36:07 UTC 2023 selfserv_9997 with PID 8666 started at Wed Oct 18 14:36:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #136: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8666 at Wed Oct 18 14:36:08 UTC 2023 kill -USR1 8666 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8666 killed at Wed Oct 18 14:36:08 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8718 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8718 found at Wed Oct 18 14:36:08 UTC 2023 selfserv_9997 with PID 8718 started at Wed Oct 18 14:36:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #137: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8718 at Wed Oct 18 14:36:08 UTC 2023 kill -USR1 8718 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8718 killed at Wed Oct 18 14:36:08 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8771 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8771 found at Wed Oct 18 14:36:08 UTC 2023 selfserv_9997 with PID 8771 started at Wed Oct 18 14:36:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #138: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8771 at Wed Oct 18 14:36:08 UTC 2023 kill -USR1 8771 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8771 killed at Wed Oct 18 14:36:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8838 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8838 found at Wed Oct 18 14:36:08 UTC 2023 selfserv_9997 with PID 8838 started at Wed Oct 18 14:36:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8838 at Wed Oct 18 14:36:08 UTC 2023 kill -USR1 8838 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8838 killed at Wed Oct 18 14:36:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8891 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8891 found at Wed Oct 18 14:36:08 UTC 2023 selfserv_9997 with PID 8891 started at Wed Oct 18 14:36:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8891 at Wed Oct 18 14:36:08 UTC 2023 kill -USR1 8891 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8891 killed at Wed Oct 18 14:36:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8943 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8943 found at Wed Oct 18 14:36:08 UTC 2023 selfserv_9997 with PID 8943 started at Wed Oct 18 14:36:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8943 at Wed Oct 18 14:36:09 UTC 2023 kill -USR1 8943 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8943 killed at Wed Oct 18 14:36:09 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9009 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9009 found at Wed Oct 18 14:36:09 UTC 2023 selfserv_9997 with PID 9009 started at Wed Oct 18 14:36:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #142: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9009 at Wed Oct 18 14:36:09 UTC 2023 kill -USR1 9009 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9009 killed at Wed Oct 18 14:36:09 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9061 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9061 found at Wed Oct 18 14:36:09 UTC 2023 selfserv_9997 with PID 9061 started at Wed Oct 18 14:36:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9061 at Wed Oct 18 14:36:09 UTC 2023 kill -USR1 9061 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9061 killed at Wed Oct 18 14:36:09 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9113 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9113 found at Wed Oct 18 14:36:09 UTC 2023 selfserv_9997 with PID 9113 started at Wed Oct 18 14:36:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #144: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9113 at Wed Oct 18 14:36:09 UTC 2023 kill -USR1 9113 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9113 killed at Wed Oct 18 14:36:09 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9179 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9179 found at Wed Oct 18 14:36:09 UTC 2023 selfserv_9997 with PID 9179 started at Wed Oct 18 14:36:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9179 at Wed Oct 18 14:36:09 UTC 2023 kill -USR1 9179 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9179 killed at Wed Oct 18 14:36:10 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9231 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9231 found at Wed Oct 18 14:36:10 UTC 2023 selfserv_9997 with PID 9231 started at Wed Oct 18 14:36:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9231 at Wed Oct 18 14:36:10 UTC 2023 kill -USR1 9231 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9231 killed at Wed Oct 18 14:36:10 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9284 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9284 found at Wed Oct 18 14:36:10 UTC 2023 selfserv_9997 with PID 9284 started at Wed Oct 18 14:36:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9284 at Wed Oct 18 14:36:10 UTC 2023 kill -USR1 9284 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9284 killed at Wed Oct 18 14:36:10 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9350 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9350 found at Wed Oct 18 14:36:10 UTC 2023 selfserv_9997 with PID 9350 started at Wed Oct 18 14:36:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9350 at Wed Oct 18 14:36:10 UTC 2023 kill -USR1 9350 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9350 killed at Wed Oct 18 14:36:10 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9402 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9402 found at Wed Oct 18 14:36:10 UTC 2023 selfserv_9997 with PID 9402 started at Wed Oct 18 14:36:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9402 at Wed Oct 18 14:36:11 UTC 2023 kill -USR1 9402 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9402 killed at Wed Oct 18 14:36:11 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9455 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9455 found at Wed Oct 18 14:36:11 UTC 2023 selfserv_9997 with PID 9455 started at Wed Oct 18 14:36:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9455 at Wed Oct 18 14:36:11 UTC 2023 kill -USR1 9455 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9455 killed at Wed Oct 18 14:36:11 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9521 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9521 found at Wed Oct 18 14:36:11 UTC 2023 selfserv_9997 with PID 9521 started at Wed Oct 18 14:36:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9521 at Wed Oct 18 14:36:11 UTC 2023 kill -USR1 9521 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9521 killed at Wed Oct 18 14:36:11 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9573 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9573 found at Wed Oct 18 14:36:11 UTC 2023 selfserv_9997 with PID 9573 started at Wed Oct 18 14:36:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9573 at Wed Oct 18 14:36:11 UTC 2023 kill -USR1 9573 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9573 killed at Wed Oct 18 14:36:11 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9625 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9625 found at Wed Oct 18 14:36:11 UTC 2023 selfserv_9997 with PID 9625 started at Wed Oct 18 14:36:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9625 at Wed Oct 18 14:36:11 UTC 2023 kill -USR1 9625 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9625 killed at Wed Oct 18 14:36:11 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9692 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9692 found at Wed Oct 18 14:36:11 UTC 2023 selfserv_9997 with PID 9692 started at Wed Oct 18 14:36:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #154: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9692 at Wed Oct 18 14:36:12 UTC 2023 kill -USR1 9692 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9692 killed at Wed Oct 18 14:36:12 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9744 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9744 found at Wed Oct 18 14:36:12 UTC 2023 selfserv_9997 with PID 9744 started at Wed Oct 18 14:36:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9744 at Wed Oct 18 14:36:12 UTC 2023 kill -USR1 9744 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9744 killed at Wed Oct 18 14:36:12 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9796 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9796 found at Wed Oct 18 14:36:12 UTC 2023 selfserv_9997 with PID 9796 started at Wed Oct 18 14:36:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9796 at Wed Oct 18 14:36:12 UTC 2023 kill -USR1 9796 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9796 killed at Wed Oct 18 14:36:12 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9862 found at Wed Oct 18 14:36:12 UTC 2023 selfserv_9997 with PID 9862 started at Wed Oct 18 14:36:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9862 at Wed Oct 18 14:36:12 UTC 2023 kill -USR1 9862 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9862 killed at Wed Oct 18 14:36:12 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9914 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9914 found at Wed Oct 18 14:36:12 UTC 2023 selfserv_9997 with PID 9914 started at Wed Oct 18 14:36:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9914 at Wed Oct 18 14:36:13 UTC 2023 kill -USR1 9914 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9914 killed at Wed Oct 18 14:36:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9966 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9966 found at Wed Oct 18 14:36:13 UTC 2023 selfserv_9997 with PID 9966 started at Wed Oct 18 14:36:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9966 at Wed Oct 18 14:36:13 UTC 2023 kill -USR1 9966 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9966 killed at Wed Oct 18 14:36:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10032 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10032 found at Wed Oct 18 14:36:13 UTC 2023 selfserv_9997 with PID 10032 started at Wed Oct 18 14:36:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10032 at Wed Oct 18 14:36:13 UTC 2023 kill -USR1 10032 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10032 killed at Wed Oct 18 14:36:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10084 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10084 found at Wed Oct 18 14:36:13 UTC 2023 selfserv_9997 with PID 10084 started at Wed Oct 18 14:36:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10084 at Wed Oct 18 14:36:13 UTC 2023 kill -USR1 10084 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10084 killed at Wed Oct 18 14:36:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10136 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10136 found at Wed Oct 18 14:36:13 UTC 2023 selfserv_9997 with PID 10136 started at Wed Oct 18 14:36:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10136 at Wed Oct 18 14:36:13 UTC 2023 kill -USR1 10136 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10136 killed at Wed Oct 18 14:36:13 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10202 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10202 found at Wed Oct 18 14:36:13 UTC 2023 selfserv_9997 with PID 10202 started at Wed Oct 18 14:36:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10202 at Wed Oct 18 14:36:14 UTC 2023 kill -USR1 10202 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10202 killed at Wed Oct 18 14:36:14 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10254 found at Wed Oct 18 14:36:14 UTC 2023 selfserv_9997 with PID 10254 started at Wed Oct 18 14:36:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10254 at Wed Oct 18 14:36:14 UTC 2023 kill -USR1 10254 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10254 killed at Wed Oct 18 14:36:14 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:36:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10306 found at Wed Oct 18 14:36:14 UTC 2023 selfserv_9997 with PID 10306 started at Wed Oct 18 14:36:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10306 at Wed Oct 18 14:36:14 UTC 2023 kill -USR1 10306 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10306 killed at Wed Oct 18 14:36:14 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10372 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10372 found at Wed Oct 18 14:36:14 UTC 2023 selfserv_9997 with PID 10372 started at Wed Oct 18 14:36:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #166: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10372 at Wed Oct 18 14:36:14 UTC 2023 kill -USR1 10372 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10372 killed at Wed Oct 18 14:36:14 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10424 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10424 found at Wed Oct 18 14:36:14 UTC 2023 selfserv_9997 with PID 10424 started at Wed Oct 18 14:36:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #167: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10424 at Wed Oct 18 14:36:14 UTC 2023 kill -USR1 10424 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10424 killed at Wed Oct 18 14:36:14 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10476 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10476 found at Wed Oct 18 14:36:14 UTC 2023 selfserv_9997 with PID 10476 started at Wed Oct 18 14:36:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #168: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10476 at Wed Oct 18 14:36:14 UTC 2023 kill -USR1 10476 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10476 killed at Wed Oct 18 14:36:14 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10542 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10542 found at Wed Oct 18 14:36:15 UTC 2023 selfserv_9997 with PID 10542 started at Wed Oct 18 14:36:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #169: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10542 at Wed Oct 18 14:36:15 UTC 2023 kill -USR1 10542 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10542 killed at Wed Oct 18 14:36:15 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10594 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10594 found at Wed Oct 18 14:36:15 UTC 2023 selfserv_9997 with PID 10594 started at Wed Oct 18 14:36:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #170: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10594 at Wed Oct 18 14:36:15 UTC 2023 kill -USR1 10594 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10594 killed at Wed Oct 18 14:36:15 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10646 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10646 found at Wed Oct 18 14:36:15 UTC 2023 selfserv_9997 with PID 10646 started at Wed Oct 18 14:36:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #171: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10646 at Wed Oct 18 14:36:15 UTC 2023 kill -USR1 10646 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10646 killed at Wed Oct 18 14:36:15 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10712 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10712 found at Wed Oct 18 14:36:16 UTC 2023 selfserv_9997 with PID 10712 started at Wed Oct 18 14:36:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #172: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10712 at Wed Oct 18 14:36:16 UTC 2023 kill -USR1 10712 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10712 killed at Wed Oct 18 14:36:16 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10764 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10764 found at Wed Oct 18 14:36:16 UTC 2023 selfserv_9997 with PID 10764 started at Wed Oct 18 14:36:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #173: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10764 at Wed Oct 18 14:36:16 UTC 2023 kill -USR1 10764 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10764 killed at Wed Oct 18 14:36:16 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10816 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10816 found at Wed Oct 18 14:36:16 UTC 2023 selfserv_9997 with PID 10816 started at Wed Oct 18 14:36:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #174: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10816 at Wed Oct 18 14:36:16 UTC 2023 kill -USR1 10816 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10816 killed at Wed Oct 18 14:36:16 UTC 2023 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/authin.tl.tmp 0 selfserv_9997 starting at Wed Oct 18 14:36:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:16 UTC 2023 selfserv_9997 with PID 10887 started at Wed Oct 18 14:36:16 UTC 2023 Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:16 UTC 2023 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:17 UTC 2023 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:17 UTC 2023 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:17 UTC 2023 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:17 UTC 2023 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:17 UTC 2023 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:17 UTC 2023 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:17 UTC 2023 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:17 UTC 2023 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:17 UTC 2023 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:17 UTC 2023 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:18 UTC 2023 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:18 UTC 2023 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:18 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:18 UTC 2023 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:18 UTC 2023 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:18 UTC 2023 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:18 UTC 2023 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:18 UTC 2023 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:18 UTC 2023 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:18 UTC 2023 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:19 UTC 2023 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:19 UTC 2023 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:19 UTC 2023 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:19 UTC 2023 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:19 UTC 2023 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:19 UTC 2023 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:19 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:19 UTC 2023 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:19 UTC 2023 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:19 UTC 2023 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:19 UTC 2023 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:20 UTC 2023 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:20 UTC 2023 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:20 UTC 2023 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:20 UTC 2023 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:20 UTC 2023 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:20 UTC 2023 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:20 UTC 2023 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:20 UTC 2023 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 10887 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10887 found at Wed Oct 18 14:36:20 UTC 2023 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 10887 at Wed Oct 18 14:36:20 UTC 2023 kill -USR1 10887 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10887 killed at Wed Oct 18 14:36:20 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:20 UTC 2023 selfserv_9997 with PID 12148 started at Wed Oct 18 14:36:20 UTC 2023 Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:21 UTC 2023 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:21 UTC 2023 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:21 UTC 2023 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:21 UTC 2023 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:21 UTC 2023 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:21 UTC 2023 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:21 UTC 2023 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:21 UTC 2023 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:21 UTC 2023 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:22 UTC 2023 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:22 UTC 2023 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:22 UTC 2023 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:22 UTC 2023 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:22 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:22 UTC 2023 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:22 UTC 2023 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:22 UTC 2023 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:22 UTC 2023 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:22 UTC 2023 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:22 UTC 2023 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:23 UTC 2023 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:23 UTC 2023 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:23 UTC 2023 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:23 UTC 2023 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:23 UTC 2023 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:23 UTC 2023 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:23 UTC 2023 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:23 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:23 UTC 2023 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:24 UTC 2023 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:24 UTC 2023 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:24 UTC 2023 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:24 UTC 2023 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:24 UTC 2023 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:24 UTC 2023 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:24 UTC 2023 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:24 UTC 2023 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:24 UTC 2023 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:24 UTC 2023 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:24 UTC 2023 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12148 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12148 found at Wed Oct 18 14:36:24 UTC 2023 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 12148 at Wed Oct 18 14:36:24 UTC 2023 kill -USR1 12148 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12148 killed at Wed Oct 18 14:36:24 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:24 UTC 2023 selfserv_9997 with PID 13406 started at Wed Oct 18 14:36:24 UTC 2023 Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:25 UTC 2023 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:25 UTC 2023 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:25 UTC 2023 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:25 UTC 2023 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:25 UTC 2023 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:25 UTC 2023 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:25 UTC 2023 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:25 UTC 2023 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:25 UTC 2023 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:26 UTC 2023 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:26 UTC 2023 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:26 UTC 2023 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:26 UTC 2023 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:26 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:26 UTC 2023 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:26 UTC 2023 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:26 UTC 2023 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:26 UTC 2023 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:26 UTC 2023 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:26 UTC 2023 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:27 UTC 2023 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:27 UTC 2023 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:27 UTC 2023 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:27 UTC 2023 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:27 UTC 2023 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:27 UTC 2023 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:27 UTC 2023 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:27 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:27 UTC 2023 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:27 UTC 2023 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:28 UTC 2023 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:28 UTC 2023 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:28 UTC 2023 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:28 UTC 2023 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:28 UTC 2023 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:28 UTC 2023 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:28 UTC 2023 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:28 UTC 2023 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:28 UTC 2023 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:28 UTC 2023 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13406 found at Wed Oct 18 14:36:28 UTC 2023 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 13406 at Wed Oct 18 14:36:28 UTC 2023 kill -USR1 13406 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13406 killed at Wed Oct 18 14:36:28 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:28 UTC 2023 selfserv_9997 with PID 14666 started at Wed Oct 18 14:36:28 UTC 2023 Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:29 UTC 2023 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:29 UTC 2023 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:29 UTC 2023 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:29 UTC 2023 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:29 UTC 2023 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:29 UTC 2023 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:29 UTC 2023 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:29 UTC 2023 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:29 UTC 2023 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:30 UTC 2023 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:30 UTC 2023 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:30 UTC 2023 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:30 UTC 2023 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:30 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:30 UTC 2023 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:30 UTC 2023 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:30 UTC 2023 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:30 UTC 2023 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:30 UTC 2023 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:31 UTC 2023 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:31 UTC 2023 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:31 UTC 2023 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:31 UTC 2023 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:31 UTC 2023 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:31 UTC 2023 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:31 UTC 2023 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:31 UTC 2023 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:31 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:31 UTC 2023 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:32 UTC 2023 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:32 UTC 2023 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:32 UTC 2023 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:32 UTC 2023 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:32 UTC 2023 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:32 UTC 2023 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:32 UTC 2023 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:32 UTC 2023 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:32 UTC 2023 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:32 UTC 2023 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:32 UTC 2023 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14666 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14666 found at Wed Oct 18 14:36:32 UTC 2023 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 14666 at Wed Oct 18 14:36:32 UTC 2023 kill -USR1 14666 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14666 killed at Wed Oct 18 14:36:32 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15928 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15928 found at Wed Oct 18 14:36:33 UTC 2023 selfserv_9997 with PID 15928 started at Wed Oct 18 14:36:33 UTC 2023 trying to kill selfserv_9997 with PID 15928 at Wed Oct 18 14:36:33 UTC 2023 kill -USR1 15928 ./ssl.sh: line 228: 15928 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9997 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15928 killed at Wed Oct 18 14:36:33 UTC 2023 selfserv_9997 starting at Wed Oct 18 14:36:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:33 UTC 2023 selfserv_9997 with PID 15970 started at Wed Oct 18 14:36:33 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:33 UTC 2023 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:33 UTC 2023 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:33 UTC 2023 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:33 UTC 2023 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:33 UTC 2023 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:33 UTC 2023 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:34 UTC 2023 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:34 UTC 2023 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:34 UTC 2023 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:34 UTC 2023 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:34 UTC 2023 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:34 UTC 2023 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:34 UTC 2023 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:35 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:35 UTC 2023 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:35 UTC 2023 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:35 UTC 2023 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:35 UTC 2023 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:35 UTC 2023 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:35 UTC 2023 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:36 UTC 2023 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:36 UTC 2023 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:36 UTC 2023 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:36 UTC 2023 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:36 UTC 2023 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:36 UTC 2023 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:36 UTC 2023 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:37 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:37 UTC 2023 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:37 UTC 2023 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:37 UTC 2023 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:37 UTC 2023 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:37 UTC 2023 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:37 UTC 2023 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:38 UTC 2023 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:38 UTC 2023 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:38 UTC 2023 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:38 UTC 2023 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:38 UTC 2023 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:38 UTC 2023 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 15970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15970 found at Wed Oct 18 14:36:38 UTC 2023 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15970 at Wed Oct 18 14:36:38 UTC 2023 kill -USR1 15970 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15970 killed at Wed Oct 18 14:36:38 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:38 UTC 2023 selfserv_9997 with PID 17230 started at Wed Oct 18 14:36:38 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:39 UTC 2023 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:39 UTC 2023 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:39 UTC 2023 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:39 UTC 2023 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:39 UTC 2023 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:40 UTC 2023 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:40 UTC 2023 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:40 UTC 2023 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:40 UTC 2023 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:40 UTC 2023 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:40 UTC 2023 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:41 UTC 2023 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:41 UTC 2023 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:41 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:41 UTC 2023 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:41 UTC 2023 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:41 UTC 2023 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:42 UTC 2023 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:42 UTC 2023 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:42 UTC 2023 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:42 UTC 2023 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:42 UTC 2023 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:42 UTC 2023 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:43 UTC 2023 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:43 UTC 2023 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:43 UTC 2023 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:43 UTC 2023 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:43 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:43 UTC 2023 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:44 UTC 2023 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:44 UTC 2023 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:44 UTC 2023 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:44 UTC 2023 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:44 UTC 2023 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:44 UTC 2023 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:45 UTC 2023 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:45 UTC 2023 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:45 UTC 2023 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:45 UTC 2023 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:45 UTC 2023 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17230 found at Wed Oct 18 14:36:46 UTC 2023 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17230 at Wed Oct 18 14:36:46 UTC 2023 kill -USR1 17230 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17230 killed at Wed Oct 18 14:36:46 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:46 UTC 2023 selfserv_9997 with PID 18508 started at Wed Oct 18 14:36:46 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:46 UTC 2023 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:46 UTC 2023 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:46 UTC 2023 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:46 UTC 2023 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:46 UTC 2023 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:46 UTC 2023 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:47 UTC 2023 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:47 UTC 2023 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:47 UTC 2023 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:47 UTC 2023 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:47 UTC 2023 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:47 UTC 2023 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:47 UTC 2023 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:48 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:48 UTC 2023 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:48 UTC 2023 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:48 UTC 2023 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:48 UTC 2023 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:48 UTC 2023 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:48 UTC 2023 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:49 UTC 2023 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:49 UTC 2023 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:49 UTC 2023 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:49 UTC 2023 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:49 UTC 2023 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:49 UTC 2023 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:49 UTC 2023 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:50 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:50 UTC 2023 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:50 UTC 2023 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:50 UTC 2023 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:50 UTC 2023 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:50 UTC 2023 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:51 UTC 2023 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:51 UTC 2023 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:51 UTC 2023 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:51 UTC 2023 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:51 UTC 2023 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:51 UTC 2023 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:51 UTC 2023 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18508 found at Wed Oct 18 14:36:52 UTC 2023 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18508 at Wed Oct 18 14:36:52 UTC 2023 kill -USR1 18508 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18508 killed at Wed Oct 18 14:36:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:52 UTC 2023 selfserv_9997 with PID 19769 started at Wed Oct 18 14:36:52 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:52 UTC 2023 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:52 UTC 2023 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:52 UTC 2023 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:52 UTC 2023 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:52 UTC 2023 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:52 UTC 2023 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:53 UTC 2023 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:53 UTC 2023 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:53 UTC 2023 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:53 UTC 2023 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:53 UTC 2023 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:53 UTC 2023 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:54 UTC 2023 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:54 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:54 UTC 2023 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:54 UTC 2023 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:54 UTC 2023 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:54 UTC 2023 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:54 UTC 2023 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:54 UTC 2023 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:55 UTC 2023 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:55 UTC 2023 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:55 UTC 2023 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:55 UTC 2023 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:55 UTC 2023 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:55 UTC 2023 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:55 UTC 2023 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:56 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:56 UTC 2023 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:56 UTC 2023 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:56 UTC 2023 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:56 UTC 2023 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:56 UTC 2023 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:56 UTC 2023 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:57 UTC 2023 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:57 UTC 2023 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:57 UTC 2023 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:57 UTC 2023 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:57 UTC 2023 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:57 UTC 2023 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19769 found at Wed Oct 18 14:36:57 UTC 2023 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19769 at Wed Oct 18 14:36:57 UTC 2023 kill -USR1 19769 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19769 killed at Wed Oct 18 14:36:57 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:36:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:36:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:36:57 UTC 2023 selfserv_9997 with PID 21031 started at Wed Oct 18 14:36:57 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:36:58 UTC 2023 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:36:58 UTC 2023 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:36:58 UTC 2023 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:36:58 UTC 2023 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:36:58 UTC 2023 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:36:58 UTC 2023 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:36:59 UTC 2023 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:36:59 UTC 2023 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:36:59 UTC 2023 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:36:59 UTC 2023 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:36:59 UTC 2023 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:00 UTC 2023 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:00 UTC 2023 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:00 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:00 UTC 2023 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:00 UTC 2023 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:00 UTC 2023 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:01 UTC 2023 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:01 UTC 2023 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:01 UTC 2023 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:01 UTC 2023 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:01 UTC 2023 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:01 UTC 2023 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:02 UTC 2023 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:02 UTC 2023 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:02 UTC 2023 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:02 UTC 2023 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:02 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:02 UTC 2023 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:03 UTC 2023 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:03 UTC 2023 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:03 UTC 2023 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:03 UTC 2023 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:03 UTC 2023 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:03 UTC 2023 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:04 UTC 2023 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:04 UTC 2023 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:04 UTC 2023 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:04 UTC 2023 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:04 UTC 2023 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21031 found at Wed Oct 18 14:37:04 UTC 2023 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 21031 at Wed Oct 18 14:37:04 UTC 2023 kill -USR1 21031 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21031 killed at Wed Oct 18 14:37:04 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:04 UTC 2023 selfserv_9997 with PID 22293 started at Wed Oct 18 14:37:04 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:05 UTC 2023 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:05 UTC 2023 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:05 UTC 2023 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:05 UTC 2023 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:05 UTC 2023 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:05 UTC 2023 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:05 UTC 2023 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:06 UTC 2023 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:06 UTC 2023 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:06 UTC 2023 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:06 UTC 2023 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:06 UTC 2023 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:06 UTC 2023 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:07 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:07 UTC 2023 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:07 UTC 2023 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:07 UTC 2023 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:07 UTC 2023 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:07 UTC 2023 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:07 UTC 2023 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:08 UTC 2023 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:08 UTC 2023 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:08 UTC 2023 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:08 UTC 2023 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:08 UTC 2023 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:08 UTC 2023 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:08 UTC 2023 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:09 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:09 UTC 2023 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:09 UTC 2023 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:09 UTC 2023 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:09 UTC 2023 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:09 UTC 2023 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:09 UTC 2023 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:09 UTC 2023 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:10 UTC 2023 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:10 UTC 2023 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:10 UTC 2023 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:10 UTC 2023 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:10 UTC 2023 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22293 found at Wed Oct 18 14:37:10 UTC 2023 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22293 at Wed Oct 18 14:37:10 UTC 2023 kill -USR1 22293 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22293 killed at Wed Oct 18 14:37:10 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23557 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23557 found at Wed Oct 18 14:37:10 UTC 2023 selfserv_9997 with PID 23557 started at Wed Oct 18 14:37:10 UTC 2023 trying to kill selfserv_9997 with PID 23557 at Wed Oct 18 14:37:10 UTC 2023 kill -USR1 23557 ./ssl.sh: line 228: 23557 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9997 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23557 killed at Wed Oct 18 14:37:10 UTC 2023 selfserv_9997 starting at Wed Oct 18 14:37:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:10 UTC 2023 selfserv_9997 with PID 23599 started at Wed Oct 18 14:37:10 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:11 UTC 2023 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:11 UTC 2023 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:11 UTC 2023 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:11 UTC 2023 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:11 UTC 2023 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:11 UTC 2023 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:11 UTC 2023 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:12 UTC 2023 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:12 UTC 2023 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:12 UTC 2023 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:12 UTC 2023 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:12 UTC 2023 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:12 UTC 2023 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:12 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:13 UTC 2023 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:13 UTC 2023 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:13 UTC 2023 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:13 UTC 2023 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:13 UTC 2023 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:13 UTC 2023 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:13 UTC 2023 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:14 UTC 2023 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:14 UTC 2023 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:14 UTC 2023 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:14 UTC 2023 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:14 UTC 2023 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:14 UTC 2023 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:14 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:15 UTC 2023 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:15 UTC 2023 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:15 UTC 2023 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:15 UTC 2023 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:15 UTC 2023 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:15 UTC 2023 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:15 UTC 2023 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:16 UTC 2023 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:16 UTC 2023 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:16 UTC 2023 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:16 UTC 2023 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:16 UTC 2023 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23599 found at Wed Oct 18 14:37:16 UTC 2023 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23599 at Wed Oct 18 14:37:16 UTC 2023 kill -USR1 23599 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23599 killed at Wed Oct 18 14:37:16 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:16 UTC 2023 selfserv_9997 with PID 24862 started at Wed Oct 18 14:37:16 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:16 UTC 2023 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:17 UTC 2023 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:17 UTC 2023 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:17 UTC 2023 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:17 UTC 2023 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:17 UTC 2023 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:18 UTC 2023 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:18 UTC 2023 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:18 UTC 2023 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:18 UTC 2023 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:18 UTC 2023 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:18 UTC 2023 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:19 UTC 2023 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:19 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:19 UTC 2023 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:19 UTC 2023 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:19 UTC 2023 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:19 UTC 2023 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:20 UTC 2023 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:20 UTC 2023 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:20 UTC 2023 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:20 UTC 2023 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:20 UTC 2023 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:21 UTC 2023 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:21 UTC 2023 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:21 UTC 2023 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:21 UTC 2023 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:21 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:21 UTC 2023 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:22 UTC 2023 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:22 UTC 2023 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:22 UTC 2023 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:22 UTC 2023 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:22 UTC 2023 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:22 UTC 2023 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:23 UTC 2023 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:23 UTC 2023 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:23 UTC 2023 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:23 UTC 2023 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:23 UTC 2023 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:37:23 UTC 2023 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24862 at Wed Oct 18 14:37:23 UTC 2023 kill -USR1 24862 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24862 killed at Wed Oct 18 14:37:23 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:23 UTC 2023 selfserv_9997 with PID 26124 started at Wed Oct 18 14:37:23 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:24 UTC 2023 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:24 UTC 2023 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:24 UTC 2023 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:24 UTC 2023 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:24 UTC 2023 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:24 UTC 2023 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:24 UTC 2023 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:25 UTC 2023 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:25 UTC 2023 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:25 UTC 2023 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:25 UTC 2023 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:25 UTC 2023 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:25 UTC 2023 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:26 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:26 UTC 2023 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:26 UTC 2023 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:26 UTC 2023 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:26 UTC 2023 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:26 UTC 2023 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:26 UTC 2023 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:26 UTC 2023 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:27 UTC 2023 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:27 UTC 2023 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:27 UTC 2023 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:27 UTC 2023 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:27 UTC 2023 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:27 UTC 2023 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52 RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:28 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:28 UTC 2023 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:28 UTC 2023 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:28 UTC 2023 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:28 UTC 2023 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:28 UTC 2023 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:28 UTC 2023 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:28 UTC 2023 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:29 UTC 2023 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:29 UTC 2023 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:29 UTC 2023 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:29 UTC 2023 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:29 UTC 2023 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26124 found at Wed Oct 18 14:37:29 UTC 2023 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 26124 at Wed Oct 18 14:37:29 UTC 2023 kill -USR1 26124 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26124 killed at Wed Oct 18 14:37:29 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:29 UTC 2023 selfserv_9997 with PID 27386 started at Wed Oct 18 14:37:29 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:30 UTC 2023 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:30 UTC 2023 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:30 UTC 2023 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:30 UTC 2023 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:30 UTC 2023 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:30 UTC 2023 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:30 UTC 2023 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:31 UTC 2023 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:31 UTC 2023 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:31 UTC 2023 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:31 UTC 2023 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:31 UTC 2023 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:31 UTC 2023 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:31 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:32 UTC 2023 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:32 UTC 2023 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:32 UTC 2023 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:32 UTC 2023 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:32 UTC 2023 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:32 UTC 2023 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:32 UTC 2023 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:33 UTC 2023 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:33 UTC 2023 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:33 UTC 2023 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:33 UTC 2023 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:33 UTC 2023 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:33 UTC 2023 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:33 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:34 UTC 2023 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:34 UTC 2023 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:34 UTC 2023 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:34 UTC 2023 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:34 UTC 2023 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:34 UTC 2023 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:34 UTC 2023 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:34 UTC 2023 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:35 UTC 2023 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:35 UTC 2023 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:35 UTC 2023 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:35 UTC 2023 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27386 found at Wed Oct 18 14:37:35 UTC 2023 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27386 at Wed Oct 18 14:37:35 UTC 2023 kill -USR1 27386 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27386 killed at Wed Oct 18 14:37:35 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:35 UTC 2023 selfserv_9997 with PID 28648 started at Wed Oct 18 14:37:35 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:35 UTC 2023 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:36 UTC 2023 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:36 UTC 2023 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:36 UTC 2023 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:36 UTC 2023 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:36 UTC 2023 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:36 UTC 2023 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:37 UTC 2023 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:37 UTC 2023 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:37 UTC 2023 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:37 UTC 2023 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:37 UTC 2023 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:38 UTC 2023 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:38 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:38 UTC 2023 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:38 UTC 2023 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:38 UTC 2023 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:38 UTC 2023 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:38 UTC 2023 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:39 UTC 2023 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:39 UTC 2023 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:39 UTC 2023 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:39 UTC 2023 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:39 UTC 2023 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:40 UTC 2023 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:40 UTC 2023 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:40 UTC 2023 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:40 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:40 UTC 2023 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:40 UTC 2023 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:41 UTC 2023 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:41 UTC 2023 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:41 UTC 2023 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:41 UTC 2023 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:41 UTC 2023 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:41 UTC 2023 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:42 UTC 2023 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:42 UTC 2023 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:42 UTC 2023 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:42 UTC 2023 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28648 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28648 found at Wed Oct 18 14:37:42 UTC 2023 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28648 at Wed Oct 18 14:37:42 UTC 2023 kill -USR1 28648 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28648 killed at Wed Oct 18 14:37:42 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:42 UTC 2023 selfserv_9997 with PID 29924 started at Wed Oct 18 14:37:42 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:42 UTC 2023 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:43 UTC 2023 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:43 UTC 2023 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:43 UTC 2023 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:43 UTC 2023 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:43 UTC 2023 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:43 UTC 2023 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:43 UTC 2023 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:44 UTC 2023 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:44 UTC 2023 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:44 UTC 2023 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:44 UTC 2023 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:44 UTC 2023 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_43-48-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:44 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:44 UTC 2023 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:45 UTC 2023 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:45 UTC 2023 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:45 UTC 2023 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:45 UTC 2023 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:45 UTC 2023 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:45 UTC 2023 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:46 UTC 2023 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:46 UTC 2023 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:46 UTC 2023 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:46 UTC 2023 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:46 UTC 2023 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:46 UTC 2023 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server/root.crl_49-52-ec RELOAD time %{do_ssl_gtests} subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:46 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:47 UTC 2023 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:47 UTC 2023 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:47 UTC 2023 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:47 UTC 2023 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:47 UTC 2023 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:47 UTC 2023 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:47 UTC 2023 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:47 UTC 2023 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:48 UTC 2023 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:48 UTC 2023 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:48 UTC 2023 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:48 UTC 2023 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29924 found at Wed Oct 18 14:37:48 UTC 2023 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 29924 at Wed Oct 18 14:37:48 UTC 2023 kill -USR1 29924 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29924 killed at Wed Oct 18 14:37:48 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31187 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31187 found at Wed Oct 18 14:37:48 UTC 2023 selfserv_9997 with PID 31187 started at Wed Oct 18 14:37:48 UTC 2023 trying to kill selfserv_9997 with PID 31187 at Wed Oct 18 14:37:48 UTC 2023 kill -USR1 31187 ./ssl.sh: line 228: 31187 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9997 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31187 killed at Wed Oct 18 14:37:48 UTC 2023 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9997 starting at Wed Oct 18 14:37:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 31232 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31232 found at Wed Oct 18 14:37:48 UTC 2023 selfserv_9997 with PID 31232 started at Wed Oct 18 14:37:48 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #657: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #658: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #659: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #660: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #661: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #662: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #663: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 31232 at Wed Oct 18 14:37:50 UTC 2023 kill -USR1 31232 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31232 killed at Wed Oct 18 14:37:50 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 14:37:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 31783 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31783 found at Wed Oct 18 14:37:50 UTC 2023 selfserv_9997 with PID 31783 started at Wed Oct 18 14:37:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31783 at Wed Oct 18 14:37:54 UTC 2023 kill -USR1 31783 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31783 killed at Wed Oct 18 14:37:54 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9997 starting at Wed Oct 18 14:37:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32585 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32585 found at Wed Oct 18 14:37:54 UTC 2023 selfserv_9997 with PID 32585 started at Wed Oct 18 14:37:54 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32585 at Wed Oct 18 14:37:54 UTC 2023 kill -USR1 32585 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32585 killed at Wed Oct 18 14:37:54 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32651 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32651 found at Wed Oct 18 14:37:54 UTC 2023 selfserv_9997 with PID 32651 started at Wed Oct 18 14:37:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32651 at Wed Oct 18 14:37:55 UTC 2023 kill -USR1 32651 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32651 killed at Wed Oct 18 14:37:55 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:37:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32703 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32703 found at Wed Oct 18 14:37:55 UTC 2023 selfserv_9997 with PID 32703 started at Wed Oct 18 14:37:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32703 at Wed Oct 18 14:37:55 UTC 2023 kill -USR1 32703 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32703 killed at Wed Oct 18 14:37:55 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32755 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32755 found at Wed Oct 18 14:37:55 UTC 2023 selfserv_9997 with PID 32755 started at Wed Oct 18 14:37:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #786: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32755 at Wed Oct 18 14:37:55 UTC 2023 kill -USR1 32755 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32755 killed at Wed Oct 18 14:37:55 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 339 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 339 found at Wed Oct 18 14:37:55 UTC 2023 selfserv_9997 with PID 339 started at Wed Oct 18 14:37:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #787: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 339 at Wed Oct 18 14:37:55 UTC 2023 kill -USR1 339 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 339 killed at Wed Oct 18 14:37:55 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:37:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 391 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 391 found at Wed Oct 18 14:37:55 UTC 2023 selfserv_9997 with PID 391 started at Wed Oct 18 14:37:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #788: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 391 at Wed Oct 18 14:37:55 UTC 2023 kill -USR1 391 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 391 killed at Wed Oct 18 14:37:55 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 444 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 444 found at Wed Oct 18 14:37:55 UTC 2023 selfserv_9997 with PID 444 started at Wed Oct 18 14:37:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #789: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 444 at Wed Oct 18 14:37:55 UTC 2023 kill -USR1 444 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 444 killed at Wed Oct 18 14:37:55 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 496 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 496 found at Wed Oct 18 14:37:55 UTC 2023 selfserv_9997 with PID 496 started at Wed Oct 18 14:37:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 496 at Wed Oct 18 14:37:56 UTC 2023 kill -USR1 496 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 496 killed at Wed Oct 18 14:37:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:37:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 553 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 553 found at Wed Oct 18 14:37:56 UTC 2023 selfserv_9997 with PID 553 started at Wed Oct 18 14:37:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 553 at Wed Oct 18 14:37:56 UTC 2023 kill -USR1 553 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 553 killed at Wed Oct 18 14:37:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 609 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 609 found at Wed Oct 18 14:37:56 UTC 2023 selfserv_9997 with PID 609 started at Wed Oct 18 14:37:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 609 at Wed Oct 18 14:37:56 UTC 2023 kill -USR1 609 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 609 killed at Wed Oct 18 14:37:56 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 668 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 668 found at Wed Oct 18 14:37:56 UTC 2023 selfserv_9997 with PID 668 started at Wed Oct 18 14:37:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #793: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 668 at Wed Oct 18 14:37:56 UTC 2023 kill -USR1 668 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 668 killed at Wed Oct 18 14:37:56 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:37:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 724 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 724 found at Wed Oct 18 14:37:56 UTC 2023 selfserv_9997 with PID 724 started at Wed Oct 18 14:37:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 724 at Wed Oct 18 14:37:56 UTC 2023 kill -USR1 724 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 724 killed at Wed Oct 18 14:37:56 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 787 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 787 found at Wed Oct 18 14:37:56 UTC 2023 selfserv_9997 with PID 787 started at Wed Oct 18 14:37:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 787 at Wed Oct 18 14:37:57 UTC 2023 kill -USR1 787 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 787 killed at Wed Oct 18 14:37:57 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 856 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 856 found at Wed Oct 18 14:37:57 UTC 2023 selfserv_9997 with PID 856 started at Wed Oct 18 14:37:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 856 at Wed Oct 18 14:37:57 UTC 2023 kill -USR1 856 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 856 killed at Wed Oct 18 14:37:57 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:37:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 925 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 925 found at Wed Oct 18 14:37:57 UTC 2023 selfserv_9997 with PID 925 started at Wed Oct 18 14:37:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 925 at Wed Oct 18 14:37:57 UTC 2023 kill -USR1 925 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 925 killed at Wed Oct 18 14:37:57 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 980 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 980 found at Wed Oct 18 14:37:57 UTC 2023 selfserv_9997 with PID 980 started at Wed Oct 18 14:37:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 980 at Wed Oct 18 14:37:57 UTC 2023 kill -USR1 980 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 980 killed at Wed Oct 18 14:37:57 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1032 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1032 found at Wed Oct 18 14:37:57 UTC 2023 selfserv_9997 with PID 1032 started at Wed Oct 18 14:37:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1032 at Wed Oct 18 14:37:58 UTC 2023 kill -USR1 1032 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1032 killed at Wed Oct 18 14:37:58 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:37:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1086 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1086 found at Wed Oct 18 14:37:58 UTC 2023 selfserv_9997 with PID 1086 started at Wed Oct 18 14:37:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1086 at Wed Oct 18 14:37:58 UTC 2023 kill -USR1 1086 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1086 killed at Wed Oct 18 14:37:58 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1138 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1138 found at Wed Oct 18 14:37:58 UTC 2023 selfserv_9997 with PID 1138 started at Wed Oct 18 14:37:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1138 at Wed Oct 18 14:37:58 UTC 2023 kill -USR1 1138 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1138 killed at Wed Oct 18 14:37:58 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1211 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1211 found at Wed Oct 18 14:37:58 UTC 2023 selfserv_9997 with PID 1211 started at Wed Oct 18 14:37:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1211 at Wed Oct 18 14:37:58 UTC 2023 kill -USR1 1211 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1211 killed at Wed Oct 18 14:37:58 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:37:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1266 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1266 found at Wed Oct 18 14:37:58 UTC 2023 selfserv_9997 with PID 1266 started at Wed Oct 18 14:37:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1266 at Wed Oct 18 14:37:59 UTC 2023 kill -USR1 1266 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1266 killed at Wed Oct 18 14:37:59 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1326 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1326 found at Wed Oct 18 14:37:59 UTC 2023 selfserv_9997 with PID 1326 started at Wed Oct 18 14:37:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1326 at Wed Oct 18 14:37:59 UTC 2023 kill -USR1 1326 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1326 killed at Wed Oct 18 14:37:59 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1379 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1379 found at Wed Oct 18 14:37:59 UTC 2023 selfserv_9997 with PID 1379 started at Wed Oct 18 14:37:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1379 at Wed Oct 18 14:37:59 UTC 2023 kill -USR1 1379 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1379 killed at Wed Oct 18 14:37:59 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:37:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1432 found at Wed Oct 18 14:37:59 UTC 2023 selfserv_9997 with PID 1432 started at Wed Oct 18 14:37:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1432 at Wed Oct 18 14:37:59 UTC 2023 kill -USR1 1432 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1432 killed at Wed Oct 18 14:37:59 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:37:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:37:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1484 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1484 found at Wed Oct 18 14:37:59 UTC 2023 selfserv_9997 with PID 1484 started at Wed Oct 18 14:37:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1484 at Wed Oct 18 14:38:00 UTC 2023 kill -USR1 1484 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1484 killed at Wed Oct 18 14:38:00 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1536 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1536 found at Wed Oct 18 14:38:00 UTC 2023 selfserv_9997 with PID 1536 started at Wed Oct 18 14:38:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1536 at Wed Oct 18 14:38:00 UTC 2023 kill -USR1 1536 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1536 killed at Wed Oct 18 14:38:00 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1588 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1588 found at Wed Oct 18 14:38:00 UTC 2023 selfserv_9997 with PID 1588 started at Wed Oct 18 14:38:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1588 at Wed Oct 18 14:38:00 UTC 2023 kill -USR1 1588 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1588 killed at Wed Oct 18 14:38:00 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1640 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1640 found at Wed Oct 18 14:38:00 UTC 2023 selfserv_9997 with PID 1640 started at Wed Oct 18 14:38:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1640 at Wed Oct 18 14:38:00 UTC 2023 kill -USR1 1640 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1640 killed at Wed Oct 18 14:38:00 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1692 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1692 found at Wed Oct 18 14:38:00 UTC 2023 selfserv_9997 with PID 1692 started at Wed Oct 18 14:38:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #811: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1692 at Wed Oct 18 14:38:01 UTC 2023 kill -USR1 1692 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1692 killed at Wed Oct 18 14:38:01 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1744 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1744 found at Wed Oct 18 14:38:01 UTC 2023 selfserv_9997 with PID 1744 started at Wed Oct 18 14:38:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1744 at Wed Oct 18 14:38:01 UTC 2023 kill -USR1 1744 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1744 killed at Wed Oct 18 14:38:01 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1796 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1796 found at Wed Oct 18 14:38:01 UTC 2023 selfserv_9997 with PID 1796 started at Wed Oct 18 14:38:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1796 at Wed Oct 18 14:38:01 UTC 2023 kill -USR1 1796 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1796 killed at Wed Oct 18 14:38:01 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1848 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1848 found at Wed Oct 18 14:38:01 UTC 2023 selfserv_9997 with PID 1848 started at Wed Oct 18 14:38:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1848 at Wed Oct 18 14:38:01 UTC 2023 kill -USR1 1848 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1848 killed at Wed Oct 18 14:38:01 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1900 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1900 found at Wed Oct 18 14:38:01 UTC 2023 selfserv_9997 with PID 1900 started at Wed Oct 18 14:38:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1900 at Wed Oct 18 14:38:01 UTC 2023 kill -USR1 1900 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1900 killed at Wed Oct 18 14:38:01 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1952 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1952 found at Wed Oct 18 14:38:01 UTC 2023 selfserv_9997 with PID 1952 started at Wed Oct 18 14:38:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1952 at Wed Oct 18 14:38:02 UTC 2023 kill -USR1 1952 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1952 killed at Wed Oct 18 14:38:02 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2004 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2004 found at Wed Oct 18 14:38:02 UTC 2023 selfserv_9997 with PID 2004 started at Wed Oct 18 14:38:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #817: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2004 at Wed Oct 18 14:38:02 UTC 2023 kill -USR1 2004 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2004 killed at Wed Oct 18 14:38:02 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2057 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2057 found at Wed Oct 18 14:38:02 UTC 2023 selfserv_9997 with PID 2057 started at Wed Oct 18 14:38:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #818: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2057 at Wed Oct 18 14:38:02 UTC 2023 kill -USR1 2057 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2057 killed at Wed Oct 18 14:38:02 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2109 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2109 found at Wed Oct 18 14:38:02 UTC 2023 selfserv_9997 with PID 2109 started at Wed Oct 18 14:38:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2109 at Wed Oct 18 14:38:02 UTC 2023 kill -USR1 2109 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2109 killed at Wed Oct 18 14:38:02 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2162 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2162 found at Wed Oct 18 14:38:02 UTC 2023 selfserv_9997 with PID 2162 started at Wed Oct 18 14:38:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2162 at Wed Oct 18 14:38:02 UTC 2023 kill -USR1 2162 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2162 killed at Wed Oct 18 14:38:02 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2214 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2214 found at Wed Oct 18 14:38:02 UTC 2023 selfserv_9997 with PID 2214 started at Wed Oct 18 14:38:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #821: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2214 at Wed Oct 18 14:38:03 UTC 2023 kill -USR1 2214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2214 killed at Wed Oct 18 14:38:03 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2266 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2266 found at Wed Oct 18 14:38:03 UTC 2023 selfserv_9997 with PID 2266 started at Wed Oct 18 14:38:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #822: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2266 at Wed Oct 18 14:38:03 UTC 2023 kill -USR1 2266 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2266 killed at Wed Oct 18 14:38:03 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2318 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2318 found at Wed Oct 18 14:38:03 UTC 2023 selfserv_9997 with PID 2318 started at Wed Oct 18 14:38:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #823: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2318 at Wed Oct 18 14:38:03 UTC 2023 kill -USR1 2318 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2318 killed at Wed Oct 18 14:38:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2370 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2370 found at Wed Oct 18 14:38:03 UTC 2023 selfserv_9997 with PID 2370 started at Wed Oct 18 14:38:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2370 at Wed Oct 18 14:38:03 UTC 2023 kill -USR1 2370 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2370 killed at Wed Oct 18 14:38:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2422 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2422 found at Wed Oct 18 14:38:03 UTC 2023 selfserv_9997 with PID 2422 started at Wed Oct 18 14:38:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2422 at Wed Oct 18 14:38:03 UTC 2023 kill -USR1 2422 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2422 killed at Wed Oct 18 14:38:03 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2475 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2475 found at Wed Oct 18 14:38:03 UTC 2023 selfserv_9997 with PID 2475 started at Wed Oct 18 14:38:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #826: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2475 at Wed Oct 18 14:38:03 UTC 2023 kill -USR1 2475 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2475 killed at Wed Oct 18 14:38:03 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2527 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2527 found at Wed Oct 18 14:38:03 UTC 2023 selfserv_9997 with PID 2527 started at Wed Oct 18 14:38:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2527 at Wed Oct 18 14:38:04 UTC 2023 kill -USR1 2527 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2527 killed at Wed Oct 18 14:38:04 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2579 found at Wed Oct 18 14:38:04 UTC 2023 selfserv_9997 with PID 2579 started at Wed Oct 18 14:38:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #828: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2579 at Wed Oct 18 14:38:04 UTC 2023 kill -USR1 2579 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2579 killed at Wed Oct 18 14:38:04 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2631 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2631 found at Wed Oct 18 14:38:04 UTC 2023 selfserv_9997 with PID 2631 started at Wed Oct 18 14:38:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2631 at Wed Oct 18 14:38:04 UTC 2023 kill -USR1 2631 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2631 killed at Wed Oct 18 14:38:04 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2684 found at Wed Oct 18 14:38:04 UTC 2023 selfserv_9997 with PID 2684 started at Wed Oct 18 14:38:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #830: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2684 at Wed Oct 18 14:38:04 UTC 2023 kill -USR1 2684 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2684 killed at Wed Oct 18 14:38:04 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2736 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2736 found at Wed Oct 18 14:38:04 UTC 2023 selfserv_9997 with PID 2736 started at Wed Oct 18 14:38:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2736 at Wed Oct 18 14:38:04 UTC 2023 kill -USR1 2736 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2736 killed at Wed Oct 18 14:38:04 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2788 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2788 found at Wed Oct 18 14:38:04 UTC 2023 selfserv_9997 with PID 2788 started at Wed Oct 18 14:38:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #832: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2788 at Wed Oct 18 14:38:05 UTC 2023 kill -USR1 2788 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2788 killed at Wed Oct 18 14:38:05 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2840 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2840 found at Wed Oct 18 14:38:05 UTC 2023 selfserv_9997 with PID 2840 started at Wed Oct 18 14:38:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #833: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2840 at Wed Oct 18 14:38:05 UTC 2023 kill -USR1 2840 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2840 killed at Wed Oct 18 14:38:05 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2892 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2892 found at Wed Oct 18 14:38:05 UTC 2023 selfserv_9997 with PID 2892 started at Wed Oct 18 14:38:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #834: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2892 at Wed Oct 18 14:38:05 UTC 2023 kill -USR1 2892 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2892 killed at Wed Oct 18 14:38:05 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2946 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2946 found at Wed Oct 18 14:38:05 UTC 2023 selfserv_9997 with PID 2946 started at Wed Oct 18 14:38:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2946 at Wed Oct 18 14:38:05 UTC 2023 kill -USR1 2946 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2946 killed at Wed Oct 18 14:38:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2998 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2998 found at Wed Oct 18 14:38:05 UTC 2023 selfserv_9997 with PID 2998 started at Wed Oct 18 14:38:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #836: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2998 at Wed Oct 18 14:38:06 UTC 2023 kill -USR1 2998 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2998 killed at Wed Oct 18 14:38:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3050 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3050 found at Wed Oct 18 14:38:06 UTC 2023 selfserv_9997 with PID 3050 started at Wed Oct 18 14:38:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3050 at Wed Oct 18 14:38:06 UTC 2023 kill -USR1 3050 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3050 killed at Wed Oct 18 14:38:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3102 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3102 found at Wed Oct 18 14:38:06 UTC 2023 selfserv_9997 with PID 3102 started at Wed Oct 18 14:38:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #838: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3102 at Wed Oct 18 14:38:06 UTC 2023 kill -USR1 3102 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3102 killed at Wed Oct 18 14:38:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3154 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3154 found at Wed Oct 18 14:38:06 UTC 2023 selfserv_9997 with PID 3154 started at Wed Oct 18 14:38:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3154 at Wed Oct 18 14:38:06 UTC 2023 kill -USR1 3154 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3154 killed at Wed Oct 18 14:38:06 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3206 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3206 found at Wed Oct 18 14:38:06 UTC 2023 selfserv_9997 with PID 3206 started at Wed Oct 18 14:38:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #840: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3206 at Wed Oct 18 14:38:07 UTC 2023 kill -USR1 3206 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3206 killed at Wed Oct 18 14:38:07 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3258 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3258 found at Wed Oct 18 14:38:07 UTC 2023 selfserv_9997 with PID 3258 started at Wed Oct 18 14:38:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3258 at Wed Oct 18 14:38:07 UTC 2023 kill -USR1 3258 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3258 killed at Wed Oct 18 14:38:07 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 14:38:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3317 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3317 found at Wed Oct 18 14:38:07 UTC 2023 selfserv_9997 with PID 3317 started at Wed Oct 18 14:38:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3317 at Wed Oct 18 14:38:07 UTC 2023 kill -USR1 3317 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3317 killed at Wed Oct 18 14:38:07 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 14:38:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3375 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3375 found at Wed Oct 18 14:38:07 UTC 2023 selfserv_9997 with PID 3375 started at Wed Oct 18 14:38:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3375 at Wed Oct 18 14:38:07 UTC 2023 kill -USR1 3375 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3375 killed at Wed Oct 18 14:38:07 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 14:38:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3433 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3433 found at Wed Oct 18 14:38:07 UTC 2023 selfserv_9997 with PID 3433 started at Wed Oct 18 14:38:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #844: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3433 at Wed Oct 18 14:38:07 UTC 2023 kill -USR1 3433 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3433 killed at Wed Oct 18 14:38:07 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 14:38:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3491 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3491 found at Wed Oct 18 14:38:07 UTC 2023 selfserv_9997 with PID 3491 started at Wed Oct 18 14:38:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #845: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3491 at Wed Oct 18 14:38:07 UTC 2023 kill -USR1 3491 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3491 killed at Wed Oct 18 14:38:07 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9997 starting at Wed Oct 18 14:38:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3549 found at Wed Oct 18 14:38:07 UTC 2023 selfserv_9997 with PID 3549 started at Wed Oct 18 14:38:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #846: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3549 at Wed Oct 18 14:38:07 UTC 2023 kill -USR1 3549 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3549 killed at Wed Oct 18 14:38:07 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 14:38:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3607 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3607 found at Wed Oct 18 14:38:07 UTC 2023 selfserv_9997 with PID 3607 started at Wed Oct 18 14:38:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3607 at Wed Oct 18 14:38:07 UTC 2023 kill -USR1 3607 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3607 killed at Wed Oct 18 14:38:07 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3665 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3665 found at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 with PID 3665 started at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #848: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3665 at Wed Oct 18 14:38:08 UTC 2023 kill -USR1 3665 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3665 killed at Wed Oct 18 14:38:08 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9997 starting at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3723 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3723 found at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 with PID 3723 started at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #849: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3723 at Wed Oct 18 14:38:08 UTC 2023 kill -USR1 3723 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3723 killed at Wed Oct 18 14:38:08 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9997 starting at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3781 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3781 found at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 with PID 3781 started at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #850: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3781 at Wed Oct 18 14:38:08 UTC 2023 kill -USR1 3781 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3781 killed at Wed Oct 18 14:38:08 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3839 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3839 found at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 with PID 3839 started at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #851: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3839 at Wed Oct 18 14:38:08 UTC 2023 kill -USR1 3839 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3839 killed at Wed Oct 18 14:38:08 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9997 starting at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3882 found at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 with PID 3882 started at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #784: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3882 at Wed Oct 18 14:38:08 UTC 2023 kill -USR1 3882 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3882 killed at Wed Oct 18 14:38:08 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9997 starting at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3924 found at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 with PID 3924 started at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #785: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9997 with PID 3924 at Wed Oct 18 14:38:08 UTC 2023 kill -USR1 3924 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3924 killed at Wed Oct 18 14:38:08 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9997 starting at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3966 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3966 found at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 with PID 3966 started at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #786: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 3966 at Wed Oct 18 14:38:08 UTC 2023 kill -USR1 3966 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3966 killed at Wed Oct 18 14:38:08 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9997 starting at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4008 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4008 found at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 with PID 4008 started at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #787: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 4008 at Wed Oct 18 14:38:08 UTC 2023 kill -USR1 4008 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4008 killed at Wed Oct 18 14:38:08 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9997 starting at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4050 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4050 found at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 with PID 4050 started at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #788: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 4050 at Wed Oct 18 14:38:08 UTC 2023 kill -USR1 4050 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4050 killed at Wed Oct 18 14:38:08 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9997 starting at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4092 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4092 found at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 with PID 4092 started at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #789: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 4092 at Wed Oct 18 14:38:08 UTC 2023 kill -USR1 4092 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4092 killed at Wed Oct 18 14:38:08 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9997 starting at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4134 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4134 found at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 with PID 4134 started at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #790: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 4134 at Wed Oct 18 14:38:08 UTC 2023 kill -USR1 4134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4134 killed at Wed Oct 18 14:38:08 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9997 starting at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4176 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4176 found at Wed Oct 18 14:38:08 UTC 2023 selfserv_9997 with PID 4176 started at Wed Oct 18 14:38:08 UTC 2023 strsclnt -q -p 9997 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 14:38:08 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 14:38:21 UTC 2023 ssl.sh: #791: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9997 with PID 4176 at Wed Oct 18 14:38:21 UTC 2023 kill -USR1 4176 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4176 killed at Wed Oct 18 14:38:21 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4227 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4227 found at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 with PID 4227 started at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4227 at Wed Oct 18 14:38:21 UTC 2023 kill -USR1 4227 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4227 killed at Wed Oct 18 14:38:21 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4269 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4269 found at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 with PID 4269 started at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #793: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4269 at Wed Oct 18 14:38:21 UTC 2023 kill -USR1 4269 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4269 killed at Wed Oct 18 14:38:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4308 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4308 found at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 with PID 4308 started at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #794: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 4308 at Wed Oct 18 14:38:21 UTC 2023 kill -USR1 4308 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4308 killed at Wed Oct 18 14:38:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4348 found at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 with PID 4348 started at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4348 at Wed Oct 18 14:38:21 UTC 2023 kill -USR1 4348 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4348 killed at Wed Oct 18 14:38:21 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4387 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4387 found at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 with PID 4387 started at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #796: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 4387 at Wed Oct 18 14:38:21 UTC 2023 kill -USR1 4387 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4387 killed at Wed Oct 18 14:38:21 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4426 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4426 found at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 with PID 4426 started at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4426 at Wed Oct 18 14:38:21 UTC 2023 kill -USR1 4426 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4426 killed at Wed Oct 18 14:38:21 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4465 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4465 found at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 with PID 4465 started at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4465 at Wed Oct 18 14:38:21 UTC 2023 kill -USR1 4465 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4465 killed at Wed Oct 18 14:38:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4504 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4504 found at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 with PID 4504 started at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4504 at Wed Oct 18 14:38:21 UTC 2023 kill -USR1 4504 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4504 killed at Wed Oct 18 14:38:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4543 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4543 found at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 with PID 4543 started at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4543 at Wed Oct 18 14:38:21 UTC 2023 kill -USR1 4543 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4543 killed at Wed Oct 18 14:38:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4582 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4582 found at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 with PID 4582 started at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4582 at Wed Oct 18 14:38:21 UTC 2023 kill -USR1 4582 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4582 killed at Wed Oct 18 14:38:21 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4621 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4621 found at Wed Oct 18 14:38:22 UTC 2023 selfserv_9997 with PID 4621 started at Wed Oct 18 14:38:22 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #802: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4621 at Wed Oct 18 14:38:22 UTC 2023 kill -USR1 4621 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4621 killed at Wed Oct 18 14:38:22 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4661 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4661 found at Wed Oct 18 14:38:22 UTC 2023 selfserv_9997 with PID 4661 started at Wed Oct 18 14:38:22 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #803: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4661 at Wed Oct 18 14:38:22 UTC 2023 kill -USR1 4661 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4661 killed at Wed Oct 18 14:38:22 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4701 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4701 found at Wed Oct 18 14:38:22 UTC 2023 selfserv_9997 with PID 4701 started at Wed Oct 18 14:38:22 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #804: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4701 at Wed Oct 18 14:38:22 UTC 2023 kill -USR1 4701 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4701 killed at Wed Oct 18 14:38:22 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4741 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4741 found at Wed Oct 18 14:38:22 UTC 2023 selfserv_9997 with PID 4741 started at Wed Oct 18 14:38:22 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #805: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4741 at Wed Oct 18 14:38:22 UTC 2023 kill -USR1 4741 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4741 killed at Wed Oct 18 14:38:22 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4781 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4781 found at Wed Oct 18 14:38:22 UTC 2023 selfserv_9997 with PID 4781 started at Wed Oct 18 14:38:22 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #806: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4781 at Wed Oct 18 14:38:22 UTC 2023 kill -USR1 4781 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4781 killed at Wed Oct 18 14:38:22 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4821 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4821 found at Wed Oct 18 14:38:22 UTC 2023 selfserv_9997 with PID 4821 started at Wed Oct 18 14:38:22 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #807: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4821 at Wed Oct 18 14:38:22 UTC 2023 kill -USR1 4821 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4821 killed at Wed Oct 18 14:38:22 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4861 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4861 found at Wed Oct 18 14:38:22 UTC 2023 selfserv_9997 with PID 4861 started at Wed Oct 18 14:38:22 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4861 at Wed Oct 18 14:38:22 UTC 2023 kill -USR1 4861 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4861 killed at Wed Oct 18 14:38:22 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4901 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4901 found at Wed Oct 18 14:38:22 UTC 2023 selfserv_9997 with PID 4901 started at Wed Oct 18 14:38:22 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4901 at Wed Oct 18 14:38:22 UTC 2023 kill -USR1 4901 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4901 killed at Wed Oct 18 14:38:22 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4941 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4941 found at Wed Oct 18 14:38:22 UTC 2023 selfserv_9997 with PID 4941 started at Wed Oct 18 14:38:22 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4941 at Wed Oct 18 14:38:22 UTC 2023 kill -USR1 4941 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4941 killed at Wed Oct 18 14:38:22 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9997 starting at Wed Oct 18 14:38:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 4981 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4981 found at Wed Oct 18 14:38:22 UTC 2023 selfserv_9997 with PID 4981 started at Wed Oct 18 14:38:22 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #811: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #812: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #813: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #814: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #815: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #816: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 4981 at Wed Oct 18 14:38:24 UTC 2023 kill -USR1 4981 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4981 killed at Wed Oct 18 14:38:24 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 14:38:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 5531 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5531 found at Wed Oct 18 14:38:24 UTC 2023 selfserv_9997 with PID 5531 started at Wed Oct 18 14:38:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5531 at Wed Oct 18 14:38:28 UTC 2023 kill -USR1 5531 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5531 killed at Wed Oct 18 14:38:28 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6341 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6341 found at Wed Oct 18 14:38:28 UTC 2023 selfserv_9997 with PID 6341 started at Wed Oct 18 14:38:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6341 at Wed Oct 18 14:38:28 UTC 2023 kill -USR1 6341 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6341 killed at Wed Oct 18 14:38:28 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6393 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6393 found at Wed Oct 18 14:38:28 UTC 2023 selfserv_9997 with PID 6393 started at Wed Oct 18 14:38:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6393 at Wed Oct 18 14:38:28 UTC 2023 kill -USR1 6393 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6393 killed at Wed Oct 18 14:38:28 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6445 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6445 found at Wed Oct 18 14:38:28 UTC 2023 selfserv_9997 with PID 6445 started at Wed Oct 18 14:38:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #940: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6445 at Wed Oct 18 14:38:28 UTC 2023 kill -USR1 6445 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6445 killed at Wed Oct 18 14:38:28 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6497 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6497 found at Wed Oct 18 14:38:28 UTC 2023 selfserv_9997 with PID 6497 started at Wed Oct 18 14:38:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #941: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6497 at Wed Oct 18 14:38:28 UTC 2023 kill -USR1 6497 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6497 killed at Wed Oct 18 14:38:28 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6549 found at Wed Oct 18 14:38:28 UTC 2023 selfserv_9997 with PID 6549 started at Wed Oct 18 14:38:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #942: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6549 at Wed Oct 18 14:38:28 UTC 2023 kill -USR1 6549 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6549 killed at Wed Oct 18 14:38:28 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6601 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6601 found at Wed Oct 18 14:38:28 UTC 2023 selfserv_9997 with PID 6601 started at Wed Oct 18 14:38:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6601 at Wed Oct 18 14:38:28 UTC 2023 kill -USR1 6601 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6601 killed at Wed Oct 18 14:38:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6653 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6653 found at Wed Oct 18 14:38:29 UTC 2023 selfserv_9997 with PID 6653 started at Wed Oct 18 14:38:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6653 at Wed Oct 18 14:38:29 UTC 2023 kill -USR1 6653 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6653 killed at Wed Oct 18 14:38:29 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6705 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6705 found at Wed Oct 18 14:38:29 UTC 2023 selfserv_9997 with PID 6705 started at Wed Oct 18 14:38:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6705 at Wed Oct 18 14:38:29 UTC 2023 kill -USR1 6705 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6705 killed at Wed Oct 18 14:38:29 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6757 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6757 found at Wed Oct 18 14:38:29 UTC 2023 selfserv_9997 with PID 6757 started at Wed Oct 18 14:38:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6757 at Wed Oct 18 14:38:29 UTC 2023 kill -USR1 6757 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6757 killed at Wed Oct 18 14:38:29 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6809 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6809 found at Wed Oct 18 14:38:29 UTC 2023 selfserv_9997 with PID 6809 started at Wed Oct 18 14:38:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #947: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6809 at Wed Oct 18 14:38:29 UTC 2023 kill -USR1 6809 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6809 killed at Wed Oct 18 14:38:29 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6861 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6861 found at Wed Oct 18 14:38:29 UTC 2023 selfserv_9997 with PID 6861 started at Wed Oct 18 14:38:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6861 at Wed Oct 18 14:38:29 UTC 2023 kill -USR1 6861 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6861 killed at Wed Oct 18 14:38:29 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6913 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6913 found at Wed Oct 18 14:38:29 UTC 2023 selfserv_9997 with PID 6913 started at Wed Oct 18 14:38:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6913 at Wed Oct 18 14:38:29 UTC 2023 kill -USR1 6913 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6913 killed at Wed Oct 18 14:38:29 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6965 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6965 found at Wed Oct 18 14:38:30 UTC 2023 selfserv_9997 with PID 6965 started at Wed Oct 18 14:38:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6965 at Wed Oct 18 14:38:30 UTC 2023 kill -USR1 6965 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6965 killed at Wed Oct 18 14:38:30 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7017 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7017 found at Wed Oct 18 14:38:30 UTC 2023 selfserv_9997 with PID 7017 started at Wed Oct 18 14:38:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7017 at Wed Oct 18 14:38:30 UTC 2023 kill -USR1 7017 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7017 killed at Wed Oct 18 14:38:30 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7069 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7069 found at Wed Oct 18 14:38:30 UTC 2023 selfserv_9997 with PID 7069 started at Wed Oct 18 14:38:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7069 at Wed Oct 18 14:38:30 UTC 2023 kill -USR1 7069 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7069 killed at Wed Oct 18 14:38:30 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7121 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7121 found at Wed Oct 18 14:38:30 UTC 2023 selfserv_9997 with PID 7121 started at Wed Oct 18 14:38:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #953: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7121 at Wed Oct 18 14:38:30 UTC 2023 kill -USR1 7121 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7121 killed at Wed Oct 18 14:38:30 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7173 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7173 found at Wed Oct 18 14:38:30 UTC 2023 selfserv_9997 with PID 7173 started at Wed Oct 18 14:38:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7173 at Wed Oct 18 14:38:30 UTC 2023 kill -USR1 7173 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7173 killed at Wed Oct 18 14:38:30 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7225 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7225 found at Wed Oct 18 14:38:30 UTC 2023 selfserv_9997 with PID 7225 started at Wed Oct 18 14:38:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #955: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7225 at Wed Oct 18 14:38:30 UTC 2023 kill -USR1 7225 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7225 killed at Wed Oct 18 14:38:30 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7277 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7277 found at Wed Oct 18 14:38:30 UTC 2023 selfserv_9997 with PID 7277 started at Wed Oct 18 14:38:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7277 at Wed Oct 18 14:38:30 UTC 2023 kill -USR1 7277 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7277 killed at Wed Oct 18 14:38:30 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7329 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7329 found at Wed Oct 18 14:38:31 UTC 2023 selfserv_9997 with PID 7329 started at Wed Oct 18 14:38:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7329 at Wed Oct 18 14:38:31 UTC 2023 kill -USR1 7329 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7329 killed at Wed Oct 18 14:38:31 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7381 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7381 found at Wed Oct 18 14:38:31 UTC 2023 selfserv_9997 with PID 7381 started at Wed Oct 18 14:38:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7381 at Wed Oct 18 14:38:31 UTC 2023 kill -USR1 7381 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7381 killed at Wed Oct 18 14:38:31 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7433 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7433 found at Wed Oct 18 14:38:31 UTC 2023 selfserv_9997 with PID 7433 started at Wed Oct 18 14:38:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #959: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7433 at Wed Oct 18 14:38:31 UTC 2023 kill -USR1 7433 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7433 killed at Wed Oct 18 14:38:31 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7485 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7485 found at Wed Oct 18 14:38:31 UTC 2023 selfserv_9997 with PID 7485 started at Wed Oct 18 14:38:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7485 at Wed Oct 18 14:38:31 UTC 2023 kill -USR1 7485 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7485 killed at Wed Oct 18 14:38:31 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7537 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7537 found at Wed Oct 18 14:38:31 UTC 2023 selfserv_9997 with PID 7537 started at Wed Oct 18 14:38:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #961: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7537 at Wed Oct 18 14:38:31 UTC 2023 kill -USR1 7537 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7537 killed at Wed Oct 18 14:38:31 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7589 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7589 found at Wed Oct 18 14:38:31 UTC 2023 selfserv_9997 with PID 7589 started at Wed Oct 18 14:38:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7589 at Wed Oct 18 14:38:32 UTC 2023 kill -USR1 7589 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7589 killed at Wed Oct 18 14:38:32 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7641 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7641 found at Wed Oct 18 14:38:32 UTC 2023 selfserv_9997 with PID 7641 started at Wed Oct 18 14:38:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7641 at Wed Oct 18 14:38:32 UTC 2023 kill -USR1 7641 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7641 killed at Wed Oct 18 14:38:32 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7693 found at Wed Oct 18 14:38:32 UTC 2023 selfserv_9997 with PID 7693 started at Wed Oct 18 14:38:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7693 at Wed Oct 18 14:38:32 UTC 2023 kill -USR1 7693 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7693 killed at Wed Oct 18 14:38:32 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7745 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7745 found at Wed Oct 18 14:38:32 UTC 2023 selfserv_9997 with PID 7745 started at Wed Oct 18 14:38:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #965: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7745 at Wed Oct 18 14:38:32 UTC 2023 kill -USR1 7745 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7745 killed at Wed Oct 18 14:38:32 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7797 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7797 found at Wed Oct 18 14:38:32 UTC 2023 selfserv_9997 with PID 7797 started at Wed Oct 18 14:38:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7797 at Wed Oct 18 14:38:32 UTC 2023 kill -USR1 7797 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7797 killed at Wed Oct 18 14:38:32 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7849 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7849 found at Wed Oct 18 14:38:32 UTC 2023 selfserv_9997 with PID 7849 started at Wed Oct 18 14:38:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #967: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7849 at Wed Oct 18 14:38:33 UTC 2023 kill -USR1 7849 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7849 killed at Wed Oct 18 14:38:33 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7902 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7902 found at Wed Oct 18 14:38:33 UTC 2023 selfserv_9997 with PID 7902 started at Wed Oct 18 14:38:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7902 at Wed Oct 18 14:38:33 UTC 2023 kill -USR1 7902 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7902 killed at Wed Oct 18 14:38:33 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7955 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7955 found at Wed Oct 18 14:38:33 UTC 2023 selfserv_9997 with PID 7955 started at Wed Oct 18 14:38:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7955 at Wed Oct 18 14:38:33 UTC 2023 kill -USR1 7955 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7955 killed at Wed Oct 18 14:38:33 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8007 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8007 found at Wed Oct 18 14:38:33 UTC 2023 selfserv_9997 with PID 8007 started at Wed Oct 18 14:38:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8007 at Wed Oct 18 14:38:33 UTC 2023 kill -USR1 8007 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8007 killed at Wed Oct 18 14:38:33 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8059 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8059 found at Wed Oct 18 14:38:33 UTC 2023 selfserv_9997 with PID 8059 started at Wed Oct 18 14:38:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #971: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8059 at Wed Oct 18 14:38:33 UTC 2023 kill -USR1 8059 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8059 killed at Wed Oct 18 14:38:33 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8111 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8111 found at Wed Oct 18 14:38:33 UTC 2023 selfserv_9997 with PID 8111 started at Wed Oct 18 14:38:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #972: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8111 at Wed Oct 18 14:38:33 UTC 2023 kill -USR1 8111 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8111 killed at Wed Oct 18 14:38:33 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8163 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8163 found at Wed Oct 18 14:38:33 UTC 2023 selfserv_9997 with PID 8163 started at Wed Oct 18 14:38:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #973: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8163 at Wed Oct 18 14:38:34 UTC 2023 kill -USR1 8163 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8163 killed at Wed Oct 18 14:38:34 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8215 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8215 found at Wed Oct 18 14:38:34 UTC 2023 selfserv_9997 with PID 8215 started at Wed Oct 18 14:38:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8215 at Wed Oct 18 14:38:34 UTC 2023 kill -USR1 8215 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8215 killed at Wed Oct 18 14:38:34 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8267 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8267 found at Wed Oct 18 14:38:34 UTC 2023 selfserv_9997 with PID 8267 started at Wed Oct 18 14:38:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #975: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8267 at Wed Oct 18 14:38:34 UTC 2023 kill -USR1 8267 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8267 killed at Wed Oct 18 14:38:34 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8319 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8319 found at Wed Oct 18 14:38:34 UTC 2023 selfserv_9997 with PID 8319 started at Wed Oct 18 14:38:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #976: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8319 at Wed Oct 18 14:38:34 UTC 2023 kill -USR1 8319 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8319 killed at Wed Oct 18 14:38:34 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8371 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8371 found at Wed Oct 18 14:38:34 UTC 2023 selfserv_9997 with PID 8371 started at Wed Oct 18 14:38:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #977: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8371 at Wed Oct 18 14:38:34 UTC 2023 kill -USR1 8371 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8371 killed at Wed Oct 18 14:38:34 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8423 found at Wed Oct 18 14:38:34 UTC 2023 selfserv_9997 with PID 8423 started at Wed Oct 18 14:38:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #978: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8423 at Wed Oct 18 14:38:34 UTC 2023 kill -USR1 8423 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8423 killed at Wed Oct 18 14:38:34 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8475 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8475 found at Wed Oct 18 14:38:34 UTC 2023 selfserv_9997 with PID 8475 started at Wed Oct 18 14:38:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #979: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8475 at Wed Oct 18 14:38:34 UTC 2023 kill -USR1 8475 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8475 killed at Wed Oct 18 14:38:34 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8527 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8527 found at Wed Oct 18 14:38:34 UTC 2023 selfserv_9997 with PID 8527 started at Wed Oct 18 14:38:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #980: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8527 at Wed Oct 18 14:38:34 UTC 2023 kill -USR1 8527 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8527 killed at Wed Oct 18 14:38:34 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8579 found at Wed Oct 18 14:38:35 UTC 2023 selfserv_9997 with PID 8579 started at Wed Oct 18 14:38:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8579 at Wed Oct 18 14:38:35 UTC 2023 kill -USR1 8579 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8579 killed at Wed Oct 18 14:38:35 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8631 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8631 found at Wed Oct 18 14:38:35 UTC 2023 selfserv_9997 with PID 8631 started at Wed Oct 18 14:38:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #982: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8631 at Wed Oct 18 14:38:35 UTC 2023 kill -USR1 8631 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8631 killed at Wed Oct 18 14:38:35 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8683 found at Wed Oct 18 14:38:35 UTC 2023 selfserv_9997 with PID 8683 started at Wed Oct 18 14:38:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #983: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8683 at Wed Oct 18 14:38:35 UTC 2023 kill -USR1 8683 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8683 killed at Wed Oct 18 14:38:35 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8736 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8736 found at Wed Oct 18 14:38:35 UTC 2023 selfserv_9997 with PID 8736 started at Wed Oct 18 14:38:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #984: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8736 at Wed Oct 18 14:38:35 UTC 2023 kill -USR1 8736 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8736 killed at Wed Oct 18 14:38:35 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8788 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8788 found at Wed Oct 18 14:38:35 UTC 2023 selfserv_9997 with PID 8788 started at Wed Oct 18 14:38:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8788 at Wed Oct 18 14:38:35 UTC 2023 kill -USR1 8788 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8788 killed at Wed Oct 18 14:38:35 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8841 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8841 found at Wed Oct 18 14:38:35 UTC 2023 selfserv_9997 with PID 8841 started at Wed Oct 18 14:38:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #986: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8841 at Wed Oct 18 14:38:35 UTC 2023 kill -USR1 8841 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8841 killed at Wed Oct 18 14:38:35 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8894 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8894 found at Wed Oct 18 14:38:35 UTC 2023 selfserv_9997 with PID 8894 started at Wed Oct 18 14:38:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #987: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8894 at Wed Oct 18 14:38:36 UTC 2023 kill -USR1 8894 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8894 killed at Wed Oct 18 14:38:36 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8946 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8946 found at Wed Oct 18 14:38:36 UTC 2023 selfserv_9997 with PID 8946 started at Wed Oct 18 14:38:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #988: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8946 at Wed Oct 18 14:38:36 UTC 2023 kill -USR1 8946 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8946 killed at Wed Oct 18 14:38:36 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8998 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8998 found at Wed Oct 18 14:38:36 UTC 2023 selfserv_9997 with PID 8998 started at Wed Oct 18 14:38:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8998 at Wed Oct 18 14:38:36 UTC 2023 kill -USR1 8998 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8998 killed at Wed Oct 18 14:38:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9050 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9050 found at Wed Oct 18 14:38:36 UTC 2023 selfserv_9997 with PID 9050 started at Wed Oct 18 14:38:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9050 at Wed Oct 18 14:38:36 UTC 2023 kill -USR1 9050 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9050 killed at Wed Oct 18 14:38:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9102 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9102 found at Wed Oct 18 14:38:36 UTC 2023 selfserv_9997 with PID 9102 started at Wed Oct 18 14:38:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9102 at Wed Oct 18 14:38:36 UTC 2023 kill -USR1 9102 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9102 killed at Wed Oct 18 14:38:36 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9154 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9154 found at Wed Oct 18 14:38:36 UTC 2023 selfserv_9997 with PID 9154 started at Wed Oct 18 14:38:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #992: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9154 at Wed Oct 18 14:38:36 UTC 2023 kill -USR1 9154 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9154 killed at Wed Oct 18 14:38:36 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9206 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9206 found at Wed Oct 18 14:38:36 UTC 2023 selfserv_9997 with PID 9206 started at Wed Oct 18 14:38:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #993: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9206 at Wed Oct 18 14:38:37 UTC 2023 kill -USR1 9206 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9206 killed at Wed Oct 18 14:38:37 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9259 found at Wed Oct 18 14:38:37 UTC 2023 selfserv_9997 with PID 9259 started at Wed Oct 18 14:38:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #994: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9259 at Wed Oct 18 14:38:37 UTC 2023 kill -USR1 9259 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9259 killed at Wed Oct 18 14:38:37 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9311 found at Wed Oct 18 14:38:37 UTC 2023 selfserv_9997 with PID 9311 started at Wed Oct 18 14:38:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #995: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9311 at Wed Oct 18 14:38:37 UTC 2023 kill -USR1 9311 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9311 killed at Wed Oct 18 14:38:37 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 14:38:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9393 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9393 found at Wed Oct 18 14:38:37 UTC 2023 selfserv_9997 with PID 9393 started at Wed Oct 18 14:38:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9393 at Wed Oct 18 14:38:37 UTC 2023 kill -USR1 9393 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9393 killed at Wed Oct 18 14:38:37 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9436 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9436 found at Wed Oct 18 14:38:37 UTC 2023 selfserv_9997 with PID 9436 started at Wed Oct 18 14:38:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9436 at Wed Oct 18 14:38:37 UTC 2023 kill -USR1 9436 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9436 killed at Wed Oct 18 14:38:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9475 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9475 found at Wed Oct 18 14:38:37 UTC 2023 selfserv_9997 with PID 9475 started at Wed Oct 18 14:38:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #940: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 9475 at Wed Oct 18 14:38:37 UTC 2023 kill -USR1 9475 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9475 killed at Wed Oct 18 14:38:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9514 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9514 found at Wed Oct 18 14:38:37 UTC 2023 selfserv_9997 with PID 9514 started at Wed Oct 18 14:38:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #941: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9514 at Wed Oct 18 14:38:37 UTC 2023 kill -USR1 9514 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9514 killed at Wed Oct 18 14:38:37 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9553 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9553 found at Wed Oct 18 14:38:37 UTC 2023 selfserv_9997 with PID 9553 started at Wed Oct 18 14:38:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #942: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 9553 at Wed Oct 18 14:38:37 UTC 2023 kill -USR1 9553 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9553 killed at Wed Oct 18 14:38:37 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9592 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9592 found at Wed Oct 18 14:38:37 UTC 2023 selfserv_9997 with PID 9592 started at Wed Oct 18 14:38:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9592 at Wed Oct 18 14:38:37 UTC 2023 kill -USR1 9592 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9592 killed at Wed Oct 18 14:38:37 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9631 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9631 found at Wed Oct 18 14:38:37 UTC 2023 selfserv_9997 with PID 9631 started at Wed Oct 18 14:38:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9631 at Wed Oct 18 14:38:37 UTC 2023 kill -USR1 9631 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9631 killed at Wed Oct 18 14:38:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9671 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9671 found at Wed Oct 18 14:38:37 UTC 2023 selfserv_9997 with PID 9671 started at Wed Oct 18 14:38:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9671 at Wed Oct 18 14:38:37 UTC 2023 kill -USR1 9671 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9671 killed at Wed Oct 18 14:38:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9710 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9710 found at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 with PID 9710 started at Wed Oct 18 14:38:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9710 at Wed Oct 18 14:38:38 UTC 2023 kill -USR1 9710 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9710 killed at Wed Oct 18 14:38:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9749 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9749 found at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 with PID 9749 started at Wed Oct 18 14:38:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9749 at Wed Oct 18 14:38:38 UTC 2023 kill -USR1 9749 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9749 killed at Wed Oct 18 14:38:38 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9788 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9788 found at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 with PID 9788 started at Wed Oct 18 14:38:38 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #948: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9788 at Wed Oct 18 14:38:38 UTC 2023 kill -USR1 9788 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9788 killed at Wed Oct 18 14:38:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9828 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9828 found at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 with PID 9828 started at Wed Oct 18 14:38:38 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #949: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9828 at Wed Oct 18 14:38:38 UTC 2023 kill -USR1 9828 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9828 killed at Wed Oct 18 14:38:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9868 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9868 found at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 with PID 9868 started at Wed Oct 18 14:38:38 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #950: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9868 at Wed Oct 18 14:38:38 UTC 2023 kill -USR1 9868 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9868 killed at Wed Oct 18 14:38:38 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9908 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9908 found at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 with PID 9908 started at Wed Oct 18 14:38:38 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #951: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9908 at Wed Oct 18 14:38:38 UTC 2023 kill -USR1 9908 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9908 killed at Wed Oct 18 14:38:38 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9948 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9948 found at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 with PID 9948 started at Wed Oct 18 14:38:38 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #952: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9948 at Wed Oct 18 14:38:38 UTC 2023 kill -USR1 9948 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9948 killed at Wed Oct 18 14:38:38 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9988 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9988 found at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 with PID 9988 started at Wed Oct 18 14:38:38 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #953: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9988 at Wed Oct 18 14:38:38 UTC 2023 kill -USR1 9988 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9988 killed at Wed Oct 18 14:38:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10028 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10028 found at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 with PID 10028 started at Wed Oct 18 14:38:38 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10028 at Wed Oct 18 14:38:38 UTC 2023 kill -USR1 10028 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10028 killed at Wed Oct 18 14:38:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10068 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10068 found at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 with PID 10068 started at Wed Oct 18 14:38:38 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10068 at Wed Oct 18 14:38:38 UTC 2023 kill -USR1 10068 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10068 killed at Wed Oct 18 14:38:38 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10108 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10108 found at Wed Oct 18 14:38:38 UTC 2023 selfserv_9997 with PID 10108 started at Wed Oct 18 14:38:38 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10108 at Wed Oct 18 14:38:38 UTC 2023 kill -USR1 10108 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10108 killed at Wed Oct 18 14:38:38 UTC 2023 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -fips true -force FIPS mode enabled. ssl.sh: #957: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -list ssl.sh: #958: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #959: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -fips true -force FIPS mode enabled. ssl.sh: #960: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -list ssl.sh: #961: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #962: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9997 starting at Wed Oct 18 14:38:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 10192 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10192 found at Wed Oct 18 14:38:39 UTC 2023 selfserv_9997 with PID 10192 started at Wed Oct 18 14:38:39 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #963: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #964: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #965: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #966: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #967: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #968: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #974: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #975: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #980: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #981: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #986: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #987: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #992: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #993: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #997: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #999: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1002: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1003: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1004: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1005: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1006: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1007: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1008: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1009: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1010: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1011: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1012: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1013: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 10192 at Wed Oct 18 14:38:41 UTC 2023 kill -USR1 10192 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10192 killed at Wed Oct 18 14:38:41 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 14:38:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 10754 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10754 found at Wed Oct 18 14:38:41 UTC 2023 selfserv_9997 with PID 10754 started at Wed Oct 18 14:38:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1014: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1015: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1016: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1017: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1018: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1019: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1020: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1021: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1022: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1023: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1055: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1056: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1061: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1062: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1067: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1068: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1073: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1074: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1076: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1077: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1078: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1079: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1080: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1081: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1082: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1083: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1084: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1085: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1086: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1087: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1088: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1089: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10754 at Wed Oct 18 14:38:45 UTC 2023 kill -USR1 10754 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10754 killed at Wed Oct 18 14:38:45 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9997 starting at Wed Oct 18 14:38:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11556 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11556 found at Wed Oct 18 14:38:45 UTC 2023 selfserv_9997 with PID 11556 started at Wed Oct 18 14:38:45 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11556 at Wed Oct 18 14:38:45 UTC 2023 kill -USR1 11556 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11556 killed at Wed Oct 18 14:38:45 UTC 2023 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11622 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11622 found at Wed Oct 18 14:38:46 UTC 2023 selfserv_9997 with PID 11622 started at Wed Oct 18 14:38:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11622 at Wed Oct 18 14:38:46 UTC 2023 kill -USR1 11622 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11622 killed at Wed Oct 18 14:38:46 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11674 found at Wed Oct 18 14:38:46 UTC 2023 selfserv_9997 with PID 11674 started at Wed Oct 18 14:38:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11674 at Wed Oct 18 14:38:46 UTC 2023 kill -USR1 11674 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11674 killed at Wed Oct 18 14:38:46 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11726 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11726 found at Wed Oct 18 14:38:46 UTC 2023 selfserv_9997 with PID 11726 started at Wed Oct 18 14:38:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1092: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11726 at Wed Oct 18 14:38:46 UTC 2023 kill -USR1 11726 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11726 killed at Wed Oct 18 14:38:46 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11778 found at Wed Oct 18 14:38:46 UTC 2023 selfserv_9997 with PID 11778 started at Wed Oct 18 14:38:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1093: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11778 at Wed Oct 18 14:38:47 UTC 2023 kill -USR1 11778 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11778 killed at Wed Oct 18 14:38:47 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11830 found at Wed Oct 18 14:38:47 UTC 2023 selfserv_9997 with PID 11830 started at Wed Oct 18 14:38:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1094: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11830 at Wed Oct 18 14:38:47 UTC 2023 kill -USR1 11830 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11830 killed at Wed Oct 18 14:38:47 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11882 found at Wed Oct 18 14:38:47 UTC 2023 selfserv_9997 with PID 11882 started at Wed Oct 18 14:38:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1095: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11882 at Wed Oct 18 14:38:47 UTC 2023 kill -USR1 11882 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11882 killed at Wed Oct 18 14:38:47 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11934 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11934 found at Wed Oct 18 14:38:47 UTC 2023 selfserv_9997 with PID 11934 started at Wed Oct 18 14:38:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11934 at Wed Oct 18 14:38:48 UTC 2023 kill -USR1 11934 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11934 killed at Wed Oct 18 14:38:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11986 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11986 found at Wed Oct 18 14:38:48 UTC 2023 selfserv_9997 with PID 11986 started at Wed Oct 18 14:38:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11986 at Wed Oct 18 14:38:48 UTC 2023 kill -USR1 11986 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11986 killed at Wed Oct 18 14:38:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12038 found at Wed Oct 18 14:38:48 UTC 2023 selfserv_9997 with PID 12038 started at Wed Oct 18 14:38:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12038 at Wed Oct 18 14:38:48 UTC 2023 kill -USR1 12038 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12038 killed at Wed Oct 18 14:38:48 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12090 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12090 found at Wed Oct 18 14:38:48 UTC 2023 selfserv_9997 with PID 12090 started at Wed Oct 18 14:38:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1099: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12090 at Wed Oct 18 14:38:49 UTC 2023 kill -USR1 12090 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12090 killed at Wed Oct 18 14:38:49 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12142 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12142 found at Wed Oct 18 14:38:49 UTC 2023 selfserv_9997 with PID 12142 started at Wed Oct 18 14:38:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1100: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12142 at Wed Oct 18 14:38:49 UTC 2023 kill -USR1 12142 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12142 killed at Wed Oct 18 14:38:49 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12194 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12194 found at Wed Oct 18 14:38:49 UTC 2023 selfserv_9997 with PID 12194 started at Wed Oct 18 14:38:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12194 at Wed Oct 18 14:38:49 UTC 2023 kill -USR1 12194 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12194 killed at Wed Oct 18 14:38:49 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12246 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12246 found at Wed Oct 18 14:38:49 UTC 2023 selfserv_9997 with PID 12246 started at Wed Oct 18 14:38:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1102: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12246 at Wed Oct 18 14:38:50 UTC 2023 kill -USR1 12246 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12246 killed at Wed Oct 18 14:38:50 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12298 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12298 found at Wed Oct 18 14:38:50 UTC 2023 selfserv_9997 with PID 12298 started at Wed Oct 18 14:38:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12298 at Wed Oct 18 14:38:50 UTC 2023 kill -USR1 12298 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12298 killed at Wed Oct 18 14:38:50 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12350 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12350 found at Wed Oct 18 14:38:50 UTC 2023 selfserv_9997 with PID 12350 started at Wed Oct 18 14:38:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12350 at Wed Oct 18 14:38:50 UTC 2023 kill -USR1 12350 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12350 killed at Wed Oct 18 14:38:50 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12402 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12402 found at Wed Oct 18 14:38:50 UTC 2023 selfserv_9997 with PID 12402 started at Wed Oct 18 14:38:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1105: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12402 at Wed Oct 18 14:38:51 UTC 2023 kill -USR1 12402 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12402 killed at Wed Oct 18 14:38:51 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12454 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12454 found at Wed Oct 18 14:38:51 UTC 2023 selfserv_9997 with PID 12454 started at Wed Oct 18 14:38:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1106: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12454 at Wed Oct 18 14:38:51 UTC 2023 kill -USR1 12454 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12454 killed at Wed Oct 18 14:38:51 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12506 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12506 found at Wed Oct 18 14:38:51 UTC 2023 selfserv_9997 with PID 12506 started at Wed Oct 18 14:38:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12506 at Wed Oct 18 14:38:51 UTC 2023 kill -USR1 12506 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12506 killed at Wed Oct 18 14:38:51 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12558 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12558 found at Wed Oct 18 14:38:51 UTC 2023 selfserv_9997 with PID 12558 started at Wed Oct 18 14:38:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12558 at Wed Oct 18 14:38:52 UTC 2023 kill -USR1 12558 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12558 killed at Wed Oct 18 14:38:52 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12610 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12610 found at Wed Oct 18 14:38:52 UTC 2023 selfserv_9997 with PID 12610 started at Wed Oct 18 14:38:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12610 at Wed Oct 18 14:38:52 UTC 2023 kill -USR1 12610 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12610 killed at Wed Oct 18 14:38:52 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12662 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12662 found at Wed Oct 18 14:38:52 UTC 2023 selfserv_9997 with PID 12662 started at Wed Oct 18 14:38:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12662 at Wed Oct 18 14:38:52 UTC 2023 kill -USR1 12662 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12662 killed at Wed Oct 18 14:38:52 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12714 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12714 found at Wed Oct 18 14:38:52 UTC 2023 selfserv_9997 with PID 12714 started at Wed Oct 18 14:38:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1111: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12714 at Wed Oct 18 14:38:53 UTC 2023 kill -USR1 12714 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12714 killed at Wed Oct 18 14:38:53 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12766 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12766 found at Wed Oct 18 14:38:53 UTC 2023 selfserv_9997 with PID 12766 started at Wed Oct 18 14:38:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1112: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12766 at Wed Oct 18 14:38:53 UTC 2023 kill -USR1 12766 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12766 killed at Wed Oct 18 14:38:53 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12818 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12818 found at Wed Oct 18 14:38:53 UTC 2023 selfserv_9997 with PID 12818 started at Wed Oct 18 14:38:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12818 at Wed Oct 18 14:38:53 UTC 2023 kill -USR1 12818 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12818 killed at Wed Oct 18 14:38:53 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12870 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12870 found at Wed Oct 18 14:38:54 UTC 2023 selfserv_9997 with PID 12870 started at Wed Oct 18 14:38:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12870 at Wed Oct 18 14:38:54 UTC 2023 kill -USR1 12870 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12870 killed at Wed Oct 18 14:38:54 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12922 found at Wed Oct 18 14:38:54 UTC 2023 selfserv_9997 with PID 12922 started at Wed Oct 18 14:38:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1115: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12922 at Wed Oct 18 14:38:54 UTC 2023 kill -USR1 12922 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12922 killed at Wed Oct 18 14:38:54 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12974 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12974 found at Wed Oct 18 14:38:54 UTC 2023 selfserv_9997 with PID 12974 started at Wed Oct 18 14:38:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1116: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12974 at Wed Oct 18 14:38:55 UTC 2023 kill -USR1 12974 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12974 killed at Wed Oct 18 14:38:55 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13026 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13026 found at Wed Oct 18 14:38:55 UTC 2023 selfserv_9997 with PID 13026 started at Wed Oct 18 14:38:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1117: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13026 at Wed Oct 18 14:38:55 UTC 2023 kill -USR1 13026 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13026 killed at Wed Oct 18 14:38:55 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13078 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13078 found at Wed Oct 18 14:38:55 UTC 2023 selfserv_9997 with PID 13078 started at Wed Oct 18 14:38:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1118: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13078 at Wed Oct 18 14:38:55 UTC 2023 kill -USR1 13078 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13078 killed at Wed Oct 18 14:38:55 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13130 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13130 found at Wed Oct 18 14:38:56 UTC 2023 selfserv_9997 with PID 13130 started at Wed Oct 18 14:38:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1119: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13130 at Wed Oct 18 14:38:56 UTC 2023 kill -USR1 13130 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13130 killed at Wed Oct 18 14:38:56 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13182 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13182 found at Wed Oct 18 14:38:56 UTC 2023 selfserv_9997 with PID 13182 started at Wed Oct 18 14:38:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1120: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13182 at Wed Oct 18 14:38:56 UTC 2023 kill -USR1 13182 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13182 killed at Wed Oct 18 14:38:56 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13234 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13234 found at Wed Oct 18 14:38:56 UTC 2023 selfserv_9997 with PID 13234 started at Wed Oct 18 14:38:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1121: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13234 at Wed Oct 18 14:38:56 UTC 2023 kill -USR1 13234 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13234 killed at Wed Oct 18 14:38:56 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13286 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13286 found at Wed Oct 18 14:38:56 UTC 2023 selfserv_9997 with PID 13286 started at Wed Oct 18 14:38:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1122: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13286 at Wed Oct 18 14:38:57 UTC 2023 kill -USR1 13286 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13286 killed at Wed Oct 18 14:38:57 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13338 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13338 found at Wed Oct 18 14:38:57 UTC 2023 selfserv_9997 with PID 13338 started at Wed Oct 18 14:38:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1123: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13338 at Wed Oct 18 14:38:57 UTC 2023 kill -USR1 13338 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13338 killed at Wed Oct 18 14:38:57 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13390 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13390 found at Wed Oct 18 14:38:57 UTC 2023 selfserv_9997 with PID 13390 started at Wed Oct 18 14:38:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1124: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13390 at Wed Oct 18 14:38:57 UTC 2023 kill -USR1 13390 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13390 killed at Wed Oct 18 14:38:57 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13442 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13442 found at Wed Oct 18 14:38:57 UTC 2023 selfserv_9997 with PID 13442 started at Wed Oct 18 14:38:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1125: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13442 at Wed Oct 18 14:38:58 UTC 2023 kill -USR1 13442 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13442 killed at Wed Oct 18 14:38:58 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13494 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13494 found at Wed Oct 18 14:38:58 UTC 2023 selfserv_9997 with PID 13494 started at Wed Oct 18 14:38:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1126: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13494 at Wed Oct 18 14:38:58 UTC 2023 kill -USR1 13494 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13494 killed at Wed Oct 18 14:38:58 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13546 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13546 found at Wed Oct 18 14:38:58 UTC 2023 selfserv_9997 with PID 13546 started at Wed Oct 18 14:38:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1127: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13546 at Wed Oct 18 14:38:58 UTC 2023 kill -USR1 13546 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13546 killed at Wed Oct 18 14:38:58 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13598 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13598 found at Wed Oct 18 14:38:58 UTC 2023 selfserv_9997 with PID 13598 started at Wed Oct 18 14:38:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1128: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13598 at Wed Oct 18 14:38:58 UTC 2023 kill -USR1 13598 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13598 killed at Wed Oct 18 14:38:58 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13650 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13650 found at Wed Oct 18 14:38:58 UTC 2023 selfserv_9997 with PID 13650 started at Wed Oct 18 14:38:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1129: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13650 at Wed Oct 18 14:38:59 UTC 2023 kill -USR1 13650 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13650 killed at Wed Oct 18 14:38:59 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13702 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13702 found at Wed Oct 18 14:38:59 UTC 2023 selfserv_9997 with PID 13702 started at Wed Oct 18 14:38:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1130: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13702 at Wed Oct 18 14:38:59 UTC 2023 kill -USR1 13702 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13702 killed at Wed Oct 18 14:38:59 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13754 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13754 found at Wed Oct 18 14:38:59 UTC 2023 selfserv_9997 with PID 13754 started at Wed Oct 18 14:38:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1131: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13754 at Wed Oct 18 14:38:59 UTC 2023 kill -USR1 13754 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13754 killed at Wed Oct 18 14:38:59 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:38:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13806 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13806 found at Wed Oct 18 14:38:59 UTC 2023 selfserv_9997 with PID 13806 started at Wed Oct 18 14:38:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1132: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13806 at Wed Oct 18 14:38:59 UTC 2023 kill -USR1 13806 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13806 killed at Wed Oct 18 14:38:59 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:38:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:38:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13858 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13858 found at Wed Oct 18 14:39:00 UTC 2023 selfserv_9997 with PID 13858 started at Wed Oct 18 14:39:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1133: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13858 at Wed Oct 18 14:39:00 UTC 2023 kill -USR1 13858 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13858 killed at Wed Oct 18 14:39:00 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13910 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13910 found at Wed Oct 18 14:39:00 UTC 2023 selfserv_9997 with PID 13910 started at Wed Oct 18 14:39:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1134: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13910 at Wed Oct 18 14:39:00 UTC 2023 kill -USR1 13910 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13910 killed at Wed Oct 18 14:39:00 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13962 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13962 found at Wed Oct 18 14:39:00 UTC 2023 selfserv_9997 with PID 13962 started at Wed Oct 18 14:39:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1135: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13962 at Wed Oct 18 14:39:00 UTC 2023 kill -USR1 13962 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13962 killed at Wed Oct 18 14:39:00 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14014 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14014 found at Wed Oct 18 14:39:00 UTC 2023 selfserv_9997 with PID 14014 started at Wed Oct 18 14:39:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1136: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14014 at Wed Oct 18 14:39:01 UTC 2023 kill -USR1 14014 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14014 killed at Wed Oct 18 14:39:01 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14067 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14067 found at Wed Oct 18 14:39:01 UTC 2023 selfserv_9997 with PID 14067 started at Wed Oct 18 14:39:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1137: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14067 at Wed Oct 18 14:39:01 UTC 2023 kill -USR1 14067 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14067 killed at Wed Oct 18 14:39:01 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14119 found at Wed Oct 18 14:39:01 UTC 2023 selfserv_9997 with PID 14119 started at Wed Oct 18 14:39:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1138: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14119 at Wed Oct 18 14:39:01 UTC 2023 kill -USR1 14119 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14119 killed at Wed Oct 18 14:39:01 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14171 found at Wed Oct 18 14:39:01 UTC 2023 selfserv_9997 with PID 14171 started at Wed Oct 18 14:39:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1139: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14171 at Wed Oct 18 14:39:02 UTC 2023 kill -USR1 14171 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14171 killed at Wed Oct 18 14:39:02 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14223 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14223 found at Wed Oct 18 14:39:02 UTC 2023 selfserv_9997 with PID 14223 started at Wed Oct 18 14:39:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1140: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14223 at Wed Oct 18 14:39:02 UTC 2023 kill -USR1 14223 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14223 killed at Wed Oct 18 14:39:02 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14276 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14276 found at Wed Oct 18 14:39:02 UTC 2023 selfserv_9997 with PID 14276 started at Wed Oct 18 14:39:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1141: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14276 at Wed Oct 18 14:39:02 UTC 2023 kill -USR1 14276 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14276 killed at Wed Oct 18 14:39:02 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14328 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14328 found at Wed Oct 18 14:39:02 UTC 2023 selfserv_9997 with PID 14328 started at Wed Oct 18 14:39:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1142: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14328 at Wed Oct 18 14:39:03 UTC 2023 kill -USR1 14328 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14328 killed at Wed Oct 18 14:39:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14380 found at Wed Oct 18 14:39:03 UTC 2023 selfserv_9997 with PID 14380 started at Wed Oct 18 14:39:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1143: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14380 at Wed Oct 18 14:39:03 UTC 2023 kill -USR1 14380 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14380 killed at Wed Oct 18 14:39:03 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14432 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14432 found at Wed Oct 18 14:39:03 UTC 2023 selfserv_9997 with PID 14432 started at Wed Oct 18 14:39:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1144: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14432 at Wed Oct 18 14:39:03 UTC 2023 kill -USR1 14432 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14432 killed at Wed Oct 18 14:39:03 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14484 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14484 found at Wed Oct 18 14:39:03 UTC 2023 selfserv_9997 with PID 14484 started at Wed Oct 18 14:39:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1145: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14484 at Wed Oct 18 14:39:04 UTC 2023 kill -USR1 14484 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14484 killed at Wed Oct 18 14:39:04 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14536 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14536 found at Wed Oct 18 14:39:04 UTC 2023 selfserv_9997 with PID 14536 started at Wed Oct 18 14:39:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1146: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14536 at Wed Oct 18 14:39:04 UTC 2023 kill -USR1 14536 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14536 killed at Wed Oct 18 14:39:04 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14588 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14588 found at Wed Oct 18 14:39:04 UTC 2023 selfserv_9997 with PID 14588 started at Wed Oct 18 14:39:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1147: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14588 at Wed Oct 18 14:39:04 UTC 2023 kill -USR1 14588 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14588 killed at Wed Oct 18 14:39:04 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 14:39:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14646 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14646 found at Wed Oct 18 14:39:05 UTC 2023 selfserv_9997 with PID 14646 started at Wed Oct 18 14:39:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1148: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14646 at Wed Oct 18 14:39:05 UTC 2023 kill -USR1 14646 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14646 killed at Wed Oct 18 14:39:05 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 14:39:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14705 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14705 found at Wed Oct 18 14:39:05 UTC 2023 selfserv_9997 with PID 14705 started at Wed Oct 18 14:39:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1149: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14705 at Wed Oct 18 14:39:05 UTC 2023 kill -USR1 14705 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14705 killed at Wed Oct 18 14:39:05 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 14:39:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14763 found at Wed Oct 18 14:39:05 UTC 2023 selfserv_9997 with PID 14763 started at Wed Oct 18 14:39:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1150: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14763 at Wed Oct 18 14:39:05 UTC 2023 kill -USR1 14763 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14763 killed at Wed Oct 18 14:39:05 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 14:39:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14821 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14821 found at Wed Oct 18 14:39:05 UTC 2023 selfserv_9997 with PID 14821 started at Wed Oct 18 14:39:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1151: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14821 at Wed Oct 18 14:39:05 UTC 2023 kill -USR1 14821 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14821 killed at Wed Oct 18 14:39:05 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9997 starting at Wed Oct 18 14:39:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14879 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14879 found at Wed Oct 18 14:39:05 UTC 2023 selfserv_9997 with PID 14879 started at Wed Oct 18 14:39:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1152: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14879 at Wed Oct 18 14:39:06 UTC 2023 kill -USR1 14879 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14879 killed at Wed Oct 18 14:39:06 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 14:39:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14937 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14937 found at Wed Oct 18 14:39:06 UTC 2023 selfserv_9997 with PID 14937 started at Wed Oct 18 14:39:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1153: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14937 at Wed Oct 18 14:39:06 UTC 2023 kill -USR1 14937 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14937 killed at Wed Oct 18 14:39:06 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 14:39:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14996 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14996 found at Wed Oct 18 14:39:06 UTC 2023 selfserv_9997 with PID 14996 started at Wed Oct 18 14:39:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1154: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14996 at Wed Oct 18 14:39:06 UTC 2023 kill -USR1 14996 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14996 killed at Wed Oct 18 14:39:06 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9997 starting at Wed Oct 18 14:39:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15054 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15054 found at Wed Oct 18 14:39:06 UTC 2023 selfserv_9997 with PID 15054 started at Wed Oct 18 14:39:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1155: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15054 at Wed Oct 18 14:39:06 UTC 2023 kill -USR1 15054 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15054 killed at Wed Oct 18 14:39:06 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9997 starting at Wed Oct 18 14:39:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15113 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15113 found at Wed Oct 18 14:39:06 UTC 2023 selfserv_9997 with PID 15113 started at Wed Oct 18 14:39:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1156: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15113 at Wed Oct 18 14:39:06 UTC 2023 kill -USR1 15113 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15113 killed at Wed Oct 18 14:39:06 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 14:39:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 14:39:07 UTC 2023 selfserv_9997 with PID 15171 started at Wed Oct 18 14:39:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1157: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15171 at Wed Oct 18 14:39:07 UTC 2023 kill -USR1 15171 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15171 killed at Wed Oct 18 14:39:07 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9997 starting at Wed Oct 18 14:39:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15214 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15214 found at Wed Oct 18 14:39:07 UTC 2023 selfserv_9997 with PID 15214 started at Wed Oct 18 14:39:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1090: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15214 at Wed Oct 18 14:39:07 UTC 2023 kill -USR1 15214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15214 killed at Wed Oct 18 14:39:07 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9997 starting at Wed Oct 18 14:39:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15256 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15256 found at Wed Oct 18 14:39:07 UTC 2023 selfserv_9997 with PID 15256 started at Wed Oct 18 14:39:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1091: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9997 with PID 15256 at Wed Oct 18 14:39:07 UTC 2023 kill -USR1 15256 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15256 killed at Wed Oct 18 14:39:07 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9997 starting at Wed Oct 18 14:39:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15298 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15298 found at Wed Oct 18 14:39:07 UTC 2023 selfserv_9997 with PID 15298 started at Wed Oct 18 14:39:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1092: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 15298 at Wed Oct 18 14:39:07 UTC 2023 kill -USR1 15298 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15298 killed at Wed Oct 18 14:39:07 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9997 starting at Wed Oct 18 14:39:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15340 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15340 found at Wed Oct 18 14:39:07 UTC 2023 selfserv_9997 with PID 15340 started at Wed Oct 18 14:39:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1093: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 15340 at Wed Oct 18 14:39:07 UTC 2023 kill -USR1 15340 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15340 killed at Wed Oct 18 14:39:07 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9997 starting at Wed Oct 18 14:39:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15382 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15382 found at Wed Oct 18 14:39:07 UTC 2023 selfserv_9997 with PID 15382 started at Wed Oct 18 14:39:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1094: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 15382 at Wed Oct 18 14:39:07 UTC 2023 kill -USR1 15382 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15382 killed at Wed Oct 18 14:39:07 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9997 starting at Wed Oct 18 14:39:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15424 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15424 found at Wed Oct 18 14:39:07 UTC 2023 selfserv_9997 with PID 15424 started at Wed Oct 18 14:39:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1095: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 15424 at Wed Oct 18 14:39:07 UTC 2023 kill -USR1 15424 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15424 killed at Wed Oct 18 14:39:07 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9997 starting at Wed Oct 18 14:39:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15466 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15466 found at Wed Oct 18 14:39:07 UTC 2023 selfserv_9997 with PID 15466 started at Wed Oct 18 14:39:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1096: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 15466 at Wed Oct 18 14:39:07 UTC 2023 kill -USR1 15466 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15466 killed at Wed Oct 18 14:39:07 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9997 starting at Wed Oct 18 14:39:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15508 found at Wed Oct 18 14:39:07 UTC 2023 selfserv_9997 with PID 15508 started at Wed Oct 18 14:39:07 UTC 2023 strsclnt -q -p 9997 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 14:39:07 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 14:39:20 UTC 2023 ssl.sh: #1097: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9997 with PID 15508 at Wed Oct 18 14:39:20 UTC 2023 kill -USR1 15508 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15508 killed at Wed Oct 18 14:39:20 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 14:39:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15559 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15559 found at Wed Oct 18 14:39:20 UTC 2023 selfserv_9997 with PID 15559 started at Wed Oct 18 14:39:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15559 at Wed Oct 18 14:39:20 UTC 2023 kill -USR1 15559 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15559 killed at Wed Oct 18 14:39:20 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15601 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15601 found at Wed Oct 18 14:39:20 UTC 2023 selfserv_9997 with PID 15601 started at Wed Oct 18 14:39:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1099: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15601 at Wed Oct 18 14:39:20 UTC 2023 kill -USR1 15601 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15601 killed at Wed Oct 18 14:39:20 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15640 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15640 found at Wed Oct 18 14:39:20 UTC 2023 selfserv_9997 with PID 15640 started at Wed Oct 18 14:39:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1100: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 15640 at Wed Oct 18 14:39:20 UTC 2023 kill -USR1 15640 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15640 killed at Wed Oct 18 14:39:20 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15679 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15679 found at Wed Oct 18 14:39:20 UTC 2023 selfserv_9997 with PID 15679 started at Wed Oct 18 14:39:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15679 at Wed Oct 18 14:39:20 UTC 2023 kill -USR1 15679 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15679 killed at Wed Oct 18 14:39:20 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15718 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15718 found at Wed Oct 18 14:39:20 UTC 2023 selfserv_9997 with PID 15718 started at Wed Oct 18 14:39:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1102: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 15718 at Wed Oct 18 14:39:20 UTC 2023 kill -USR1 15718 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15718 killed at Wed Oct 18 14:39:20 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15757 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15757 found at Wed Oct 18 14:39:21 UTC 2023 selfserv_9997 with PID 15757 started at Wed Oct 18 14:39:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15757 at Wed Oct 18 14:39:21 UTC 2023 kill -USR1 15757 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15757 killed at Wed Oct 18 14:39:21 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15796 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15796 found at Wed Oct 18 14:39:21 UTC 2023 selfserv_9997 with PID 15796 started at Wed Oct 18 14:39:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15796 at Wed Oct 18 14:39:21 UTC 2023 kill -USR1 15796 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15796 killed at Wed Oct 18 14:39:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15835 found at Wed Oct 18 14:39:21 UTC 2023 selfserv_9997 with PID 15835 started at Wed Oct 18 14:39:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15835 at Wed Oct 18 14:39:21 UTC 2023 kill -USR1 15835 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15835 killed at Wed Oct 18 14:39:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15874 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15874 found at Wed Oct 18 14:39:21 UTC 2023 selfserv_9997 with PID 15874 started at Wed Oct 18 14:39:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1106: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15874 at Wed Oct 18 14:39:21 UTC 2023 kill -USR1 15874 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15874 killed at Wed Oct 18 14:39:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15913 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15913 found at Wed Oct 18 14:39:21 UTC 2023 selfserv_9997 with PID 15913 started at Wed Oct 18 14:39:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15913 at Wed Oct 18 14:39:21 UTC 2023 kill -USR1 15913 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15913 killed at Wed Oct 18 14:39:21 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15952 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15952 found at Wed Oct 18 14:39:21 UTC 2023 selfserv_9997 with PID 15952 started at Wed Oct 18 14:39:21 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1108: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15952 at Wed Oct 18 14:39:21 UTC 2023 kill -USR1 15952 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15952 killed at Wed Oct 18 14:39:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15992 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15992 found at Wed Oct 18 14:39:22 UTC 2023 selfserv_9997 with PID 15992 started at Wed Oct 18 14:39:22 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1109: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15992 at Wed Oct 18 14:39:22 UTC 2023 kill -USR1 15992 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15992 killed at Wed Oct 18 14:39:22 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16032 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16032 found at Wed Oct 18 14:39:22 UTC 2023 selfserv_9997 with PID 16032 started at Wed Oct 18 14:39:22 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1110: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16032 at Wed Oct 18 14:39:22 UTC 2023 kill -USR1 16032 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16032 killed at Wed Oct 18 14:39:22 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16072 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16072 found at Wed Oct 18 14:39:22 UTC 2023 selfserv_9997 with PID 16072 started at Wed Oct 18 14:39:22 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1111: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16072 at Wed Oct 18 14:39:22 UTC 2023 kill -USR1 16072 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16072 killed at Wed Oct 18 14:39:22 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16112 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16112 found at Wed Oct 18 14:39:22 UTC 2023 selfserv_9997 with PID 16112 started at Wed Oct 18 14:39:22 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1112: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16112 at Wed Oct 18 14:39:22 UTC 2023 kill -USR1 16112 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16112 killed at Wed Oct 18 14:39:22 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16152 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16152 found at Wed Oct 18 14:39:22 UTC 2023 selfserv_9997 with PID 16152 started at Wed Oct 18 14:39:22 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1113: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16152 at Wed Oct 18 14:39:22 UTC 2023 kill -USR1 16152 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16152 killed at Wed Oct 18 14:39:22 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16193 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16193 found at Wed Oct 18 14:39:22 UTC 2023 selfserv_9997 with PID 16193 started at Wed Oct 18 14:39:22 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1114: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16193 at Wed Oct 18 14:39:22 UTC 2023 kill -USR1 16193 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16193 killed at Wed Oct 18 14:39:22 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16233 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16233 found at Wed Oct 18 14:39:23 UTC 2023 selfserv_9997 with PID 16233 started at Wed Oct 18 14:39:23 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1115: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16233 at Wed Oct 18 14:39:23 UTC 2023 kill -USR1 16233 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16233 killed at Wed Oct 18 14:39:23 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16273 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16273 found at Wed Oct 18 14:39:23 UTC 2023 selfserv_9997 with PID 16273 started at Wed Oct 18 14:39:23 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1116: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16273 at Wed Oct 18 14:39:23 UTC 2023 kill -USR1 16273 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16273 killed at Wed Oct 18 14:39:23 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9997 starting at Wed Oct 18 14:39:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 16313 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16313 found at Wed Oct 18 14:39:23 UTC 2023 selfserv_9997 with PID 16313 started at Wed Oct 18 14:39:23 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1117: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1118: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1119: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1120: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1121: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1122: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1123: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1125: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1126: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1131: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1132: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1137: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1138: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1142: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1144: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1147: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1148: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1149: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1150: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1151: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1152: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1153: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1154: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1155: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1156: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1157: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1158: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1159: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1160: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1161: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1162: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1163: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1164: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1165: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1166: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 16313 at Wed Oct 18 14:39:25 UTC 2023 kill -USR1 16313 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16313 killed at Wed Oct 18 14:39:25 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 14:39:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 16863 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16863 found at Wed Oct 18 14:39:25 UTC 2023 selfserv_9997 with PID 16863 started at Wed Oct 18 14:39:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1190: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1191: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1196: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1197: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1202: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1203: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1208: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1209: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1211: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1212: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1213: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1214: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1215: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1216: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1217: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1218: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1219: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1220: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1221: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1222: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1223: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1224: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1225: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1226: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1227: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1228: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1229: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1230: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1231: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1232: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1233: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16863 at Wed Oct 18 14:39:29 UTC 2023 kill -USR1 16863 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16863 killed at Wed Oct 18 14:39:29 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17674 found at Wed Oct 18 14:39:29 UTC 2023 selfserv_9997 with PID 17674 started at Wed Oct 18 14:39:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17674 at Wed Oct 18 14:39:29 UTC 2023 kill -USR1 17674 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17674 killed at Wed Oct 18 14:39:29 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17728 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17728 found at Wed Oct 18 14:39:29 UTC 2023 selfserv_9997 with PID 17728 started at Wed Oct 18 14:39:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17728 at Wed Oct 18 14:39:29 UTC 2023 kill -USR1 17728 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17728 killed at Wed Oct 18 14:39:29 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17780 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17780 found at Wed Oct 18 14:39:30 UTC 2023 selfserv_9997 with PID 17780 started at Wed Oct 18 14:39:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1246: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17780 at Wed Oct 18 14:39:30 UTC 2023 kill -USR1 17780 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17780 killed at Wed Oct 18 14:39:30 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17834 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17834 found at Wed Oct 18 14:39:30 UTC 2023 selfserv_9997 with PID 17834 started at Wed Oct 18 14:39:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1247: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17834 at Wed Oct 18 14:39:30 UTC 2023 kill -USR1 17834 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17834 killed at Wed Oct 18 14:39:30 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17886 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17886 found at Wed Oct 18 14:39:30 UTC 2023 selfserv_9997 with PID 17886 started at Wed Oct 18 14:39:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1248: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17886 at Wed Oct 18 14:39:30 UTC 2023 kill -USR1 17886 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17886 killed at Wed Oct 18 14:39:30 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17938 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17938 found at Wed Oct 18 14:39:30 UTC 2023 selfserv_9997 with PID 17938 started at Wed Oct 18 14:39:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17938 at Wed Oct 18 14:39:30 UTC 2023 kill -USR1 17938 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17938 killed at Wed Oct 18 14:39:30 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17990 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17990 found at Wed Oct 18 14:39:30 UTC 2023 selfserv_9997 with PID 17990 started at Wed Oct 18 14:39:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17990 at Wed Oct 18 14:39:31 UTC 2023 kill -USR1 17990 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17990 killed at Wed Oct 18 14:39:31 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18042 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18042 found at Wed Oct 18 14:39:31 UTC 2023 selfserv_9997 with PID 18042 started at Wed Oct 18 14:39:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18042 at Wed Oct 18 14:39:31 UTC 2023 kill -USR1 18042 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18042 killed at Wed Oct 18 14:39:31 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18094 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18094 found at Wed Oct 18 14:39:31 UTC 2023 selfserv_9997 with PID 18094 started at Wed Oct 18 14:39:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18094 at Wed Oct 18 14:39:31 UTC 2023 kill -USR1 18094 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18094 killed at Wed Oct 18 14:39:31 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18146 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18146 found at Wed Oct 18 14:39:31 UTC 2023 selfserv_9997 with PID 18146 started at Wed Oct 18 14:39:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1253: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18146 at Wed Oct 18 14:39:32 UTC 2023 kill -USR1 18146 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18146 killed at Wed Oct 18 14:39:32 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18198 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18198 found at Wed Oct 18 14:39:32 UTC 2023 selfserv_9997 with PID 18198 started at Wed Oct 18 14:39:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1254: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18198 at Wed Oct 18 14:39:32 UTC 2023 kill -USR1 18198 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18198 killed at Wed Oct 18 14:39:32 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18250 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18250 found at Wed Oct 18 14:39:32 UTC 2023 selfserv_9997 with PID 18250 started at Wed Oct 18 14:39:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18250 at Wed Oct 18 14:39:32 UTC 2023 kill -USR1 18250 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18250 killed at Wed Oct 18 14:39:32 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18302 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18302 found at Wed Oct 18 14:39:32 UTC 2023 selfserv_9997 with PID 18302 started at Wed Oct 18 14:39:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18302 at Wed Oct 18 14:39:32 UTC 2023 kill -USR1 18302 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18302 killed at Wed Oct 18 14:39:32 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18354 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18354 found at Wed Oct 18 14:39:32 UTC 2023 selfserv_9997 with PID 18354 started at Wed Oct 18 14:39:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18354 at Wed Oct 18 14:39:33 UTC 2023 kill -USR1 18354 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18354 killed at Wed Oct 18 14:39:33 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18406 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18406 found at Wed Oct 18 14:39:33 UTC 2023 selfserv_9997 with PID 18406 started at Wed Oct 18 14:39:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18406 at Wed Oct 18 14:39:33 UTC 2023 kill -USR1 18406 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18406 killed at Wed Oct 18 14:39:33 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18458 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18458 found at Wed Oct 18 14:39:33 UTC 2023 selfserv_9997 with PID 18458 started at Wed Oct 18 14:39:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1259: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18458 at Wed Oct 18 14:39:33 UTC 2023 kill -USR1 18458 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18458 killed at Wed Oct 18 14:39:33 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18510 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18510 found at Wed Oct 18 14:39:33 UTC 2023 selfserv_9997 with PID 18510 started at Wed Oct 18 14:39:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1260: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18510 at Wed Oct 18 14:39:33 UTC 2023 kill -USR1 18510 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18510 killed at Wed Oct 18 14:39:33 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18562 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18562 found at Wed Oct 18 14:39:33 UTC 2023 selfserv_9997 with PID 18562 started at Wed Oct 18 14:39:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1261: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18562 at Wed Oct 18 14:39:34 UTC 2023 kill -USR1 18562 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18562 killed at Wed Oct 18 14:39:34 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18614 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18614 found at Wed Oct 18 14:39:34 UTC 2023 selfserv_9997 with PID 18614 started at Wed Oct 18 14:39:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1262: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18614 at Wed Oct 18 14:39:34 UTC 2023 kill -USR1 18614 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18614 killed at Wed Oct 18 14:39:34 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18667 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18667 found at Wed Oct 18 14:39:34 UTC 2023 selfserv_9997 with PID 18667 started at Wed Oct 18 14:39:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1263: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18667 at Wed Oct 18 14:39:34 UTC 2023 kill -USR1 18667 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18667 killed at Wed Oct 18 14:39:34 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18719 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18719 found at Wed Oct 18 14:39:34 UTC 2023 selfserv_9997 with PID 18719 started at Wed Oct 18 14:39:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1264: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18719 at Wed Oct 18 14:39:34 UTC 2023 kill -USR1 18719 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18719 killed at Wed Oct 18 14:39:34 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18771 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18771 found at Wed Oct 18 14:39:34 UTC 2023 selfserv_9997 with PID 18771 started at Wed Oct 18 14:39:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1265: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18771 at Wed Oct 18 14:39:35 UTC 2023 kill -USR1 18771 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18771 killed at Wed Oct 18 14:39:35 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18824 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18824 found at Wed Oct 18 14:39:35 UTC 2023 selfserv_9997 with PID 18824 started at Wed Oct 18 14:39:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1266: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18824 at Wed Oct 18 14:39:35 UTC 2023 kill -USR1 18824 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18824 killed at Wed Oct 18 14:39:35 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18876 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18876 found at Wed Oct 18 14:39:35 UTC 2023 selfserv_9997 with PID 18876 started at Wed Oct 18 14:39:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1267: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18876 at Wed Oct 18 14:39:35 UTC 2023 kill -USR1 18876 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18876 killed at Wed Oct 18 14:39:35 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18929 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18929 found at Wed Oct 18 14:39:35 UTC 2023 selfserv_9997 with PID 18929 started at Wed Oct 18 14:39:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1268: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18929 at Wed Oct 18 14:39:36 UTC 2023 kill -USR1 18929 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18929 killed at Wed Oct 18 14:39:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18981 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18981 found at Wed Oct 18 14:39:36 UTC 2023 selfserv_9997 with PID 18981 started at Wed Oct 18 14:39:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1269: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18981 at Wed Oct 18 14:39:36 UTC 2023 kill -USR1 18981 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18981 killed at Wed Oct 18 14:39:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19033 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19033 found at Wed Oct 18 14:39:36 UTC 2023 selfserv_9997 with PID 19033 started at Wed Oct 18 14:39:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1270: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19033 at Wed Oct 18 14:39:36 UTC 2023 kill -USR1 19033 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19033 killed at Wed Oct 18 14:39:36 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19085 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19085 found at Wed Oct 18 14:39:36 UTC 2023 selfserv_9997 with PID 19085 started at Wed Oct 18 14:39:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1271: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19085 at Wed Oct 18 14:39:37 UTC 2023 kill -USR1 19085 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19085 killed at Wed Oct 18 14:39:37 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19137 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19137 found at Wed Oct 18 14:39:37 UTC 2023 selfserv_9997 with PID 19137 started at Wed Oct 18 14:39:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1272: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19137 at Wed Oct 18 14:39:37 UTC 2023 kill -USR1 19137 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19137 killed at Wed Oct 18 14:39:37 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19189 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19189 found at Wed Oct 18 14:39:37 UTC 2023 selfserv_9997 with PID 19189 started at Wed Oct 18 14:39:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1273: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19189 at Wed Oct 18 14:39:37 UTC 2023 kill -USR1 19189 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19189 killed at Wed Oct 18 14:39:37 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19241 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19241 found at Wed Oct 18 14:39:37 UTC 2023 selfserv_9997 with PID 19241 started at Wed Oct 18 14:39:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1274: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19241 at Wed Oct 18 14:39:38 UTC 2023 kill -USR1 19241 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19241 killed at Wed Oct 18 14:39:38 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19293 found at Wed Oct 18 14:39:38 UTC 2023 selfserv_9997 with PID 19293 started at Wed Oct 18 14:39:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1275: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19293 at Wed Oct 18 14:39:38 UTC 2023 kill -USR1 19293 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19293 killed at Wed Oct 18 14:39:38 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19345 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19345 found at Wed Oct 18 14:39:38 UTC 2023 selfserv_9997 with PID 19345 started at Wed Oct 18 14:39:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1276: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19345 at Wed Oct 18 14:39:38 UTC 2023 kill -USR1 19345 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19345 killed at Wed Oct 18 14:39:38 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19397 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19397 found at Wed Oct 18 14:39:38 UTC 2023 selfserv_9997 with PID 19397 started at Wed Oct 18 14:39:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1277: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19397 at Wed Oct 18 14:39:38 UTC 2023 kill -USR1 19397 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19397 killed at Wed Oct 18 14:39:38 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19449 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19449 found at Wed Oct 18 14:39:38 UTC 2023 selfserv_9997 with PID 19449 started at Wed Oct 18 14:39:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1278: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19449 at Wed Oct 18 14:39:39 UTC 2023 kill -USR1 19449 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19449 killed at Wed Oct 18 14:39:39 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19501 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19501 found at Wed Oct 18 14:39:39 UTC 2023 selfserv_9997 with PID 19501 started at Wed Oct 18 14:39:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1279: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19501 at Wed Oct 18 14:39:39 UTC 2023 kill -USR1 19501 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19501 killed at Wed Oct 18 14:39:39 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19553 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19553 found at Wed Oct 18 14:39:39 UTC 2023 selfserv_9997 with PID 19553 started at Wed Oct 18 14:39:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1280: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19553 at Wed Oct 18 14:39:39 UTC 2023 kill -USR1 19553 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19553 killed at Wed Oct 18 14:39:39 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19605 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19605 found at Wed Oct 18 14:39:39 UTC 2023 selfserv_9997 with PID 19605 started at Wed Oct 18 14:39:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1281: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19605 at Wed Oct 18 14:39:39 UTC 2023 kill -USR1 19605 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19605 killed at Wed Oct 18 14:39:39 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19657 found at Wed Oct 18 14:39:39 UTC 2023 selfserv_9997 with PID 19657 started at Wed Oct 18 14:39:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1282: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19657 at Wed Oct 18 14:39:39 UTC 2023 kill -USR1 19657 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19657 killed at Wed Oct 18 14:39:39 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19709 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19709 found at Wed Oct 18 14:39:40 UTC 2023 selfserv_9997 with PID 19709 started at Wed Oct 18 14:39:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1283: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19709 at Wed Oct 18 14:39:40 UTC 2023 kill -USR1 19709 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19709 killed at Wed Oct 18 14:39:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19761 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19761 found at Wed Oct 18 14:39:40 UTC 2023 selfserv_9997 with PID 19761 started at Wed Oct 18 14:39:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1284: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19761 at Wed Oct 18 14:39:40 UTC 2023 kill -USR1 19761 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19761 killed at Wed Oct 18 14:39:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19814 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19814 found at Wed Oct 18 14:39:40 UTC 2023 selfserv_9997 with PID 19814 started at Wed Oct 18 14:39:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1285: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19814 at Wed Oct 18 14:39:40 UTC 2023 kill -USR1 19814 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19814 killed at Wed Oct 18 14:39:40 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19871 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19871 found at Wed Oct 18 14:39:40 UTC 2023 selfserv_9997 with PID 19871 started at Wed Oct 18 14:39:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1286: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19871 at Wed Oct 18 14:39:41 UTC 2023 kill -USR1 19871 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19871 killed at Wed Oct 18 14:39:41 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19923 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19923 found at Wed Oct 18 14:39:41 UTC 2023 selfserv_9997 with PID 19923 started at Wed Oct 18 14:39:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1287: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19923 at Wed Oct 18 14:39:41 UTC 2023 kill -USR1 19923 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19923 killed at Wed Oct 18 14:39:41 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19975 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19975 found at Wed Oct 18 14:39:41 UTC 2023 selfserv_9997 with PID 19975 started at Wed Oct 18 14:39:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1288: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19975 at Wed Oct 18 14:39:41 UTC 2023 kill -USR1 19975 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19975 killed at Wed Oct 18 14:39:41 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20036 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20036 found at Wed Oct 18 14:39:41 UTC 2023 selfserv_9997 with PID 20036 started at Wed Oct 18 14:39:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1289: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20036 at Wed Oct 18 14:39:41 UTC 2023 kill -USR1 20036 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20036 killed at Wed Oct 18 14:39:41 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20088 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20088 found at Wed Oct 18 14:39:41 UTC 2023 selfserv_9997 with PID 20088 started at Wed Oct 18 14:39:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1290: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20088 at Wed Oct 18 14:39:42 UTC 2023 kill -USR1 20088 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20088 killed at Wed Oct 18 14:39:42 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20140 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20140 found at Wed Oct 18 14:39:42 UTC 2023 selfserv_9997 with PID 20140 started at Wed Oct 18 14:39:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1291: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20140 at Wed Oct 18 14:39:42 UTC 2023 kill -USR1 20140 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20140 killed at Wed Oct 18 14:39:42 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20192 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20192 found at Wed Oct 18 14:39:42 UTC 2023 selfserv_9997 with PID 20192 started at Wed Oct 18 14:39:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1292: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20192 at Wed Oct 18 14:39:42 UTC 2023 kill -USR1 20192 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20192 killed at Wed Oct 18 14:39:42 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20245 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20245 found at Wed Oct 18 14:39:42 UTC 2023 selfserv_9997 with PID 20245 started at Wed Oct 18 14:39:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1293: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20245 at Wed Oct 18 14:39:42 UTC 2023 kill -USR1 20245 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20245 killed at Wed Oct 18 14:39:42 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20299 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20299 found at Wed Oct 18 14:39:42 UTC 2023 selfserv_9997 with PID 20299 started at Wed Oct 18 14:39:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1294: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20299 at Wed Oct 18 14:39:43 UTC 2023 kill -USR1 20299 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20299 killed at Wed Oct 18 14:39:43 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20352 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20352 found at Wed Oct 18 14:39:43 UTC 2023 selfserv_9997 with PID 20352 started at Wed Oct 18 14:39:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1295: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20352 at Wed Oct 18 14:39:43 UTC 2023 kill -USR1 20352 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20352 killed at Wed Oct 18 14:39:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20404 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20404 found at Wed Oct 18 14:39:43 UTC 2023 selfserv_9997 with PID 20404 started at Wed Oct 18 14:39:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1296: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20404 at Wed Oct 18 14:39:43 UTC 2023 kill -USR1 20404 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20404 killed at Wed Oct 18 14:39:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20456 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20456 found at Wed Oct 18 14:39:43 UTC 2023 selfserv_9997 with PID 20456 started at Wed Oct 18 14:39:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1297: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20456 at Wed Oct 18 14:39:44 UTC 2023 kill -USR1 20456 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20456 killed at Wed Oct 18 14:39:44 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:39:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20508 found at Wed Oct 18 14:39:44 UTC 2023 selfserv_9997 with PID 20508 started at Wed Oct 18 14:39:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1298: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20508 at Wed Oct 18 14:39:44 UTC 2023 kill -USR1 20508 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20508 killed at Wed Oct 18 14:39:44 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20560 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20560 found at Wed Oct 18 14:39:44 UTC 2023 selfserv_9997 with PID 20560 started at Wed Oct 18 14:39:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1299: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20560 at Wed Oct 18 14:39:44 UTC 2023 kill -USR1 20560 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20560 killed at Wed Oct 18 14:39:44 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20612 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20612 found at Wed Oct 18 14:39:44 UTC 2023 selfserv_9997 with PID 20612 started at Wed Oct 18 14:39:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1300: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20612 at Wed Oct 18 14:39:45 UTC 2023 kill -USR1 20612 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20612 killed at Wed Oct 18 14:39:45 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:39:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20664 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20664 found at Wed Oct 18 14:39:45 UTC 2023 selfserv_9997 with PID 20664 started at Wed Oct 18 14:39:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1301: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20664 at Wed Oct 18 14:39:45 UTC 2023 kill -USR1 20664 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20664 killed at Wed Oct 18 14:39:45 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 14:39:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20746 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20746 found at Wed Oct 18 14:39:45 UTC 2023 selfserv_9997 with PID 20746 started at Wed Oct 18 14:39:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20746 at Wed Oct 18 14:39:45 UTC 2023 kill -USR1 20746 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20746 killed at Wed Oct 18 14:39:45 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20788 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20788 found at Wed Oct 18 14:39:45 UTC 2023 selfserv_9997 with PID 20788 started at Wed Oct 18 14:39:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20788 at Wed Oct 18 14:39:45 UTC 2023 kill -USR1 20788 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20788 killed at Wed Oct 18 14:39:45 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20827 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20827 found at Wed Oct 18 14:39:45 UTC 2023 selfserv_9997 with PID 20827 started at Wed Oct 18 14:39:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1246: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 20827 at Wed Oct 18 14:39:45 UTC 2023 kill -USR1 20827 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20827 killed at Wed Oct 18 14:39:45 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20866 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20866 found at Wed Oct 18 14:39:45 UTC 2023 selfserv_9997 with PID 20866 started at Wed Oct 18 14:39:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1247: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20866 at Wed Oct 18 14:39:45 UTC 2023 kill -USR1 20866 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20866 killed at Wed Oct 18 14:39:45 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20905 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20905 found at Wed Oct 18 14:39:46 UTC 2023 selfserv_9997 with PID 20905 started at Wed Oct 18 14:39:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1248: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 20905 at Wed Oct 18 14:39:46 UTC 2023 kill -USR1 20905 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20905 killed at Wed Oct 18 14:39:46 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20944 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20944 found at Wed Oct 18 14:39:46 UTC 2023 selfserv_9997 with PID 20944 started at Wed Oct 18 14:39:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20944 at Wed Oct 18 14:39:46 UTC 2023 kill -USR1 20944 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20944 killed at Wed Oct 18 14:39:46 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20983 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20983 found at Wed Oct 18 14:39:46 UTC 2023 selfserv_9997 with PID 20983 started at Wed Oct 18 14:39:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20983 at Wed Oct 18 14:39:46 UTC 2023 kill -USR1 20983 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20983 killed at Wed Oct 18 14:39:46 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21022 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21022 found at Wed Oct 18 14:39:46 UTC 2023 selfserv_9997 with PID 21022 started at Wed Oct 18 14:39:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21022 at Wed Oct 18 14:39:46 UTC 2023 kill -USR1 21022 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21022 killed at Wed Oct 18 14:39:46 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21061 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21061 found at Wed Oct 18 14:39:46 UTC 2023 selfserv_9997 with PID 21061 started at Wed Oct 18 14:39:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21061 at Wed Oct 18 14:39:46 UTC 2023 kill -USR1 21061 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21061 killed at Wed Oct 18 14:39:46 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21100 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21100 found at Wed Oct 18 14:39:46 UTC 2023 selfserv_9997 with PID 21100 started at Wed Oct 18 14:39:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1253: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21100 at Wed Oct 18 14:39:46 UTC 2023 kill -USR1 21100 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21100 killed at Wed Oct 18 14:39:46 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21139 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21139 found at Wed Oct 18 14:39:47 UTC 2023 selfserv_9997 with PID 21139 started at Wed Oct 18 14:39:47 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1254: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21139 at Wed Oct 18 14:39:47 UTC 2023 kill -USR1 21139 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21139 killed at Wed Oct 18 14:39:47 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21179 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21179 found at Wed Oct 18 14:39:47 UTC 2023 selfserv_9997 with PID 21179 started at Wed Oct 18 14:39:47 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1255: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 21179 at Wed Oct 18 14:39:47 UTC 2023 kill -USR1 21179 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21179 killed at Wed Oct 18 14:39:47 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21219 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21219 found at Wed Oct 18 14:39:47 UTC 2023 selfserv_9997 with PID 21219 started at Wed Oct 18 14:39:47 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1256: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21219 at Wed Oct 18 14:39:47 UTC 2023 kill -USR1 21219 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21219 killed at Wed Oct 18 14:39:47 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21259 found at Wed Oct 18 14:39:47 UTC 2023 selfserv_9997 with PID 21259 started at Wed Oct 18 14:39:47 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1257: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 21259 at Wed Oct 18 14:39:47 UTC 2023 kill -USR1 21259 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21259 killed at Wed Oct 18 14:39:47 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21300 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21300 found at Wed Oct 18 14:39:47 UTC 2023 selfserv_9997 with PID 21300 started at Wed Oct 18 14:39:47 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1258: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21300 at Wed Oct 18 14:39:47 UTC 2023 kill -USR1 21300 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21300 killed at Wed Oct 18 14:39:47 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21340 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21340 found at Wed Oct 18 14:39:47 UTC 2023 selfserv_9997 with PID 21340 started at Wed Oct 18 14:39:47 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1259: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21340 at Wed Oct 18 14:39:47 UTC 2023 kill -USR1 21340 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21340 killed at Wed Oct 18 14:39:47 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 14:39:47 UTC 2023 selfserv_9997 with PID 21380 started at Wed Oct 18 14:39:47 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1260: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21380 at Wed Oct 18 14:39:48 UTC 2023 kill -USR1 21380 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21380 killed at Wed Oct 18 14:39:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21420 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21420 found at Wed Oct 18 14:39:48 UTC 2023 selfserv_9997 with PID 21420 started at Wed Oct 18 14:39:48 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1261: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21420 at Wed Oct 18 14:39:48 UTC 2023 kill -USR1 21420 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21420 killed at Wed Oct 18 14:39:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:39:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21461 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21461 found at Wed Oct 18 14:39:48 UTC 2023 selfserv_9997 with PID 21461 started at Wed Oct 18 14:39:48 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1262: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21461 at Wed Oct 18 14:39:48 UTC 2023 kill -USR1 21461 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21461 killed at Wed Oct 18 14:39:48 UTC 2023 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -fips false -force FIPS mode disabled. ssl.sh: #1263: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/server -list ssl.sh: #1264: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1265: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1266: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_server -list ssl.sh: #1267: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1268: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -fips true -force FIPS mode enabled. ssl.sh: #1269: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -list ssl.sh: #1270: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1271: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1272: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -list ssl.sh: #1273: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1274: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9997 starting at Wed Oct 18 14:39:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 21583 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21583 found at Wed Oct 18 14:39:48 UTC 2023 selfserv_9997 with PID 21583 started at Wed Oct 18 14:39:48 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1275: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1276: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1277: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1278: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1279: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1280: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1281: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1282: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1283: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1284: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1305: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1306: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1308: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1309: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1311: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1312: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1314: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1315: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1317: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1318: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1319: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1320: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1321: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1322: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1323: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1324: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1325: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 21583 at Wed Oct 18 14:39:54 UTC 2023 kill -USR1 21583 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21583 killed at Wed Oct 18 14:39:54 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 14:39:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:39:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 22134 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22134 found at Wed Oct 18 14:39:54 UTC 2023 selfserv_9997 with PID 22134 started at Wed Oct 18 14:39:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1326: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1327: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1328: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1329: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1330: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1331: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1332: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1333: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1334: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1335: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1336: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1337: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1338: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1339: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1340: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1341: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1342: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1343: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1344: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1345: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1346: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1347: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1348: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1349: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1350: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1351: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1352: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1353: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1354: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1355: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1356: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1357: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1358: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1359: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1360: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1361: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1362: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1363: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1364: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1365: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1366: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1367: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1368: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1369: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1370: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1371: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1372: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22134 at Wed Oct 18 14:40:03 UTC 2023 kill -USR1 22134 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22134 killed at Wed Oct 18 14:40:03 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9997 starting at Wed Oct 18 14:40:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:40:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22935 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22935 found at Wed Oct 18 14:40:03 UTC 2023 selfserv_9997 with PID 22935 started at Wed Oct 18 14:40:03 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1402: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1403: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22935 at Wed Oct 18 14:40:03 UTC 2023 kill -USR1 22935 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22935 killed at Wed Oct 18 14:40:03 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:40:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:40:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23013 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23013 found at Wed Oct 18 14:40:03 UTC 2023 selfserv_9997 with PID 23013 started at Wed Oct 18 14:40:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1402: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23013 at Wed Oct 18 14:40:03 UTC 2023 kill -USR1 23013 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23013 killed at Wed Oct 18 14:40:03 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:40:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:40:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23065 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23065 found at Wed Oct 18 14:40:03 UTC 2023 selfserv_9997 with PID 23065 started at Wed Oct 18 14:40:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1403: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23065 at Wed Oct 18 14:40:27 UTC 2023 kill -USR1 23065 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23065 killed at Wed Oct 18 14:40:27 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:40:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:40:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23117 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23117 found at Wed Oct 18 14:40:27 UTC 2023 selfserv_9997 with PID 23117 started at Wed Oct 18 14:40:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1404: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23117 at Wed Oct 18 14:40:27 UTC 2023 kill -USR1 23117 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23117 killed at Wed Oct 18 14:40:27 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:40:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:40:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23181 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23181 found at Wed Oct 18 14:40:28 UTC 2023 selfserv_9997 with PID 23181 started at Wed Oct 18 14:40:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1405: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23181 at Wed Oct 18 14:40:28 UTC 2023 kill -USR1 23181 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23181 killed at Wed Oct 18 14:40:28 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:40:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:40:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23233 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23233 found at Wed Oct 18 14:40:28 UTC 2023 selfserv_9997 with PID 23233 started at Wed Oct 18 14:40:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1406: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23233 at Wed Oct 18 14:40:51 UTC 2023 kill -USR1 23233 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23233 killed at Wed Oct 18 14:40:51 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:40:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:40:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23300 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23300 found at Wed Oct 18 14:40:51 UTC 2023 selfserv_9997 with PID 23300 started at Wed Oct 18 14:40:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1407: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23300 at Wed Oct 18 14:40:51 UTC 2023 kill -USR1 23300 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23300 killed at Wed Oct 18 14:40:51 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:40:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:40:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23364 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23364 found at Wed Oct 18 14:40:51 UTC 2023 selfserv_9997 with PID 23364 started at Wed Oct 18 14:40:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1408: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23364 at Wed Oct 18 14:40:52 UTC 2023 kill -USR1 23364 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23364 killed at Wed Oct 18 14:40:52 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:40:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:40:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23417 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23417 found at Wed Oct 18 14:40:52 UTC 2023 selfserv_9997 with PID 23417 started at Wed Oct 18 14:40:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1409: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23417 at Wed Oct 18 14:41:16 UTC 2023 kill -USR1 23417 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23417 killed at Wed Oct 18 14:41:16 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:41:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:41:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23470 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23470 found at Wed Oct 18 14:41:16 UTC 2023 selfserv_9997 with PID 23470 started at Wed Oct 18 14:41:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23470 at Wed Oct 18 14:41:16 UTC 2023 kill -USR1 23470 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23470 killed at Wed Oct 18 14:41:16 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:41:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:41:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23534 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23534 found at Wed Oct 18 14:41:16 UTC 2023 selfserv_9997 with PID 23534 started at Wed Oct 18 14:41:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1411: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23534 at Wed Oct 18 14:41:16 UTC 2023 kill -USR1 23534 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23534 killed at Wed Oct 18 14:41:16 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:41:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:41:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23586 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23586 found at Wed Oct 18 14:41:17 UTC 2023 selfserv_9997 with PID 23586 started at Wed Oct 18 14:41:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23586 at Wed Oct 18 14:41:41 UTC 2023 kill -USR1 23586 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23586 killed at Wed Oct 18 14:41:41 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:41:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:41:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23643 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23643 found at Wed Oct 18 14:41:41 UTC 2023 selfserv_9997 with PID 23643 started at Wed Oct 18 14:41:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23643 at Wed Oct 18 14:41:41 UTC 2023 kill -USR1 23643 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23643 killed at Wed Oct 18 14:41:41 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:41:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:41:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23707 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23707 found at Wed Oct 18 14:41:41 UTC 2023 selfserv_9997 with PID 23707 started at Wed Oct 18 14:41:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1414: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23707 at Wed Oct 18 14:41:41 UTC 2023 kill -USR1 23707 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23707 killed at Wed Oct 18 14:41:41 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:41:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:41:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23767 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23767 found at Wed Oct 18 14:41:41 UTC 2023 selfserv_9997 with PID 23767 started at Wed Oct 18 14:41:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1415: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23767 at Wed Oct 18 14:42:05 UTC 2023 kill -USR1 23767 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23767 killed at Wed Oct 18 14:42:05 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:42:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:42:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23821 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23821 found at Wed Oct 18 14:42:05 UTC 2023 selfserv_9997 with PID 23821 started at Wed Oct 18 14:42:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23821 at Wed Oct 18 14:42:05 UTC 2023 kill -USR1 23821 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23821 killed at Wed Oct 18 14:42:05 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:42:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:42:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23878 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23878 found at Wed Oct 18 14:42:05 UTC 2023 selfserv_9997 with PID 23878 started at Wed Oct 18 14:42:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23878 at Wed Oct 18 14:42:05 UTC 2023 kill -USR1 23878 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23878 killed at Wed Oct 18 14:42:05 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:42:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:42:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23934 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23934 found at Wed Oct 18 14:42:05 UTC 2023 selfserv_9997 with PID 23934 started at Wed Oct 18 14:42:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1418: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23934 at Wed Oct 18 14:42:05 UTC 2023 kill -USR1 23934 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23934 killed at Wed Oct 18 14:42:05 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:42:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:42:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23990 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23990 found at Wed Oct 18 14:42:05 UTC 2023 selfserv_9997 with PID 23990 started at Wed Oct 18 14:42:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23990 at Wed Oct 18 14:42:06 UTC 2023 kill -USR1 23990 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23990 killed at Wed Oct 18 14:42:06 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:42:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:42:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24050 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24050 found at Wed Oct 18 14:42:06 UTC 2023 selfserv_9997 with PID 24050 started at Wed Oct 18 14:42:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1420: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24050 at Wed Oct 18 14:42:30 UTC 2023 kill -USR1 24050 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24050 killed at Wed Oct 18 14:42:30 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:42:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:42:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24102 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24102 found at Wed Oct 18 14:42:30 UTC 2023 selfserv_9997 with PID 24102 started at Wed Oct 18 14:42:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1421: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24102 at Wed Oct 18 14:42:30 UTC 2023 kill -USR1 24102 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24102 killed at Wed Oct 18 14:42:30 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:42:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:42:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24162 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24162 found at Wed Oct 18 14:42:30 UTC 2023 selfserv_9997 with PID 24162 started at Wed Oct 18 14:42:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1422: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24162 at Wed Oct 18 14:42:53 UTC 2023 kill -USR1 24162 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24162 killed at Wed Oct 18 14:42:53 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:42:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:42:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24229 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24229 found at Wed Oct 18 14:42:53 UTC 2023 selfserv_9997 with PID 24229 started at Wed Oct 18 14:42:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24229 at Wed Oct 18 14:42:54 UTC 2023 kill -USR1 24229 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24229 killed at Wed Oct 18 14:42:54 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:42:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:42:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24290 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24290 found at Wed Oct 18 14:42:54 UTC 2023 selfserv_9997 with PID 24290 started at Wed Oct 18 14:42:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1424: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24290 at Wed Oct 18 14:43:18 UTC 2023 kill -USR1 24290 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24290 killed at Wed Oct 18 14:43:18 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:43:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:43:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24342 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24342 found at Wed Oct 18 14:43:18 UTC 2023 selfserv_9997 with PID 24342 started at Wed Oct 18 14:43:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24342 at Wed Oct 18 14:43:18 UTC 2023 kill -USR1 24342 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24342 killed at Wed Oct 18 14:43:18 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:43:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:43:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24402 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24402 found at Wed Oct 18 14:43:18 UTC 2023 selfserv_9997 with PID 24402 started at Wed Oct 18 14:43:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1426: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24402 at Wed Oct 18 14:43:42 UTC 2023 kill -USR1 24402 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24402 killed at Wed Oct 18 14:43:42 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:43:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:43:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24467 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24467 found at Wed Oct 18 14:43:42 UTC 2023 selfserv_9997 with PID 24467 started at Wed Oct 18 14:43:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1427: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24467 at Wed Oct 18 14:43:42 UTC 2023 kill -USR1 24467 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24467 killed at Wed Oct 18 14:43:42 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:43:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:43:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24529 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24529 found at Wed Oct 18 14:43:42 UTC 2023 selfserv_9997 with PID 24529 started at Wed Oct 18 14:43:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1428: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24529 at Wed Oct 18 14:44:06 UTC 2023 kill -USR1 24529 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24529 killed at Wed Oct 18 14:44:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:44:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24583 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24583 found at Wed Oct 18 14:44:06 UTC 2023 selfserv_9997 with PID 24583 started at Wed Oct 18 14:44:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1429: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24583 at Wed Oct 18 14:44:06 UTC 2023 kill -USR1 24583 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24583 killed at Wed Oct 18 14:44:06 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:44:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24635 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24635 found at Wed Oct 18 14:44:06 UTC 2023 selfserv_9997 with PID 24635 started at Wed Oct 18 14:44:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1430: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24635 at Wed Oct 18 14:44:06 UTC 2023 kill -USR1 24635 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24635 killed at Wed Oct 18 14:44:06 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:44:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24687 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24687 found at Wed Oct 18 14:44:06 UTC 2023 selfserv_9997 with PID 24687 started at Wed Oct 18 14:44:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1431: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24687 at Wed Oct 18 14:44:07 UTC 2023 kill -USR1 24687 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24687 killed at Wed Oct 18 14:44:07 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 14:44:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24745 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24745 found at Wed Oct 18 14:44:07 UTC 2023 selfserv_9997 with PID 24745 started at Wed Oct 18 14:44:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1432: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24745 at Wed Oct 18 14:44:07 UTC 2023 kill -USR1 24745 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24745 killed at Wed Oct 18 14:44:07 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 14:44:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24803 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24803 found at Wed Oct 18 14:44:07 UTC 2023 selfserv_9997 with PID 24803 started at Wed Oct 18 14:44:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1433: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24803 at Wed Oct 18 14:44:07 UTC 2023 kill -USR1 24803 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24803 killed at Wed Oct 18 14:44:07 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 14:44:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24862 found at Wed Oct 18 14:44:07 UTC 2023 selfserv_9997 with PID 24862 started at Wed Oct 18 14:44:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1434: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24862 at Wed Oct 18 14:44:07 UTC 2023 kill -USR1 24862 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24862 killed at Wed Oct 18 14:44:07 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 14:44:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24920 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24920 found at Wed Oct 18 14:44:07 UTC 2023 selfserv_9997 with PID 24920 started at Wed Oct 18 14:44:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1435: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24920 at Wed Oct 18 14:44:07 UTC 2023 kill -USR1 24920 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24920 killed at Wed Oct 18 14:44:07 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9997 starting at Wed Oct 18 14:44:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24978 found at Wed Oct 18 14:44:07 UTC 2023 selfserv_9997 with PID 24978 started at Wed Oct 18 14:44:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1436: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24978 at Wed Oct 18 14:44:07 UTC 2023 kill -USR1 24978 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24978 killed at Wed Oct 18 14:44:07 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 14:44:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25036 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25036 found at Wed Oct 18 14:44:08 UTC 2023 selfserv_9997 with PID 25036 started at Wed Oct 18 14:44:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1437: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25036 at Wed Oct 18 14:44:08 UTC 2023 kill -USR1 25036 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25036 killed at Wed Oct 18 14:44:08 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 14:44:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25095 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25095 found at Wed Oct 18 14:44:08 UTC 2023 selfserv_9997 with PID 25095 started at Wed Oct 18 14:44:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1438: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25095 at Wed Oct 18 14:44:08 UTC 2023 kill -USR1 25095 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25095 killed at Wed Oct 18 14:44:08 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9997 starting at Wed Oct 18 14:44:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25154 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25154 found at Wed Oct 18 14:44:08 UTC 2023 selfserv_9997 with PID 25154 started at Wed Oct 18 14:44:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1439: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25154 at Wed Oct 18 14:44:08 UTC 2023 kill -USR1 25154 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25154 killed at Wed Oct 18 14:44:08 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9997 starting at Wed Oct 18 14:44:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25212 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25212 found at Wed Oct 18 14:44:08 UTC 2023 selfserv_9997 with PID 25212 started at Wed Oct 18 14:44:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1440: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25212 at Wed Oct 18 14:44:08 UTC 2023 kill -USR1 25212 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25212 killed at Wed Oct 18 14:44:08 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 14:44:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25270 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25270 found at Wed Oct 18 14:44:08 UTC 2023 selfserv_9997 with PID 25270 started at Wed Oct 18 14:44:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1441: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25270 at Wed Oct 18 14:44:08 UTC 2023 kill -USR1 25270 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25270 killed at Wed Oct 18 14:44:08 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9997 starting at Wed Oct 18 14:44:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25312 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25312 found at Wed Oct 18 14:44:08 UTC 2023 selfserv_9997 with PID 25312 started at Wed Oct 18 14:44:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1402: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25312 at Wed Oct 18 14:44:08 UTC 2023 kill -USR1 25312 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25312 killed at Wed Oct 18 14:44:08 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9997 starting at Wed Oct 18 14:44:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25355 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25355 found at Wed Oct 18 14:44:08 UTC 2023 selfserv_9997 with PID 25355 started at Wed Oct 18 14:44:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1403: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9997 with PID 25355 at Wed Oct 18 14:44:09 UTC 2023 kill -USR1 25355 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25355 killed at Wed Oct 18 14:44:09 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9997 starting at Wed Oct 18 14:44:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25397 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25397 found at Wed Oct 18 14:44:09 UTC 2023 selfserv_9997 with PID 25397 started at Wed Oct 18 14:44:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1404: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 25397 at Wed Oct 18 14:44:09 UTC 2023 kill -USR1 25397 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25397 killed at Wed Oct 18 14:44:09 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9997 starting at Wed Oct 18 14:44:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25439 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25439 found at Wed Oct 18 14:44:09 UTC 2023 selfserv_9997 with PID 25439 started at Wed Oct 18 14:44:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1405: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 25439 at Wed Oct 18 14:44:09 UTC 2023 kill -USR1 25439 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25439 killed at Wed Oct 18 14:44:09 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9997 starting at Wed Oct 18 14:44:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25481 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25481 found at Wed Oct 18 14:44:09 UTC 2023 selfserv_9997 with PID 25481 started at Wed Oct 18 14:44:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1406: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 25481 at Wed Oct 18 14:44:09 UTC 2023 kill -USR1 25481 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25481 killed at Wed Oct 18 14:44:09 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9997 starting at Wed Oct 18 14:44:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25523 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25523 found at Wed Oct 18 14:44:09 UTC 2023 selfserv_9997 with PID 25523 started at Wed Oct 18 14:44:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1407: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 25523 at Wed Oct 18 14:44:09 UTC 2023 kill -USR1 25523 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25523 killed at Wed Oct 18 14:44:09 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9997 starting at Wed Oct 18 14:44:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25565 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25565 found at Wed Oct 18 14:44:09 UTC 2023 selfserv_9997 with PID 25565 started at Wed Oct 18 14:44:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1408: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 25565 at Wed Oct 18 14:44:09 UTC 2023 kill -USR1 25565 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25565 killed at Wed Oct 18 14:44:09 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9997 starting at Wed Oct 18 14:44:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25607 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25607 found at Wed Oct 18 14:44:09 UTC 2023 selfserv_9997 with PID 25607 started at Wed Oct 18 14:44:09 UTC 2023 strsclnt -q -p 9997 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 14:44:09 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 14:44:22 UTC 2023 ssl.sh: #1409: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9997 with PID 25607 at Wed Oct 18 14:44:22 UTC 2023 kill -USR1 25607 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25607 killed at Wed Oct 18 14:44:22 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 14:44:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25658 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25658 found at Wed Oct 18 14:44:22 UTC 2023 selfserv_9997 with PID 25658 started at Wed Oct 18 14:44:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25658 at Wed Oct 18 14:44:22 UTC 2023 kill -USR1 25658 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25658 killed at Wed Oct 18 14:44:22 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:44:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25700 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25700 found at Wed Oct 18 14:44:22 UTC 2023 selfserv_9997 with PID 25700 started at Wed Oct 18 14:44:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1411: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25700 at Wed Oct 18 14:44:22 UTC 2023 kill -USR1 25700 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25700 killed at Wed Oct 18 14:44:22 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:44:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25739 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25739 found at Wed Oct 18 14:44:22 UTC 2023 selfserv_9997 with PID 25739 started at Wed Oct 18 14:44:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 25739 at Wed Oct 18 14:44:22 UTC 2023 kill -USR1 25739 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25739 killed at Wed Oct 18 14:44:22 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:44:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25778 found at Wed Oct 18 14:44:22 UTC 2023 selfserv_9997 with PID 25778 started at Wed Oct 18 14:44:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25778 at Wed Oct 18 14:44:22 UTC 2023 kill -USR1 25778 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25778 killed at Wed Oct 18 14:44:22 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:44:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25817 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25817 found at Wed Oct 18 14:44:22 UTC 2023 selfserv_9997 with PID 25817 started at Wed Oct 18 14:44:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1414: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 25817 at Wed Oct 18 14:44:22 UTC 2023 kill -USR1 25817 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25817 killed at Wed Oct 18 14:44:22 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:44:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25856 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25856 found at Wed Oct 18 14:44:22 UTC 2023 selfserv_9997 with PID 25856 started at Wed Oct 18 14:44:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1415: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25856 at Wed Oct 18 14:44:22 UTC 2023 kill -USR1 25856 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25856 killed at Wed Oct 18 14:44:22 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:44:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25895 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25895 found at Wed Oct 18 14:44:22 UTC 2023 selfserv_9997 with PID 25895 started at Wed Oct 18 14:44:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25895 at Wed Oct 18 14:44:23 UTC 2023 kill -USR1 25895 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25895 killed at Wed Oct 18 14:44:23 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:44:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25934 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25934 found at Wed Oct 18 14:44:23 UTC 2023 selfserv_9997 with PID 25934 started at Wed Oct 18 14:44:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25934 at Wed Oct 18 14:44:23 UTC 2023 kill -USR1 25934 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25934 killed at Wed Oct 18 14:44:23 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:44:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25974 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25974 found at Wed Oct 18 14:44:23 UTC 2023 selfserv_9997 with PID 25974 started at Wed Oct 18 14:44:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1418: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25974 at Wed Oct 18 14:44:23 UTC 2023 kill -USR1 25974 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25974 killed at Wed Oct 18 14:44:23 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:44:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26013 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26013 found at Wed Oct 18 14:44:23 UTC 2023 selfserv_9997 with PID 26013 started at Wed Oct 18 14:44:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26013 at Wed Oct 18 14:44:23 UTC 2023 kill -USR1 26013 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26013 killed at Wed Oct 18 14:44:23 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:44:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26052 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26052 found at Wed Oct 18 14:44:23 UTC 2023 selfserv_9997 with PID 26052 started at Wed Oct 18 14:44:23 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1420: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26052 at Wed Oct 18 14:44:23 UTC 2023 kill -USR1 26052 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26052 killed at Wed Oct 18 14:44:23 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:44:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26092 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26092 found at Wed Oct 18 14:44:23 UTC 2023 selfserv_9997 with PID 26092 started at Wed Oct 18 14:44:23 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1421: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 26092 at Wed Oct 18 14:44:23 UTC 2023 kill -USR1 26092 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26092 killed at Wed Oct 18 14:44:23 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:44:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26132 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26132 found at Wed Oct 18 14:44:23 UTC 2023 selfserv_9997 with PID 26132 started at Wed Oct 18 14:44:23 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1422: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26132 at Wed Oct 18 14:44:23 UTC 2023 kill -USR1 26132 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26132 killed at Wed Oct 18 14:44:23 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:44:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26172 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26172 found at Wed Oct 18 14:44:23 UTC 2023 selfserv_9997 with PID 26172 started at Wed Oct 18 14:44:23 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1423: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 26172 at Wed Oct 18 14:44:23 UTC 2023 kill -USR1 26172 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26172 killed at Wed Oct 18 14:44:23 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:44:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26212 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26212 found at Wed Oct 18 14:44:23 UTC 2023 selfserv_9997 with PID 26212 started at Wed Oct 18 14:44:23 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1424: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26212 at Wed Oct 18 14:44:23 UTC 2023 kill -USR1 26212 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26212 killed at Wed Oct 18 14:44:24 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:44:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26253 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26253 found at Wed Oct 18 14:44:24 UTC 2023 selfserv_9997 with PID 26253 started at Wed Oct 18 14:44:24 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1425: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26253 at Wed Oct 18 14:44:24 UTC 2023 kill -USR1 26253 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26253 killed at Wed Oct 18 14:44:24 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:44:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26293 found at Wed Oct 18 14:44:24 UTC 2023 selfserv_9997 with PID 26293 started at Wed Oct 18 14:44:24 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1426: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26293 at Wed Oct 18 14:44:24 UTC 2023 kill -USR1 26293 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26293 killed at Wed Oct 18 14:44:24 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:44:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26333 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26333 found at Wed Oct 18 14:44:24 UTC 2023 selfserv_9997 with PID 26333 started at Wed Oct 18 14:44:24 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1427: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26333 at Wed Oct 18 14:44:24 UTC 2023 kill -USR1 26333 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26333 killed at Wed Oct 18 14:44:24 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:44:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26373 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26373 found at Wed Oct 18 14:44:24 UTC 2023 selfserv_9997 with PID 26373 started at Wed Oct 18 14:44:24 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1428: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26373 at Wed Oct 18 14:44:24 UTC 2023 kill -USR1 26373 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26373 killed at Wed Oct 18 14:44:24 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9997 starting at Wed Oct 18 14:44:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 26413 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26413 found at Wed Oct 18 14:44:24 UTC 2023 selfserv_9997 with PID 26413 started at Wed Oct 18 14:44:24 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1429: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1430: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1431: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1432: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1433: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1434: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 26413 at Wed Oct 18 14:44:30 UTC 2023 kill -USR1 26413 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26413 killed at Wed Oct 18 14:44:30 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 14:44:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 26963 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26963 found at Wed Oct 18 14:44:30 UTC 2023 selfserv_9997 with PID 26963 started at Wed Oct 18 14:44:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1502: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1503: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1504: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1505: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1506: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1507: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1508: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1509: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1510: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1511: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1512: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1513: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1514: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1515: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1516: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1517: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1518: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1519: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1520: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1521: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1522: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1523: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1524: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1525: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1526: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26963 at Wed Oct 18 14:44:38 UTC 2023 kill -USR1 26963 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26963 killed at Wed Oct 18 14:44:38 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:44:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27788 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27788 found at Wed Oct 18 14:44:38 UTC 2023 selfserv_9997 with PID 27788 started at Wed Oct 18 14:44:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1556: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27788 at Wed Oct 18 14:44:38 UTC 2023 kill -USR1 27788 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27788 killed at Wed Oct 18 14:44:38 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:44:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:44:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27840 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27840 found at Wed Oct 18 14:44:38 UTC 2023 selfserv_9997 with PID 27840 started at Wed Oct 18 14:44:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1557: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27840 at Wed Oct 18 14:45:03 UTC 2023 kill -USR1 27840 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27840 killed at Wed Oct 18 14:45:03 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:45:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:45:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27908 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27908 found at Wed Oct 18 14:45:03 UTC 2023 selfserv_9997 with PID 27908 started at Wed Oct 18 14:45:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1558: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27908 at Wed Oct 18 14:45:03 UTC 2023 kill -USR1 27908 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27908 killed at Wed Oct 18 14:45:03 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:45:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:45:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27972 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27972 found at Wed Oct 18 14:45:03 UTC 2023 selfserv_9997 with PID 27972 started at Wed Oct 18 14:45:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1559: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27972 at Wed Oct 18 14:45:03 UTC 2023 kill -USR1 27972 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27972 killed at Wed Oct 18 14:45:03 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:45:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:45:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28024 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28024 found at Wed Oct 18 14:45:04 UTC 2023 selfserv_9997 with PID 28024 started at Wed Oct 18 14:45:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1560: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28024 at Wed Oct 18 14:45:27 UTC 2023 kill -USR1 28024 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28024 killed at Wed Oct 18 14:45:27 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:45:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:45:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28076 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28076 found at Wed Oct 18 14:45:27 UTC 2023 selfserv_9997 with PID 28076 started at Wed Oct 18 14:45:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28076 at Wed Oct 18 14:45:27 UTC 2023 kill -USR1 28076 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28076 killed at Wed Oct 18 14:45:27 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:45:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:45:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28140 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28140 found at Wed Oct 18 14:45:27 UTC 2023 selfserv_9997 with PID 28140 started at Wed Oct 18 14:45:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1562: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28140 at Wed Oct 18 14:45:27 UTC 2023 kill -USR1 28140 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28140 killed at Wed Oct 18 14:45:27 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:45:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:45:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28192 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28192 found at Wed Oct 18 14:45:27 UTC 2023 selfserv_9997 with PID 28192 started at Wed Oct 18 14:45:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1563: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28192 at Wed Oct 18 14:45:52 UTC 2023 kill -USR1 28192 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28192 killed at Wed Oct 18 14:45:52 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:45:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:45:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28260 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28260 found at Wed Oct 18 14:45:52 UTC 2023 selfserv_9997 with PID 28260 started at Wed Oct 18 14:45:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28260 at Wed Oct 18 14:45:53 UTC 2023 kill -USR1 28260 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28260 killed at Wed Oct 18 14:45:53 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:45:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:45:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28325 found at Wed Oct 18 14:45:53 UTC 2023 selfserv_9997 with PID 28325 started at Wed Oct 18 14:45:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1565: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28325 at Wed Oct 18 14:45:53 UTC 2023 kill -USR1 28325 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28325 killed at Wed Oct 18 14:45:53 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:45:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:45:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28377 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28377 found at Wed Oct 18 14:45:53 UTC 2023 selfserv_9997 with PID 28377 started at Wed Oct 18 14:45:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1566: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28377 at Wed Oct 18 14:46:18 UTC 2023 kill -USR1 28377 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28377 killed at Wed Oct 18 14:46:18 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:46:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:46:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28429 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28429 found at Wed Oct 18 14:46:18 UTC 2023 selfserv_9997 with PID 28429 started at Wed Oct 18 14:46:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28429 at Wed Oct 18 14:46:18 UTC 2023 kill -USR1 28429 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28429 killed at Wed Oct 18 14:46:18 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:46:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:46:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28493 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28493 found at Wed Oct 18 14:46:18 UTC 2023 selfserv_9997 with PID 28493 started at Wed Oct 18 14:46:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1568: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28493 at Wed Oct 18 14:46:19 UTC 2023 kill -USR1 28493 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28493 killed at Wed Oct 18 14:46:19 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:46:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:46:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28545 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28545 found at Wed Oct 18 14:46:19 UTC 2023 selfserv_9997 with PID 28545 started at Wed Oct 18 14:46:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1569: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28545 at Wed Oct 18 14:46:42 UTC 2023 kill -USR1 28545 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28545 killed at Wed Oct 18 14:46:42 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:46:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:46:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28612 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28612 found at Wed Oct 18 14:46:42 UTC 2023 selfserv_9997 with PID 28612 started at Wed Oct 18 14:46:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28612 at Wed Oct 18 14:46:42 UTC 2023 kill -USR1 28612 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28612 killed at Wed Oct 18 14:46:42 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:46:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:46:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28668 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28668 found at Wed Oct 18 14:46:42 UTC 2023 selfserv_9997 with PID 28668 started at Wed Oct 18 14:46:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28668 at Wed Oct 18 14:46:42 UTC 2023 kill -USR1 28668 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28668 killed at Wed Oct 18 14:46:42 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 14:46:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:46:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28724 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28724 found at Wed Oct 18 14:46:42 UTC 2023 selfserv_9997 with PID 28724 started at Wed Oct 18 14:46:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1572: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28724 at Wed Oct 18 14:46:43 UTC 2023 kill -USR1 28724 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28724 killed at Wed Oct 18 14:46:43 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:46:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:46:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28781 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28781 found at Wed Oct 18 14:46:43 UTC 2023 selfserv_9997 with PID 28781 started at Wed Oct 18 14:46:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1573: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28781 at Wed Oct 18 14:46:43 UTC 2023 kill -USR1 28781 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28781 killed at Wed Oct 18 14:46:43 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:46:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:46:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28842 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28842 found at Wed Oct 18 14:46:43 UTC 2023 selfserv_9997 with PID 28842 started at Wed Oct 18 14:46:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1574: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28842 at Wed Oct 18 14:47:08 UTC 2023 kill -USR1 28842 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28842 killed at Wed Oct 18 14:47:08 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:47:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:47:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28894 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28894 found at Wed Oct 18 14:47:08 UTC 2023 selfserv_9997 with PID 28894 started at Wed Oct 18 14:47:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1575: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28894 at Wed Oct 18 14:47:08 UTC 2023 kill -USR1 28894 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28894 killed at Wed Oct 18 14:47:08 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:47:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:47:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28954 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28954 found at Wed Oct 18 14:47:08 UTC 2023 selfserv_9997 with PID 28954 started at Wed Oct 18 14:47:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1576: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28954 at Wed Oct 18 14:47:31 UTC 2023 kill -USR1 28954 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28954 killed at Wed Oct 18 14:47:31 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:47:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:47:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29006 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29006 found at Wed Oct 18 14:47:31 UTC 2023 selfserv_9997 with PID 29006 started at Wed Oct 18 14:47:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1577: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29006 at Wed Oct 18 14:47:32 UTC 2023 kill -USR1 29006 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29006 killed at Wed Oct 18 14:47:32 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:47:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:47:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29066 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29066 found at Wed Oct 18 14:47:32 UTC 2023 selfserv_9997 with PID 29066 started at Wed Oct 18 14:47:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1578: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 29066 at Wed Oct 18 14:47:57 UTC 2023 kill -USR1 29066 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29066 killed at Wed Oct 18 14:47:57 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:47:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:47:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29137 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29137 found at Wed Oct 18 14:47:57 UTC 2023 selfserv_9997 with PID 29137 started at Wed Oct 18 14:47:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1579: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29137 at Wed Oct 18 14:47:57 UTC 2023 kill -USR1 29137 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29137 killed at Wed Oct 18 14:47:57 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:47:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:47:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29197 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29197 found at Wed Oct 18 14:47:57 UTC 2023 selfserv_9997 with PID 29197 started at Wed Oct 18 14:47:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1580: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 29197 at Wed Oct 18 14:48:22 UTC 2023 kill -USR1 29197 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29197 killed at Wed Oct 18 14:48:22 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:48:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29249 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29249 found at Wed Oct 18 14:48:22 UTC 2023 selfserv_9997 with PID 29249 started at Wed Oct 18 14:48:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29249 at Wed Oct 18 14:48:22 UTC 2023 kill -USR1 29249 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29249 killed at Wed Oct 18 14:48:22 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 14:48:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29309 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29309 found at Wed Oct 18 14:48:22 UTC 2023 selfserv_9997 with PID 29309 started at Wed Oct 18 14:48:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1582: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 29309 at Wed Oct 18 14:48:45 UTC 2023 kill -USR1 29309 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29309 killed at Wed Oct 18 14:48:46 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:48:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29376 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29376 found at Wed Oct 18 14:48:46 UTC 2023 selfserv_9997 with PID 29376 started at Wed Oct 18 14:48:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1583: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29376 at Wed Oct 18 14:48:46 UTC 2023 kill -USR1 29376 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29376 killed at Wed Oct 18 14:48:46 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:48:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29429 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29429 found at Wed Oct 18 14:48:46 UTC 2023 selfserv_9997 with PID 29429 started at Wed Oct 18 14:48:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1584: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29429 at Wed Oct 18 14:48:46 UTC 2023 kill -USR1 29429 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29429 killed at Wed Oct 18 14:48:46 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 14:48:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29481 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29481 found at Wed Oct 18 14:48:46 UTC 2023 selfserv_9997 with PID 29481 started at Wed Oct 18 14:48:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1585: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29481 at Wed Oct 18 14:48:46 UTC 2023 kill -USR1 29481 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29481 killed at Wed Oct 18 14:48:46 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 14:48:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29563 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29563 found at Wed Oct 18 14:48:46 UTC 2023 selfserv_9997 with PID 29563 started at Wed Oct 18 14:48:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1556: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29563 at Wed Oct 18 14:48:46 UTC 2023 kill -USR1 29563 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29563 killed at Wed Oct 18 14:48:46 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:48:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29605 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29605 found at Wed Oct 18 14:48:46 UTC 2023 selfserv_9997 with PID 29605 started at Wed Oct 18 14:48:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1557: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29605 at Wed Oct 18 14:48:47 UTC 2023 kill -USR1 29605 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29605 killed at Wed Oct 18 14:48:47 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:48:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29644 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29644 found at Wed Oct 18 14:48:47 UTC 2023 selfserv_9997 with PID 29644 started at Wed Oct 18 14:48:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1558: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 29644 at Wed Oct 18 14:48:47 UTC 2023 kill -USR1 29644 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29644 killed at Wed Oct 18 14:48:47 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:48:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29683 found at Wed Oct 18 14:48:47 UTC 2023 selfserv_9997 with PID 29683 started at Wed Oct 18 14:48:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1559: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29683 at Wed Oct 18 14:48:47 UTC 2023 kill -USR1 29683 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29683 killed at Wed Oct 18 14:48:47 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:48:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29722 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29722 found at Wed Oct 18 14:48:47 UTC 2023 selfserv_9997 with PID 29722 started at Wed Oct 18 14:48:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1560: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 29722 at Wed Oct 18 14:48:47 UTC 2023 kill -USR1 29722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29722 killed at Wed Oct 18 14:48:47 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:48:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29761 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29761 found at Wed Oct 18 14:48:47 UTC 2023 selfserv_9997 with PID 29761 started at Wed Oct 18 14:48:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29761 at Wed Oct 18 14:48:47 UTC 2023 kill -USR1 29761 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29761 killed at Wed Oct 18 14:48:47 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:48:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29800 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29800 found at Wed Oct 18 14:48:47 UTC 2023 selfserv_9997 with PID 29800 started at Wed Oct 18 14:48:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1562: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29800 at Wed Oct 18 14:48:47 UTC 2023 kill -USR1 29800 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29800 killed at Wed Oct 18 14:48:47 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:48:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29839 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29839 found at Wed Oct 18 14:48:47 UTC 2023 selfserv_9997 with PID 29839 started at Wed Oct 18 14:48:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29839 at Wed Oct 18 14:48:47 UTC 2023 kill -USR1 29839 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29839 killed at Wed Oct 18 14:48:47 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:48:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29878 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29878 found at Wed Oct 18 14:48:47 UTC 2023 selfserv_9997 with PID 29878 started at Wed Oct 18 14:48:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29878 at Wed Oct 18 14:48:47 UTC 2023 kill -USR1 29878 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29878 killed at Wed Oct 18 14:48:47 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:48:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29917 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29917 found at Wed Oct 18 14:48:47 UTC 2023 selfserv_9997 with PID 29917 started at Wed Oct 18 14:48:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29917 at Wed Oct 18 14:48:48 UTC 2023 kill -USR1 29917 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29917 killed at Wed Oct 18 14:48:48 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:48:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29956 found at Wed Oct 18 14:48:48 UTC 2023 selfserv_9997 with PID 29956 started at Wed Oct 18 14:48:48 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1566: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29956 at Wed Oct 18 14:48:48 UTC 2023 kill -USR1 29956 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29956 killed at Wed Oct 18 14:48:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:48:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29997 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29997 found at Wed Oct 18 14:48:48 UTC 2023 selfserv_9997 with PID 29997 started at Wed Oct 18 14:48:48 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1567: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 29997 at Wed Oct 18 14:48:48 UTC 2023 kill -USR1 29997 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29997 killed at Wed Oct 18 14:48:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:48:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30039 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30039 found at Wed Oct 18 14:48:48 UTC 2023 selfserv_9997 with PID 30039 started at Wed Oct 18 14:48:48 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1568: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30039 at Wed Oct 18 14:48:48 UTC 2023 kill -USR1 30039 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30039 killed at Wed Oct 18 14:48:48 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:48:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30079 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30079 found at Wed Oct 18 14:48:48 UTC 2023 selfserv_9997 with PID 30079 started at Wed Oct 18 14:48:48 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1569: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 30079 at Wed Oct 18 14:48:48 UTC 2023 kill -USR1 30079 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30079 killed at Wed Oct 18 14:48:48 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:48:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30119 found at Wed Oct 18 14:48:48 UTC 2023 selfserv_9997 with PID 30119 started at Wed Oct 18 14:48:48 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1570: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30119 at Wed Oct 18 14:48:48 UTC 2023 kill -USR1 30119 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30119 killed at Wed Oct 18 14:48:48 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:48:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30159 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30159 found at Wed Oct 18 14:48:48 UTC 2023 selfserv_9997 with PID 30159 started at Wed Oct 18 14:48:48 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1571: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30159 at Wed Oct 18 14:48:48 UTC 2023 kill -USR1 30159 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30159 killed at Wed Oct 18 14:48:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:48:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30199 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30199 found at Wed Oct 18 14:48:48 UTC 2023 selfserv_9997 with PID 30199 started at Wed Oct 18 14:48:48 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1572: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30199 at Wed Oct 18 14:48:48 UTC 2023 kill -USR1 30199 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30199 killed at Wed Oct 18 14:48:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:48:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30239 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30239 found at Wed Oct 18 14:48:48 UTC 2023 selfserv_9997 with PID 30239 started at Wed Oct 18 14:48:48 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1573: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30239 at Wed Oct 18 14:48:48 UTC 2023 kill -USR1 30239 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30239 killed at Wed Oct 18 14:48:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 14:48:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 14:48:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30279 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30279 found at Wed Oct 18 14:48:48 UTC 2023 selfserv_9997 with PID 30279 started at Wed Oct 18 14:48:48 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1574: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30279 at Wed Oct 18 14:48:49 UTC 2023 kill -USR1 30279 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30279 killed at Wed Oct 18 14:48:49 UTC 2023 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -fips false -force FIPS mode disabled. ssl.sh: #1575: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/client -list ssl.sh: #1576: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1577: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1578: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/ext_client -list ssl.sh: #1579: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1580: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Wed Oct 18 14:48:49 UTC 2023 Running tests for ocsp TIMESTAMP ocsp BEGIN: Wed Oct 18 14:48:49 UTC 2023 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Wed Oct 18 14:48:49 UTC 2023 Running tests for pkits TIMESTAMP pkits BEGIN: Wed Oct 18 14:48:49 UTC 2023 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Wed Oct 18 14:48:49 UTC 2023 Running tests for chains TIMESTAMP chains BEGIN: Wed Oct 18 14:48:49 UTC 2023 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #1: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144850 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #3: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #5: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #9: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #10: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #14: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #15: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #16: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10008 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #17: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #18: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #19: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #20: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -2 -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #21: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #22: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #23: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #24: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -2 -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #25: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #26: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #27: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #28: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -2 -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #29: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #30: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #31: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #32: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -2 -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #33: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #34: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #35: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #36: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -2 -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #37: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10008 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #38: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #39: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #40: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -2 -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #41: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #42: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #43: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #44: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -2 -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #45: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #46: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #47: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #48: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -2 -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #49: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10008 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #50: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #51: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #52: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -2 -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #53: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #54: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #55: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #56: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -2 -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #57: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #58: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #59: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #60: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -2 -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #61: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10008 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #62: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #63: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20231018144906Z nextupdate=20241018144906Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Wed Oct 18 14:49:06 2023 Next Update: Fri Oct 18 14:49:06 2024 CRL Extensions: chains.sh: #64: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20231018144907Z addcert 2 20231018144907Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Wed Oct 18 14:49:07 2023 Next Update: Fri Oct 18 14:49:06 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:49:07 2023 CRL Extensions: chains.sh: #65: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20231018144907Z nextupdate=20241018144907Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Oct 18 14:49:07 2023 Next Update: Fri Oct 18 14:49:07 2024 CRL Extensions: chains.sh: #66: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20231018144908Z addcert 2 20231018144908Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Oct 18 14:49:08 2023 Next Update: Fri Oct 18 14:49:07 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:49:08 2023 CRL Extensions: chains.sh: #67: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20231018144909Z addcert 4 20231018144909Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Oct 18 14:49:09 2023 Next Update: Fri Oct 18 14:49:07 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:49:08 2023 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Wed Oct 18 14:49:09 2023 CRL Extensions: chains.sh: #68: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20231018144909Z nextupdate=20241018144909Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Oct 18 14:49:09 2023 Next Update: Fri Oct 18 14:49:09 2024 CRL Extensions: chains.sh: #69: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20231018144910Z addcert 2 20231018144910Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Oct 18 14:49:10 2023 Next Update: Fri Oct 18 14:49:09 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:49:10 2023 CRL Extensions: chains.sh: #70: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20231018144911Z addcert 3 20231018144911Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Oct 18 14:49:11 2023 Next Update: Fri Oct 18 14:49:09 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:49:10 2023 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Wed Oct 18 14:49:11 2023 CRL Extensions: chains.sh: #71: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20231018144911Z nextupdate=20241018144911Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Oct 18 14:49:11 2023 Next Update: Fri Oct 18 14:49:11 2024 CRL Extensions: chains.sh: #72: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20231018144912Z addcert 2 20231018144912Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Oct 18 14:49:12 2023 Next Update: Fri Oct 18 14:49:11 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:49:12 2023 CRL Extensions: chains.sh: #73: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20231018144913Z addcert 3 20231018144913Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Oct 18 14:49:13 2023 Next Update: Fri Oct 18 14:49:11 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 14:49:12 2023 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Wed Oct 18 14:49:13 2023 CRL Extensions: chains.sh: #74: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #75: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #76: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #77: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #78: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #79: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #80: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #81: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #82: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #83: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #84: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #85: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #86: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #87: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #88: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #89: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #90: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #91: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #92: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #93: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #94: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #95: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #96: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #97: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #98: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #99: IPsec: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144851 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #100: IPsec: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #101: IPsec: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #102: IPsec: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #103: IPsec: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018144852 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #104: IPsec: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #105: IPsec: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB NoKUDB certutil -N -d NoKUDB -f NoKUDB/dbpasswd chains.sh: #106: IPsec: Creating DB NoKUDB - PASSED chains.sh: Creating EE certifiate request NoKUReq.der certutil -s "CN=NoKU EE, O=NoKU, C=US" -R -2 -d NoKUDB -f NoKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o NoKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #107: IPsec: Creating EE certifiate request NoKUReq.der - PASSED chains.sh: Creating certficate NoKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoKUReq.der -o NoKUCA1.der -f CA1DB/dbpasswd -m 1018144853 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #108: IPsec: Creating certficate NoKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoKUCA1.der to NoKUDB database certutil -A -n NoKU -t u,u,u -d NoKUDB -f NoKUDB/dbpasswd -i NoKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #109: IPsec: Importing certificate NoKUCA1.der to NoKUDB database - PASSED chains.sh: Creating DB DigSigDB certutil -N -d DigSigDB -f DigSigDB/dbpasswd chains.sh: #110: IPsec: Creating DB DigSigDB - PASSED chains.sh: Creating EE certifiate request DigSigReq.der certutil -s "CN=DigSig EE, O=DigSig, C=US" -R -2 -d DigSigDB -f DigSigDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o DigSigReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #111: IPsec: Creating EE certifiate request DigSigReq.der - PASSED chains.sh: Creating certficate DigSigCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigReq.der -o DigSigCA1.der -f CA1DB/dbpasswd -m 1018144854 --keyUsage digitalSignature < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #112: IPsec: Creating certficate DigSigCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigCA1.der to DigSigDB database certutil -A -n DigSig -t u,u,u -d DigSigDB -f DigSigDB/dbpasswd -i DigSigCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #113: IPsec: Importing certificate DigSigCA1.der to DigSigDB database - PASSED chains.sh: Creating DB NonRepDB certutil -N -d NonRepDB -f NonRepDB/dbpasswd chains.sh: #114: IPsec: Creating DB NonRepDB - PASSED chains.sh: Creating EE certifiate request NonRepReq.der certutil -s "CN=NonRep EE, O=NonRep, C=US" -R -2 -d NonRepDB -f NonRepDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o NonRepReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #115: IPsec: Creating EE certifiate request NonRepReq.der - PASSED chains.sh: Creating certficate NonRepCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonRepReq.der -o NonRepCA1.der -f CA1DB/dbpasswd -m 1018144855 --keyUsage nonRepudiation < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #116: IPsec: Creating certficate NonRepCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonRepCA1.der to NonRepDB database certutil -A -n NonRep -t u,u,u -d NonRepDB -f NonRepDB/dbpasswd -i NonRepCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #117: IPsec: Importing certificate NonRepCA1.der to NonRepDB database - PASSED chains.sh: Creating DB DigSigNonRepAndExtraDB certutil -N -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd chains.sh: #118: IPsec: Creating DB DigSigNonRepAndExtraDB - PASSED chains.sh: Creating EE certifiate request DigSigNonRepAndExtraReq.der certutil -s "CN=DigSigNonRepAndExtra EE, O=DigSigNonRepAndExtra, C=US" -R -2 -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o DigSigNonRepAndExtraReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #119: IPsec: Creating EE certifiate request DigSigNonRepAndExtraReq.der - PASSED chains.sh: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigNonRepAndExtraReq.der -o DigSigNonRepAndExtraCA1.der -f CA1DB/dbpasswd -m 1018144856 --keyUsage digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #120: IPsec: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database certutil -A -n DigSigNonRepAndExtra -t u,u,u -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -i DigSigNonRepAndExtraCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #121: IPsec: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database - PASSED chains.sh: Creating DB NoMatchDB certutil -N -d NoMatchDB -f NoMatchDB/dbpasswd chains.sh: #122: IPsec: Creating DB NoMatchDB - PASSED chains.sh: Creating EE certifiate request NoMatchReq.der certutil -s "CN=NoMatch EE, O=NoMatch, C=US" -R -2 -d NoMatchDB -f NoMatchDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o NoMatchReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #123: IPsec: Creating EE certifiate request NoMatchReq.der - PASSED chains.sh: Creating certficate NoMatchCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoMatchReq.der -o NoMatchCA1.der -f CA1DB/dbpasswd -m 1018144857 --keyUsage keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #124: IPsec: Creating certficate NoMatchCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoMatchCA1.der to NoMatchDB database certutil -A -n NoMatch -t u,u,u -d NoMatchDB -f NoMatchDB/dbpasswd -i NoMatchCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #125: IPsec: Importing certificate NoMatchCA1.der to NoMatchDB database - PASSED chains.sh: Creating DB NonCriticalServerAuthEKUDB certutil -N -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd chains.sh: #126: IPsec: Creating DB NonCriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request NonCriticalServerAuthEKUReq.der certutil -s "CN=NonCriticalServerAuthEKU EE, O=NonCriticalServerAuthEKU, C=US" -R -2 -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o NonCriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #127: IPsec: Creating EE certifiate request NonCriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonCriticalServerAuthEKUReq.der -o NonCriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 1018144858 --extKeyUsage serverAuth < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #128: IPsec: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database certutil -A -n NonCriticalServerAuthEKU -t u,u,u -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -i NonCriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #129: IPsec: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB NonIPSECEKUDB certutil -N -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd chains.sh: #130: IPsec: Creating DB NonIPSECEKUDB - PASSED chains.sh: Creating EE certifiate request NonIPSECEKUReq.der certutil -s "CN=NonIPSECEKU EE, O=NonIPSECEKU, C=US" -R -2 -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o NonIPSECEKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #131: IPsec: Creating EE certifiate request NonIPSECEKUReq.der - PASSED chains.sh: Creating certficate NonIPSECEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonIPSECEKUReq.der -o NonIPSECEKUCA1.der -f CA1DB/dbpasswd -m 1018144859 --extKeyUsage codeSigning < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #132: IPsec: Creating certficate NonIPSECEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database certutil -A -n NonIPSECEKU -t u,u,u -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -i NonIPSECEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #133: IPsec: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database - PASSED chains.sh: Creating DB CriticalServerAuthEKUDB certutil -N -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd chains.sh: #134: IPsec: Creating DB CriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request CriticalServerAuthEKUReq.der certutil -s "CN=CriticalServerAuthEKU EE, O=CriticalServerAuthEKU, C=US" -R -2 -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #135: IPsec: Creating EE certifiate request CriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CriticalServerAuthEKUReq.der -o CriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 1018144860 --keyUsage digitalSignature --extKeyUsage critical,serverAuth < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #136: IPsec: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database certutil -A -n CriticalServerAuthEKU -t u,u,u -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -i CriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #137: IPsec: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB EKUIPsecIKEDB certutil -N -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd chains.sh: #138: IPsec: Creating DB EKUIPsecIKEDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEReq.der certutil -s "CN=EKUIPsecIKE EE, O=EKUIPsecIKE, C=US" -R -2 -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EKUIPsecIKEReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #139: IPsec: Creating EE certifiate request EKUIPsecIKEReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKECA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEReq.der -o EKUIPsecIKECA1.der -f CA1DB/dbpasswd -m 1018144861 --keyUsage digitalSignature --extKeyUsage critical,ipsecIKE < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #140: IPsec: Creating certficate EKUIPsecIKECA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database certutil -A -n EKUIPsecIKE -t u,u,u -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -i EKUIPsecIKECA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #141: IPsec: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database - PASSED chains.sh: Creating DB EKUIPsecIKEEndDB certutil -N -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd chains.sh: #142: IPsec: Creating DB EKUIPsecIKEEndDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEEndReq.der certutil -s "CN=EKUIPsecIKEEnd EE, O=EKUIPsecIKEEnd, C=US" -R -2 -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EKUIPsecIKEEndReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #143: IPsec: Creating EE certifiate request EKUIPsecIKEEndReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEEndReq.der -o EKUIPsecIKEEndCA1.der -f CA1DB/dbpasswd -m 1018144862 --keyUsage digitalSignature --extKeyUsage ipsecIKEEnd < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #144: IPsec: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database certutil -A -n EKUIPsecIKEEnd -t u,u,u -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -i EKUIPsecIKEEndCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #145: IPsec: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database - PASSED chains.sh: Creating DB EKUIPsecIKEIntermediateDB certutil -N -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd chains.sh: #146: IPsec: Creating DB EKUIPsecIKEIntermediateDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der certutil -s "CN=EKUIPsecIKEIntermediate EE, O=EKUIPsecIKEIntermediate, C=US" -R -2 -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EKUIPsecIKEIntermediateReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #147: IPsec: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEIntermediateReq.der -o EKUIPsecIKEIntermediateCA1.der -f CA1DB/dbpasswd -m 1018144863 --keyUsage digitalSignature --extKeyUsage codeSigning,serverAuth,ipsecIKEIntermediate < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #148: IPsec: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database certutil -A -n EKUIPsecIKEIntermediate -t u,u,u -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -i EKUIPsecIKEIntermediateCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #149: IPsec: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database - PASSED chains.sh: Creating DB EKUAnyDB certutil -N -d EKUAnyDB -f EKUAnyDB/dbpasswd chains.sh: #150: IPsec: Creating DB EKUAnyDB - PASSED chains.sh: Creating EE certifiate request EKUAnyReq.der certutil -s "CN=EKUAny EE, O=EKUAny, C=US" -R -2 -d EKUAnyDB -f EKUAnyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EKUAnyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #151: IPsec: Creating EE certifiate request EKUAnyReq.der - PASSED chains.sh: Creating certficate EKUAnyCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUAnyReq.der -o EKUAnyCA1.der -f CA1DB/dbpasswd -m 1018144864 --keyUsage digitalSignature --extKeyUsage x509Any < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #152: IPsec: Creating certficate EKUAnyCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUAnyCA1.der to EKUAnyDB database certutil -A -n EKUAny -t u,u,u -d EKUAnyDB -f EKUAnyDB/dbpasswd -i EKUAnyCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #153: IPsec: Importing certificate EKUAnyCA1.der to EKUAnyDB database - PASSED chains.sh: Creating DB EKUEmailDB certutil -N -d EKUEmailDB -f EKUEmailDB/dbpasswd chains.sh: #154: IPsec: Creating DB EKUEmailDB - PASSED chains.sh: Creating EE certifiate request EKUEmailReq.der certutil -s "CN=EKUEmail EE, O=EKUEmail, C=US" -R -2 -d EKUEmailDB -f EKUEmailDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EKUEmailReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #155: IPsec: Creating EE certifiate request EKUEmailReq.der - PASSED chains.sh: Creating certficate EKUEmailCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUEmailReq.der -o EKUEmailCA1.der -f CA1DB/dbpasswd -m 1018144865 --keyUsage digitalSignature --extKeyUsage emailProtection < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #156: IPsec: Creating certficate EKUEmailCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUEmailCA1.der to EKUEmailDB database certutil -A -n EKUEmail -t u,u,u -d EKUEmailDB -f EKUEmailDB/dbpasswd -i EKUEmailCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #157: IPsec: Importing certificate EKUEmailCA1.der to EKUEmailDB database - PASSED chains.sh: Creating DB EKUIPsecUserDB certutil -N -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd chains.sh: #158: IPsec: Creating DB EKUIPsecUserDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecUserReq.der certutil -s "CN=EKUIPsecUser EE, O=EKUIPsecUser, C=US" -R -2 -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EKUIPsecUserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #159: IPsec: Creating EE certifiate request EKUIPsecUserReq.der - PASSED chains.sh: Creating certficate EKUIPsecUserCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecUserReq.der -o EKUIPsecUserCA1.der -f CA1DB/dbpasswd -m 1018144866 --keyUsage digitalSignature --extKeyUsage ipsecUser < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #160: IPsec: Creating certficate EKUIPsecUserCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database certutil -A -n EKUIPsecUser -t u,u,u -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -i EKUIPsecUserCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #161: IPsec: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #162: IPsec: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,," -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #163: IPsec: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #164: IPsec: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144851 (0x3cafa853) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:25 2023 Not After : Wed Oct 18 14:49:25 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:e3:b0:44:67:c2:39:96:32:a7:ae:2f:77:25:f4:0c: d5:5b:f4:32:2e:23:37:3b:1c:fb:fd:06:f0:d3:1f:d9: 6b:08:08:55:13:0a:96:dc:3f:a9:39:6c:42:0c:5c:fd: b9:d7:4d:31:01:a7:b3:4c:4f:60:15:b8:b5:65:2b:2d: 1b:1e:1d:e3:72:35:a1:cd:d2:af:5d:97:86:8b:7e:90: df:2b:e3:d6:f0:b6:ed:d9:9b:1f:73:7f:b5:a0:5e:40: 3f:8a:fc:e1:0e:66:08:a5:93:d5:bb:b0:24:21:64:67: 0d:de:82:23:ed:ee:ba:19:2e:81:b5:16:bf:20:11:19: ad:6a:0a:64:9d:1c:ef:f0:5c:13:5a:42:7a:1f:f3:5b: 16:13:ce:b8:55:7d:07:82:a6:28:56:e5:18:9c:ef:bd: eb:e7:d9:51:36:59:19:34:bf:ab:bb:50:7f:b9:92:a5: c1:fc:11:63:c9:82:66:ab:aa:0e:f2:9c:ea:58:63:ab: 63:22:42:85:d9:60:30:60:9c:7a:d8:59:e8:48:42:9e: bc:c2:d9:4c:5c:5d:31:25:42:f7:d2:e6:21:1a:82:b4: 2a:46:15:66:32:9b:41:b7:84:89:7a:fe:24:ab:3c:4d: 00:0c:63:0c:d7:ff:0c:4b:a8:4e:e2:78:e3:1f:f2:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:11:cd:df:aa:6f:4c:3a:41:81:31:52:6b:cd:d7:c1: e1:fb:8d:81:40:52:1a:69:72:86:6c:1b:16:90:9e:fe: 08:1c:42:36:8c:08:a0:92:0e:ce:19:29:91:25:c5:bc: 80:f8:d8:2c:ae:85:00:6e:66:c9:1b:b0:16:66:51:d0: c6:35:22:5d:d1:83:38:26:e6:3f:6c:61:72:09:71:8e: b2:e4:af:58:57:e6:e8:ad:6c:3d:f9:b2:c2:6b:8f:0b: 8b:80:04:40:73:dc:f7:fb:f1:d9:b6:4c:b8:81:b8:e5: 1e:04:6c:a5:f3:16:35:ff:c8:3b:55:f1:d6:4d:e4:e1: 20:7d:54:aa:3a:1e:6e:02:75:8c:6e:63:51:ad:f8:6a: 7a:5b:79:5b:66:92:0f:41:39:a0:c6:f6:77:72:5e:7f: 33:75:43:9d:65:ba:94:91:70:b6:08:65:62:07:86:82: 63:41:3f:96:ee:d5:f1:e1:dd:d5:16:18:a5:50:f9:ca: f9:6e:8a:53:7e:97:9c:53:0f:95:80:fd:17:63:0b:c2: 14:14:34:a7:9d:92:8d:42:eb:cf:0f:5d:09:c2:96:05: 6a:c4:4e:c8:7b:1d:89:0b:e7:77:ba:53:6b:5f:35:e0: cd:44:d4:15:3a:55:a0:d8:6e:63:72:b0:2a:ad:fb:ae Fingerprint (SHA-256): DB:78:8E:BC:12:39:D9:88:53:89:5A:17:20:EC:05:EF:2F:93:F7:31:E2:EF:59:67:3C:ED:39:64:45:8A:60:20 Fingerprint (SHA1): DA:96:10:78:B5:D5:4C:02:AC:10:64:81:5C:9F:8D:BC:2C:D7:06:86 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NoKU EE,O=NoKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #165: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #166: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #167: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144851 (0x3cafa853) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:25 2023 Not After : Wed Oct 18 14:49:25 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:e3:b0:44:67:c2:39:96:32:a7:ae:2f:77:25:f4:0c: d5:5b:f4:32:2e:23:37:3b:1c:fb:fd:06:f0:d3:1f:d9: 6b:08:08:55:13:0a:96:dc:3f:a9:39:6c:42:0c:5c:fd: b9:d7:4d:31:01:a7:b3:4c:4f:60:15:b8:b5:65:2b:2d: 1b:1e:1d:e3:72:35:a1:cd:d2:af:5d:97:86:8b:7e:90: df:2b:e3:d6:f0:b6:ed:d9:9b:1f:73:7f:b5:a0:5e:40: 3f:8a:fc:e1:0e:66:08:a5:93:d5:bb:b0:24:21:64:67: 0d:de:82:23:ed:ee:ba:19:2e:81:b5:16:bf:20:11:19: ad:6a:0a:64:9d:1c:ef:f0:5c:13:5a:42:7a:1f:f3:5b: 16:13:ce:b8:55:7d:07:82:a6:28:56:e5:18:9c:ef:bd: eb:e7:d9:51:36:59:19:34:bf:ab:bb:50:7f:b9:92:a5: c1:fc:11:63:c9:82:66:ab:aa:0e:f2:9c:ea:58:63:ab: 63:22:42:85:d9:60:30:60:9c:7a:d8:59:e8:48:42:9e: bc:c2:d9:4c:5c:5d:31:25:42:f7:d2:e6:21:1a:82:b4: 2a:46:15:66:32:9b:41:b7:84:89:7a:fe:24:ab:3c:4d: 00:0c:63:0c:d7:ff:0c:4b:a8:4e:e2:78:e3:1f:f2:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:11:cd:df:aa:6f:4c:3a:41:81:31:52:6b:cd:d7:c1: e1:fb:8d:81:40:52:1a:69:72:86:6c:1b:16:90:9e:fe: 08:1c:42:36:8c:08:a0:92:0e:ce:19:29:91:25:c5:bc: 80:f8:d8:2c:ae:85:00:6e:66:c9:1b:b0:16:66:51:d0: c6:35:22:5d:d1:83:38:26:e6:3f:6c:61:72:09:71:8e: b2:e4:af:58:57:e6:e8:ad:6c:3d:f9:b2:c2:6b:8f:0b: 8b:80:04:40:73:dc:f7:fb:f1:d9:b6:4c:b8:81:b8:e5: 1e:04:6c:a5:f3:16:35:ff:c8:3b:55:f1:d6:4d:e4:e1: 20:7d:54:aa:3a:1e:6e:02:75:8c:6e:63:51:ad:f8:6a: 7a:5b:79:5b:66:92:0f:41:39:a0:c6:f6:77:72:5e:7f: 33:75:43:9d:65:ba:94:91:70:b6:08:65:62:07:86:82: 63:41:3f:96:ee:d5:f1:e1:dd:d5:16:18:a5:50:f9:ca: f9:6e:8a:53:7e:97:9c:53:0f:95:80:fd:17:63:0b:c2: 14:14:34:a7:9d:92:8d:42:eb:cf:0f:5d:09:c2:96:05: 6a:c4:4e:c8:7b:1d:89:0b:e7:77:ba:53:6b:5f:35:e0: cd:44:d4:15:3a:55:a0:d8:6e:63:72:b0:2a:ad:fb:ae Fingerprint (SHA-256): DB:78:8E:BC:12:39:D9:88:53:89:5A:17:20:EC:05:EF:2F:93:F7:31:E2:EF:59:67:3C:ED:39:64:45:8A:60:20 Fingerprint (SHA1): DA:96:10:78:B5:D5:4C:02:AC:10:64:81:5C:9F:8D:BC:2C:D7:06:86 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSig EE,O=DigSig,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #168: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #169: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #170: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonRepCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144851 (0x3cafa853) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:25 2023 Not After : Wed Oct 18 14:49:25 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:e3:b0:44:67:c2:39:96:32:a7:ae:2f:77:25:f4:0c: d5:5b:f4:32:2e:23:37:3b:1c:fb:fd:06:f0:d3:1f:d9: 6b:08:08:55:13:0a:96:dc:3f:a9:39:6c:42:0c:5c:fd: b9:d7:4d:31:01:a7:b3:4c:4f:60:15:b8:b5:65:2b:2d: 1b:1e:1d:e3:72:35:a1:cd:d2:af:5d:97:86:8b:7e:90: df:2b:e3:d6:f0:b6:ed:d9:9b:1f:73:7f:b5:a0:5e:40: 3f:8a:fc:e1:0e:66:08:a5:93:d5:bb:b0:24:21:64:67: 0d:de:82:23:ed:ee:ba:19:2e:81:b5:16:bf:20:11:19: ad:6a:0a:64:9d:1c:ef:f0:5c:13:5a:42:7a:1f:f3:5b: 16:13:ce:b8:55:7d:07:82:a6:28:56:e5:18:9c:ef:bd: eb:e7:d9:51:36:59:19:34:bf:ab:bb:50:7f:b9:92:a5: c1:fc:11:63:c9:82:66:ab:aa:0e:f2:9c:ea:58:63:ab: 63:22:42:85:d9:60:30:60:9c:7a:d8:59:e8:48:42:9e: bc:c2:d9:4c:5c:5d:31:25:42:f7:d2:e6:21:1a:82:b4: 2a:46:15:66:32:9b:41:b7:84:89:7a:fe:24:ab:3c:4d: 00:0c:63:0c:d7:ff:0c:4b:a8:4e:e2:78:e3:1f:f2:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:11:cd:df:aa:6f:4c:3a:41:81:31:52:6b:cd:d7:c1: e1:fb:8d:81:40:52:1a:69:72:86:6c:1b:16:90:9e:fe: 08:1c:42:36:8c:08:a0:92:0e:ce:19:29:91:25:c5:bc: 80:f8:d8:2c:ae:85:00:6e:66:c9:1b:b0:16:66:51:d0: c6:35:22:5d:d1:83:38:26:e6:3f:6c:61:72:09:71:8e: b2:e4:af:58:57:e6:e8:ad:6c:3d:f9:b2:c2:6b:8f:0b: 8b:80:04:40:73:dc:f7:fb:f1:d9:b6:4c:b8:81:b8:e5: 1e:04:6c:a5:f3:16:35:ff:c8:3b:55:f1:d6:4d:e4:e1: 20:7d:54:aa:3a:1e:6e:02:75:8c:6e:63:51:ad:f8:6a: 7a:5b:79:5b:66:92:0f:41:39:a0:c6:f6:77:72:5e:7f: 33:75:43:9d:65:ba:94:91:70:b6:08:65:62:07:86:82: 63:41:3f:96:ee:d5:f1:e1:dd:d5:16:18:a5:50:f9:ca: f9:6e:8a:53:7e:97:9c:53:0f:95:80:fd:17:63:0b:c2: 14:14:34:a7:9d:92:8d:42:eb:cf:0f:5d:09:c2:96:05: 6a:c4:4e:c8:7b:1d:89:0b:e7:77:ba:53:6b:5f:35:e0: cd:44:d4:15:3a:55:a0:d8:6e:63:72:b0:2a:ad:fb:ae Fingerprint (SHA-256): DB:78:8E:BC:12:39:D9:88:53:89:5A:17:20:EC:05:EF:2F:93:F7:31:E2:EF:59:67:3C:ED:39:64:45:8A:60:20 Fingerprint (SHA1): DA:96:10:78:B5:D5:4C:02:AC:10:64:81:5C:9F:8D:BC:2C:D7:06:86 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonRep EE,O=NonRep,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #171: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #172: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #173: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144851 (0x3cafa853) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:25 2023 Not After : Wed Oct 18 14:49:25 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:e3:b0:44:67:c2:39:96:32:a7:ae:2f:77:25:f4:0c: d5:5b:f4:32:2e:23:37:3b:1c:fb:fd:06:f0:d3:1f:d9: 6b:08:08:55:13:0a:96:dc:3f:a9:39:6c:42:0c:5c:fd: b9:d7:4d:31:01:a7:b3:4c:4f:60:15:b8:b5:65:2b:2d: 1b:1e:1d:e3:72:35:a1:cd:d2:af:5d:97:86:8b:7e:90: df:2b:e3:d6:f0:b6:ed:d9:9b:1f:73:7f:b5:a0:5e:40: 3f:8a:fc:e1:0e:66:08:a5:93:d5:bb:b0:24:21:64:67: 0d:de:82:23:ed:ee:ba:19:2e:81:b5:16:bf:20:11:19: ad:6a:0a:64:9d:1c:ef:f0:5c:13:5a:42:7a:1f:f3:5b: 16:13:ce:b8:55:7d:07:82:a6:28:56:e5:18:9c:ef:bd: eb:e7:d9:51:36:59:19:34:bf:ab:bb:50:7f:b9:92:a5: c1:fc:11:63:c9:82:66:ab:aa:0e:f2:9c:ea:58:63:ab: 63:22:42:85:d9:60:30:60:9c:7a:d8:59:e8:48:42:9e: bc:c2:d9:4c:5c:5d:31:25:42:f7:d2:e6:21:1a:82:b4: 2a:46:15:66:32:9b:41:b7:84:89:7a:fe:24:ab:3c:4d: 00:0c:63:0c:d7:ff:0c:4b:a8:4e:e2:78:e3:1f:f2:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:11:cd:df:aa:6f:4c:3a:41:81:31:52:6b:cd:d7:c1: e1:fb:8d:81:40:52:1a:69:72:86:6c:1b:16:90:9e:fe: 08:1c:42:36:8c:08:a0:92:0e:ce:19:29:91:25:c5:bc: 80:f8:d8:2c:ae:85:00:6e:66:c9:1b:b0:16:66:51:d0: c6:35:22:5d:d1:83:38:26:e6:3f:6c:61:72:09:71:8e: b2:e4:af:58:57:e6:e8:ad:6c:3d:f9:b2:c2:6b:8f:0b: 8b:80:04:40:73:dc:f7:fb:f1:d9:b6:4c:b8:81:b8:e5: 1e:04:6c:a5:f3:16:35:ff:c8:3b:55:f1:d6:4d:e4:e1: 20:7d:54:aa:3a:1e:6e:02:75:8c:6e:63:51:ad:f8:6a: 7a:5b:79:5b:66:92:0f:41:39:a0:c6:f6:77:72:5e:7f: 33:75:43:9d:65:ba:94:91:70:b6:08:65:62:07:86:82: 63:41:3f:96:ee:d5:f1:e1:dd:d5:16:18:a5:50:f9:ca: f9:6e:8a:53:7e:97:9c:53:0f:95:80:fd:17:63:0b:c2: 14:14:34:a7:9d:92:8d:42:eb:cf:0f:5d:09:c2:96:05: 6a:c4:4e:c8:7b:1d:89:0b:e7:77:ba:53:6b:5f:35:e0: cd:44:d4:15:3a:55:a0:d8:6e:63:72:b0:2a:ad:fb:ae Fingerprint (SHA-256): DB:78:8E:BC:12:39:D9:88:53:89:5A:17:20:EC:05:EF:2F:93:F7:31:E2:EF:59:67:3C:ED:39:64:45:8A:60:20 Fingerprint (SHA1): DA:96:10:78:B5:D5:4C:02:AC:10:64:81:5C:9F:8D:BC:2C:D7:06:86 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSigNonRepAndExtra EE,O=DigSigNonRepAndExtra,C=U S" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #174: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #175: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #176: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #177: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #178: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #179: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #180: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #181: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #182: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144851 (0x3cafa853) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:25 2023 Not After : Wed Oct 18 14:49:25 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:e3:b0:44:67:c2:39:96:32:a7:ae:2f:77:25:f4:0c: d5:5b:f4:32:2e:23:37:3b:1c:fb:fd:06:f0:d3:1f:d9: 6b:08:08:55:13:0a:96:dc:3f:a9:39:6c:42:0c:5c:fd: b9:d7:4d:31:01:a7:b3:4c:4f:60:15:b8:b5:65:2b:2d: 1b:1e:1d:e3:72:35:a1:cd:d2:af:5d:97:86:8b:7e:90: df:2b:e3:d6:f0:b6:ed:d9:9b:1f:73:7f:b5:a0:5e:40: 3f:8a:fc:e1:0e:66:08:a5:93:d5:bb:b0:24:21:64:67: 0d:de:82:23:ed:ee:ba:19:2e:81:b5:16:bf:20:11:19: ad:6a:0a:64:9d:1c:ef:f0:5c:13:5a:42:7a:1f:f3:5b: 16:13:ce:b8:55:7d:07:82:a6:28:56:e5:18:9c:ef:bd: eb:e7:d9:51:36:59:19:34:bf:ab:bb:50:7f:b9:92:a5: c1:fc:11:63:c9:82:66:ab:aa:0e:f2:9c:ea:58:63:ab: 63:22:42:85:d9:60:30:60:9c:7a:d8:59:e8:48:42:9e: bc:c2:d9:4c:5c:5d:31:25:42:f7:d2:e6:21:1a:82:b4: 2a:46:15:66:32:9b:41:b7:84:89:7a:fe:24:ab:3c:4d: 00:0c:63:0c:d7:ff:0c:4b:a8:4e:e2:78:e3:1f:f2:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:11:cd:df:aa:6f:4c:3a:41:81:31:52:6b:cd:d7:c1: e1:fb:8d:81:40:52:1a:69:72:86:6c:1b:16:90:9e:fe: 08:1c:42:36:8c:08:a0:92:0e:ce:19:29:91:25:c5:bc: 80:f8:d8:2c:ae:85:00:6e:66:c9:1b:b0:16:66:51:d0: c6:35:22:5d:d1:83:38:26:e6:3f:6c:61:72:09:71:8e: b2:e4:af:58:57:e6:e8:ad:6c:3d:f9:b2:c2:6b:8f:0b: 8b:80:04:40:73:dc:f7:fb:f1:d9:b6:4c:b8:81:b8:e5: 1e:04:6c:a5:f3:16:35:ff:c8:3b:55:f1:d6:4d:e4:e1: 20:7d:54:aa:3a:1e:6e:02:75:8c:6e:63:51:ad:f8:6a: 7a:5b:79:5b:66:92:0f:41:39:a0:c6:f6:77:72:5e:7f: 33:75:43:9d:65:ba:94:91:70:b6:08:65:62:07:86:82: 63:41:3f:96:ee:d5:f1:e1:dd:d5:16:18:a5:50:f9:ca: f9:6e:8a:53:7e:97:9c:53:0f:95:80:fd:17:63:0b:c2: 14:14:34:a7:9d:92:8d:42:eb:cf:0f:5d:09:c2:96:05: 6a:c4:4e:c8:7b:1d:89:0b:e7:77:ba:53:6b:5f:35:e0: cd:44:d4:15:3a:55:a0:d8:6e:63:72:b0:2a:ad:fb:ae Fingerprint (SHA-256): DB:78:8E:BC:12:39:D9:88:53:89:5A:17:20:EC:05:EF:2F:93:F7:31:E2:EF:59:67:3C:ED:39:64:45:8A:60:20 Fingerprint (SHA1): DA:96:10:78:B5:D5:4C:02:AC:10:64:81:5C:9F:8D:BC:2C:D7:06:86 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonCriticalServerAuthEKU EE,O=NonCriticalServerAut hEKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #183: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #184: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #185: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144851 (0x3cafa853) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:25 2023 Not After : Wed Oct 18 14:49:25 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:e3:b0:44:67:c2:39:96:32:a7:ae:2f:77:25:f4:0c: d5:5b:f4:32:2e:23:37:3b:1c:fb:fd:06:f0:d3:1f:d9: 6b:08:08:55:13:0a:96:dc:3f:a9:39:6c:42:0c:5c:fd: b9:d7:4d:31:01:a7:b3:4c:4f:60:15:b8:b5:65:2b:2d: 1b:1e:1d:e3:72:35:a1:cd:d2:af:5d:97:86:8b:7e:90: df:2b:e3:d6:f0:b6:ed:d9:9b:1f:73:7f:b5:a0:5e:40: 3f:8a:fc:e1:0e:66:08:a5:93:d5:bb:b0:24:21:64:67: 0d:de:82:23:ed:ee:ba:19:2e:81:b5:16:bf:20:11:19: ad:6a:0a:64:9d:1c:ef:f0:5c:13:5a:42:7a:1f:f3:5b: 16:13:ce:b8:55:7d:07:82:a6:28:56:e5:18:9c:ef:bd: eb:e7:d9:51:36:59:19:34:bf:ab:bb:50:7f:b9:92:a5: c1:fc:11:63:c9:82:66:ab:aa:0e:f2:9c:ea:58:63:ab: 63:22:42:85:d9:60:30:60:9c:7a:d8:59:e8:48:42:9e: bc:c2:d9:4c:5c:5d:31:25:42:f7:d2:e6:21:1a:82:b4: 2a:46:15:66:32:9b:41:b7:84:89:7a:fe:24:ab:3c:4d: 00:0c:63:0c:d7:ff:0c:4b:a8:4e:e2:78:e3:1f:f2:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:11:cd:df:aa:6f:4c:3a:41:81:31:52:6b:cd:d7:c1: e1:fb:8d:81:40:52:1a:69:72:86:6c:1b:16:90:9e:fe: 08:1c:42:36:8c:08:a0:92:0e:ce:19:29:91:25:c5:bc: 80:f8:d8:2c:ae:85:00:6e:66:c9:1b:b0:16:66:51:d0: c6:35:22:5d:d1:83:38:26:e6:3f:6c:61:72:09:71:8e: b2:e4:af:58:57:e6:e8:ad:6c:3d:f9:b2:c2:6b:8f:0b: 8b:80:04:40:73:dc:f7:fb:f1:d9:b6:4c:b8:81:b8:e5: 1e:04:6c:a5:f3:16:35:ff:c8:3b:55:f1:d6:4d:e4:e1: 20:7d:54:aa:3a:1e:6e:02:75:8c:6e:63:51:ad:f8:6a: 7a:5b:79:5b:66:92:0f:41:39:a0:c6:f6:77:72:5e:7f: 33:75:43:9d:65:ba:94:91:70:b6:08:65:62:07:86:82: 63:41:3f:96:ee:d5:f1:e1:dd:d5:16:18:a5:50:f9:ca: f9:6e:8a:53:7e:97:9c:53:0f:95:80:fd:17:63:0b:c2: 14:14:34:a7:9d:92:8d:42:eb:cf:0f:5d:09:c2:96:05: 6a:c4:4e:c8:7b:1d:89:0b:e7:77:ba:53:6b:5f:35:e0: cd:44:d4:15:3a:55:a0:d8:6e:63:72:b0:2a:ad:fb:ae Fingerprint (SHA-256): DB:78:8E:BC:12:39:D9:88:53:89:5A:17:20:EC:05:EF:2F:93:F7:31:E2:EF:59:67:3C:ED:39:64:45:8A:60:20 Fingerprint (SHA1): DA:96:10:78:B5:D5:4C:02:AC:10:64:81:5C:9F:8D:BC:2C:D7:06:86 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=CriticalServerAuthEKU EE,O=CriticalServerAuthEKU,C =US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #186: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #187: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #188: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKECA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144851 (0x3cafa853) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:25 2023 Not After : Wed Oct 18 14:49:25 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:e3:b0:44:67:c2:39:96:32:a7:ae:2f:77:25:f4:0c: d5:5b:f4:32:2e:23:37:3b:1c:fb:fd:06:f0:d3:1f:d9: 6b:08:08:55:13:0a:96:dc:3f:a9:39:6c:42:0c:5c:fd: b9:d7:4d:31:01:a7:b3:4c:4f:60:15:b8:b5:65:2b:2d: 1b:1e:1d:e3:72:35:a1:cd:d2:af:5d:97:86:8b:7e:90: df:2b:e3:d6:f0:b6:ed:d9:9b:1f:73:7f:b5:a0:5e:40: 3f:8a:fc:e1:0e:66:08:a5:93:d5:bb:b0:24:21:64:67: 0d:de:82:23:ed:ee:ba:19:2e:81:b5:16:bf:20:11:19: ad:6a:0a:64:9d:1c:ef:f0:5c:13:5a:42:7a:1f:f3:5b: 16:13:ce:b8:55:7d:07:82:a6:28:56:e5:18:9c:ef:bd: eb:e7:d9:51:36:59:19:34:bf:ab:bb:50:7f:b9:92:a5: c1:fc:11:63:c9:82:66:ab:aa:0e:f2:9c:ea:58:63:ab: 63:22:42:85:d9:60:30:60:9c:7a:d8:59:e8:48:42:9e: bc:c2:d9:4c:5c:5d:31:25:42:f7:d2:e6:21:1a:82:b4: 2a:46:15:66:32:9b:41:b7:84:89:7a:fe:24:ab:3c:4d: 00:0c:63:0c:d7:ff:0c:4b:a8:4e:e2:78:e3:1f:f2:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:11:cd:df:aa:6f:4c:3a:41:81:31:52:6b:cd:d7:c1: e1:fb:8d:81:40:52:1a:69:72:86:6c:1b:16:90:9e:fe: 08:1c:42:36:8c:08:a0:92:0e:ce:19:29:91:25:c5:bc: 80:f8:d8:2c:ae:85:00:6e:66:c9:1b:b0:16:66:51:d0: c6:35:22:5d:d1:83:38:26:e6:3f:6c:61:72:09:71:8e: b2:e4:af:58:57:e6:e8:ad:6c:3d:f9:b2:c2:6b:8f:0b: 8b:80:04:40:73:dc:f7:fb:f1:d9:b6:4c:b8:81:b8:e5: 1e:04:6c:a5:f3:16:35:ff:c8:3b:55:f1:d6:4d:e4:e1: 20:7d:54:aa:3a:1e:6e:02:75:8c:6e:63:51:ad:f8:6a: 7a:5b:79:5b:66:92:0f:41:39:a0:c6:f6:77:72:5e:7f: 33:75:43:9d:65:ba:94:91:70:b6:08:65:62:07:86:82: 63:41:3f:96:ee:d5:f1:e1:dd:d5:16:18:a5:50:f9:ca: f9:6e:8a:53:7e:97:9c:53:0f:95:80:fd:17:63:0b:c2: 14:14:34:a7:9d:92:8d:42:eb:cf:0f:5d:09:c2:96:05: 6a:c4:4e:c8:7b:1d:89:0b:e7:77:ba:53:6b:5f:35:e0: cd:44:d4:15:3a:55:a0:d8:6e:63:72:b0:2a:ad:fb:ae Fingerprint (SHA-256): DB:78:8E:BC:12:39:D9:88:53:89:5A:17:20:EC:05:EF:2F:93:F7:31:E2:EF:59:67:3C:ED:39:64:45:8A:60:20 Fingerprint (SHA1): DA:96:10:78:B5:D5:4C:02:AC:10:64:81:5C:9F:8D:BC:2C:D7:06:86 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKE EE,O=EKUIPsecIKE,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #189: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #190: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #191: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144851 (0x3cafa853) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:25 2023 Not After : Wed Oct 18 14:49:25 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:e3:b0:44:67:c2:39:96:32:a7:ae:2f:77:25:f4:0c: d5:5b:f4:32:2e:23:37:3b:1c:fb:fd:06:f0:d3:1f:d9: 6b:08:08:55:13:0a:96:dc:3f:a9:39:6c:42:0c:5c:fd: b9:d7:4d:31:01:a7:b3:4c:4f:60:15:b8:b5:65:2b:2d: 1b:1e:1d:e3:72:35:a1:cd:d2:af:5d:97:86:8b:7e:90: df:2b:e3:d6:f0:b6:ed:d9:9b:1f:73:7f:b5:a0:5e:40: 3f:8a:fc:e1:0e:66:08:a5:93:d5:bb:b0:24:21:64:67: 0d:de:82:23:ed:ee:ba:19:2e:81:b5:16:bf:20:11:19: ad:6a:0a:64:9d:1c:ef:f0:5c:13:5a:42:7a:1f:f3:5b: 16:13:ce:b8:55:7d:07:82:a6:28:56:e5:18:9c:ef:bd: eb:e7:d9:51:36:59:19:34:bf:ab:bb:50:7f:b9:92:a5: c1:fc:11:63:c9:82:66:ab:aa:0e:f2:9c:ea:58:63:ab: 63:22:42:85:d9:60:30:60:9c:7a:d8:59:e8:48:42:9e: bc:c2:d9:4c:5c:5d:31:25:42:f7:d2:e6:21:1a:82:b4: 2a:46:15:66:32:9b:41:b7:84:89:7a:fe:24:ab:3c:4d: 00:0c:63:0c:d7:ff:0c:4b:a8:4e:e2:78:e3:1f:f2:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:11:cd:df:aa:6f:4c:3a:41:81:31:52:6b:cd:d7:c1: e1:fb:8d:81:40:52:1a:69:72:86:6c:1b:16:90:9e:fe: 08:1c:42:36:8c:08:a0:92:0e:ce:19:29:91:25:c5:bc: 80:f8:d8:2c:ae:85:00:6e:66:c9:1b:b0:16:66:51:d0: c6:35:22:5d:d1:83:38:26:e6:3f:6c:61:72:09:71:8e: b2:e4:af:58:57:e6:e8:ad:6c:3d:f9:b2:c2:6b:8f:0b: 8b:80:04:40:73:dc:f7:fb:f1:d9:b6:4c:b8:81:b8:e5: 1e:04:6c:a5:f3:16:35:ff:c8:3b:55:f1:d6:4d:e4:e1: 20:7d:54:aa:3a:1e:6e:02:75:8c:6e:63:51:ad:f8:6a: 7a:5b:79:5b:66:92:0f:41:39:a0:c6:f6:77:72:5e:7f: 33:75:43:9d:65:ba:94:91:70:b6:08:65:62:07:86:82: 63:41:3f:96:ee:d5:f1:e1:dd:d5:16:18:a5:50:f9:ca: f9:6e:8a:53:7e:97:9c:53:0f:95:80:fd:17:63:0b:c2: 14:14:34:a7:9d:92:8d:42:eb:cf:0f:5d:09:c2:96:05: 6a:c4:4e:c8:7b:1d:89:0b:e7:77:ba:53:6b:5f:35:e0: cd:44:d4:15:3a:55:a0:d8:6e:63:72:b0:2a:ad:fb:ae Fingerprint (SHA-256): DB:78:8E:BC:12:39:D9:88:53:89:5A:17:20:EC:05:EF:2F:93:F7:31:E2:EF:59:67:3C:ED:39:64:45:8A:60:20 Fingerprint (SHA1): DA:96:10:78:B5:D5:4C:02:AC:10:64:81:5C:9F:8D:BC:2C:D7:06:86 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEEnd EE,O=EKUIPsecIKEEnd,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #192: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #193: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #194: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144851 (0x3cafa853) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:25 2023 Not After : Wed Oct 18 14:49:25 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:e3:b0:44:67:c2:39:96:32:a7:ae:2f:77:25:f4:0c: d5:5b:f4:32:2e:23:37:3b:1c:fb:fd:06:f0:d3:1f:d9: 6b:08:08:55:13:0a:96:dc:3f:a9:39:6c:42:0c:5c:fd: b9:d7:4d:31:01:a7:b3:4c:4f:60:15:b8:b5:65:2b:2d: 1b:1e:1d:e3:72:35:a1:cd:d2:af:5d:97:86:8b:7e:90: df:2b:e3:d6:f0:b6:ed:d9:9b:1f:73:7f:b5:a0:5e:40: 3f:8a:fc:e1:0e:66:08:a5:93:d5:bb:b0:24:21:64:67: 0d:de:82:23:ed:ee:ba:19:2e:81:b5:16:bf:20:11:19: ad:6a:0a:64:9d:1c:ef:f0:5c:13:5a:42:7a:1f:f3:5b: 16:13:ce:b8:55:7d:07:82:a6:28:56:e5:18:9c:ef:bd: eb:e7:d9:51:36:59:19:34:bf:ab:bb:50:7f:b9:92:a5: c1:fc:11:63:c9:82:66:ab:aa:0e:f2:9c:ea:58:63:ab: 63:22:42:85:d9:60:30:60:9c:7a:d8:59:e8:48:42:9e: bc:c2:d9:4c:5c:5d:31:25:42:f7:d2:e6:21:1a:82:b4: 2a:46:15:66:32:9b:41:b7:84:89:7a:fe:24:ab:3c:4d: 00:0c:63:0c:d7:ff:0c:4b:a8:4e:e2:78:e3:1f:f2:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:11:cd:df:aa:6f:4c:3a:41:81:31:52:6b:cd:d7:c1: e1:fb:8d:81:40:52:1a:69:72:86:6c:1b:16:90:9e:fe: 08:1c:42:36:8c:08:a0:92:0e:ce:19:29:91:25:c5:bc: 80:f8:d8:2c:ae:85:00:6e:66:c9:1b:b0:16:66:51:d0: c6:35:22:5d:d1:83:38:26:e6:3f:6c:61:72:09:71:8e: b2:e4:af:58:57:e6:e8:ad:6c:3d:f9:b2:c2:6b:8f:0b: 8b:80:04:40:73:dc:f7:fb:f1:d9:b6:4c:b8:81:b8:e5: 1e:04:6c:a5:f3:16:35:ff:c8:3b:55:f1:d6:4d:e4:e1: 20:7d:54:aa:3a:1e:6e:02:75:8c:6e:63:51:ad:f8:6a: 7a:5b:79:5b:66:92:0f:41:39:a0:c6:f6:77:72:5e:7f: 33:75:43:9d:65:ba:94:91:70:b6:08:65:62:07:86:82: 63:41:3f:96:ee:d5:f1:e1:dd:d5:16:18:a5:50:f9:ca: f9:6e:8a:53:7e:97:9c:53:0f:95:80:fd:17:63:0b:c2: 14:14:34:a7:9d:92:8d:42:eb:cf:0f:5d:09:c2:96:05: 6a:c4:4e:c8:7b:1d:89:0b:e7:77:ba:53:6b:5f:35:e0: cd:44:d4:15:3a:55:a0:d8:6e:63:72:b0:2a:ad:fb:ae Fingerprint (SHA-256): DB:78:8E:BC:12:39:D9:88:53:89:5A:17:20:EC:05:EF:2F:93:F7:31:E2:EF:59:67:3C:ED:39:64:45:8A:60:20 Fingerprint (SHA1): DA:96:10:78:B5:D5:4C:02:AC:10:64:81:5C:9F:8D:BC:2C:D7:06:86 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEIntermediate EE,O=EKUIPsecIKEIntermedia te,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #195: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #196: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #197: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUAnyCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144851 (0x3cafa853) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:25 2023 Not After : Wed Oct 18 14:49:25 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:e3:b0:44:67:c2:39:96:32:a7:ae:2f:77:25:f4:0c: d5:5b:f4:32:2e:23:37:3b:1c:fb:fd:06:f0:d3:1f:d9: 6b:08:08:55:13:0a:96:dc:3f:a9:39:6c:42:0c:5c:fd: b9:d7:4d:31:01:a7:b3:4c:4f:60:15:b8:b5:65:2b:2d: 1b:1e:1d:e3:72:35:a1:cd:d2:af:5d:97:86:8b:7e:90: df:2b:e3:d6:f0:b6:ed:d9:9b:1f:73:7f:b5:a0:5e:40: 3f:8a:fc:e1:0e:66:08:a5:93:d5:bb:b0:24:21:64:67: 0d:de:82:23:ed:ee:ba:19:2e:81:b5:16:bf:20:11:19: ad:6a:0a:64:9d:1c:ef:f0:5c:13:5a:42:7a:1f:f3:5b: 16:13:ce:b8:55:7d:07:82:a6:28:56:e5:18:9c:ef:bd: eb:e7:d9:51:36:59:19:34:bf:ab:bb:50:7f:b9:92:a5: c1:fc:11:63:c9:82:66:ab:aa:0e:f2:9c:ea:58:63:ab: 63:22:42:85:d9:60:30:60:9c:7a:d8:59:e8:48:42:9e: bc:c2:d9:4c:5c:5d:31:25:42:f7:d2:e6:21:1a:82:b4: 2a:46:15:66:32:9b:41:b7:84:89:7a:fe:24:ab:3c:4d: 00:0c:63:0c:d7:ff:0c:4b:a8:4e:e2:78:e3:1f:f2:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:11:cd:df:aa:6f:4c:3a:41:81:31:52:6b:cd:d7:c1: e1:fb:8d:81:40:52:1a:69:72:86:6c:1b:16:90:9e:fe: 08:1c:42:36:8c:08:a0:92:0e:ce:19:29:91:25:c5:bc: 80:f8:d8:2c:ae:85:00:6e:66:c9:1b:b0:16:66:51:d0: c6:35:22:5d:d1:83:38:26:e6:3f:6c:61:72:09:71:8e: b2:e4:af:58:57:e6:e8:ad:6c:3d:f9:b2:c2:6b:8f:0b: 8b:80:04:40:73:dc:f7:fb:f1:d9:b6:4c:b8:81:b8:e5: 1e:04:6c:a5:f3:16:35:ff:c8:3b:55:f1:d6:4d:e4:e1: 20:7d:54:aa:3a:1e:6e:02:75:8c:6e:63:51:ad:f8:6a: 7a:5b:79:5b:66:92:0f:41:39:a0:c6:f6:77:72:5e:7f: 33:75:43:9d:65:ba:94:91:70:b6:08:65:62:07:86:82: 63:41:3f:96:ee:d5:f1:e1:dd:d5:16:18:a5:50:f9:ca: f9:6e:8a:53:7e:97:9c:53:0f:95:80:fd:17:63:0b:c2: 14:14:34:a7:9d:92:8d:42:eb:cf:0f:5d:09:c2:96:05: 6a:c4:4e:c8:7b:1d:89:0b:e7:77:ba:53:6b:5f:35:e0: cd:44:d4:15:3a:55:a0:d8:6e:63:72:b0:2a:ad:fb:ae Fingerprint (SHA-256): DB:78:8E:BC:12:39:D9:88:53:89:5A:17:20:EC:05:EF:2F:93:F7:31:E2:EF:59:67:3C:ED:39:64:45:8A:60:20 Fingerprint (SHA1): DA:96:10:78:B5:D5:4C:02:AC:10:64:81:5C:9F:8D:BC:2C:D7:06:86 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUAny EE,O=EKUAny,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #198: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #199: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #200: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUEmailCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144851 (0x3cafa853) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:25 2023 Not After : Wed Oct 18 14:49:25 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:e3:b0:44:67:c2:39:96:32:a7:ae:2f:77:25:f4:0c: d5:5b:f4:32:2e:23:37:3b:1c:fb:fd:06:f0:d3:1f:d9: 6b:08:08:55:13:0a:96:dc:3f:a9:39:6c:42:0c:5c:fd: b9:d7:4d:31:01:a7:b3:4c:4f:60:15:b8:b5:65:2b:2d: 1b:1e:1d:e3:72:35:a1:cd:d2:af:5d:97:86:8b:7e:90: df:2b:e3:d6:f0:b6:ed:d9:9b:1f:73:7f:b5:a0:5e:40: 3f:8a:fc:e1:0e:66:08:a5:93:d5:bb:b0:24:21:64:67: 0d:de:82:23:ed:ee:ba:19:2e:81:b5:16:bf:20:11:19: ad:6a:0a:64:9d:1c:ef:f0:5c:13:5a:42:7a:1f:f3:5b: 16:13:ce:b8:55:7d:07:82:a6:28:56:e5:18:9c:ef:bd: eb:e7:d9:51:36:59:19:34:bf:ab:bb:50:7f:b9:92:a5: c1:fc:11:63:c9:82:66:ab:aa:0e:f2:9c:ea:58:63:ab: 63:22:42:85:d9:60:30:60:9c:7a:d8:59:e8:48:42:9e: bc:c2:d9:4c:5c:5d:31:25:42:f7:d2:e6:21:1a:82:b4: 2a:46:15:66:32:9b:41:b7:84:89:7a:fe:24:ab:3c:4d: 00:0c:63:0c:d7:ff:0c:4b:a8:4e:e2:78:e3:1f:f2:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:11:cd:df:aa:6f:4c:3a:41:81:31:52:6b:cd:d7:c1: e1:fb:8d:81:40:52:1a:69:72:86:6c:1b:16:90:9e:fe: 08:1c:42:36:8c:08:a0:92:0e:ce:19:29:91:25:c5:bc: 80:f8:d8:2c:ae:85:00:6e:66:c9:1b:b0:16:66:51:d0: c6:35:22:5d:d1:83:38:26:e6:3f:6c:61:72:09:71:8e: b2:e4:af:58:57:e6:e8:ad:6c:3d:f9:b2:c2:6b:8f:0b: 8b:80:04:40:73:dc:f7:fb:f1:d9:b6:4c:b8:81:b8:e5: 1e:04:6c:a5:f3:16:35:ff:c8:3b:55:f1:d6:4d:e4:e1: 20:7d:54:aa:3a:1e:6e:02:75:8c:6e:63:51:ad:f8:6a: 7a:5b:79:5b:66:92:0f:41:39:a0:c6:f6:77:72:5e:7f: 33:75:43:9d:65:ba:94:91:70:b6:08:65:62:07:86:82: 63:41:3f:96:ee:d5:f1:e1:dd:d5:16:18:a5:50:f9:ca: f9:6e:8a:53:7e:97:9c:53:0f:95:80:fd:17:63:0b:c2: 14:14:34:a7:9d:92:8d:42:eb:cf:0f:5d:09:c2:96:05: 6a:c4:4e:c8:7b:1d:89:0b:e7:77:ba:53:6b:5f:35:e0: cd:44:d4:15:3a:55:a0:d8:6e:63:72:b0:2a:ad:fb:ae Fingerprint (SHA-256): DB:78:8E:BC:12:39:D9:88:53:89:5A:17:20:EC:05:EF:2F:93:F7:31:E2:EF:59:67:3C:ED:39:64:45:8A:60:20 Fingerprint (SHA1): DA:96:10:78:B5:D5:4C:02:AC:10:64:81:5C:9F:8D:BC:2C:D7:06:86 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUEmail EE,O=EKUEmail,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #201: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #202: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #203: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 - PASSED httpserv starting at Wed Oct 18 14:49:33 UTC 2023 httpserv -D -p 10007 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/aiahttp/http_pid.17687 & trying to connect to httpserv at Wed Oct 18 14:49:33 UTC 2023 tstclnt -4 -p 10007 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:10007 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 32563 >/dev/null 2>/dev/null httpserv with PID 32563 found at Wed Oct 18 14:49:33 UTC 2023 httpserv with PID 32563 started at Wed Oct 18 14:49:33 UTC 2023 chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecUserCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144851 (0x3cafa853) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:25 2023 Not After : Wed Oct 18 14:49:25 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:e3:b0:44:67:c2:39:96:32:a7:ae:2f:77:25:f4:0c: d5:5b:f4:32:2e:23:37:3b:1c:fb:fd:06:f0:d3:1f:d9: 6b:08:08:55:13:0a:96:dc:3f:a9:39:6c:42:0c:5c:fd: b9:d7:4d:31:01:a7:b3:4c:4f:60:15:b8:b5:65:2b:2d: 1b:1e:1d:e3:72:35:a1:cd:d2:af:5d:97:86:8b:7e:90: df:2b:e3:d6:f0:b6:ed:d9:9b:1f:73:7f:b5:a0:5e:40: 3f:8a:fc:e1:0e:66:08:a5:93:d5:bb:b0:24:21:64:67: 0d:de:82:23:ed:ee:ba:19:2e:81:b5:16:bf:20:11:19: ad:6a:0a:64:9d:1c:ef:f0:5c:13:5a:42:7a:1f:f3:5b: 16:13:ce:b8:55:7d:07:82:a6:28:56:e5:18:9c:ef:bd: eb:e7:d9:51:36:59:19:34:bf:ab:bb:50:7f:b9:92:a5: c1:fc:11:63:c9:82:66:ab:aa:0e:f2:9c:ea:58:63:ab: 63:22:42:85:d9:60:30:60:9c:7a:d8:59:e8:48:42:9e: bc:c2:d9:4c:5c:5d:31:25:42:f7:d2:e6:21:1a:82:b4: 2a:46:15:66:32:9b:41:b7:84:89:7a:fe:24:ab:3c:4d: 00:0c:63:0c:d7:ff:0c:4b:a8:4e:e2:78:e3:1f:f2:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:11:cd:df:aa:6f:4c:3a:41:81:31:52:6b:cd:d7:c1: e1:fb:8d:81:40:52:1a:69:72:86:6c:1b:16:90:9e:fe: 08:1c:42:36:8c:08:a0:92:0e:ce:19:29:91:25:c5:bc: 80:f8:d8:2c:ae:85:00:6e:66:c9:1b:b0:16:66:51:d0: c6:35:22:5d:d1:83:38:26:e6:3f:6c:61:72:09:71:8e: b2:e4:af:58:57:e6:e8:ad:6c:3d:f9:b2:c2:6b:8f:0b: 8b:80:04:40:73:dc:f7:fb:f1:d9:b6:4c:b8:81:b8:e5: 1e:04:6c:a5:f3:16:35:ff:c8:3b:55:f1:d6:4d:e4:e1: 20:7d:54:aa:3a:1e:6e:02:75:8c:6e:63:51:ad:f8:6a: 7a:5b:79:5b:66:92:0f:41:39:a0:c6:f6:77:72:5e:7f: 33:75:43:9d:65:ba:94:91:70:b6:08:65:62:07:86:82: 63:41:3f:96:ee:d5:f1:e1:dd:d5:16:18:a5:50:f9:ca: f9:6e:8a:53:7e:97:9c:53:0f:95:80:fd:17:63:0b:c2: 14:14:34:a7:9d:92:8d:42:eb:cf:0f:5d:09:c2:96:05: 6a:c4:4e:c8:7b:1d:89:0b:e7:77:ba:53:6b:5f:35:e0: cd:44:d4:15:3a:55:a0:d8:6e:63:72:b0:2a:ad:fb:ae Fingerprint (SHA-256): DB:78:8E:BC:12:39:D9:88:53:89:5A:17:20:EC:05:EF:2F:93:F7:31:E2:EF:59:67:3C:ED:39:64:45:8A:60:20 Fingerprint (SHA1): DA:96:10:78:B5:D5:4C:02:AC:10:64:81:5C:9F:8D:BC:2C:D7:06:86 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecUser EE,O=EKUIPsecUser,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #204: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #205: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #206: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 - PASSED tstclnt -4 -h localhost.localdomain -p 10007 -q -t 20 chains.sh: #207: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144850 (0x3cafa852) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Wed Oct 18 14:48:49 2023 Not After : Wed Oct 18 14:48:49 2073 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:7d:b0:c3:b3:4a:1f:d4:bd:26:62:5e:da:65:ba:29: b1:33:ed:d6:c1:37:b4:8b:84:a2:8c:2b:1e:8a:3b:63: 2d:23:22:0e:b7:11:33:62:7c:47:23:c9:2a:d6:3e:25: c7:99:af:31:9e:6b:b8:b4:b5:1d:48:e5:b4:08:4c:d8: ac:d2:86:d8:2d:cc:fb:76:4c:66:9e:f3:11:6c:11:fb: 43:62:8e:c1:9b:d3:64:1e:bc:a9:6b:f7:bb:9a:f8:b8: 4e:fd:35:71:5c:70:5a:f6:87:f2:56:a2:6a:f1:b2:91: d9:4d:fa:87:b0:e7:c0:17:33:ba:c0:1e:dc:55:4e:7b: a3:e7:b8:2f:21:a4:74:8c:17:69:6e:fd:ed:ff:7a:22: 60:ab:9b:39:07:74:eb:75:1d:79:df:f6:db:75:c2:47: 56:eb:46:b4:1e:30:b1:2c:b1:51:c0:df:70:42:90:24: 8d:9a:36:14:65:f2:8e:11:b7:c3:4a:72:e7:8c:51:7f: 55:8a:1f:b3:ad:e5:c5:b1:00:7c:d3:a8:1b:85:52:2d: 99:bd:58:f5:74:65:d9:2b:82:07:c9:b3:2c:60:b5:da: c1:c9:01:5c:69:fa:70:da:82:d1:39:82:24:99:3c:92: 5c:6c:5d:d2:a4:a5:03:ad:91:64:4e:d7:3a:ff:6f:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:bd:8e:0b:02:db:02:e7:a3:d3:1d:3a:8e:3f:8d:ce: 02:90:e4:59:98:29:71:60:73:90:2a:25:f8:a8:d5:59: 89:f5:72:52:09:4a:9f:ec:9c:8c:95:67:22:a7:0c:bf: 40:9b:61:02:a9:3c:af:00:06:07:c2:75:37:c3:23:a4: 46:84:72:bc:3e:20:6b:a8:73:a4:1c:13:0c:fe:58:ff: df:48:ea:61:76:f1:59:b3:c6:00:51:82:26:88:57:f5: ff:cc:78:4f:80:74:6c:01:f0:ed:48:75:f6:d9:11:6d: 5a:92:b9:01:aa:c6:44:44:97:7d:98:70:a8:ff:91:91: 9a:bc:3c:0d:4a:f2:f1:73:0b:59:48:cc:82:8a:3e:5d: 38:7d:5e:ef:95:7b:8a:46:a2:67:38:fa:02:31:d5:5c: df:4d:73:30:04:d8:a0:e4:48:f8:33:a0:3d:6a:62:c3: b5:a2:bd:4a:5e:9f:60:d3:7a:26:22:83:97:13:78:a9: 09:70:1a:03:a2:9d:71:16:7a:cb:de:f2:25:eb:6e:7b: 1c:fb:be:82:fe:0c:45:ed:4f:b8:25:39:eb:94:91:5d: 08:42:be:75:f8:3f:d8:b4:27:69:e8:30:5a:1a:88:eb: 56:ad:b2:60:c2:6e:d4:a2:20:e1:af:c2:cc:5b:fc:b5 Fingerprint (SHA-256): 98:FD:D0:A8:B0:1C:35:39:98:F3:DF:BA:EE:BC:60:23:25:45:40:00:14:55:3E:0B:89:5F:C2:FD:73:3F:7A:E4 Fingerprint (SHA1): 7C:16:4D:23:0F:0B:B5:FE:FC:7D:A4:79:ED:50:10:78:29:C8:BD:DD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #208: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #209: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #210: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 32563 at Wed Oct 18 14:49:33 UTC 2023 kill -USR1 32563 httpserv: normal termination httpserv -b -p 10007 2>/dev/null; httpserv with PID 32563 killed at Wed Oct 18 14:49:33 UTC 2023 httpserv starting at Wed Oct 18 14:49:33 UTC 2023 httpserv -D -p 10007 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/aiahttp/http_pid.17687 & trying to connect to httpserv at Wed Oct 18 14:49:33 UTC 2023 tstclnt -4 -p 10007 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:10007 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 32764 >/dev/null 2>/dev/null httpserv with PID 32764 found at Wed Oct 18 14:49:33 UTC 2023 httpserv with PID 32764 started at Wed Oct 18 14:49:33 UTC 2023 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #211: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #212: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #213: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -4 -h localhost.localdomain -p 10007 -q -t 20 chains.sh: #214: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144850 (0x3cafa852) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Wed Oct 18 14:48:49 2023 Not After : Wed Oct 18 14:48:49 2073 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:7d:b0:c3:b3:4a:1f:d4:bd:26:62:5e:da:65:ba:29: b1:33:ed:d6:c1:37:b4:8b:84:a2:8c:2b:1e:8a:3b:63: 2d:23:22:0e:b7:11:33:62:7c:47:23:c9:2a:d6:3e:25: c7:99:af:31:9e:6b:b8:b4:b5:1d:48:e5:b4:08:4c:d8: ac:d2:86:d8:2d:cc:fb:76:4c:66:9e:f3:11:6c:11:fb: 43:62:8e:c1:9b:d3:64:1e:bc:a9:6b:f7:bb:9a:f8:b8: 4e:fd:35:71:5c:70:5a:f6:87:f2:56:a2:6a:f1:b2:91: d9:4d:fa:87:b0:e7:c0:17:33:ba:c0:1e:dc:55:4e:7b: a3:e7:b8:2f:21:a4:74:8c:17:69:6e:fd:ed:ff:7a:22: 60:ab:9b:39:07:74:eb:75:1d:79:df:f6:db:75:c2:47: 56:eb:46:b4:1e:30:b1:2c:b1:51:c0:df:70:42:90:24: 8d:9a:36:14:65:f2:8e:11:b7:c3:4a:72:e7:8c:51:7f: 55:8a:1f:b3:ad:e5:c5:b1:00:7c:d3:a8:1b:85:52:2d: 99:bd:58:f5:74:65:d9:2b:82:07:c9:b3:2c:60:b5:da: c1:c9:01:5c:69:fa:70:da:82:d1:39:82:24:99:3c:92: 5c:6c:5d:d2:a4:a5:03:ad:91:64:4e:d7:3a:ff:6f:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:bd:8e:0b:02:db:02:e7:a3:d3:1d:3a:8e:3f:8d:ce: 02:90:e4:59:98:29:71:60:73:90:2a:25:f8:a8:d5:59: 89:f5:72:52:09:4a:9f:ec:9c:8c:95:67:22:a7:0c:bf: 40:9b:61:02:a9:3c:af:00:06:07:c2:75:37:c3:23:a4: 46:84:72:bc:3e:20:6b:a8:73:a4:1c:13:0c:fe:58:ff: df:48:ea:61:76:f1:59:b3:c6:00:51:82:26:88:57:f5: ff:cc:78:4f:80:74:6c:01:f0:ed:48:75:f6:d9:11:6d: 5a:92:b9:01:aa:c6:44:44:97:7d:98:70:a8:ff:91:91: 9a:bc:3c:0d:4a:f2:f1:73:0b:59:48:cc:82:8a:3e:5d: 38:7d:5e:ef:95:7b:8a:46:a2:67:38:fa:02:31:d5:5c: df:4d:73:30:04:d8:a0:e4:48:f8:33:a0:3d:6a:62:c3: b5:a2:bd:4a:5e:9f:60:d3:7a:26:22:83:97:13:78:a9: 09:70:1a:03:a2:9d:71:16:7a:cb:de:f2:25:eb:6e:7b: 1c:fb:be:82:fe:0c:45:ed:4f:b8:25:39:eb:94:91:5d: 08:42:be:75:f8:3f:d8:b4:27:69:e8:30:5a:1a:88:eb: 56:ad:b2:60:c2:6e:d4:a2:20:e1:af:c2:cc:5b:fc:b5 Fingerprint (SHA-256): 98:FD:D0:A8:B0:1C:35:39:98:F3:DF:BA:EE:BC:60:23:25:45:40:00:14:55:3E:0B:89:5F:C2:FD:73:3F:7A:E4 Fingerprint (SHA1): 7C:16:4D:23:0F:0B:B5:FE:FC:7D:A4:79:ED:50:10:78:29:C8:BD:DD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #215: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #216: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #217: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 32764 at Wed Oct 18 14:49:33 UTC 2023 kill -USR1 32764 httpserv: normal termination httpserv -b -p 10007 2>/dev/null; httpserv with PID 32764 killed at Wed Oct 18 14:49:33 UTC 2023 httpserv starting at Wed Oct 18 14:49:33 UTC 2023 httpserv -D -p 10007 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/aiahttp/http_pid.17687 & trying to connect to httpserv at Wed Oct 18 14:49:33 UTC 2023 tstclnt -4 -p 10007 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:10007 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 520 >/dev/null 2>/dev/null httpserv with PID 520 found at Wed Oct 18 14:49:33 UTC 2023 httpserv with PID 520 started at Wed Oct 18 14:49:33 UTC 2023 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #218: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #219: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144867 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #220: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #221: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #222: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144868 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #223: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #224: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #225: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #226: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018144869 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #227: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #228: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018144870 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #229: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #230: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #231: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #232: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #233: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1018144871 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #234: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #235: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #236: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #237: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #238: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144868 (0x3cafa864) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:49:34 2023 Not After : Wed Oct 18 14:49:34 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:59:4c:17:e6:50:36:72:fe:6f:47:d8:2d:cf:dd:f9: 41:76:2b:7c:d7:42:c2:3c:5e:cf:be:a0:e3:bf:d3:71: d4:11:a5:77:ab:f0:63:c5:b6:d1:1c:2a:ad:ca:c8:b1: f8:04:fe:35:c8:7c:d4:db:cd:32:a0:e1:fb:25:ee:68: 43:73:c4:12:94:28:d9:fe:3c:d8:81:1f:49:53:11:8a: 5c:0b:dc:31:89:d6:7e:37:d7:6a:13:e5:b1:00:5f:f6: 72:2f:b3:14:e9:57:66:5e:f1:50:8e:ce:f3:6f:bd:85: 83:ca:7d:ea:e6:82:06:67:3b:f2:5b:4f:4d:b1:df:f0: 26:aa:ff:4a:56:01:cb:e4:4e:2c:b0:7f:e1:02:07:e3: 8b:e3:c8:cb:f4:0e:73:de:32:f0:fb:2f:06:f4:d5:9c: ac:94:a1:93:2e:f6:da:7b:41:0d:cc:65:ee:6c:0d:b2: c1:3c:8e:58:7b:c6:08:a5:d4:b2:11:27:8f:37:39:4e: f1:f7:f2:06:ea:98:7a:85:00:38:4f:a3:1e:43:4d:e2: ea:f8:57:1d:74:11:f3:23:3d:32:53:92:67:c0:9a:6e: 77:7e:96:9c:ca:2f:c7:d3:0e:46:65:2a:86:91:7f:c0: 41:76:1b:de:b1:c0:34:57:96:14:8b:14:0f:84:cc:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:f9:b2:fc:17:50:b5:1a:d7:38:8d:b5:ab:bd:c8:84: 6b:5c:a8:93:94:86:c9:cc:c1:77:5a:8e:e1:f2:54:8d: 4d:9d:77:7c:ae:c0:e6:2b:e6:d1:ba:66:53:d0:7b:4a: 68:e2:d3:80:47:95:39:60:db:f8:3e:17:f4:3c:e8:3c: 61:d0:d8:ad:d5:aa:28:33:bf:58:0d:10:67:85:92:f2: 89:e2:17:8b:d7:ee:41:19:fe:88:3d:f9:b3:d7:07:e2: c0:b8:cb:83:6d:74:10:52:04:72:0c:44:90:8c:46:84: ec:75:83:8a:d0:29:23:18:3d:d6:b3:dd:ea:0f:ab:3d: ab:6e:7b:e8:ed:e6:4f:fb:c3:db:58:97:8e:ff:35:44: e1:d9:0e:8b:a5:fe:a9:9b:8e:b5:7f:ca:d7:e9:c6:ce: f7:cc:a5:25:14:c1:a7:a8:6f:41:d9:84:bd:33:a2:eb: 6c:84:2b:3d:68:99:70:ae:7c:63:50:4f:be:93:39:b2: 3a:f9:57:0f:52:92:7f:51:08:fd:94:a5:fb:5e:29:f4: 6c:40:c1:a2:3b:15:11:d4:08:69:59:5f:4d:14:62:4e: 48:6f:3d:87:6e:94:e3:87:d1:d1:ff:6b:ca:7e:96:32: eb:1f:1f:d1:ff:5f:b2:d5:3e:b7:c1:06:9b:fe:af:f0 Fingerprint (SHA-256): BA:C0:34:A6:35:3A:72:4B:17:EE:44:18:03:08:B6:F9:0D:83:0F:0E:62:49:27:F5:E0:34:F9:56:D1:8E:1B:7F Fingerprint (SHA1): 2E:FF:AD:A5:23:69:24:66:64:6F:5D:E1:34:5C:BB:AE:85:5B:AA:96 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #239: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144867 (0x3cafa863) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:49:34 2023 Not After : Wed Oct 18 14:49:34 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:df:0d:e0:c5:0e:c0:6f:66:c9:9e:71:21:ae:ea:1c: f6:50:b4:58:09:43:bc:87:47:e6:43:03:dc:20:7a:63: c7:b7:cf:cd:9e:23:c0:02:e0:0c:d3:41:1e:3f:eb:e1: 02:dd:07:83:48:ac:bb:1a:d9:1a:62:0b:3b:87:d8:98: 50:5b:d0:11:a0:c2:47:e8:a4:5c:8e:c6:b0:3f:a3:f3: d0:5e:d8:fd:23:84:36:d5:1b:6c:2e:2c:ec:10:98:6e: a7:c8:a9:bc:56:21:51:07:77:65:ac:9b:62:c9:79:e8: 55:08:73:11:eb:3e:57:9c:7e:c4:67:71:4b:48:da:74: 6b:c9:7a:78:24:70:ea:6e:50:fb:64:97:48:57:dd:02: 64:d9:db:87:d0:29:ec:93:73:ff:72:ac:34:c1:7f:3e: 4c:01:52:c6:4b:0c:00:1c:d3:7a:89:a4:86:b9:f2:aa: 12:f9:6a:dc:2c:c6:f8:cc:9b:85:50:68:88:67:a8:04: 3d:80:a7:d5:e8:13:0a:3c:7d:10:3a:1c:b2:54:3e:42: f7:6b:ca:55:7d:25:51:7d:83:33:ff:52:e6:72:1c:b0: f9:53:70:37:e5:b0:af:9e:6e:65:1b:27:17:48:c4:d3: 7f:92:52:a0:75:f3:7d:47:e3:27:9d:39:20:ba:7b:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:ca:a1:35:5d:18:5b:c6:1c:cc:49:e6:69:bf:86:d1: db:56:6e:0c:15:f4:a3:62:b5:29:dd:a1:59:7e:3c:f8: 7a:1f:5b:b2:f0:85:9f:48:b4:38:d9:cc:48:3a:0e:8f: e9:4b:1a:85:7a:2e:a0:26:c9:1e:57:f9:88:1f:08:20: c4:97:f0:32:bb:f0:27:89:98:67:db:e8:f2:bd:dc:38: d5:fc:41:18:69:37:5b:88:d7:8c:5f:40:95:2d:ce:a9: 45:65:bb:8a:b9:99:fd:c0:c3:ce:5d:7c:96:bd:b3:79: c7:04:48:61:59:89:1f:7f:d5:13:79:67:34:0e:ce:13: 07:6a:79:3d:4f:9e:9c:b7:37:3e:c6:43:97:68:85:05: 55:d0:8b:f0:73:ef:d4:e2:b2:e7:5d:86:91:ef:38:fb: 36:ac:f2:c7:b2:30:d3:30:ec:d7:d6:aa:bb:13:e8:03: 33:54:ec:4d:87:c4:2d:f1:14:57:f0:9a:59:e3:05:d8: 7c:2c:2c:79:33:2e:7b:1d:55:79:34:24:52:aa:b9:91: c3:47:c7:b8:d7:0e:eb:21:11:47:d6:02:91:64:64:b8: 30:81:d2:73:44:eb:8e:a1:3e:86:57:45:6e:43:cc:42: 73:05:01:cf:28:2c:a5:5c:46:8f:ee:d1:69:35:88:ad Fingerprint (SHA-256): 1C:5E:7D:87:04:3E:2E:58:A9:53:22:5B:BB:9C:50:9D:08:12:38:1C:EF:92:71:4B:F9:9C:36:53:4A:8C:F6:87 Fingerprint (SHA1): BC:41:01:09:7C:C5:82:4A:DF:79:6B:C7:B1:00:7E:B7:CE:57:50:3E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #240: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #241: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #242: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #243: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144867 (0x3cafa863) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:49:34 2023 Not After : Wed Oct 18 14:49:34 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:df:0d:e0:c5:0e:c0:6f:66:c9:9e:71:21:ae:ea:1c: f6:50:b4:58:09:43:bc:87:47:e6:43:03:dc:20:7a:63: c7:b7:cf:cd:9e:23:c0:02:e0:0c:d3:41:1e:3f:eb:e1: 02:dd:07:83:48:ac:bb:1a:d9:1a:62:0b:3b:87:d8:98: 50:5b:d0:11:a0:c2:47:e8:a4:5c:8e:c6:b0:3f:a3:f3: d0:5e:d8:fd:23:84:36:d5:1b:6c:2e:2c:ec:10:98:6e: a7:c8:a9:bc:56:21:51:07:77:65:ac:9b:62:c9:79:e8: 55:08:73:11:eb:3e:57:9c:7e:c4:67:71:4b:48:da:74: 6b:c9:7a:78:24:70:ea:6e:50:fb:64:97:48:57:dd:02: 64:d9:db:87:d0:29:ec:93:73:ff:72:ac:34:c1:7f:3e: 4c:01:52:c6:4b:0c:00:1c:d3:7a:89:a4:86:b9:f2:aa: 12:f9:6a:dc:2c:c6:f8:cc:9b:85:50:68:88:67:a8:04: 3d:80:a7:d5:e8:13:0a:3c:7d:10:3a:1c:b2:54:3e:42: f7:6b:ca:55:7d:25:51:7d:83:33:ff:52:e6:72:1c:b0: f9:53:70:37:e5:b0:af:9e:6e:65:1b:27:17:48:c4:d3: 7f:92:52:a0:75:f3:7d:47:e3:27:9d:39:20:ba:7b:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:ca:a1:35:5d:18:5b:c6:1c:cc:49:e6:69:bf:86:d1: db:56:6e:0c:15:f4:a3:62:b5:29:dd:a1:59:7e:3c:f8: 7a:1f:5b:b2:f0:85:9f:48:b4:38:d9:cc:48:3a:0e:8f: e9:4b:1a:85:7a:2e:a0:26:c9:1e:57:f9:88:1f:08:20: c4:97:f0:32:bb:f0:27:89:98:67:db:e8:f2:bd:dc:38: d5:fc:41:18:69:37:5b:88:d7:8c:5f:40:95:2d:ce:a9: 45:65:bb:8a:b9:99:fd:c0:c3:ce:5d:7c:96:bd:b3:79: c7:04:48:61:59:89:1f:7f:d5:13:79:67:34:0e:ce:13: 07:6a:79:3d:4f:9e:9c:b7:37:3e:c6:43:97:68:85:05: 55:d0:8b:f0:73:ef:d4:e2:b2:e7:5d:86:91:ef:38:fb: 36:ac:f2:c7:b2:30:d3:30:ec:d7:d6:aa:bb:13:e8:03: 33:54:ec:4d:87:c4:2d:f1:14:57:f0:9a:59:e3:05:d8: 7c:2c:2c:79:33:2e:7b:1d:55:79:34:24:52:aa:b9:91: c3:47:c7:b8:d7:0e:eb:21:11:47:d6:02:91:64:64:b8: 30:81:d2:73:44:eb:8e:a1:3e:86:57:45:6e:43:cc:42: 73:05:01:cf:28:2c:a5:5c:46:8f:ee:d1:69:35:88:ad Fingerprint (SHA-256): 1C:5E:7D:87:04:3E:2E:58:A9:53:22:5B:BB:9C:50:9D:08:12:38:1C:EF:92:71:4B:F9:9C:36:53:4A:8C:F6:87 Fingerprint (SHA1): BC:41:01:09:7C:C5:82:4A:DF:79:6B:C7:B1:00:7E:B7:CE:57:50:3E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #244: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144868 (0x3cafa864) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:49:34 2023 Not After : Wed Oct 18 14:49:34 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:59:4c:17:e6:50:36:72:fe:6f:47:d8:2d:cf:dd:f9: 41:76:2b:7c:d7:42:c2:3c:5e:cf:be:a0:e3:bf:d3:71: d4:11:a5:77:ab:f0:63:c5:b6:d1:1c:2a:ad:ca:c8:b1: f8:04:fe:35:c8:7c:d4:db:cd:32:a0:e1:fb:25:ee:68: 43:73:c4:12:94:28:d9:fe:3c:d8:81:1f:49:53:11:8a: 5c:0b:dc:31:89:d6:7e:37:d7:6a:13:e5:b1:00:5f:f6: 72:2f:b3:14:e9:57:66:5e:f1:50:8e:ce:f3:6f:bd:85: 83:ca:7d:ea:e6:82:06:67:3b:f2:5b:4f:4d:b1:df:f0: 26:aa:ff:4a:56:01:cb:e4:4e:2c:b0:7f:e1:02:07:e3: 8b:e3:c8:cb:f4:0e:73:de:32:f0:fb:2f:06:f4:d5:9c: ac:94:a1:93:2e:f6:da:7b:41:0d:cc:65:ee:6c:0d:b2: c1:3c:8e:58:7b:c6:08:a5:d4:b2:11:27:8f:37:39:4e: f1:f7:f2:06:ea:98:7a:85:00:38:4f:a3:1e:43:4d:e2: ea:f8:57:1d:74:11:f3:23:3d:32:53:92:67:c0:9a:6e: 77:7e:96:9c:ca:2f:c7:d3:0e:46:65:2a:86:91:7f:c0: 41:76:1b:de:b1:c0:34:57:96:14:8b:14:0f:84:cc:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:f9:b2:fc:17:50:b5:1a:d7:38:8d:b5:ab:bd:c8:84: 6b:5c:a8:93:94:86:c9:cc:c1:77:5a:8e:e1:f2:54:8d: 4d:9d:77:7c:ae:c0:e6:2b:e6:d1:ba:66:53:d0:7b:4a: 68:e2:d3:80:47:95:39:60:db:f8:3e:17:f4:3c:e8:3c: 61:d0:d8:ad:d5:aa:28:33:bf:58:0d:10:67:85:92:f2: 89:e2:17:8b:d7:ee:41:19:fe:88:3d:f9:b3:d7:07:e2: c0:b8:cb:83:6d:74:10:52:04:72:0c:44:90:8c:46:84: ec:75:83:8a:d0:29:23:18:3d:d6:b3:dd:ea:0f:ab:3d: ab:6e:7b:e8:ed:e6:4f:fb:c3:db:58:97:8e:ff:35:44: e1:d9:0e:8b:a5:fe:a9:9b:8e:b5:7f:ca:d7:e9:c6:ce: f7:cc:a5:25:14:c1:a7:a8:6f:41:d9:84:bd:33:a2:eb: 6c:84:2b:3d:68:99:70:ae:7c:63:50:4f:be:93:39:b2: 3a:f9:57:0f:52:92:7f:51:08:fd:94:a5:fb:5e:29:f4: 6c:40:c1:a2:3b:15:11:d4:08:69:59:5f:4d:14:62:4e: 48:6f:3d:87:6e:94:e3:87:d1:d1:ff:6b:ca:7e:96:32: eb:1f:1f:d1:ff:5f:b2:d5:3e:b7:c1:06:9b:fe:af:f0 Fingerprint (SHA-256): BA:C0:34:A6:35:3A:72:4B:17:EE:44:18:03:08:B6:F9:0D:83:0F:0E:62:49:27:F5:E0:34:F9:56:D1:8E:1B:7F Fingerprint (SHA1): 2E:FF:AD:A5:23:69:24:66:64:6F:5D:E1:34:5C:BB:AE:85:5B:AA:96 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #245: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #246: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #247: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #248: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #249: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #250: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144868 (0x3cafa864) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:49:34 2023 Not After : Wed Oct 18 14:49:34 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:59:4c:17:e6:50:36:72:fe:6f:47:d8:2d:cf:dd:f9: 41:76:2b:7c:d7:42:c2:3c:5e:cf:be:a0:e3:bf:d3:71: d4:11:a5:77:ab:f0:63:c5:b6:d1:1c:2a:ad:ca:c8:b1: f8:04:fe:35:c8:7c:d4:db:cd:32:a0:e1:fb:25:ee:68: 43:73:c4:12:94:28:d9:fe:3c:d8:81:1f:49:53:11:8a: 5c:0b:dc:31:89:d6:7e:37:d7:6a:13:e5:b1:00:5f:f6: 72:2f:b3:14:e9:57:66:5e:f1:50:8e:ce:f3:6f:bd:85: 83:ca:7d:ea:e6:82:06:67:3b:f2:5b:4f:4d:b1:df:f0: 26:aa:ff:4a:56:01:cb:e4:4e:2c:b0:7f:e1:02:07:e3: 8b:e3:c8:cb:f4:0e:73:de:32:f0:fb:2f:06:f4:d5:9c: ac:94:a1:93:2e:f6:da:7b:41:0d:cc:65:ee:6c:0d:b2: c1:3c:8e:58:7b:c6:08:a5:d4:b2:11:27:8f:37:39:4e: f1:f7:f2:06:ea:98:7a:85:00:38:4f:a3:1e:43:4d:e2: ea:f8:57:1d:74:11:f3:23:3d:32:53:92:67:c0:9a:6e: 77:7e:96:9c:ca:2f:c7:d3:0e:46:65:2a:86:91:7f:c0: 41:76:1b:de:b1:c0:34:57:96:14:8b:14:0f:84:cc:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:f9:b2:fc:17:50:b5:1a:d7:38:8d:b5:ab:bd:c8:84: 6b:5c:a8:93:94:86:c9:cc:c1:77:5a:8e:e1:f2:54:8d: 4d:9d:77:7c:ae:c0:e6:2b:e6:d1:ba:66:53:d0:7b:4a: 68:e2:d3:80:47:95:39:60:db:f8:3e:17:f4:3c:e8:3c: 61:d0:d8:ad:d5:aa:28:33:bf:58:0d:10:67:85:92:f2: 89:e2:17:8b:d7:ee:41:19:fe:88:3d:f9:b3:d7:07:e2: c0:b8:cb:83:6d:74:10:52:04:72:0c:44:90:8c:46:84: ec:75:83:8a:d0:29:23:18:3d:d6:b3:dd:ea:0f:ab:3d: ab:6e:7b:e8:ed:e6:4f:fb:c3:db:58:97:8e:ff:35:44: e1:d9:0e:8b:a5:fe:a9:9b:8e:b5:7f:ca:d7:e9:c6:ce: f7:cc:a5:25:14:c1:a7:a8:6f:41:d9:84:bd:33:a2:eb: 6c:84:2b:3d:68:99:70:ae:7c:63:50:4f:be:93:39:b2: 3a:f9:57:0f:52:92:7f:51:08:fd:94:a5:fb:5e:29:f4: 6c:40:c1:a2:3b:15:11:d4:08:69:59:5f:4d:14:62:4e: 48:6f:3d:87:6e:94:e3:87:d1:d1:ff:6b:ca:7e:96:32: eb:1f:1f:d1:ff:5f:b2:d5:3e:b7:c1:06:9b:fe:af:f0 Fingerprint (SHA-256): BA:C0:34:A6:35:3A:72:4B:17:EE:44:18:03:08:B6:F9:0D:83:0F:0E:62:49:27:F5:E0:34:F9:56:D1:8E:1B:7F Fingerprint (SHA1): 2E:FF:AD:A5:23:69:24:66:64:6F:5D:E1:34:5C:BB:AE:85:5B:AA:96 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #251: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144868 (0x3cafa864) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:49:34 2023 Not After : Wed Oct 18 14:49:34 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:59:4c:17:e6:50:36:72:fe:6f:47:d8:2d:cf:dd:f9: 41:76:2b:7c:d7:42:c2:3c:5e:cf:be:a0:e3:bf:d3:71: d4:11:a5:77:ab:f0:63:c5:b6:d1:1c:2a:ad:ca:c8:b1: f8:04:fe:35:c8:7c:d4:db:cd:32:a0:e1:fb:25:ee:68: 43:73:c4:12:94:28:d9:fe:3c:d8:81:1f:49:53:11:8a: 5c:0b:dc:31:89:d6:7e:37:d7:6a:13:e5:b1:00:5f:f6: 72:2f:b3:14:e9:57:66:5e:f1:50:8e:ce:f3:6f:bd:85: 83:ca:7d:ea:e6:82:06:67:3b:f2:5b:4f:4d:b1:df:f0: 26:aa:ff:4a:56:01:cb:e4:4e:2c:b0:7f:e1:02:07:e3: 8b:e3:c8:cb:f4:0e:73:de:32:f0:fb:2f:06:f4:d5:9c: ac:94:a1:93:2e:f6:da:7b:41:0d:cc:65:ee:6c:0d:b2: c1:3c:8e:58:7b:c6:08:a5:d4:b2:11:27:8f:37:39:4e: f1:f7:f2:06:ea:98:7a:85:00:38:4f:a3:1e:43:4d:e2: ea:f8:57:1d:74:11:f3:23:3d:32:53:92:67:c0:9a:6e: 77:7e:96:9c:ca:2f:c7:d3:0e:46:65:2a:86:91:7f:c0: 41:76:1b:de:b1:c0:34:57:96:14:8b:14:0f:84:cc:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c5:f9:b2:fc:17:50:b5:1a:d7:38:8d:b5:ab:bd:c8:84: 6b:5c:a8:93:94:86:c9:cc:c1:77:5a:8e:e1:f2:54:8d: 4d:9d:77:7c:ae:c0:e6:2b:e6:d1:ba:66:53:d0:7b:4a: 68:e2:d3:80:47:95:39:60:db:f8:3e:17:f4:3c:e8:3c: 61:d0:d8:ad:d5:aa:28:33:bf:58:0d:10:67:85:92:f2: 89:e2:17:8b:d7:ee:41:19:fe:88:3d:f9:b3:d7:07:e2: c0:b8:cb:83:6d:74:10:52:04:72:0c:44:90:8c:46:84: ec:75:83:8a:d0:29:23:18:3d:d6:b3:dd:ea:0f:ab:3d: ab:6e:7b:e8:ed:e6:4f:fb:c3:db:58:97:8e:ff:35:44: e1:d9:0e:8b:a5:fe:a9:9b:8e:b5:7f:ca:d7:e9:c6:ce: f7:cc:a5:25:14:c1:a7:a8:6f:41:d9:84:bd:33:a2:eb: 6c:84:2b:3d:68:99:70:ae:7c:63:50:4f:be:93:39:b2: 3a:f9:57:0f:52:92:7f:51:08:fd:94:a5:fb:5e:29:f4: 6c:40:c1:a2:3b:15:11:d4:08:69:59:5f:4d:14:62:4e: 48:6f:3d:87:6e:94:e3:87:d1:d1:ff:6b:ca:7e:96:32: eb:1f:1f:d1:ff:5f:b2:d5:3e:b7:c1:06:9b:fe:af:f0 Fingerprint (SHA-256): BA:C0:34:A6:35:3A:72:4B:17:EE:44:18:03:08:B6:F9:0D:83:0F:0E:62:49:27:F5:E0:34:F9:56:D1:8E:1B:7F Fingerprint (SHA1): 2E:FF:AD:A5:23:69:24:66:64:6F:5D:E1:34:5C:BB:AE:85:5B:AA:96 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #252: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #253: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #254: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #255: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #256: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #257: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144867 (0x3cafa863) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:49:34 2023 Not After : Wed Oct 18 14:49:34 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:df:0d:e0:c5:0e:c0:6f:66:c9:9e:71:21:ae:ea:1c: f6:50:b4:58:09:43:bc:87:47:e6:43:03:dc:20:7a:63: c7:b7:cf:cd:9e:23:c0:02:e0:0c:d3:41:1e:3f:eb:e1: 02:dd:07:83:48:ac:bb:1a:d9:1a:62:0b:3b:87:d8:98: 50:5b:d0:11:a0:c2:47:e8:a4:5c:8e:c6:b0:3f:a3:f3: d0:5e:d8:fd:23:84:36:d5:1b:6c:2e:2c:ec:10:98:6e: a7:c8:a9:bc:56:21:51:07:77:65:ac:9b:62:c9:79:e8: 55:08:73:11:eb:3e:57:9c:7e:c4:67:71:4b:48:da:74: 6b:c9:7a:78:24:70:ea:6e:50:fb:64:97:48:57:dd:02: 64:d9:db:87:d0:29:ec:93:73:ff:72:ac:34:c1:7f:3e: 4c:01:52:c6:4b:0c:00:1c:d3:7a:89:a4:86:b9:f2:aa: 12:f9:6a:dc:2c:c6:f8:cc:9b:85:50:68:88:67:a8:04: 3d:80:a7:d5:e8:13:0a:3c:7d:10:3a:1c:b2:54:3e:42: f7:6b:ca:55:7d:25:51:7d:83:33:ff:52:e6:72:1c:b0: f9:53:70:37:e5:b0:af:9e:6e:65:1b:27:17:48:c4:d3: 7f:92:52:a0:75:f3:7d:47:e3:27:9d:39:20:ba:7b:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:ca:a1:35:5d:18:5b:c6:1c:cc:49:e6:69:bf:86:d1: db:56:6e:0c:15:f4:a3:62:b5:29:dd:a1:59:7e:3c:f8: 7a:1f:5b:b2:f0:85:9f:48:b4:38:d9:cc:48:3a:0e:8f: e9:4b:1a:85:7a:2e:a0:26:c9:1e:57:f9:88:1f:08:20: c4:97:f0:32:bb:f0:27:89:98:67:db:e8:f2:bd:dc:38: d5:fc:41:18:69:37:5b:88:d7:8c:5f:40:95:2d:ce:a9: 45:65:bb:8a:b9:99:fd:c0:c3:ce:5d:7c:96:bd:b3:79: c7:04:48:61:59:89:1f:7f:d5:13:79:67:34:0e:ce:13: 07:6a:79:3d:4f:9e:9c:b7:37:3e:c6:43:97:68:85:05: 55:d0:8b:f0:73:ef:d4:e2:b2:e7:5d:86:91:ef:38:fb: 36:ac:f2:c7:b2:30:d3:30:ec:d7:d6:aa:bb:13:e8:03: 33:54:ec:4d:87:c4:2d:f1:14:57:f0:9a:59:e3:05:d8: 7c:2c:2c:79:33:2e:7b:1d:55:79:34:24:52:aa:b9:91: c3:47:c7:b8:d7:0e:eb:21:11:47:d6:02:91:64:64:b8: 30:81:d2:73:44:eb:8e:a1:3e:86:57:45:6e:43:cc:42: 73:05:01:cf:28:2c:a5:5c:46:8f:ee:d1:69:35:88:ad Fingerprint (SHA-256): 1C:5E:7D:87:04:3E:2E:58:A9:53:22:5B:BB:9C:50:9D:08:12:38:1C:EF:92:71:4B:F9:9C:36:53:4A:8C:F6:87 Fingerprint (SHA1): BC:41:01:09:7C:C5:82:4A:DF:79:6B:C7:B1:00:7E:B7:CE:57:50:3E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #258: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144867 (0x3cafa863) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:49:34 2023 Not After : Wed Oct 18 14:49:34 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:df:0d:e0:c5:0e:c0:6f:66:c9:9e:71:21:ae:ea:1c: f6:50:b4:58:09:43:bc:87:47:e6:43:03:dc:20:7a:63: c7:b7:cf:cd:9e:23:c0:02:e0:0c:d3:41:1e:3f:eb:e1: 02:dd:07:83:48:ac:bb:1a:d9:1a:62:0b:3b:87:d8:98: 50:5b:d0:11:a0:c2:47:e8:a4:5c:8e:c6:b0:3f:a3:f3: d0:5e:d8:fd:23:84:36:d5:1b:6c:2e:2c:ec:10:98:6e: a7:c8:a9:bc:56:21:51:07:77:65:ac:9b:62:c9:79:e8: 55:08:73:11:eb:3e:57:9c:7e:c4:67:71:4b:48:da:74: 6b:c9:7a:78:24:70:ea:6e:50:fb:64:97:48:57:dd:02: 64:d9:db:87:d0:29:ec:93:73:ff:72:ac:34:c1:7f:3e: 4c:01:52:c6:4b:0c:00:1c:d3:7a:89:a4:86:b9:f2:aa: 12:f9:6a:dc:2c:c6:f8:cc:9b:85:50:68:88:67:a8:04: 3d:80:a7:d5:e8:13:0a:3c:7d:10:3a:1c:b2:54:3e:42: f7:6b:ca:55:7d:25:51:7d:83:33:ff:52:e6:72:1c:b0: f9:53:70:37:e5:b0:af:9e:6e:65:1b:27:17:48:c4:d3: 7f:92:52:a0:75:f3:7d:47:e3:27:9d:39:20:ba:7b:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:ca:a1:35:5d:18:5b:c6:1c:cc:49:e6:69:bf:86:d1: db:56:6e:0c:15:f4:a3:62:b5:29:dd:a1:59:7e:3c:f8: 7a:1f:5b:b2:f0:85:9f:48:b4:38:d9:cc:48:3a:0e:8f: e9:4b:1a:85:7a:2e:a0:26:c9:1e:57:f9:88:1f:08:20: c4:97:f0:32:bb:f0:27:89:98:67:db:e8:f2:bd:dc:38: d5:fc:41:18:69:37:5b:88:d7:8c:5f:40:95:2d:ce:a9: 45:65:bb:8a:b9:99:fd:c0:c3:ce:5d:7c:96:bd:b3:79: c7:04:48:61:59:89:1f:7f:d5:13:79:67:34:0e:ce:13: 07:6a:79:3d:4f:9e:9c:b7:37:3e:c6:43:97:68:85:05: 55:d0:8b:f0:73:ef:d4:e2:b2:e7:5d:86:91:ef:38:fb: 36:ac:f2:c7:b2:30:d3:30:ec:d7:d6:aa:bb:13:e8:03: 33:54:ec:4d:87:c4:2d:f1:14:57:f0:9a:59:e3:05:d8: 7c:2c:2c:79:33:2e:7b:1d:55:79:34:24:52:aa:b9:91: c3:47:c7:b8:d7:0e:eb:21:11:47:d6:02:91:64:64:b8: 30:81:d2:73:44:eb:8e:a1:3e:86:57:45:6e:43:cc:42: 73:05:01:cf:28:2c:a5:5c:46:8f:ee:d1:69:35:88:ad Fingerprint (SHA-256): 1C:5E:7D:87:04:3E:2E:58:A9:53:22:5B:BB:9C:50:9D:08:12:38:1C:EF:92:71:4B:F9:9C:36:53:4A:8C:F6:87 Fingerprint (SHA1): BC:41:01:09:7C:C5:82:4A:DF:79:6B:C7:B1:00:7E:B7:CE:57:50:3E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #259: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #260: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144872 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #261: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #262: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #263: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144873 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #264: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #265: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #266: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144874 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #267: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #268: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #269: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144875 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #270: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #271: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #272: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144876 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #273: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #274: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #275: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144877 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #276: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #277: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #278: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144878 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #279: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #280: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #281: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144879 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #282: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #283: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #284: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144880 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #285: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #286: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #287: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #288: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1018144881 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #289: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #290: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1018144882 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #291: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #292: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1018144883 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #293: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #294: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #295: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #296: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #297: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1018144884 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #298: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #299: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1018144885 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #300: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #301: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1018144886 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #302: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #303: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #304: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #305: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #306: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1018144887 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #307: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #308: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1018144888 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #309: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #310: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1018144889 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #311: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #312: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #313: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #314: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #315: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1018144890 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #316: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #317: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1018144891 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #318: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #319: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1018144892 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #320: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #321: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #322: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #323: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #324: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1018144893 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #325: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #326: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #327: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #328: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018144894 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #329: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #330: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144872 (0x3cafa868) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Wed Oct 18 14:49:37 2023 Not After : Wed Oct 18 14:49:37 2073 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:a0:1e:58:b6:5c:12:ad:51:31:45:c1:5c:d5:eb:c9: b3:59:c5:5b:89:37:53:8b:40:72:48:d8:2c:c6:2e:2e: 81:e4:67:c3:93:8c:33:a2:bc:06:fd:36:83:76:22:32: 74:b5:af:8c:84:18:90:2d:22:45:d3:96:4e:9a:27:b5: d2:e3:07:23:fa:c0:a9:84:14:af:55:fd:8d:bb:aa:5c: f1:3f:27:22:e5:b2:8a:75:b7:52:96:81:9c:60:8d:14: f6:79:ed:fa:0d:0b:f4:5c:c3:68:98:d8:05:92:8b:58: 77:49:9e:1e:af:f3:10:58:c9:ef:58:1c:60:74:b2:38: 61:96:5d:50:0a:12:54:fb:12:f9:78:80:a0:6c:94:eb: 55:10:66:39:a9:20:c8:4d:10:64:69:4a:29:e1:e7:4d: 13:32:41:8a:de:17:98:be:d8:a7:cd:60:ad:c0:76:11: 57:30:57:31:75:4e:e2:5a:8b:ed:f5:c9:3d:9f:79:b5: 60:fe:41:97:98:1d:58:55:eb:b5:f0:48:06:e3:b6:76: dc:90:18:29:c2:85:b7:13:fd:25:0d:7a:d1:a4:c1:63: 8b:e5:39:5b:7b:d0:00:67:b6:ec:91:d7:6a:f7:1b:89: 4f:e9:ea:fe:52:6e:b5:b9:d5:bd:09:25:44:00:5c:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b1:ca:c5:0e:cb:1b:a4:c3:7a:16:4a:9e:4c:78:42:7e: 29:a6:5b:55:b4:d7:52:19:f2:f2:c7:50:e3:30:3c:92: 2f:ad:65:40:66:7d:31:83:e4:62:bf:ce:93:27:96:5b: 8a:3c:45:a5:94:e6:36:8c:9b:fd:a3:4f:ce:3e:32:c8: be:25:13:b9:57:70:e3:37:c7:87:fd:63:7d:d2:d3:e5: bb:f0:84:ed:e2:61:16:e1:7b:30:0a:df:6c:9a:0e:80: ed:87:d6:61:89:52:c9:f4:2b:4a:66:5a:98:4b:91:8f: 5d:6b:f1:e1:a6:bf:4c:e3:b0:a9:29:5f:fe:a1:68:1d: bf:ec:4a:d1:60:2b:65:d4:56:ef:ad:cb:43:b3:b2:88: dd:d8:6d:8e:84:bf:2b:e4:cc:33:9b:ec:65:2c:0b:95: 7c:3a:2c:e0:dc:33:a6:49:e7:8f:a9:8e:6b:72:42:ac: 9b:8b:e7:9d:76:aa:95:ec:43:df:a7:4f:e7:74:85:82: 4e:81:21:82:f4:db:7c:63:0e:2e:2c:d3:46:5d:4d:66: 51:f8:30:05:fa:36:6d:1b:6f:df:8f:f6:91:99:62:53: 79:ff:98:46:2a:a9:b0:76:f8:02:e2:5d:f3:4a:47:50: db:cd:3b:09:dc:b8:28:e3:8d:1f:80:3e:68:22:13:8c Fingerprint (SHA-256): 0A:9B:E3:D2:EE:09:9F:39:E9:16:BB:D3:F6:15:9F:CB:58:81:0F:00:3E:4E:20:6D:89:03:A1:FE:BA:F7:2A:08 Fingerprint (SHA1): 4D:B1:07:7C:64:A0:62:33:DC:74:B8:78:64:3B:DE:8C:07:8C:44:6C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #331: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144873 (0x3cafa869) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Wed Oct 18 14:49:37 2023 Not After : Wed Oct 18 14:49:37 2073 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: be:5a:71:76:93:ec:fe:61:67:db:4b:81:9e:f1:c1:d3: 3e:a6:a1:ff:4a:fd:4c:ae:0a:fb:07:8b:b6:af:c3:03: a0:51:74:f4:2b:82:de:8e:6f:0f:7d:4d:ec:a8:45:22: 6d:e1:1e:07:a6:c5:a2:7a:f0:15:2d:2c:b0:98:06:a4: f3:10:14:af:4a:49:17:76:b1:30:3a:f1:e4:ae:11:18: 04:81:70:09:ff:75:3e:5f:b9:55:af:ef:41:d0:d6:b1: e7:e0:02:d6:3b:be:83:87:14:5b:ab:4d:e7:d1:87:be: 68:ea:55:f8:5e:2f:2b:2a:25:dd:a9:9e:d3:d2:3b:06: af:6a:49:38:9a:3a:70:c9:c3:e5:a4:a8:b7:b1:1c:91: 3f:4a:68:16:e1:c8:f8:80:03:12:70:23:ca:4a:66:21: 1e:db:74:52:10:79:8e:b8:0b:ea:bd:eb:3a:e1:fd:0c: 49:55:ea:2b:c5:eb:aa:7f:3f:75:9d:c5:3e:cd:07:53: c8:be:87:cf:4e:0b:85:ee:dc:4c:cb:a8:c2:b8:8f:66: 0d:47:48:8c:5d:c6:79:0d:03:eb:74:39:22:7c:f0:16: 6a:d5:6c:74:03:b5:4e:1b:e6:bf:9c:d0:4f:b9:f5:39: 09:a3:1b:21:7d:1f:88:c0:ff:28:e9:b0:5d:c0:31:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 42:33:42:e1:aa:23:bf:f9:38:75:87:d2:e5:8e:18:26: 74:77:61:40:de:7b:cc:3f:d3:f3:99:44:7a:ec:2e:32: c0:ff:99:ad:e4:c6:0e:21:8a:98:a3:49:f8:47:29:b7: 03:52:a3:84:e3:ef:f0:1c:09:f0:93:56:bb:8d:27:6e: f5:da:7f:cd:4a:ad:87:1f:79:3b:b8:d0:d3:56:04:cd: b1:b4:29:5a:aa:33:aa:dc:85:4a:6c:d9:5a:b9:2c:5f: e7:2b:df:1d:e3:f5:38:52:42:8f:06:21:14:84:53:d9: 91:2a:29:36:e2:11:49:62:dc:f5:78:01:4e:2b:df:24: 56:1c:1b:0c:33:95:05:bc:c3:81:59:cb:29:b0:df:dc: e5:83:36:fe:8c:63:4a:af:95:5f:71:c1:12:14:c2:59: d6:3f:11:f2:83:97:1e:36:12:97:a6:04:80:a5:72:27: 76:28:8f:cc:72:b4:b6:02:c2:b6:d4:05:7d:c5:74:37: b6:39:0c:d2:14:65:7e:5f:e1:48:2e:67:f1:e7:d2:49: 8c:0d:f3:35:ef:15:15:8d:63:f1:3b:46:a9:d3:b6:18: d0:fe:f5:b6:8e:44:74:86:1a:59:7e:f5:3a:37:c6:5d: b7:50:e1:be:ce:31:28:f9:83:a3:c3:8a:2e:26:29:eb Fingerprint (SHA-256): D6:9C:A7:48:75:9A:92:E0:15:66:29:CF:E0:79:89:27:CD:B4:4D:7E:BE:FC:08:CC:1D:4A:84:82:E1:B6:00:45 Fingerprint (SHA1): 49:49:A4:CF:44:27:48:9D:67:5C:F3:F0:F4:5C:3D:E9:18:F9:12:00 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #332: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144874 (0x3cafa86a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Wed Oct 18 14:49:37 2023 Not After : Wed Oct 18 14:49:37 2073 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:74:a1:2d:bd:34:23:d5:d2:7b:d9:5c:68:8d:86:78: ca:46:de:a6:d2:bb:e9:b0:15:22:71:df:47:ae:6f:b5: bd:c2:92:1b:01:93:d0:f4:f8:11:c1:74:67:be:15:57: 06:be:57:db:1f:35:92:92:23:98:6a:f5:52:b9:bb:a4: 08:0f:cf:65:36:7b:05:b3:d5:81:04:55:27:dd:a0:38: a0:fd:1a:b2:ce:43:45:c0:33:a9:69:f9:a8:16:ed:3e: cc:bf:0e:80:1b:d0:0b:42:75:2a:a9:c4:25:7a:04:68: f1:9f:11:1d:da:cf:22:5d:eb:03:b7:c5:b4:9c:01:80: ca:66:6b:3b:7d:49:de:c2:a2:f7:4d:6b:3a:df:58:e8: d8:61:1b:d7:fa:dd:db:33:0c:82:09:cb:a7:63:87:fb: ba:fe:c5:97:e3:40:ab:09:b1:18:d4:b7:24:cd:42:d9: 0d:93:a2:00:60:72:55:4e:9a:17:96:64:07:cd:d0:a1: e3:49:c0:d8:b8:60:3b:bc:2f:fd:5b:35:01:af:29:5d: 08:9e:0d:6b:b2:13:a8:88:c0:89:84:0b:ea:6f:92:9a: cb:01:12:0d:54:90:bf:04:42:02:ca:16:a8:9e:83:e3: 9e:51:34:51:db:cf:35:92:d8:aa:a2:ac:d2:5d:0f:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:cc:be:f3:1f:0e:f0:92:10:90:90:40:8e:46:4a:50: dc:c9:e7:a5:0d:0f:24:22:01:fe:2e:d7:5b:91:f0:da: f1:42:58:1d:1e:2b:14:43:40:9f:cf:3d:5a:3d:92:c5: b7:16:c3:0c:2b:36:ca:3a:be:43:58:63:03:36:71:f5: 55:57:6d:fc:16:82:66:a8:57:fb:bc:3d:e3:81:02:72: 63:2d:01:a9:f7:68:78:bd:fb:3c:ff:6d:7b:ff:84:b1: 90:fa:6c:43:54:c3:c2:b3:b9:36:76:cb:83:ba:04:e0: 99:32:e7:90:76:21:2f:cd:af:ac:9c:e0:f4:82:88:60: a5:a7:59:ba:13:8c:b1:96:85:0d:56:b8:8d:26:9f:eb: bc:c4:81:fd:cb:05:32:cb:fb:79:ff:ff:c0:13:d7:c3: af:31:a2:d4:82:85:26:2f:bd:04:a6:b7:2e:e9:b5:71: 8f:8a:db:bc:d6:c6:dc:c3:e2:a5:f9:0a:03:b8:1b:88: d7:46:44:bb:d9:44:03:bf:2f:d1:49:95:96:1b:74:0c: c9:63:12:b6:a0:63:24:1a:b1:56:14:d6:98:99:92:4a: c5:1d:4b:32:b0:02:25:42:28:67:4f:9c:ea:69:22:84: 61:13:58:5f:18:90:61:89:57:e9:b6:97:4a:f7:2f:e6 Fingerprint (SHA-256): 60:3B:B5:AA:76:63:D8:AA:67:CA:2E:60:D8:2F:5C:7D:CC:8D:BA:FB:58:00:D1:7A:D4:9D:E2:2B:0F:A2:16:9C Fingerprint (SHA1): B1:F6:AD:7B:E3:4A:D8:56:BF:59:17:D9:A4:AC:49:F2:BE:9B:EA:1A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #333: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144875 (0x3cafa86b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Wed Oct 18 14:49:38 2023 Not After : Wed Oct 18 14:49:38 2073 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:fd:f9:0c:43:b6:22:82:4c:3f:1e:a0:d3:76:78:62: 9c:06:82:f6:4c:12:97:c9:2a:2a:ea:ff:cc:0a:72:df: 5b:46:a1:97:7e:70:87:fc:70:af:ea:ae:3f:b5:88:a3: fd:ed:b6:9e:f2:bf:80:10:e4:47:91:21:c1:70:50:db: bb:25:5d:81:e8:f5:d6:c3:e5:01:eb:bd:82:b8:ab:1b: a1:1e:61:ef:e2:79:55:00:dd:89:04:e6:16:3b:44:4e: 82:47:1a:ea:8a:c0:a9:eb:3f:3c:d7:8b:e4:1c:34:fd: a9:05:4f:e2:d3:ae:e4:68:f9:a4:fc:8b:57:8f:93:f3: e5:66:b3:1e:91:4f:0f:9f:ad:a4:e9:ad:cd:89:6f:b8: c0:70:ae:f3:9f:bd:32:98:c1:36:73:ee:6b:81:5e:53: 8e:2f:e3:78:78:e0:b7:2f:73:66:f2:40:9d:fd:03:68: d2:48:be:b5:a0:bc:0f:3f:56:8f:26:7b:58:d2:28:55: fe:db:5c:3c:fc:b8:72:9b:46:11:33:a4:d2:d2:02:88: 8c:ce:d3:c4:a0:be:af:18:67:9a:4b:e0:a7:e0:0a:e0: 2c:7d:f7:81:66:e1:8e:3c:40:e6:89:48:75:53:72:00: 81:48:2d:4e:b6:4b:24:37:31:89:0e:c1:b1:c6:8d:49 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 21:a0:52:0c:e3:9a:89:80:22:38:45:d5:0b:2d:d4:de: 71:78:af:a9:82:ad:9f:ef:e6:1d:7c:56:5c:c6:07:e3: 09:26:5a:81:df:54:6b:11:45:40:96:c3:51:86:ed:f3: 93:11:fa:c9:3a:b5:af:4c:14:80:c7:ff:b7:c2:08:b1: 7b:83:61:63:d7:c7:bd:44:97:9d:91:be:e9:b0:2d:10: ab:4d:b4:3b:24:5c:a3:99:46:42:8b:90:cb:f3:03:e3: 51:30:9e:d0:ef:d8:16:d6:ad:d0:3b:58:3c:f9:8a:2d: a7:39:e9:43:87:09:9f:9f:39:2d:ab:39:4b:8b:a2:7f: 40:8f:8d:0e:25:ac:b5:e3:68:0b:ae:cd:64:aa:18:bd: 87:a4:65:23:57:df:f3:7d:ee:9a:7f:c8:9f:bb:74:83: 71:07:93:77:28:9f:c1:82:1e:d5:66:d5:2e:72:76:ce: 0b:23:d5:5c:01:55:38:5c:8b:7d:07:0a:b0:01:8e:22: 8e:f6:37:c9:52:53:98:6e:de:a8:6f:42:65:d9:22:7c: 78:3d:b8:c6:a7:48:c0:d0:21:02:05:67:49:0d:7d:7a: 92:55:75:db:13:49:f2:43:e4:26:13:84:23:39:33:e4: 39:7c:24:ee:cb:d1:7f:c4:66:ce:d0:5e:2c:ba:14:60 Fingerprint (SHA-256): 4D:41:12:BD:8E:BF:F8:C2:BD:4F:28:C7:B0:0B:E0:CD:D3:2B:07:75:B5:B8:91:05:A8:1A:46:6B:E9:84:0B:44 Fingerprint (SHA1): 57:E1:A8:B5:C6:B8:CE:F8:CE:73:07:00:E7:E3:71:98:A4:B9:CF:B1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #334: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144876 (0x3cafa86c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Wed Oct 18 14:49:38 2023 Not After : Wed Oct 18 14:49:38 2073 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:31:ed:51:a2:cc:4c:56:62:9b:a4:b7:4f:92:71:41: 6f:20:4d:03:1b:36:b0:6c:d1:40:2b:43:ec:38:af:82: bc:66:25:27:64:31:52:24:b2:1b:17:8d:7e:00:15:8e: 15:87:ef:08:93:7c:bf:dc:aa:12:28:36:8d:25:7a:d0: 80:ac:d2:8c:21:1b:99:ac:77:1d:28:7d:1f:be:a6:d0: 72:0e:96:25:e5:7e:5c:e9:09:3e:c3:39:05:1d:2c:66: 34:41:e9:1e:9b:82:b1:90:05:02:03:82:b5:d3:f6:94: 3d:2c:be:7d:f1:1c:83:f1:03:75:47:0f:50:ed:9f:bc: 38:34:f7:d8:0f:af:1b:0f:4f:64:33:66:0a:3c:34:8a: 50:08:e3:39:41:f7:e9:19:6f:ea:9e:21:9d:bc:1a:72: c9:3b:c3:98:93:50:46:4e:4d:51:e1:16:e9:29:0e:82: 16:3d:80:4f:e1:70:16:85:cd:5f:72:28:b3:2d:8f:0f: 97:07:01:97:e7:1d:8c:50:07:04:d2:60:44:60:f6:12: ec:d0:35:d1:94:82:39:d6:f0:c0:63:77:f8:50:e1:cd: 12:7e:9e:9d:b0:80:92:7e:46:07:3d:bc:14:ee:e5:9d: 0d:d1:98:86:0c:8c:e4:90:3c:8e:7d:e3:f4:0a:82:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 47:60:d2:2a:d9:76:0f:e2:eb:ba:6f:94:70:85:08:90: 91:10:93:59:65:57:4a:2f:f8:55:84:21:bd:f3:f9:aa: 60:33:35:60:ab:a7:c6:d3:6a:c3:11:69:8a:23:22:1c: c3:16:37:60:eb:f1:aa:af:36:73:ac:9d:14:5a:6a:e1: 5a:78:49:81:43:83:c4:31:10:08:77:c8:a3:4b:e6:b1: 84:8a:d3:86:93:a0:2f:6a:7d:6c:81:91:8b:07:ec:ad: 7a:b4:ce:56:05:82:c2:5a:38:73:a9:b7:df:bd:0a:37: d0:fe:9d:08:70:81:8e:b6:fc:e4:8f:a8:8a:9f:63:77: 0b:1a:ac:82:81:40:67:6b:ac:2b:ce:47:f2:c8:c6:82: e4:97:fe:e4:a3:39:97:a6:c7:05:be:bd:d7:a0:d8:2a: f2:ad:20:14:06:29:4a:73:b6:a5:56:1d:34:e1:fd:3d: 18:0f:38:21:58:45:03:2d:24:ea:45:66:30:51:9a:11: 51:8b:3a:8f:12:5e:44:d5:11:7e:fd:b1:34:00:3a:20: 31:c4:b8:d0:36:ec:46:80:ee:c7:32:07:ff:69:d4:29: 15:cf:99:b3:1b:80:89:51:a8:de:be:34:1b:c1:9f:f8: ce:0d:32:13:5f:19:32:4c:b7:11:e3:7c:47:fc:7f:cd Fingerprint (SHA-256): C7:67:F4:D9:D0:DB:A3:24:C2:F5:4E:7C:35:03:73:E8:64:EA:B4:40:68:90:49:72:43:8A:70:AF:91:19:E5:A6 Fingerprint (SHA1): CB:F3:F5:1C:A9:75:84:10:19:F4:DE:83:A7:0E:BB:83:86:11:8B:6E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #335: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144877 (0x3cafa86d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Wed Oct 18 14:49:38 2023 Not After : Wed Oct 18 14:49:38 2073 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:35:e2:cb:1c:95:ce:96:73:c4:c1:c3:a0:02:49:82: 63:eb:3f:5f:3d:c9:ae:6b:1d:93:20:c1:34:18:f5:02: 19:57:b4:bf:b8:6b:0d:25:c2:ea:1d:64:7c:3e:48:0f: b5:80:82:ab:dc:d7:2d:18:a0:16:68:00:7c:24:c7:7a: 10:6c:ad:b5:ec:8a:00:be:85:58:e8:d6:f1:ae:b9:e3: a3:e8:54:75:fe:35:2e:e2:57:21:4c:ca:a6:f7:09:1c: 83:1a:ca:60:64:7b:07:d8:96:98:dd:80:40:8d:3e:0b: cb:fd:94:c0:de:de:c2:c5:ae:e3:6d:92:d7:8c:bf:16: 45:1e:38:58:48:b2:91:f7:f8:5a:7e:70:a3:d2:0e:0a: 41:87:31:7a:0a:47:ff:54:4d:26:a3:66:52:1d:5a:ff: 29:54:db:40:e6:ed:97:c7:f2:82:10:d2:9c:56:f8:04: ab:68:ee:8c:81:c3:46:d8:ef:2c:0c:71:88:5d:c2:3c: 25:cc:f2:66:00:40:f7:af:d4:a3:94:48:06:9a:2c:3b: 86:ca:e5:49:0a:24:19:2c:17:c9:11:8a:70:93:dd:bc: 3c:cc:ac:c2:5f:1e:b1:ba:7b:37:af:10:a9:0d:02:e4: a5:68:b9:5f:49:3c:76:0e:72:a7:a4:ef:71:98:31:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5a:f3:92:0e:0d:43:de:66:b2:e9:86:f2:60:7a:3a:3d: 48:88:f5:f0:97:66:f8:3a:96:e5:64:f2:55:b2:0e:de: 5c:c8:c3:f6:ef:71:c4:97:5e:b6:33:80:ab:ee:6d:c9: 2c:62:b4:9b:b2:09:d4:66:ca:4d:b3:e8:39:01:21:21: d2:de:d1:38:84:99:ce:7d:2a:3e:28:c4:2b:d5:d6:72: 43:b4:ff:ea:fd:54:3a:27:e7:8f:3e:df:c2:54:6a:29: e3:a8:c0:99:95:53:0e:77:2d:8c:cc:f5:fc:dc:44:a9: 0d:cd:f6:30:d0:84:97:ed:95:d2:c9:33:59:16:fb:c9: f4:b6:c3:5f:91:a6:a1:93:5d:48:9c:d8:bd:a1:5a:ed: 65:d3:1e:9a:65:39:3c:d7:0b:83:23:05:0a:a9:9b:3e: 2b:fb:41:e4:51:c7:c4:35:33:4b:c8:8d:5a:4d:61:df: dd:78:c6:32:1a:21:ce:2c:4c:ca:5c:9f:23:ac:92:10: e4:55:63:a6:84:c7:0a:01:4c:2a:c4:4e:68:ba:d8:02: 29:f5:1a:ff:eb:73:39:0b:5e:98:d1:b0:84:63:53:44: 05:e3:e1:50:1b:6d:e3:fd:bf:8b:e2:d5:62:bc:ec:fb: b9:0d:1d:2f:9d:96:4b:6e:d8:58:fb:ce:09:77:52:a6 Fingerprint (SHA-256): FD:1C:7D:1F:36:20:42:C8:99:C5:4C:55:12:01:30:39:65:56:4E:44:0D:85:6D:8F:4F:DC:61:A8:49:95:84:1F Fingerprint (SHA1): ED:4A:1C:32:F6:34:48:BE:25:FD:F0:54:50:63:CE:D7:4A:5F:A5:00 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #336: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144878 (0x3cafa86e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Wed Oct 18 14:49:38 2023 Not After : Wed Oct 18 14:49:38 2073 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:9b:1e:9b:32:d8:50:fa:04:3b:59:36:98:f0:44:e5: e5:b1:68:de:49:4a:e3:15:43:a7:79:a3:5c:10:43:c6: be:eb:52:3b:76:41:f8:54:03:ae:ee:de:07:0c:37:8d: 08:85:49:e8:4e:fe:ac:9f:9f:c4:71:67:98:18:f9:d2: 0a:7b:46:dd:3a:5e:4f:c0:3a:76:23:52:bf:da:f3:1a: 65:ec:e2:c4:2d:ca:a4:2d:f7:07:1f:de:b0:c3:cc:8a: d2:87:41:92:67:fd:ad:97:ad:6b:0b:2f:04:68:16:04: 27:32:15:ba:20:97:b5:b9:12:67:e6:34:64:49:2f:84: d0:0a:ba:26:37:3b:57:2d:7b:83:00:93:92:51:36:ef: a8:0e:c0:52:0a:ab:df:e8:d9:27:b5:41:8a:6e:95:ba: a7:04:13:62:15:c1:a9:39:a6:9d:99:55:66:86:30:54: 7e:2a:bd:e4:23:c8:86:04:ca:f0:aa:cb:e0:fb:3b:04: 6f:dd:b6:5f:55:c2:82:19:2a:00:1e:d6:a4:82:6b:e5: 3e:32:69:0e:9e:81:97:8f:c0:73:6a:be:7b:bc:a8:f3: 48:9f:46:ad:d1:11:7d:fc:5d:8f:e8:70:e0:2f:e4:8e: df:7e:d3:a0:c4:06:b8:35:b5:21:68:c7:67:ef:24:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:d2:a5:ad:00:0c:44:61:31:ce:19:df:0c:1b:64:bd: 2a:c1:03:05:70:4d:bf:40:ba:ec:ec:ef:a1:03:72:37: f7:1f:e8:32:d2:d5:da:56:9e:c1:ab:e9:dd:9c:2f:6a: 37:23:18:83:7b:86:0b:08:0f:f9:46:ff:32:a7:4b:d7: a8:3a:fa:cd:31:d9:ff:8b:41:3e:09:76:6b:26:ac:e3: 3c:95:a2:08:7d:f2:c4:6a:3f:a0:5d:b5:92:73:71:af: 3b:ba:db:45:37:e1:a1:3a:d9:cf:c7:59:77:61:99:3d: d3:0e:c0:3a:88:97:7d:77:72:e2:c2:4c:2b:37:20:cb: ad:dc:c3:11:7c:86:e4:c4:ff:08:09:b2:1c:6e:7c:cb: 29:bc:ed:9d:8d:10:ae:b2:79:36:f6:9b:2b:6b:55:c3: af:89:1a:4e:5c:da:33:37:cd:ee:aa:4a:ce:39:8b:f3: 58:8b:43:68:56:1b:9e:b6:4c:d6:a3:19:fa:cf:ce:d1: 79:4c:b0:cc:01:7f:00:3b:d2:e9:29:d5:76:e3:97:8e: be:c2:50:b6:46:54:9e:c2:c4:45:66:c3:ab:72:9c:aa: 90:14:93:5a:23:c8:b6:cf:42:2e:67:44:87:f1:48:6d: 0e:aa:21:f5:9e:d7:93:ac:9b:30:c3:e4:c9:50:0d:d8 Fingerprint (SHA-256): AF:8F:FC:5C:B6:B8:28:CC:5D:CB:45:F3:55:3D:D4:74:82:C4:71:22:4A:B4:BE:AA:B1:ED:53:66:67:8D:2E:28 Fingerprint (SHA1): 8A:EA:14:03:12:A9:FA:96:51:80:DB:61:CD:6C:5E:AC:1E:0B:9B:B8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #337: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144879 (0x3cafa86f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Wed Oct 18 14:49:39 2023 Not After : Wed Oct 18 14:49:39 2073 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:7f:34:40:83:e6:88:d3:95:97:31:f1:17:c8:2e:eb: 64:a0:d7:4c:ac:a9:bd:de:99:72:6a:d8:b5:59:be:ca: 0b:f1:a9:83:eb:ee:69:37:f2:4a:a9:66:ee:72:e8:6c: fd:bf:f3:fd:43:82:0d:13:3d:23:03:19:8b:17:1a:8a: 5c:33:e8:1d:3e:1e:8a:59:14:11:e8:e1:04:5f:6e:b2: f8:63:83:ad:5d:60:8c:5d:41:84:7b:4c:53:9b:2a:a6: dd:11:1e:5e:26:d7:f5:34:07:44:fc:86:a2:98:56:fd: ac:92:23:91:66:64:3f:f1:a8:6a:b6:13:53:91:c7:21: e0:ad:ec:21:53:e0:45:60:0d:83:44:1b:cc:0a:6a:e4: 0b:a0:74:6d:b1:19:ef:ce:24:5f:4c:4d:58:8a:0f:e5: 2c:81:a9:66:78:fe:01:a3:e5:c8:e4:3b:0a:ad:5a:38: 47:c4:2f:bd:d3:fc:10:7b:80:c3:61:da:12:69:72:ee: 59:86:f6:61:83:e6:d5:05:3f:93:72:d7:71:c4:74:8f: 94:74:41:b4:bc:03:92:04:b9:6f:76:fe:c2:64:e3:06: 49:b8:71:00:2c:73:b8:22:72:59:a9:0e:74:91:41:0d: b1:e3:b5:cf:92:7d:a4:68:52:52:fa:55:b5:db:83:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:eb:26:27:fe:dd:5e:26:db:5f:58:9e:bc:8f:43:e9: 85:39:f0:33:89:05:7d:ca:5a:a4:3e:5a:83:c5:0c:69: 38:40:c1:18:2b:d7:84:0f:bb:16:39:69:f9:43:14:b4: 8b:d4:de:12:14:33:28:8a:8e:4d:0d:51:e7:1c:c3:ab: 36:c9:e6:83:74:b2:ea:09:41:6f:4e:cf:81:fe:22:d1: 99:ef:09:a0:dd:7a:90:34:49:5a:14:c6:b5:61:25:54: 8a:d9:d7:b6:0a:d5:12:1a:69:59:7e:73:ed:a9:21:ee: e1:7a:4b:14:a2:dd:47:09:91:01:4f:fe:19:6c:16:30: 61:46:93:52:0c:6b:7c:92:93:3b:b0:80:2e:17:81:77: a1:6a:8e:9f:fe:3e:42:23:9c:dd:ad:5e:48:25:2f:ef: 0f:aa:0f:f9:96:7e:a2:58:bc:85:3f:71:49:0a:9f:b9: 89:90:e4:5d:31:98:0e:85:1b:68:6d:62:98:c5:ca:b3: 9d:e6:af:2f:a2:01:fb:09:fc:32:65:1d:28:3e:01:4e: 84:9a:64:e0:9e:b4:aa:fc:48:f3:4c:86:8d:38:d5:1b: 1d:72:3f:fa:41:3a:24:0d:0a:4f:43:cc:c5:a6:30:b0: dd:4a:a5:92:e3:ae:c6:b3:7d:99:03:c9:e9:bb:b4:42 Fingerprint (SHA-256): E4:6B:35:DB:64:F8:D8:1D:A9:83:CD:8B:43:51:7D:EE:D1:F7:65:B4:D3:4C:4D:8A:17:CC:96:4B:9B:22:F8:CF Fingerprint (SHA1): 34:9E:01:10:D1:34:46:B7:29:2A:AB:80:61:D9:53:94:EB:FB:0B:04 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #338: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144880 (0x3cafa870) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Wed Oct 18 14:49:39 2023 Not After : Wed Oct 18 14:49:39 2073 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a4:05:d8:d4:84:b0:25:b8:c5:e6:46:ff:8f:39:22:7b: 71:95:39:e4:f0:de:82:84:8c:ba:56:0c:e3:94:5c:47: d7:0f:97:8f:a3:a9:85:31:be:71:b7:75:6e:e9:28:04: d0:2d:06:71:53:bb:bd:19:84:e9:1c:4a:65:1b:4c:58: 4d:ed:5b:8d:a4:99:d6:9e:a5:50:71:99:76:38:d0:63: 31:f6:8f:9d:23:fb:fe:6e:c0:4c:11:27:2c:a3:79:c7: b1:d6:b5:73:95:78:51:4d:c2:c0:82:bb:90:44:6b:62: 52:31:db:2e:ed:25:04:f3:0c:3a:f4:9f:f2:ad:f2:42: 2e:79:da:bf:3d:fc:4c:9b:95:95:29:11:09:39:75:02: ea:b8:73:9c:63:90:a1:8a:25:c3:6f:10:df:1f:4d:2a: c3:21:cc:b6:17:27:9a:8d:99:a3:07:11:7c:eb:0e:00: 6c:ad:a8:3b:c8:59:43:78:b7:94:14:c7:c2:22:99:fd: 42:e5:fb:e1:47:8e:3c:75:d1:0b:28:c3:03:7c:39:7b: 74:20:ad:96:6b:8a:80:bf:7f:64:57:3c:6e:3f:52:f5: 58:19:0f:47:8b:89:c2:98:64:05:f7:bc:90:3a:30:88: 2a:a4:6c:b0:6d:0c:1a:4d:2d:b0:c1:ef:fb:0d:73:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3b:ec:74:75:ff:c3:13:9a:15:1b:ee:7a:d3:7f:ad:e8: d3:7b:0c:f9:41:36:74:b5:3e:18:d7:44:14:ef:34:6b: 56:80:40:b0:b5:72:c8:c8:74:58:d6:25:fb:c7:61:9a: 03:0d:95:d9:0d:4d:1a:f8:71:b8:70:99:09:05:a9:d8: 9a:12:55:bf:ec:b3:f1:6a:5b:e0:fb:61:81:c6:f7:c9: 66:63:e9:f4:15:94:ed:f7:54:46:95:29:95:7a:bb:b4: cd:85:59:78:96:e3:9e:91:2a:a8:2d:3c:a4:01:1a:dd: 6b:5f:f7:f2:de:c0:c6:bd:d2:13:60:fd:2d:bd:cc:79: 86:2f:15:69:c0:39:94:dc:05:b4:76:1e:9f:a8:f6:1c: 71:a9:87:8a:fd:dd:31:be:5b:0b:8f:80:a6:91:87:f2: d6:1d:87:6b:f2:3f:5b:01:03:99:03:82:68:d5:ef:d8: ee:85:e2:e0:c8:6d:6e:cc:19:3e:27:6f:a0:d6:12:b4: d8:5a:3e:f8:39:39:36:67:c8:0b:e3:3b:29:1b:80:bf: c2:af:75:43:b2:d4:9e:a0:65:ad:0c:83:fd:2a:dc:ce: 6a:01:8f:6f:da:5a:89:bc:c6:9d:8c:01:05:10:12:b0: 6c:ed:99:dc:c2:69:64:ca:ce:62:dd:fb:34:5d:3e:c0 Fingerprint (SHA-256): 73:F6:39:43:7D:5E:70:08:87:31:20:0A:7F:CB:E0:38:8E:17:22:42:A4:C2:A6:1F:13:E3:FD:C0:45:55:2A:79 Fingerprint (SHA1): BC:AF:42:9C:76:5F:F9:66:3E:A0:AC:E3:2C:E1:7A:AF:F3:19:63:73 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #339: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #340: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144895 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #341: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #342: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #343: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #344: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018144896 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #345: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #346: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #347: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #348: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018144897 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #349: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #350: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #351: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #352: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018144898 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #353: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #354: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #355: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144895 (0x3cafa87f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:42 2023 Not After : Wed Oct 18 14:49:42 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:9c:47:a3:c9:6b:f1:1a:b6:dd:60:21:40:67:61:1a: c4:f5:6c:f9:e2:53:f2:9e:f4:5d:76:8b:87:95:12:bf: 86:eb:c9:7f:0e:53:aa:3b:62:9e:e7:c2:00:95:e1:b8: 0c:d0:4c:6b:19:86:fd:d1:14:b5:da:d4:5d:23:7e:61: 0c:94:86:41:2d:03:73:3d:a3:85:d0:9d:4b:d1:df:d5: 03:1e:06:dc:65:33:4d:a7:e3:11:68:81:ba:5f:5e:d2: b9:24:8e:29:e6:c6:24:88:3a:64:d9:7d:2e:0f:bb:4c: f0:e6:62:b4:8c:7a:08:3c:53:3f:98:06:1e:e2:0b:c9: 45:56:1f:43:a2:72:91:3e:59:bf:cc:be:68:41:5b:ef: a6:92:dc:15:c0:20:9a:94:d5:d2:ba:51:ef:34:96:cf: 13:15:6f:c8:df:95:63:45:2e:e3:35:bd:82:47:a3:fc: 60:50:05:19:8e:37:3f:ee:61:46:9d:f4:92:a9:38:eb: 21:db:ff:08:bd:fa:8a:8d:ab:56:a6:9d:b3:8a:f7:fb: 90:09:90:b4:88:c7:fb:bf:f4:27:68:b6:8c:1b:1e:e7: 5f:30:dd:7b:09:79:28:43:94:e9:9c:9b:5c:df:3c:6f: 45:e1:5c:8f:83:45:44:5a:b0:66:98:b2:10:6e:80:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:12:38:cd:e7:27:60:b4:bd:3e:9a:5b:df:e5:2c:32: fe:9c:b6:27:e5:c8:28:38:9d:a4:8c:4b:8b:b7:30:d5: 15:4b:1f:39:55:f3:39:6f:f8:3c:de:e5:e3:45:17:c0: 53:e3:a7:d3:d9:c3:c8:22:cc:84:1f:8b:f5:2b:45:5c: 6b:df:bd:29:36:2f:39:b6:cd:c3:f3:7a:3a:e3:97:a9: 78:46:cf:71:5d:3a:74:99:ca:ad:e2:51:f0:dc:c0:ca: 12:be:78:6e:99:cd:25:ee:11:19:79:e6:51:98:10:43: 5f:18:03:61:3f:7b:af:b9:fc:a9:dd:29:64:57:3c:ff: 0e:86:73:db:e0:36:d8:63:36:7e:3b:4d:f0:b3:d0:5a: 9f:65:a1:8e:67:03:fa:72:3e:8d:23:96:83:f5:be:2f: 66:62:04:63:e6:8b:7c:79:13:6b:d9:30:7b:c8:da:f5: d9:3f:24:0c:21:5c:a9:1e:7e:ac:2d:15:cd:22:18:47: b5:76:c6:4a:7d:60:b2:7a:2f:a8:29:45:16:3b:ef:16: ea:ae:d1:5f:01:b1:de:b3:1f:ac:1f:a9:7b:da:c1:d3: 9f:a2:69:83:29:d9:e0:90:af:f1:92:78:c6:71:f7:55: ab:eb:cd:e6:f0:b3:ef:f0:1e:0d:f9:fc:b0:af:08:57 Fingerprint (SHA-256): 72:5A:F7:39:76:B5:2F:E4:5F:58:69:EB:DB:26:B1:10:F1:22:3E:3B:C9:3C:1F:84:6D:27:D9:FE:9E:25:E8:CE Fingerprint (SHA1): 8F:D3:10:42:59:B5:62:FC:2A:3D:CF:91:EF:1F:F3:83:F9:29:A2:F7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #356: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #357: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144896 (0x3cafa880) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:43 2023 Not After : Wed Oct 18 14:49:43 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:cc:20:ef:12:46:7b:a7:4f:83:1b:49:e3:71:3b:b8: 68:18:0f:97:ac:15:61:a5:18:e5:26:e3:13:4d:e0:dd: ca:7f:94:9c:45:bd:d6:fc:14:df:ae:ae:49:8c:fd:ad: c2:08:71:dd:d6:5f:23:98:f5:56:28:f3:04:04:4e:e7: 44:22:d1:12:8b:93:bb:cc:80:7a:09:af:4e:7b:17:7c: 2b:f6:48:d3:60:42:d5:8e:c4:69:b6:7c:b3:0b:69:40: 43:14:f4:03:5a:4e:a6:3c:d3:aa:fe:5e:61:12:c9:90: 67:80:65:cd:89:40:44:c3:59:9b:ef:0a:eb:69:1a:e0: d8:6e:54:1b:ab:43:7b:cf:f2:7a:5b:99:1c:27:54:48: 7c:2b:a2:d9:01:80:07:f9:7b:8e:c1:e2:16:8c:98:89: d1:21:7c:ef:c0:2b:9a:b5:37:c6:9f:1d:db:c1:e9:50: 35:bb:79:f5:31:c1:de:7b:c0:87:eb:c3:e4:45:8d:a9: d8:37:bf:9e:56:60:0d:56:ab:93:08:e4:8f:64:b5:29: 11:6b:19:8b:30:e9:a5:97:38:8c:24:e8:6f:ba:f3:f5: 48:48:ef:83:79:90:56:18:87:5a:5d:a7:f6:f7:6c:4d: c1:c8:4b:ab:66:a6:3b:78:1f:bc:7c:ab:f7:ae:a5:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:bb:69:6a:40:03:f9:fe:f8:52:bd:b6:ce:59:30:f0: 0d:3a:b9:e0:1a:a2:2a:99:7f:c5:ef:f1:df:e5:81:ff: 29:2e:ec:ff:b7:da:fd:b2:a8:d3:9f:21:e6:11:ab:e9: aa:df:8a:df:ca:fa:4b:03:b4:7f:4c:f3:1b:2a:10:7a: 4b:8d:1b:e6:2e:93:00:45:9d:81:8e:80:ed:8e:47:d8: 63:65:63:9c:f2:a8:f3:dd:73:fd:73:6b:6d:f7:ed:5f: 53:bb:19:ab:74:cb:12:68:e4:e4:cb:f7:ee:f4:8f:ba: 35:55:a7:4d:65:f7:ef:16:cc:8b:50:50:ad:5b:f0:66: a0:92:c2:09:43:93:ea:b5:79:88:7b:18:f3:85:64:ea: ad:35:7a:6b:ac:a9:9a:49:b4:6e:5c:3f:e3:30:53:19: 6b:13:e2:ed:45:7f:79:26:0f:01:a1:c2:60:db:0d:ed: 05:48:6f:ac:89:5c:fe:e6:ba:39:7b:0a:80:a1:24:71: c1:9b:8e:a1:2a:4e:fe:43:de:14:39:88:b4:32:46:21: 63:5e:e6:72:ab:0a:dc:7c:9a:36:aa:02:65:5f:a2:62: 48:7b:7a:50:7f:6a:a8:e2:91:c0:f9:de:8c:f8:3e:83: a7:4d:7a:81:0d:00:da:d4:76:73:3a:2c:0d:bd:09:82 Fingerprint (SHA-256): 4D:6E:02:CA:88:27:3B:7C:25:16:EE:8D:E8:C1:C6:F7:C4:32:7E:16:DE:51:43:8B:FC:C2:B7:F4:3B:D4:35:79 Fingerprint (SHA1): 2D:AE:9E:A1:95:22:97:87:AE:0B:54:7F:D8:0D:46:47:FB:BF:C3:08 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #358: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #359: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144897 (0x3cafa881) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:49:43 2023 Not After : Wed Oct 18 14:49:43 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:bb:34:af:b4:9e:1b:46:40:b0:a6:a7:bd:16:1f:70: d1:5e:c6:cb:e6:39:6f:b8:12:9b:d0:d3:c7:25:5f:83: 89:c5:ac:7e:e6:ef:82:6f:43:f3:d1:d7:91:47:e6:8a: 80:3c:e1:96:59:f8:26:98:5f:e9:b0:07:5a:5d:17:e4: 7e:10:82:57:05:87:2b:70:61:df:a1:44:0d:14:f7:c4: 6a:45:c6:91:ac:d5:39:4b:b0:bf:2f:63:fa:12:65:61: 0e:65:05:27:21:58:8e:57:2d:84:0c:92:3c:4f:ff:ee: 68:f1:0a:96:a6:ca:ff:ed:07:e1:ae:6b:99:4c:dc:0c: 1d:a6:76:64:96:a1:7c:1f:f1:cb:8b:e4:06:7d:a6:82: c9:5e:f2:05:1f:4b:05:1a:98:21:ec:75:f2:7c:ed:d8: 0d:5a:93:ab:65:c3:25:ae:04:d0:4d:6b:bd:d3:20:9b: 72:d3:4c:17:f1:43:ac:e5:0c:3d:a7:72:29:5b:b6:1c: 44:6e:2d:e5:f8:a2:0c:59:53:c5:61:63:49:6e:f5:14: 46:b3:84:39:91:f4:78:76:65:ea:1d:c0:1d:e5:b7:df: 5a:ee:e3:ce:18:e2:32:d1:57:f9:46:a2:d1:94:a1:46: ee:f3:8c:36:58:96:28:a3:38:e6:71:d0:52:cf:e6:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:cb:cd:e3:7b:3f:19:c9:26:5b:ff:1d:de:5a:71:3f: 11:cd:a2:ed:09:b7:1e:a9:44:e2:13:6c:2b:26:7b:26: e2:4d:2a:d3:d0:d6:cc:fd:40:2b:2f:e3:8e:71:2e:3e: 03:26:3a:df:15:aa:cf:fd:73:65:10:82:54:c7:13:7e: 71:f6:e5:d7:27:63:2b:88:e4:44:32:82:a0:b6:fb:b7: 31:0d:0f:44:15:99:63:93:b8:9d:24:fc:06:e4:0b:7d: 42:dd:ec:a7:0c:3d:8f:e4:a8:ef:13:b3:8b:94:ce:5d: 1f:3b:38:6b:b3:42:cf:35:e3:b6:0a:8c:8e:21:6c:5b: 47:15:b3:43:67:09:97:c0:e0:d9:5d:71:8c:d2:13:ed: b1:be:f9:b2:88:fa:ba:cf:4e:76:aa:a1:c8:f7:5b:e2: a0:28:8d:3c:4b:84:6c:38:82:59:57:29:a9:f4:93:30: a0:97:ac:26:ea:98:91:8c:4a:8f:3a:b2:9b:f2:fa:b4: 2f:97:3d:99:b2:13:15:3c:7b:f1:75:ad:7f:ef:85:1b: b7:67:05:95:d1:92:5e:92:65:2f:0c:ea:30:c6:a3:7a: 37:88:79:7b:de:16:b2:11:6d:ff:c1:fc:93:d4:61:84: 61:89:b4:e1:93:6d:27:7c:0f:1e:fd:95:74:36:58:a0 Fingerprint (SHA-256): B8:E8:15:8A:A5:2E:60:59:DF:B0:B6:54:1A:45:73:7F:F8:38:A3:92:5F:D4:85:ED:D2:C5:4F:5B:61:CA:FF:97 Fingerprint (SHA1): 82:95:D3:AB:74:6A:56:B4:9F:03:C5:D8:70:FA:D0:58:D1:F0:93:01 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #360: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #361: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #362: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #363: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #364: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144895 (0x3cafa87f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:42 2023 Not After : Wed Oct 18 14:49:42 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cf:9c:47:a3:c9:6b:f1:1a:b6:dd:60:21:40:67:61:1a: c4:f5:6c:f9:e2:53:f2:9e:f4:5d:76:8b:87:95:12:bf: 86:eb:c9:7f:0e:53:aa:3b:62:9e:e7:c2:00:95:e1:b8: 0c:d0:4c:6b:19:86:fd:d1:14:b5:da:d4:5d:23:7e:61: 0c:94:86:41:2d:03:73:3d:a3:85:d0:9d:4b:d1:df:d5: 03:1e:06:dc:65:33:4d:a7:e3:11:68:81:ba:5f:5e:d2: b9:24:8e:29:e6:c6:24:88:3a:64:d9:7d:2e:0f:bb:4c: f0:e6:62:b4:8c:7a:08:3c:53:3f:98:06:1e:e2:0b:c9: 45:56:1f:43:a2:72:91:3e:59:bf:cc:be:68:41:5b:ef: a6:92:dc:15:c0:20:9a:94:d5:d2:ba:51:ef:34:96:cf: 13:15:6f:c8:df:95:63:45:2e:e3:35:bd:82:47:a3:fc: 60:50:05:19:8e:37:3f:ee:61:46:9d:f4:92:a9:38:eb: 21:db:ff:08:bd:fa:8a:8d:ab:56:a6:9d:b3:8a:f7:fb: 90:09:90:b4:88:c7:fb:bf:f4:27:68:b6:8c:1b:1e:e7: 5f:30:dd:7b:09:79:28:43:94:e9:9c:9b:5c:df:3c:6f: 45:e1:5c:8f:83:45:44:5a:b0:66:98:b2:10:6e:80:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:12:38:cd:e7:27:60:b4:bd:3e:9a:5b:df:e5:2c:32: fe:9c:b6:27:e5:c8:28:38:9d:a4:8c:4b:8b:b7:30:d5: 15:4b:1f:39:55:f3:39:6f:f8:3c:de:e5:e3:45:17:c0: 53:e3:a7:d3:d9:c3:c8:22:cc:84:1f:8b:f5:2b:45:5c: 6b:df:bd:29:36:2f:39:b6:cd:c3:f3:7a:3a:e3:97:a9: 78:46:cf:71:5d:3a:74:99:ca:ad:e2:51:f0:dc:c0:ca: 12:be:78:6e:99:cd:25:ee:11:19:79:e6:51:98:10:43: 5f:18:03:61:3f:7b:af:b9:fc:a9:dd:29:64:57:3c:ff: 0e:86:73:db:e0:36:d8:63:36:7e:3b:4d:f0:b3:d0:5a: 9f:65:a1:8e:67:03:fa:72:3e:8d:23:96:83:f5:be:2f: 66:62:04:63:e6:8b:7c:79:13:6b:d9:30:7b:c8:da:f5: d9:3f:24:0c:21:5c:a9:1e:7e:ac:2d:15:cd:22:18:47: b5:76:c6:4a:7d:60:b2:7a:2f:a8:29:45:16:3b:ef:16: ea:ae:d1:5f:01:b1:de:b3:1f:ac:1f:a9:7b:da:c1:d3: 9f:a2:69:83:29:d9:e0:90:af:f1:92:78:c6:71:f7:55: ab:eb:cd:e6:f0:b3:ef:f0:1e:0d:f9:fc:b0:af:08:57 Fingerprint (SHA-256): 72:5A:F7:39:76:B5:2F:E4:5F:58:69:EB:DB:26:B1:10:F1:22:3E:3B:C9:3C:1F:84:6D:27:D9:FE:9E:25:E8:CE Fingerprint (SHA1): 8F:D3:10:42:59:B5:62:FC:2A:3D:CF:91:EF:1F:F3:83:F9:29:A2:F7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #365: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #366: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144896 (0x3cafa880) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:43 2023 Not After : Wed Oct 18 14:49:43 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:cc:20:ef:12:46:7b:a7:4f:83:1b:49:e3:71:3b:b8: 68:18:0f:97:ac:15:61:a5:18:e5:26:e3:13:4d:e0:dd: ca:7f:94:9c:45:bd:d6:fc:14:df:ae:ae:49:8c:fd:ad: c2:08:71:dd:d6:5f:23:98:f5:56:28:f3:04:04:4e:e7: 44:22:d1:12:8b:93:bb:cc:80:7a:09:af:4e:7b:17:7c: 2b:f6:48:d3:60:42:d5:8e:c4:69:b6:7c:b3:0b:69:40: 43:14:f4:03:5a:4e:a6:3c:d3:aa:fe:5e:61:12:c9:90: 67:80:65:cd:89:40:44:c3:59:9b:ef:0a:eb:69:1a:e0: d8:6e:54:1b:ab:43:7b:cf:f2:7a:5b:99:1c:27:54:48: 7c:2b:a2:d9:01:80:07:f9:7b:8e:c1:e2:16:8c:98:89: d1:21:7c:ef:c0:2b:9a:b5:37:c6:9f:1d:db:c1:e9:50: 35:bb:79:f5:31:c1:de:7b:c0:87:eb:c3:e4:45:8d:a9: d8:37:bf:9e:56:60:0d:56:ab:93:08:e4:8f:64:b5:29: 11:6b:19:8b:30:e9:a5:97:38:8c:24:e8:6f:ba:f3:f5: 48:48:ef:83:79:90:56:18:87:5a:5d:a7:f6:f7:6c:4d: c1:c8:4b:ab:66:a6:3b:78:1f:bc:7c:ab:f7:ae:a5:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a1:bb:69:6a:40:03:f9:fe:f8:52:bd:b6:ce:59:30:f0: 0d:3a:b9:e0:1a:a2:2a:99:7f:c5:ef:f1:df:e5:81:ff: 29:2e:ec:ff:b7:da:fd:b2:a8:d3:9f:21:e6:11:ab:e9: aa:df:8a:df:ca:fa:4b:03:b4:7f:4c:f3:1b:2a:10:7a: 4b:8d:1b:e6:2e:93:00:45:9d:81:8e:80:ed:8e:47:d8: 63:65:63:9c:f2:a8:f3:dd:73:fd:73:6b:6d:f7:ed:5f: 53:bb:19:ab:74:cb:12:68:e4:e4:cb:f7:ee:f4:8f:ba: 35:55:a7:4d:65:f7:ef:16:cc:8b:50:50:ad:5b:f0:66: a0:92:c2:09:43:93:ea:b5:79:88:7b:18:f3:85:64:ea: ad:35:7a:6b:ac:a9:9a:49:b4:6e:5c:3f:e3:30:53:19: 6b:13:e2:ed:45:7f:79:26:0f:01:a1:c2:60:db:0d:ed: 05:48:6f:ac:89:5c:fe:e6:ba:39:7b:0a:80:a1:24:71: c1:9b:8e:a1:2a:4e:fe:43:de:14:39:88:b4:32:46:21: 63:5e:e6:72:ab:0a:dc:7c:9a:36:aa:02:65:5f:a2:62: 48:7b:7a:50:7f:6a:a8:e2:91:c0:f9:de:8c:f8:3e:83: a7:4d:7a:81:0d:00:da:d4:76:73:3a:2c:0d:bd:09:82 Fingerprint (SHA-256): 4D:6E:02:CA:88:27:3B:7C:25:16:EE:8D:E8:C1:C6:F7:C4:32:7E:16:DE:51:43:8B:FC:C2:B7:F4:3B:D4:35:79 Fingerprint (SHA1): 2D:AE:9E:A1:95:22:97:87:AE:0B:54:7F:D8:0D:46:47:FB:BF:C3:08 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #367: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #368: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144897 (0x3cafa881) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:49:43 2023 Not After : Wed Oct 18 14:49:43 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:bb:34:af:b4:9e:1b:46:40:b0:a6:a7:bd:16:1f:70: d1:5e:c6:cb:e6:39:6f:b8:12:9b:d0:d3:c7:25:5f:83: 89:c5:ac:7e:e6:ef:82:6f:43:f3:d1:d7:91:47:e6:8a: 80:3c:e1:96:59:f8:26:98:5f:e9:b0:07:5a:5d:17:e4: 7e:10:82:57:05:87:2b:70:61:df:a1:44:0d:14:f7:c4: 6a:45:c6:91:ac:d5:39:4b:b0:bf:2f:63:fa:12:65:61: 0e:65:05:27:21:58:8e:57:2d:84:0c:92:3c:4f:ff:ee: 68:f1:0a:96:a6:ca:ff:ed:07:e1:ae:6b:99:4c:dc:0c: 1d:a6:76:64:96:a1:7c:1f:f1:cb:8b:e4:06:7d:a6:82: c9:5e:f2:05:1f:4b:05:1a:98:21:ec:75:f2:7c:ed:d8: 0d:5a:93:ab:65:c3:25:ae:04:d0:4d:6b:bd:d3:20:9b: 72:d3:4c:17:f1:43:ac:e5:0c:3d:a7:72:29:5b:b6:1c: 44:6e:2d:e5:f8:a2:0c:59:53:c5:61:63:49:6e:f5:14: 46:b3:84:39:91:f4:78:76:65:ea:1d:c0:1d:e5:b7:df: 5a:ee:e3:ce:18:e2:32:d1:57:f9:46:a2:d1:94:a1:46: ee:f3:8c:36:58:96:28:a3:38:e6:71:d0:52:cf:e6:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:cb:cd:e3:7b:3f:19:c9:26:5b:ff:1d:de:5a:71:3f: 11:cd:a2:ed:09:b7:1e:a9:44:e2:13:6c:2b:26:7b:26: e2:4d:2a:d3:d0:d6:cc:fd:40:2b:2f:e3:8e:71:2e:3e: 03:26:3a:df:15:aa:cf:fd:73:65:10:82:54:c7:13:7e: 71:f6:e5:d7:27:63:2b:88:e4:44:32:82:a0:b6:fb:b7: 31:0d:0f:44:15:99:63:93:b8:9d:24:fc:06:e4:0b:7d: 42:dd:ec:a7:0c:3d:8f:e4:a8:ef:13:b3:8b:94:ce:5d: 1f:3b:38:6b:b3:42:cf:35:e3:b6:0a:8c:8e:21:6c:5b: 47:15:b3:43:67:09:97:c0:e0:d9:5d:71:8c:d2:13:ed: b1:be:f9:b2:88:fa:ba:cf:4e:76:aa:a1:c8:f7:5b:e2: a0:28:8d:3c:4b:84:6c:38:82:59:57:29:a9:f4:93:30: a0:97:ac:26:ea:98:91:8c:4a:8f:3a:b2:9b:f2:fa:b4: 2f:97:3d:99:b2:13:15:3c:7b:f1:75:ad:7f:ef:85:1b: b7:67:05:95:d1:92:5e:92:65:2f:0c:ea:30:c6:a3:7a: 37:88:79:7b:de:16:b2:11:6d:ff:c1:fc:93:d4:61:84: 61:89:b4:e1:93:6d:27:7c:0f:1e:fd:95:74:36:58:a0 Fingerprint (SHA-256): B8:E8:15:8A:A5:2E:60:59:DF:B0:B6:54:1A:45:73:7F:F8:38:A3:92:5F:D4:85:ED:D2:C5:4F:5B:61:CA:FF:97 Fingerprint (SHA1): 82:95:D3:AB:74:6A:56:B4:9F:03:C5:D8:70:FA:D0:58:D1:F0:93:01 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #369: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #370: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #371: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144899 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #372: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #373: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #374: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #375: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018144900 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #376: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #377: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #378: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #379: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018144901 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #380: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #381: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #382: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #383: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018144902 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #384: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #385: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #386: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #387: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018144903 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #388: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #389: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #390: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144899 (0x3cafa883) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:45 2023 Not After : Wed Oct 18 14:49:45 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:cc:94:69:fd:09:1c:63:bd:1d:82:02:85:20:7b:c9: a8:ce:78:8b:70:11:2b:c7:de:41:e1:74:48:a9:13:8b: 0d:db:9c:17:c9:1b:b7:ea:b8:53:70:eb:fe:f7:73:1d: 47:3b:5a:3c:b7:03:22:df:17:43:8d:fd:68:c1:4a:e7: 92:59:4e:82:30:4f:f8:fd:97:6c:da:99:56:2e:96:0a: 93:27:8f:d0:9d:23:d3:a6:c7:7e:cb:5a:ef:e0:20:28: 8a:42:ef:92:47:1c:5a:39:70:76:02:c4:c0:8f:f8:18: 6d:e3:3a:55:de:a1:c4:96:f7:32:b6:f8:ff:57:dc:81: 0f:bb:71:b1:bb:04:ed:25:25:04:19:d1:c3:5e:b0:b5: 3d:9e:18:d7:dc:ba:24:1d:54:dd:54:32:f4:ea:2c:4c: 6c:89:67:90:73:7b:c7:cf:cf:5f:70:c6:e7:58:3a:68: ef:0c:56:6d:6b:ab:8b:27:52:f9:23:70:bc:69:5f:7b: d5:94:b4:1f:ec:23:9d:3c:a0:fc:22:e9:d2:25:45:8a: 75:8f:59:2d:6a:a4:35:05:64:84:f1:b9:16:62:14:c0: 61:ec:8a:3a:e6:d6:3b:2e:90:08:06:b0:88:65:15:a1: 00:6a:31:2a:e6:aa:97:ed:87:29:30:d6:ac:27:81:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:94:b8:f7:e4:03:0a:51:9d:34:7c:66:25:6b:15:4b: 47:9c:f5:fb:fb:e6:da:58:78:d3:de:5f:be:5c:93:ae: 04:b7:d7:fc:ee:0e:d7:82:01:c7:2a:1d:e2:b2:4a:31: da:ff:01:10:d3:f3:3d:f1:97:6e:83:b8:c9:04:98:0c: 5b:2b:4e:fd:4d:d2:8f:c7:b1:9f:01:6f:86:7b:c5:23: 8d:9c:3d:82:2e:19:8e:34:25:7e:04:b2:0c:7e:99:6f: 6e:1e:55:d5:3e:ab:6f:a3:88:24:81:ac:bd:05:0a:3c: f4:c9:08:40:04:b6:83:f9:86:67:6c:87:4d:b5:8f:bd: be:87:e9:cf:85:a0:be:d6:28:bc:3b:5a:6e:84:db:2e: 31:c8:fc:bd:aa:39:a3:a7:d0:30:8a:c1:46:cf:95:28: 5b:49:46:10:6b:63:f4:35:ce:2e:71:b7:e7:87:b3:63: c3:ec:32:ae:ab:9a:35:4a:fe:f5:12:e8:2f:36:32:dc: c8:0b:74:7a:76:77:fc:a3:83:89:5b:6e:92:fc:51:fd: 4c:ad:42:fe:44:02:d6:7a:b9:03:e9:8d:b8:31:65:c4: 85:3f:87:3a:23:0e:a8:5e:d7:0f:b0:fc:4f:4a:85:c1: 30:da:6d:df:c2:fa:ea:d5:6c:c3:0b:b3:1d:6c:f9:2e Fingerprint (SHA-256): A7:DF:FD:58:FD:77:F1:F7:13:AC:C7:78:96:AE:8E:03:14:70:FC:AB:38:54:64:72:0A:DF:60:AD:49:FA:84:1F Fingerprint (SHA1): 51:04:14:2A:36:05:C6:4C:56:A4:EA:96:B6:9E:D4:3B:37:30:3D:5E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #391: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #392: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144900 (0x3cafa884) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:45 2023 Not After : Wed Oct 18 14:49:45 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:47:ff:40:3e:5b:38:34:c0:c1:d5:4f:77:09:73:60: 40:46:c7:f7:1e:ac:06:d3:6a:01:e3:16:a1:47:39:e5: 16:9b:bc:9b:f1:e7:7e:ad:ec:67:9e:94:bf:a7:04:ef: 25:18:25:9e:6e:c7:c3:fd:d1:a0:3f:60:f5:47:7c:e2: 44:f0:26:25:cd:75:61:6c:a7:3f:c8:a5:94:aa:be:0b: 54:b3:23:65:dc:ed:68:e8:f6:f3:0f:96:23:3e:2b:c8: b7:18:37:e3:17:6c:06:01:8d:9b:7a:d6:02:07:d3:e9: e3:02:2c:28:0b:54:c6:ad:e1:bc:37:e5:39:38:d2:be: 8f:4b:6a:0d:48:72:70:4b:32:ed:2c:96:32:00:61:6b: ab:6c:98:7a:a9:53:59:9b:bf:a0:64:ac:a1:36:40:49: 59:60:e1:df:6c:f6:b9:fc:3e:71:bb:6c:92:53:f7:ab: 37:32:f5:47:6c:72:9a:7c:47:14:7b:88:17:fb:9b:3a: 4a:39:ac:88:9f:db:5c:2e:de:68:b6:0a:98:03:62:89: 6b:eb:cd:fe:5f:4c:91:b7:f1:8b:82:37:9d:7b:b3:c3: 86:53:21:92:13:88:d8:9a:3b:33:b4:99:b0:9c:6e:64: 67:1c:07:43:10:fc:4a:b9:19:a2:12:41:e7:c0:dc:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:e4:55:2b:3b:53:08:ab:6f:92:10:ec:73:ef:63:55: 58:8d:7c:1f:9d:83:6f:93:a3:01:24:b7:48:95:a2:d1: d3:62:57:a0:27:51:52:7a:5e:d9:f8:46:5c:d8:83:9c: ce:29:0c:6c:f4:48:3f:4b:24:61:f1:25:a6:19:7e:f0: 7f:cc:d7:79:e9:6e:1d:24:be:84:ad:59:8a:9b:35:67: ab:8f:9b:e2:9e:96:b5:6e:8b:86:ce:a3:b8:4d:76:cc: f7:27:ff:18:67:2e:cb:47:37:7b:73:a3:18:92:89:6e: f7:05:af:43:01:99:2e:03:23:c6:63:6d:30:e4:48:8b: 55:f8:bf:6a:f1:72:3e:42:c7:4d:e2:5f:99:c5:d4:c3: 40:1f:34:65:b3:34:0e:4d:e1:b2:ec:ce:32:89:70:fa: 5d:7b:b1:2b:6f:a4:9f:ae:e9:36:99:89:81:a4:0c:86: dd:7d:1d:79:73:5a:82:21:62:77:81:e1:ff:46:9c:6e: d3:e0:d3:4c:a1:35:ea:f6:a9:ae:a5:4c:3a:df:2a:66: dd:46:31:31:5e:a2:da:cc:2f:b2:61:51:9e:5b:ba:37: e5:59:9f:71:90:f0:2f:17:92:b9:8d:d3:e4:b4:c4:31: f5:6c:3a:cc:8a:3d:a8:ab:64:e6:cb:f8:52:88:be:0e Fingerprint (SHA-256): 71:71:81:F5:96:24:86:BB:20:A0:9A:D3:62:BA:7B:FC:0D:07:34:60:A6:B3:11:50:AB:32:09:39:05:10:FD:DD Fingerprint (SHA1): B9:EE:B7:B6:68:43:36:15:56:94:DC:45:C3:3C:52:B5:E0:76:81:01 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #393: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #394: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144901 (0x3cafa885) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:49:46 2023 Not After : Wed Oct 18 14:49:46 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:2d:35:cb:fa:e7:ed:59:d8:93:cc:35:7a:7a:5a:17: bd:e8:65:6e:09:bb:ec:b6:c2:35:63:93:5b:d3:4f:59: 6e:8c:cb:c8:eb:de:46:4c:80:1e:f1:1c:96:f1:a2:59: 5f:da:9c:85:a6:ae:d2:02:3d:96:b3:99:fa:19:84:86: 22:9b:4a:02:86:a6:2c:fd:66:e7:e9:df:bd:3d:89:d1: da:c8:f6:78:9a:67:42:41:c2:5c:ec:ef:56:4d:a3:4f: b3:36:95:20:23:26:54:e7:7d:1f:fa:b4:60:7c:fa:05: 49:0e:29:87:6c:56:08:01:7c:37:59:4c:c3:7e:3d:ed: 9b:df:9e:9d:35:5d:e5:09:bd:e8:7c:17:bb:9c:70:13: 93:b7:4e:cb:3c:5f:91:c1:cc:7f:18:a6:32:86:20:04: ec:72:ab:c7:b7:4e:f0:7a:f0:20:72:af:c1:76:6e:21: c6:72:00:3f:95:4d:c8:b6:ba:71:85:2d:5c:0c:9a:90: ae:d5:1e:c6:fc:26:52:26:ed:b4:7e:de:b7:90:ee:77: 64:8a:b1:1f:83:b2:b0:2d:bb:df:17:23:8b:c1:99:32: 24:6d:f5:63:ad:df:bf:de:be:00:f1:ec:40:ec:e9:99: ce:32:87:21:07:be:18:ab:60:d9:a9:96:2f:42:b8:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:aa:19:0f:31:93:ef:de:9f:f2:5b:aa:3a:7f:18:93: d0:8a:cc:36:b7:5c:8f:54:82:05:fd:54:51:a0:9e:38: d0:58:7f:9a:61:dd:68:c9:70:7f:71:9a:e2:c1:56:a9: a7:19:87:db:32:19:7e:b4:6b:a4:7c:f1:30:08:3e:bb: 51:02:5c:4d:f5:77:c1:a9:91:b3:ea:83:37:e6:7b:2d: 38:af:12:d9:a0:1a:02:9f:d5:3e:37:a3:d8:f8:cf:11: ff:b3:69:8e:2c:43:14:35:78:35:b0:d8:b4:f1:b7:ae: 06:05:b2:27:76:f4:01:69:af:3a:a0:85:54:ca:95:f4: b6:09:b9:6b:f5:4d:11:93:f5:33:82:1d:d9:40:d0:76: 2e:91:61:90:08:44:67:e5:1b:c8:ea:c8:79:a4:a6:c7: 94:7a:f6:36:7a:85:11:29:58:04:b8:a7:43:f2:04:01: 49:f4:1e:65:ec:8c:66:23:8b:72:93:8b:a8:70:89:7e: 3b:ea:16:e6:50:3c:22:b0:e8:c7:89:6a:fa:95:14:4e: 5f:f4:31:e9:45:ec:fa:e0:7d:86:10:3e:14:b4:2c:9c: b8:f2:34:a3:b1:3b:7c:de:93:48:11:52:6a:3f:72:d4: 19:26:22:cf:05:bf:ab:16:96:65:6c:99:9a:3e:e2:5c Fingerprint (SHA-256): 73:C6:8B:B9:59:EB:67:88:A3:FE:D5:71:7B:A6:F6:5A:B7:DA:24:33:B5:57:DC:23:D0:67:F3:CA:ED:C6:03:DF Fingerprint (SHA1): 47:27:40:26:07:87:FF:9D:B5:57:8E:61:10:95:B2:D5:BF:2A:B5:83 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #395: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #396: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #397: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #398: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #399: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144899 (0x3cafa883) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:45 2023 Not After : Wed Oct 18 14:49:45 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:cc:94:69:fd:09:1c:63:bd:1d:82:02:85:20:7b:c9: a8:ce:78:8b:70:11:2b:c7:de:41:e1:74:48:a9:13:8b: 0d:db:9c:17:c9:1b:b7:ea:b8:53:70:eb:fe:f7:73:1d: 47:3b:5a:3c:b7:03:22:df:17:43:8d:fd:68:c1:4a:e7: 92:59:4e:82:30:4f:f8:fd:97:6c:da:99:56:2e:96:0a: 93:27:8f:d0:9d:23:d3:a6:c7:7e:cb:5a:ef:e0:20:28: 8a:42:ef:92:47:1c:5a:39:70:76:02:c4:c0:8f:f8:18: 6d:e3:3a:55:de:a1:c4:96:f7:32:b6:f8:ff:57:dc:81: 0f:bb:71:b1:bb:04:ed:25:25:04:19:d1:c3:5e:b0:b5: 3d:9e:18:d7:dc:ba:24:1d:54:dd:54:32:f4:ea:2c:4c: 6c:89:67:90:73:7b:c7:cf:cf:5f:70:c6:e7:58:3a:68: ef:0c:56:6d:6b:ab:8b:27:52:f9:23:70:bc:69:5f:7b: d5:94:b4:1f:ec:23:9d:3c:a0:fc:22:e9:d2:25:45:8a: 75:8f:59:2d:6a:a4:35:05:64:84:f1:b9:16:62:14:c0: 61:ec:8a:3a:e6:d6:3b:2e:90:08:06:b0:88:65:15:a1: 00:6a:31:2a:e6:aa:97:ed:87:29:30:d6:ac:27:81:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:94:b8:f7:e4:03:0a:51:9d:34:7c:66:25:6b:15:4b: 47:9c:f5:fb:fb:e6:da:58:78:d3:de:5f:be:5c:93:ae: 04:b7:d7:fc:ee:0e:d7:82:01:c7:2a:1d:e2:b2:4a:31: da:ff:01:10:d3:f3:3d:f1:97:6e:83:b8:c9:04:98:0c: 5b:2b:4e:fd:4d:d2:8f:c7:b1:9f:01:6f:86:7b:c5:23: 8d:9c:3d:82:2e:19:8e:34:25:7e:04:b2:0c:7e:99:6f: 6e:1e:55:d5:3e:ab:6f:a3:88:24:81:ac:bd:05:0a:3c: f4:c9:08:40:04:b6:83:f9:86:67:6c:87:4d:b5:8f:bd: be:87:e9:cf:85:a0:be:d6:28:bc:3b:5a:6e:84:db:2e: 31:c8:fc:bd:aa:39:a3:a7:d0:30:8a:c1:46:cf:95:28: 5b:49:46:10:6b:63:f4:35:ce:2e:71:b7:e7:87:b3:63: c3:ec:32:ae:ab:9a:35:4a:fe:f5:12:e8:2f:36:32:dc: c8:0b:74:7a:76:77:fc:a3:83:89:5b:6e:92:fc:51:fd: 4c:ad:42:fe:44:02:d6:7a:b9:03:e9:8d:b8:31:65:c4: 85:3f:87:3a:23:0e:a8:5e:d7:0f:b0:fc:4f:4a:85:c1: 30:da:6d:df:c2:fa:ea:d5:6c:c3:0b:b3:1d:6c:f9:2e Fingerprint (SHA-256): A7:DF:FD:58:FD:77:F1:F7:13:AC:C7:78:96:AE:8E:03:14:70:FC:AB:38:54:64:72:0A:DF:60:AD:49:FA:84:1F Fingerprint (SHA1): 51:04:14:2A:36:05:C6:4C:56:A4:EA:96:B6:9E:D4:3B:37:30:3D:5E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #400: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #401: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144900 (0x3cafa884) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:45 2023 Not After : Wed Oct 18 14:49:45 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:47:ff:40:3e:5b:38:34:c0:c1:d5:4f:77:09:73:60: 40:46:c7:f7:1e:ac:06:d3:6a:01:e3:16:a1:47:39:e5: 16:9b:bc:9b:f1:e7:7e:ad:ec:67:9e:94:bf:a7:04:ef: 25:18:25:9e:6e:c7:c3:fd:d1:a0:3f:60:f5:47:7c:e2: 44:f0:26:25:cd:75:61:6c:a7:3f:c8:a5:94:aa:be:0b: 54:b3:23:65:dc:ed:68:e8:f6:f3:0f:96:23:3e:2b:c8: b7:18:37:e3:17:6c:06:01:8d:9b:7a:d6:02:07:d3:e9: e3:02:2c:28:0b:54:c6:ad:e1:bc:37:e5:39:38:d2:be: 8f:4b:6a:0d:48:72:70:4b:32:ed:2c:96:32:00:61:6b: ab:6c:98:7a:a9:53:59:9b:bf:a0:64:ac:a1:36:40:49: 59:60:e1:df:6c:f6:b9:fc:3e:71:bb:6c:92:53:f7:ab: 37:32:f5:47:6c:72:9a:7c:47:14:7b:88:17:fb:9b:3a: 4a:39:ac:88:9f:db:5c:2e:de:68:b6:0a:98:03:62:89: 6b:eb:cd:fe:5f:4c:91:b7:f1:8b:82:37:9d:7b:b3:c3: 86:53:21:92:13:88:d8:9a:3b:33:b4:99:b0:9c:6e:64: 67:1c:07:43:10:fc:4a:b9:19:a2:12:41:e7:c0:dc:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:e4:55:2b:3b:53:08:ab:6f:92:10:ec:73:ef:63:55: 58:8d:7c:1f:9d:83:6f:93:a3:01:24:b7:48:95:a2:d1: d3:62:57:a0:27:51:52:7a:5e:d9:f8:46:5c:d8:83:9c: ce:29:0c:6c:f4:48:3f:4b:24:61:f1:25:a6:19:7e:f0: 7f:cc:d7:79:e9:6e:1d:24:be:84:ad:59:8a:9b:35:67: ab:8f:9b:e2:9e:96:b5:6e:8b:86:ce:a3:b8:4d:76:cc: f7:27:ff:18:67:2e:cb:47:37:7b:73:a3:18:92:89:6e: f7:05:af:43:01:99:2e:03:23:c6:63:6d:30:e4:48:8b: 55:f8:bf:6a:f1:72:3e:42:c7:4d:e2:5f:99:c5:d4:c3: 40:1f:34:65:b3:34:0e:4d:e1:b2:ec:ce:32:89:70:fa: 5d:7b:b1:2b:6f:a4:9f:ae:e9:36:99:89:81:a4:0c:86: dd:7d:1d:79:73:5a:82:21:62:77:81:e1:ff:46:9c:6e: d3:e0:d3:4c:a1:35:ea:f6:a9:ae:a5:4c:3a:df:2a:66: dd:46:31:31:5e:a2:da:cc:2f:b2:61:51:9e:5b:ba:37: e5:59:9f:71:90:f0:2f:17:92:b9:8d:d3:e4:b4:c4:31: f5:6c:3a:cc:8a:3d:a8:ab:64:e6:cb:f8:52:88:be:0e Fingerprint (SHA-256): 71:71:81:F5:96:24:86:BB:20:A0:9A:D3:62:BA:7B:FC:0D:07:34:60:A6:B3:11:50:AB:32:09:39:05:10:FD:DD Fingerprint (SHA1): B9:EE:B7:B6:68:43:36:15:56:94:DC:45:C3:3C:52:B5:E0:76:81:01 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #402: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #403: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144901 (0x3cafa885) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:49:46 2023 Not After : Wed Oct 18 14:49:46 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:2d:35:cb:fa:e7:ed:59:d8:93:cc:35:7a:7a:5a:17: bd:e8:65:6e:09:bb:ec:b6:c2:35:63:93:5b:d3:4f:59: 6e:8c:cb:c8:eb:de:46:4c:80:1e:f1:1c:96:f1:a2:59: 5f:da:9c:85:a6:ae:d2:02:3d:96:b3:99:fa:19:84:86: 22:9b:4a:02:86:a6:2c:fd:66:e7:e9:df:bd:3d:89:d1: da:c8:f6:78:9a:67:42:41:c2:5c:ec:ef:56:4d:a3:4f: b3:36:95:20:23:26:54:e7:7d:1f:fa:b4:60:7c:fa:05: 49:0e:29:87:6c:56:08:01:7c:37:59:4c:c3:7e:3d:ed: 9b:df:9e:9d:35:5d:e5:09:bd:e8:7c:17:bb:9c:70:13: 93:b7:4e:cb:3c:5f:91:c1:cc:7f:18:a6:32:86:20:04: ec:72:ab:c7:b7:4e:f0:7a:f0:20:72:af:c1:76:6e:21: c6:72:00:3f:95:4d:c8:b6:ba:71:85:2d:5c:0c:9a:90: ae:d5:1e:c6:fc:26:52:26:ed:b4:7e:de:b7:90:ee:77: 64:8a:b1:1f:83:b2:b0:2d:bb:df:17:23:8b:c1:99:32: 24:6d:f5:63:ad:df:bf:de:be:00:f1:ec:40:ec:e9:99: ce:32:87:21:07:be:18:ab:60:d9:a9:96:2f:42:b8:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:aa:19:0f:31:93:ef:de:9f:f2:5b:aa:3a:7f:18:93: d0:8a:cc:36:b7:5c:8f:54:82:05:fd:54:51:a0:9e:38: d0:58:7f:9a:61:dd:68:c9:70:7f:71:9a:e2:c1:56:a9: a7:19:87:db:32:19:7e:b4:6b:a4:7c:f1:30:08:3e:bb: 51:02:5c:4d:f5:77:c1:a9:91:b3:ea:83:37:e6:7b:2d: 38:af:12:d9:a0:1a:02:9f:d5:3e:37:a3:d8:f8:cf:11: ff:b3:69:8e:2c:43:14:35:78:35:b0:d8:b4:f1:b7:ae: 06:05:b2:27:76:f4:01:69:af:3a:a0:85:54:ca:95:f4: b6:09:b9:6b:f5:4d:11:93:f5:33:82:1d:d9:40:d0:76: 2e:91:61:90:08:44:67:e5:1b:c8:ea:c8:79:a4:a6:c7: 94:7a:f6:36:7a:85:11:29:58:04:b8:a7:43:f2:04:01: 49:f4:1e:65:ec:8c:66:23:8b:72:93:8b:a8:70:89:7e: 3b:ea:16:e6:50:3c:22:b0:e8:c7:89:6a:fa:95:14:4e: 5f:f4:31:e9:45:ec:fa:e0:7d:86:10:3e:14:b4:2c:9c: b8:f2:34:a3:b1:3b:7c:de:93:48:11:52:6a:3f:72:d4: 19:26:22:cf:05:bf:ab:16:96:65:6c:99:9a:3e:e2:5c Fingerprint (SHA-256): 73:C6:8B:B9:59:EB:67:88:A3:FE:D5:71:7B:A6:F6:5A:B7:DA:24:33:B5:57:DC:23:D0:67:F3:CA:ED:C6:03:DF Fingerprint (SHA1): 47:27:40:26:07:87:FF:9D:B5:57:8E:61:10:95:B2:D5:BF:2A:B5:83 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #404: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #405: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144899 (0x3cafa883) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:45 2023 Not After : Wed Oct 18 14:49:45 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:cc:94:69:fd:09:1c:63:bd:1d:82:02:85:20:7b:c9: a8:ce:78:8b:70:11:2b:c7:de:41:e1:74:48:a9:13:8b: 0d:db:9c:17:c9:1b:b7:ea:b8:53:70:eb:fe:f7:73:1d: 47:3b:5a:3c:b7:03:22:df:17:43:8d:fd:68:c1:4a:e7: 92:59:4e:82:30:4f:f8:fd:97:6c:da:99:56:2e:96:0a: 93:27:8f:d0:9d:23:d3:a6:c7:7e:cb:5a:ef:e0:20:28: 8a:42:ef:92:47:1c:5a:39:70:76:02:c4:c0:8f:f8:18: 6d:e3:3a:55:de:a1:c4:96:f7:32:b6:f8:ff:57:dc:81: 0f:bb:71:b1:bb:04:ed:25:25:04:19:d1:c3:5e:b0:b5: 3d:9e:18:d7:dc:ba:24:1d:54:dd:54:32:f4:ea:2c:4c: 6c:89:67:90:73:7b:c7:cf:cf:5f:70:c6:e7:58:3a:68: ef:0c:56:6d:6b:ab:8b:27:52:f9:23:70:bc:69:5f:7b: d5:94:b4:1f:ec:23:9d:3c:a0:fc:22:e9:d2:25:45:8a: 75:8f:59:2d:6a:a4:35:05:64:84:f1:b9:16:62:14:c0: 61:ec:8a:3a:e6:d6:3b:2e:90:08:06:b0:88:65:15:a1: 00:6a:31:2a:e6:aa:97:ed:87:29:30:d6:ac:27:81:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:94:b8:f7:e4:03:0a:51:9d:34:7c:66:25:6b:15:4b: 47:9c:f5:fb:fb:e6:da:58:78:d3:de:5f:be:5c:93:ae: 04:b7:d7:fc:ee:0e:d7:82:01:c7:2a:1d:e2:b2:4a:31: da:ff:01:10:d3:f3:3d:f1:97:6e:83:b8:c9:04:98:0c: 5b:2b:4e:fd:4d:d2:8f:c7:b1:9f:01:6f:86:7b:c5:23: 8d:9c:3d:82:2e:19:8e:34:25:7e:04:b2:0c:7e:99:6f: 6e:1e:55:d5:3e:ab:6f:a3:88:24:81:ac:bd:05:0a:3c: f4:c9:08:40:04:b6:83:f9:86:67:6c:87:4d:b5:8f:bd: be:87:e9:cf:85:a0:be:d6:28:bc:3b:5a:6e:84:db:2e: 31:c8:fc:bd:aa:39:a3:a7:d0:30:8a:c1:46:cf:95:28: 5b:49:46:10:6b:63:f4:35:ce:2e:71:b7:e7:87:b3:63: c3:ec:32:ae:ab:9a:35:4a:fe:f5:12:e8:2f:36:32:dc: c8:0b:74:7a:76:77:fc:a3:83:89:5b:6e:92:fc:51:fd: 4c:ad:42:fe:44:02:d6:7a:b9:03:e9:8d:b8:31:65:c4: 85:3f:87:3a:23:0e:a8:5e:d7:0f:b0:fc:4f:4a:85:c1: 30:da:6d:df:c2:fa:ea:d5:6c:c3:0b:b3:1d:6c:f9:2e Fingerprint (SHA-256): A7:DF:FD:58:FD:77:F1:F7:13:AC:C7:78:96:AE:8E:03:14:70:FC:AB:38:54:64:72:0A:DF:60:AD:49:FA:84:1F Fingerprint (SHA1): 51:04:14:2A:36:05:C6:4C:56:A4:EA:96:B6:9E:D4:3B:37:30:3D:5E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #406: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144899 (0x3cafa883) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:45 2023 Not After : Wed Oct 18 14:49:45 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: de:cc:94:69:fd:09:1c:63:bd:1d:82:02:85:20:7b:c9: a8:ce:78:8b:70:11:2b:c7:de:41:e1:74:48:a9:13:8b: 0d:db:9c:17:c9:1b:b7:ea:b8:53:70:eb:fe:f7:73:1d: 47:3b:5a:3c:b7:03:22:df:17:43:8d:fd:68:c1:4a:e7: 92:59:4e:82:30:4f:f8:fd:97:6c:da:99:56:2e:96:0a: 93:27:8f:d0:9d:23:d3:a6:c7:7e:cb:5a:ef:e0:20:28: 8a:42:ef:92:47:1c:5a:39:70:76:02:c4:c0:8f:f8:18: 6d:e3:3a:55:de:a1:c4:96:f7:32:b6:f8:ff:57:dc:81: 0f:bb:71:b1:bb:04:ed:25:25:04:19:d1:c3:5e:b0:b5: 3d:9e:18:d7:dc:ba:24:1d:54:dd:54:32:f4:ea:2c:4c: 6c:89:67:90:73:7b:c7:cf:cf:5f:70:c6:e7:58:3a:68: ef:0c:56:6d:6b:ab:8b:27:52:f9:23:70:bc:69:5f:7b: d5:94:b4:1f:ec:23:9d:3c:a0:fc:22:e9:d2:25:45:8a: 75:8f:59:2d:6a:a4:35:05:64:84:f1:b9:16:62:14:c0: 61:ec:8a:3a:e6:d6:3b:2e:90:08:06:b0:88:65:15:a1: 00:6a:31:2a:e6:aa:97:ed:87:29:30:d6:ac:27:81:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:94:b8:f7:e4:03:0a:51:9d:34:7c:66:25:6b:15:4b: 47:9c:f5:fb:fb:e6:da:58:78:d3:de:5f:be:5c:93:ae: 04:b7:d7:fc:ee:0e:d7:82:01:c7:2a:1d:e2:b2:4a:31: da:ff:01:10:d3:f3:3d:f1:97:6e:83:b8:c9:04:98:0c: 5b:2b:4e:fd:4d:d2:8f:c7:b1:9f:01:6f:86:7b:c5:23: 8d:9c:3d:82:2e:19:8e:34:25:7e:04:b2:0c:7e:99:6f: 6e:1e:55:d5:3e:ab:6f:a3:88:24:81:ac:bd:05:0a:3c: f4:c9:08:40:04:b6:83:f9:86:67:6c:87:4d:b5:8f:bd: be:87:e9:cf:85:a0:be:d6:28:bc:3b:5a:6e:84:db:2e: 31:c8:fc:bd:aa:39:a3:a7:d0:30:8a:c1:46:cf:95:28: 5b:49:46:10:6b:63:f4:35:ce:2e:71:b7:e7:87:b3:63: c3:ec:32:ae:ab:9a:35:4a:fe:f5:12:e8:2f:36:32:dc: c8:0b:74:7a:76:77:fc:a3:83:89:5b:6e:92:fc:51:fd: 4c:ad:42:fe:44:02:d6:7a:b9:03:e9:8d:b8:31:65:c4: 85:3f:87:3a:23:0e:a8:5e:d7:0f:b0:fc:4f:4a:85:c1: 30:da:6d:df:c2:fa:ea:d5:6c:c3:0b:b3:1d:6c:f9:2e Fingerprint (SHA-256): A7:DF:FD:58:FD:77:F1:F7:13:AC:C7:78:96:AE:8E:03:14:70:FC:AB:38:54:64:72:0A:DF:60:AD:49:FA:84:1F Fingerprint (SHA1): 51:04:14:2A:36:05:C6:4C:56:A4:EA:96:B6:9E:D4:3B:37:30:3D:5E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #407: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144900 (0x3cafa884) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:45 2023 Not After : Wed Oct 18 14:49:45 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:47:ff:40:3e:5b:38:34:c0:c1:d5:4f:77:09:73:60: 40:46:c7:f7:1e:ac:06:d3:6a:01:e3:16:a1:47:39:e5: 16:9b:bc:9b:f1:e7:7e:ad:ec:67:9e:94:bf:a7:04:ef: 25:18:25:9e:6e:c7:c3:fd:d1:a0:3f:60:f5:47:7c:e2: 44:f0:26:25:cd:75:61:6c:a7:3f:c8:a5:94:aa:be:0b: 54:b3:23:65:dc:ed:68:e8:f6:f3:0f:96:23:3e:2b:c8: b7:18:37:e3:17:6c:06:01:8d:9b:7a:d6:02:07:d3:e9: e3:02:2c:28:0b:54:c6:ad:e1:bc:37:e5:39:38:d2:be: 8f:4b:6a:0d:48:72:70:4b:32:ed:2c:96:32:00:61:6b: ab:6c:98:7a:a9:53:59:9b:bf:a0:64:ac:a1:36:40:49: 59:60:e1:df:6c:f6:b9:fc:3e:71:bb:6c:92:53:f7:ab: 37:32:f5:47:6c:72:9a:7c:47:14:7b:88:17:fb:9b:3a: 4a:39:ac:88:9f:db:5c:2e:de:68:b6:0a:98:03:62:89: 6b:eb:cd:fe:5f:4c:91:b7:f1:8b:82:37:9d:7b:b3:c3: 86:53:21:92:13:88:d8:9a:3b:33:b4:99:b0:9c:6e:64: 67:1c:07:43:10:fc:4a:b9:19:a2:12:41:e7:c0:dc:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:e4:55:2b:3b:53:08:ab:6f:92:10:ec:73:ef:63:55: 58:8d:7c:1f:9d:83:6f:93:a3:01:24:b7:48:95:a2:d1: d3:62:57:a0:27:51:52:7a:5e:d9:f8:46:5c:d8:83:9c: ce:29:0c:6c:f4:48:3f:4b:24:61:f1:25:a6:19:7e:f0: 7f:cc:d7:79:e9:6e:1d:24:be:84:ad:59:8a:9b:35:67: ab:8f:9b:e2:9e:96:b5:6e:8b:86:ce:a3:b8:4d:76:cc: f7:27:ff:18:67:2e:cb:47:37:7b:73:a3:18:92:89:6e: f7:05:af:43:01:99:2e:03:23:c6:63:6d:30:e4:48:8b: 55:f8:bf:6a:f1:72:3e:42:c7:4d:e2:5f:99:c5:d4:c3: 40:1f:34:65:b3:34:0e:4d:e1:b2:ec:ce:32:89:70:fa: 5d:7b:b1:2b:6f:a4:9f:ae:e9:36:99:89:81:a4:0c:86: dd:7d:1d:79:73:5a:82:21:62:77:81:e1:ff:46:9c:6e: d3:e0:d3:4c:a1:35:ea:f6:a9:ae:a5:4c:3a:df:2a:66: dd:46:31:31:5e:a2:da:cc:2f:b2:61:51:9e:5b:ba:37: e5:59:9f:71:90:f0:2f:17:92:b9:8d:d3:e4:b4:c4:31: f5:6c:3a:cc:8a:3d:a8:ab:64:e6:cb:f8:52:88:be:0e Fingerprint (SHA-256): 71:71:81:F5:96:24:86:BB:20:A0:9A:D3:62:BA:7B:FC:0D:07:34:60:A6:B3:11:50:AB:32:09:39:05:10:FD:DD Fingerprint (SHA1): B9:EE:B7:B6:68:43:36:15:56:94:DC:45:C3:3C:52:B5:E0:76:81:01 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #408: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144900 (0x3cafa884) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:49:45 2023 Not After : Wed Oct 18 14:49:45 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:47:ff:40:3e:5b:38:34:c0:c1:d5:4f:77:09:73:60: 40:46:c7:f7:1e:ac:06:d3:6a:01:e3:16:a1:47:39:e5: 16:9b:bc:9b:f1:e7:7e:ad:ec:67:9e:94:bf:a7:04:ef: 25:18:25:9e:6e:c7:c3:fd:d1:a0:3f:60:f5:47:7c:e2: 44:f0:26:25:cd:75:61:6c:a7:3f:c8:a5:94:aa:be:0b: 54:b3:23:65:dc:ed:68:e8:f6:f3:0f:96:23:3e:2b:c8: b7:18:37:e3:17:6c:06:01:8d:9b:7a:d6:02:07:d3:e9: e3:02:2c:28:0b:54:c6:ad:e1:bc:37:e5:39:38:d2:be: 8f:4b:6a:0d:48:72:70:4b:32:ed:2c:96:32:00:61:6b: ab:6c:98:7a:a9:53:59:9b:bf:a0:64:ac:a1:36:40:49: 59:60:e1:df:6c:f6:b9:fc:3e:71:bb:6c:92:53:f7:ab: 37:32:f5:47:6c:72:9a:7c:47:14:7b:88:17:fb:9b:3a: 4a:39:ac:88:9f:db:5c:2e:de:68:b6:0a:98:03:62:89: 6b:eb:cd:fe:5f:4c:91:b7:f1:8b:82:37:9d:7b:b3:c3: 86:53:21:92:13:88:d8:9a:3b:33:b4:99:b0:9c:6e:64: 67:1c:07:43:10:fc:4a:b9:19:a2:12:41:e7:c0:dc:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:e4:55:2b:3b:53:08:ab:6f:92:10:ec:73:ef:63:55: 58:8d:7c:1f:9d:83:6f:93:a3:01:24:b7:48:95:a2:d1: d3:62:57:a0:27:51:52:7a:5e:d9:f8:46:5c:d8:83:9c: ce:29:0c:6c:f4:48:3f:4b:24:61:f1:25:a6:19:7e:f0: 7f:cc:d7:79:e9:6e:1d:24:be:84:ad:59:8a:9b:35:67: ab:8f:9b:e2:9e:96:b5:6e:8b:86:ce:a3:b8:4d:76:cc: f7:27:ff:18:67:2e:cb:47:37:7b:73:a3:18:92:89:6e: f7:05:af:43:01:99:2e:03:23:c6:63:6d:30:e4:48:8b: 55:f8:bf:6a:f1:72:3e:42:c7:4d:e2:5f:99:c5:d4:c3: 40:1f:34:65:b3:34:0e:4d:e1:b2:ec:ce:32:89:70:fa: 5d:7b:b1:2b:6f:a4:9f:ae:e9:36:99:89:81:a4:0c:86: dd:7d:1d:79:73:5a:82:21:62:77:81:e1:ff:46:9c:6e: d3:e0:d3:4c:a1:35:ea:f6:a9:ae:a5:4c:3a:df:2a:66: dd:46:31:31:5e:a2:da:cc:2f:b2:61:51:9e:5b:ba:37: e5:59:9f:71:90:f0:2f:17:92:b9:8d:d3:e4:b4:c4:31: f5:6c:3a:cc:8a:3d:a8:ab:64:e6:cb:f8:52:88:be:0e Fingerprint (SHA-256): 71:71:81:F5:96:24:86:BB:20:A0:9A:D3:62:BA:7B:FC:0D:07:34:60:A6:B3:11:50:AB:32:09:39:05:10:FD:DD Fingerprint (SHA1): B9:EE:B7:B6:68:43:36:15:56:94:DC:45:C3:3C:52:B5:E0:76:81:01 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #409: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144901 (0x3cafa885) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:49:46 2023 Not After : Wed Oct 18 14:49:46 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:2d:35:cb:fa:e7:ed:59:d8:93:cc:35:7a:7a:5a:17: bd:e8:65:6e:09:bb:ec:b6:c2:35:63:93:5b:d3:4f:59: 6e:8c:cb:c8:eb:de:46:4c:80:1e:f1:1c:96:f1:a2:59: 5f:da:9c:85:a6:ae:d2:02:3d:96:b3:99:fa:19:84:86: 22:9b:4a:02:86:a6:2c:fd:66:e7:e9:df:bd:3d:89:d1: da:c8:f6:78:9a:67:42:41:c2:5c:ec:ef:56:4d:a3:4f: b3:36:95:20:23:26:54:e7:7d:1f:fa:b4:60:7c:fa:05: 49:0e:29:87:6c:56:08:01:7c:37:59:4c:c3:7e:3d:ed: 9b:df:9e:9d:35:5d:e5:09:bd:e8:7c:17:bb:9c:70:13: 93:b7:4e:cb:3c:5f:91:c1:cc:7f:18:a6:32:86:20:04: ec:72:ab:c7:b7:4e:f0:7a:f0:20:72:af:c1:76:6e:21: c6:72:00:3f:95:4d:c8:b6:ba:71:85:2d:5c:0c:9a:90: ae:d5:1e:c6:fc:26:52:26:ed:b4:7e:de:b7:90:ee:77: 64:8a:b1:1f:83:b2:b0:2d:bb:df:17:23:8b:c1:99:32: 24:6d:f5:63:ad:df:bf:de:be:00:f1:ec:40:ec:e9:99: ce:32:87:21:07:be:18:ab:60:d9:a9:96:2f:42:b8:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:aa:19:0f:31:93:ef:de:9f:f2:5b:aa:3a:7f:18:93: d0:8a:cc:36:b7:5c:8f:54:82:05:fd:54:51:a0:9e:38: d0:58:7f:9a:61:dd:68:c9:70:7f:71:9a:e2:c1:56:a9: a7:19:87:db:32:19:7e:b4:6b:a4:7c:f1:30:08:3e:bb: 51:02:5c:4d:f5:77:c1:a9:91:b3:ea:83:37:e6:7b:2d: 38:af:12:d9:a0:1a:02:9f:d5:3e:37:a3:d8:f8:cf:11: ff:b3:69:8e:2c:43:14:35:78:35:b0:d8:b4:f1:b7:ae: 06:05:b2:27:76:f4:01:69:af:3a:a0:85:54:ca:95:f4: b6:09:b9:6b:f5:4d:11:93:f5:33:82:1d:d9:40:d0:76: 2e:91:61:90:08:44:67:e5:1b:c8:ea:c8:79:a4:a6:c7: 94:7a:f6:36:7a:85:11:29:58:04:b8:a7:43:f2:04:01: 49:f4:1e:65:ec:8c:66:23:8b:72:93:8b:a8:70:89:7e: 3b:ea:16:e6:50:3c:22:b0:e8:c7:89:6a:fa:95:14:4e: 5f:f4:31:e9:45:ec:fa:e0:7d:86:10:3e:14:b4:2c:9c: b8:f2:34:a3:b1:3b:7c:de:93:48:11:52:6a:3f:72:d4: 19:26:22:cf:05:bf:ab:16:96:65:6c:99:9a:3e:e2:5c Fingerprint (SHA-256): 73:C6:8B:B9:59:EB:67:88:A3:FE:D5:71:7B:A6:F6:5A:B7:DA:24:33:B5:57:DC:23:D0:67:F3:CA:ED:C6:03:DF Fingerprint (SHA1): 47:27:40:26:07:87:FF:9D:B5:57:8E:61:10:95:B2:D5:BF:2A:B5:83 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #410: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144901 (0x3cafa885) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:49:46 2023 Not After : Wed Oct 18 14:49:46 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:2d:35:cb:fa:e7:ed:59:d8:93:cc:35:7a:7a:5a:17: bd:e8:65:6e:09:bb:ec:b6:c2:35:63:93:5b:d3:4f:59: 6e:8c:cb:c8:eb:de:46:4c:80:1e:f1:1c:96:f1:a2:59: 5f:da:9c:85:a6:ae:d2:02:3d:96:b3:99:fa:19:84:86: 22:9b:4a:02:86:a6:2c:fd:66:e7:e9:df:bd:3d:89:d1: da:c8:f6:78:9a:67:42:41:c2:5c:ec:ef:56:4d:a3:4f: b3:36:95:20:23:26:54:e7:7d:1f:fa:b4:60:7c:fa:05: 49:0e:29:87:6c:56:08:01:7c:37:59:4c:c3:7e:3d:ed: 9b:df:9e:9d:35:5d:e5:09:bd:e8:7c:17:bb:9c:70:13: 93:b7:4e:cb:3c:5f:91:c1:cc:7f:18:a6:32:86:20:04: ec:72:ab:c7:b7:4e:f0:7a:f0:20:72:af:c1:76:6e:21: c6:72:00:3f:95:4d:c8:b6:ba:71:85:2d:5c:0c:9a:90: ae:d5:1e:c6:fc:26:52:26:ed:b4:7e:de:b7:90:ee:77: 64:8a:b1:1f:83:b2:b0:2d:bb:df:17:23:8b:c1:99:32: 24:6d:f5:63:ad:df:bf:de:be:00:f1:ec:40:ec:e9:99: ce:32:87:21:07:be:18:ab:60:d9:a9:96:2f:42:b8:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:aa:19:0f:31:93:ef:de:9f:f2:5b:aa:3a:7f:18:93: d0:8a:cc:36:b7:5c:8f:54:82:05:fd:54:51:a0:9e:38: d0:58:7f:9a:61:dd:68:c9:70:7f:71:9a:e2:c1:56:a9: a7:19:87:db:32:19:7e:b4:6b:a4:7c:f1:30:08:3e:bb: 51:02:5c:4d:f5:77:c1:a9:91:b3:ea:83:37:e6:7b:2d: 38:af:12:d9:a0:1a:02:9f:d5:3e:37:a3:d8:f8:cf:11: ff:b3:69:8e:2c:43:14:35:78:35:b0:d8:b4:f1:b7:ae: 06:05:b2:27:76:f4:01:69:af:3a:a0:85:54:ca:95:f4: b6:09:b9:6b:f5:4d:11:93:f5:33:82:1d:d9:40:d0:76: 2e:91:61:90:08:44:67:e5:1b:c8:ea:c8:79:a4:a6:c7: 94:7a:f6:36:7a:85:11:29:58:04:b8:a7:43:f2:04:01: 49:f4:1e:65:ec:8c:66:23:8b:72:93:8b:a8:70:89:7e: 3b:ea:16:e6:50:3c:22:b0:e8:c7:89:6a:fa:95:14:4e: 5f:f4:31:e9:45:ec:fa:e0:7d:86:10:3e:14:b4:2c:9c: b8:f2:34:a3:b1:3b:7c:de:93:48:11:52:6a:3f:72:d4: 19:26:22:cf:05:bf:ab:16:96:65:6c:99:9a:3e:e2:5c Fingerprint (SHA-256): 73:C6:8B:B9:59:EB:67:88:A3:FE:D5:71:7B:A6:F6:5A:B7:DA:24:33:B5:57:DC:23:D0:67:F3:CA:ED:C6:03:DF Fingerprint (SHA1): 47:27:40:26:07:87:FF:9D:B5:57:8E:61:10:95:B2:D5:BF:2A:B5:83 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #411: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #412: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144904 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #413: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #414: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #415: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #416: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018144905 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #417: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #418: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #419: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #420: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018144906 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #421: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #422: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #423: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #424: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1018144907 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #425: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #426: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #427: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #428: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018144908 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #429: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #430: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #431: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #432: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018144909 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #433: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #434: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #435: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #436: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1018144910 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #437: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #438: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #439: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #440: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #441: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #442: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #443: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144904 (0x3cafa888) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:49:48 2023 Not After : Wed Oct 18 14:49:48 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:7a:bd:db:03:47:1e:e5:6e:58:40:49:94:d8:02:a2: e7:76:ae:87:c1:52:2d:f3:d5:53:df:c4:c2:00:fc:2a: 3a:fb:ea:a4:a0:de:9e:0c:53:2d:5b:e0:cd:f6:a7:dc: 8f:60:8b:ab:c2:b5:29:5a:e6:cc:fc:52:d4:50:65:76: 47:57:02:27:54:fa:a3:c0:ac:c8:bd:5a:01:1f:65:51: f4:09:cb:bc:79:d9:c2:42:34:37:eb:66:4a:15:bb:fd: 27:6b:a0:a9:d8:ff:24:46:5b:d6:00:50:87:2e:47:f2: 8e:f0:12:79:d2:34:8b:73:f9:b2:20:a2:48:04:c2:4e: 34:8a:4a:6d:c5:8c:b0:d4:9c:db:16:8e:dc:ef:6c:76: 40:e7:c1:b0:85:22:0e:ac:6c:15:4a:09:c4:6b:f2:b8: c1:18:6e:73:ca:69:88:0b:4a:32:d8:ae:56:54:10:ee: 52:e1:86:c9:a3:f8:fc:e3:c1:51:51:a4:2d:b1:92:2d: 70:04:4c:9b:4b:fd:2e:69:bd:f4:3f:30:0e:43:3a:89: df:da:02:d4:bb:32:e6:75:60:af:0c:66:e1:64:3f:22: 7d:4d:27:e0:2d:ff:d6:46:f9:08:33:06:e4:2a:42:76: 17:c2:8f:d4:59:5a:1b:d5:79:a7:dc:06:01:d9:7f:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:55:5d:14:d1:45:7e:d0:a0:55:02:ae:9d:77:cb:4b: df:62:0b:26:72:1e:28:b0:72:aa:f6:ae:57:65:4d:ba: dd:d8:ba:90:f2:62:49:9f:3f:d4:52:8c:e4:2b:8c:a9: b1:37:44:77:1b:7b:97:b1:87:05:12:91:09:17:a9:e5: d9:73:6b:6e:09:8e:b7:0d:81:18:41:20:d7:24:3b:f1: fc:0f:db:08:66:7b:7e:18:8e:55:d3:b9:3f:08:59:6a: 01:fb:6d:ea:96:4f:63:ed:33:b2:18:f5:2d:86:5c:43: d3:2c:ff:3c:4d:9d:4a:e0:d3:9c:e1:43:8e:e3:7c:b1: 52:89:3b:46:be:10:bd:4e:18:aa:dc:1e:4e:8d:17:57: b2:ee:29:12:8b:be:d4:4d:34:7a:11:62:3c:4f:63:23: 58:c0:d9:3e:cd:d5:ea:22:d0:4b:89:bb:4d:d4:85:ab: 69:82:0c:c7:8d:32:c4:1c:ef:e9:c8:67:17:4f:fd:f0: 35:41:cf:68:24:db:e8:a0:f5:69:ad:1b:c0:4a:76:a9: 28:c8:08:8c:65:ad:d7:44:e0:98:e3:06:59:c3:87:4f: 67:35:63:61:52:4b:9a:c7:e6:41:07:b2:31:ce:d7:4d: 4b:a1:15:f5:2b:6a:e4:5e:8d:3b:c5:fd:19:9d:c0:1f Fingerprint (SHA-256): E2:F1:E4:5F:D9:FB:0A:AE:B1:6F:5F:A5:E2:2E:76:8A:3F:7A:5A:DB:60:EC:6C:2C:6F:47:12:6D:09:8A:D9:52 Fingerprint (SHA1): 0F:B5:62:31:47:67:1B:0B:BC:72:A1:6D:78:C0:F3:C8:86:27:E4:78 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #444: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #445: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #446: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #447: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144904 (0x3cafa888) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:49:48 2023 Not After : Wed Oct 18 14:49:48 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:7a:bd:db:03:47:1e:e5:6e:58:40:49:94:d8:02:a2: e7:76:ae:87:c1:52:2d:f3:d5:53:df:c4:c2:00:fc:2a: 3a:fb:ea:a4:a0:de:9e:0c:53:2d:5b:e0:cd:f6:a7:dc: 8f:60:8b:ab:c2:b5:29:5a:e6:cc:fc:52:d4:50:65:76: 47:57:02:27:54:fa:a3:c0:ac:c8:bd:5a:01:1f:65:51: f4:09:cb:bc:79:d9:c2:42:34:37:eb:66:4a:15:bb:fd: 27:6b:a0:a9:d8:ff:24:46:5b:d6:00:50:87:2e:47:f2: 8e:f0:12:79:d2:34:8b:73:f9:b2:20:a2:48:04:c2:4e: 34:8a:4a:6d:c5:8c:b0:d4:9c:db:16:8e:dc:ef:6c:76: 40:e7:c1:b0:85:22:0e:ac:6c:15:4a:09:c4:6b:f2:b8: c1:18:6e:73:ca:69:88:0b:4a:32:d8:ae:56:54:10:ee: 52:e1:86:c9:a3:f8:fc:e3:c1:51:51:a4:2d:b1:92:2d: 70:04:4c:9b:4b:fd:2e:69:bd:f4:3f:30:0e:43:3a:89: df:da:02:d4:bb:32:e6:75:60:af:0c:66:e1:64:3f:22: 7d:4d:27:e0:2d:ff:d6:46:f9:08:33:06:e4:2a:42:76: 17:c2:8f:d4:59:5a:1b:d5:79:a7:dc:06:01:d9:7f:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 69:55:5d:14:d1:45:7e:d0:a0:55:02:ae:9d:77:cb:4b: df:62:0b:26:72:1e:28:b0:72:aa:f6:ae:57:65:4d:ba: dd:d8:ba:90:f2:62:49:9f:3f:d4:52:8c:e4:2b:8c:a9: b1:37:44:77:1b:7b:97:b1:87:05:12:91:09:17:a9:e5: d9:73:6b:6e:09:8e:b7:0d:81:18:41:20:d7:24:3b:f1: fc:0f:db:08:66:7b:7e:18:8e:55:d3:b9:3f:08:59:6a: 01:fb:6d:ea:96:4f:63:ed:33:b2:18:f5:2d:86:5c:43: d3:2c:ff:3c:4d:9d:4a:e0:d3:9c:e1:43:8e:e3:7c:b1: 52:89:3b:46:be:10:bd:4e:18:aa:dc:1e:4e:8d:17:57: b2:ee:29:12:8b:be:d4:4d:34:7a:11:62:3c:4f:63:23: 58:c0:d9:3e:cd:d5:ea:22:d0:4b:89:bb:4d:d4:85:ab: 69:82:0c:c7:8d:32:c4:1c:ef:e9:c8:67:17:4f:fd:f0: 35:41:cf:68:24:db:e8:a0:f5:69:ad:1b:c0:4a:76:a9: 28:c8:08:8c:65:ad:d7:44:e0:98:e3:06:59:c3:87:4f: 67:35:63:61:52:4b:9a:c7:e6:41:07:b2:31:ce:d7:4d: 4b:a1:15:f5:2b:6a:e4:5e:8d:3b:c5:fd:19:9d:c0:1f Fingerprint (SHA-256): E2:F1:E4:5F:D9:FB:0A:AE:B1:6F:5F:A5:E2:2E:76:8A:3F:7A:5A:DB:60:EC:6C:2C:6F:47:12:6D:09:8A:D9:52 Fingerprint (SHA1): 0F:B5:62:31:47:67:1B:0B:BC:72:A1:6D:78:C0:F3:C8:86:27:E4:78 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #448: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #449: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #450: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144911 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #451: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #452: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #453: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #454: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018144912 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #455: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #456: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #457: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #458: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1018144913 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #459: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #460: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #461: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #462: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1018144914 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #463: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #464: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #465: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #466: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1018144915 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #467: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #468: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #469: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #470: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1018144916 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #471: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #472: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #473: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #474: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1018144917 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #475: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #476: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #477: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #478: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1018144918 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #479: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #480: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #481: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #482: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1018144919 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #483: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #484: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #485: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #486: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1018144920 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #487: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #488: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #489: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #490: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1018144921 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #491: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #492: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #493: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #494: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1018144922 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #495: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #496: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #497: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #498: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1018144923 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #499: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #500: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #501: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #502: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1018144924 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #503: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #504: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #505: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #506: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1018144925 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #507: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #508: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #509: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #510: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1018144926 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #511: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #512: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #513: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #514: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1018144927 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #515: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #516: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #517: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #518: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1018144928 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #519: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #520: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #521: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #522: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1018144929 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #523: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #524: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #525: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #526: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1018144930 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #527: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #528: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #529: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #530: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1018144931 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #531: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #532: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #533: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #534: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1018144932 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #535: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #536: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #537: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #538: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1018144933 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #539: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #540: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #541: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #542: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1018144934 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #543: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #544: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #545: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #546: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1018144935 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #547: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #548: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #549: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #550: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1018144936 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #551: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #552: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #553: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #554: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1018144937 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #555: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #556: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #557: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #558: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1018144938 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #559: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #560: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #561: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #562: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1018144939 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #563: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #564: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #565: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #566: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1018144940 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #567: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #568: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #569: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144911 (0x3cafa88f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:49:52 2023 Not After : Wed Oct 18 14:49:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1e:09:16:f1:91:95:2c:ca:c0:86:53:a3:95:88:15: d9:75:9c:66:c0:58:66:f3:dc:3d:04:0c:d6:32:e7:3a: 60:b0:37:99:51:a4:d4:8a:51:ed:59:79:33:bf:29:a3: cb:a8:e9:29:8c:1b:05:f4:f8:ea:7f:29:d9:e9:e4:0a: c4:4e:67:7c:9a:ad:ff:fa:84:9d:f0:da:2c:f0:b0:3d: 7a:b4:48:cf:65:6c:f3:8e:1d:22:7e:13:5a:3c:ea:ba: 12:4d:00:45:ca:8e:d1:09:c8:d3:2c:08:6e:e5:53:b3: 16:f4:56:8a:c0:aa:6c:a9:70:70:ac:bb:23:82:19:e9: 67:77:4d:22:d9:26:11:dd:12:e5:cb:95:c5:a8:cf:01: 6d:f4:df:5e:3d:2d:5d:e8:17:65:31:5c:5a:f3:01:88: 27:55:f4:2a:07:65:20:04:6c:8a:7c:1d:59:e2:45:af: 08:f7:cf:7c:6f:a7:a4:59:2b:d0:5c:13:79:0c:ba:e1: d1:79:6d:3f:83:c3:9c:10:23:51:4a:0e:f4:4d:41:d6: 3a:5f:9d:95:c9:23:57:96:b0:f4:d7:44:a9:78:aa:13: 70:fc:a2:4f:e5:12:6c:08:d0:66:e7:d7:a5:85:b3:27: 0d:3f:f1:cb:56:58:ef:d1:ef:26:78:79:c2:58:11:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:cc:a3:92:df:f3:38:7d:ae:fd:49:d8:53:8a:02:5f: ca:39:62:6d:ba:9d:e3:c7:69:7e:1f:a7:04:38:03:21: ff:fb:af:b4:35:bf:88:c6:70:68:eb:c3:4a:95:97:c5: 0f:ce:d3:1a:4c:08:e6:ff:0c:2d:3a:f1:93:75:44:86: a8:28:08:02:1c:6b:a7:62:6f:2d:2e:a5:17:c8:f1:cd: 32:c6:ca:54:50:3b:67:e1:2a:21:cf:56:5b:4a:c1:6f: 78:f2:86:23:01:71:18:e9:a8:9a:52:57:de:83:d0:8b: 44:0d:48:e0:ab:03:16:f2:7d:f7:52:10:7e:23:24:5a: 9b:ad:95:f7:08:f9:22:0f:90:7b:df:3f:bc:ca:b2:41: 90:03:aa:20:cd:fb:97:67:8e:cf:fe:05:12:1d:f1:33: 1d:ab:c1:06:0b:c4:90:60:93:1d:a8:e4:75:23:f0:58: 2e:c2:69:6e:5c:da:67:9d:d3:8c:7d:cf:90:aa:24:38: fc:e0:ce:68:3d:5f:d0:d5:ab:0e:44:9b:5b:0e:3a:3a: ab:f0:bc:30:32:f4:a2:22:9f:2a:4c:83:8c:64:74:b5: 41:d6:cc:ac:bb:f8:84:1e:f7:f9:5a:8d:6a:1b:93:28: 10:2a:5e:6c:b6:41:4a:7c:0a:2a:72:5b:8a:49:21:74 Fingerprint (SHA-256): 57:3F:C9:86:9A:A6:5A:76:7F:9C:E0:C7:2F:48:72:7B:0B:B3:B3:B1:E5:89:34:E7:0A:4C:36:C2:41:32:30:20 Fingerprint (SHA1): 98:67:08:26:81:EC:56:D9:DF:F5:24:22:F8:05:9E:E3:86:37:F3:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #570: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #571: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144911 (0x3cafa88f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:49:52 2023 Not After : Wed Oct 18 14:49:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1e:09:16:f1:91:95:2c:ca:c0:86:53:a3:95:88:15: d9:75:9c:66:c0:58:66:f3:dc:3d:04:0c:d6:32:e7:3a: 60:b0:37:99:51:a4:d4:8a:51:ed:59:79:33:bf:29:a3: cb:a8:e9:29:8c:1b:05:f4:f8:ea:7f:29:d9:e9:e4:0a: c4:4e:67:7c:9a:ad:ff:fa:84:9d:f0:da:2c:f0:b0:3d: 7a:b4:48:cf:65:6c:f3:8e:1d:22:7e:13:5a:3c:ea:ba: 12:4d:00:45:ca:8e:d1:09:c8:d3:2c:08:6e:e5:53:b3: 16:f4:56:8a:c0:aa:6c:a9:70:70:ac:bb:23:82:19:e9: 67:77:4d:22:d9:26:11:dd:12:e5:cb:95:c5:a8:cf:01: 6d:f4:df:5e:3d:2d:5d:e8:17:65:31:5c:5a:f3:01:88: 27:55:f4:2a:07:65:20:04:6c:8a:7c:1d:59:e2:45:af: 08:f7:cf:7c:6f:a7:a4:59:2b:d0:5c:13:79:0c:ba:e1: d1:79:6d:3f:83:c3:9c:10:23:51:4a:0e:f4:4d:41:d6: 3a:5f:9d:95:c9:23:57:96:b0:f4:d7:44:a9:78:aa:13: 70:fc:a2:4f:e5:12:6c:08:d0:66:e7:d7:a5:85:b3:27: 0d:3f:f1:cb:56:58:ef:d1:ef:26:78:79:c2:58:11:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:cc:a3:92:df:f3:38:7d:ae:fd:49:d8:53:8a:02:5f: ca:39:62:6d:ba:9d:e3:c7:69:7e:1f:a7:04:38:03:21: ff:fb:af:b4:35:bf:88:c6:70:68:eb:c3:4a:95:97:c5: 0f:ce:d3:1a:4c:08:e6:ff:0c:2d:3a:f1:93:75:44:86: a8:28:08:02:1c:6b:a7:62:6f:2d:2e:a5:17:c8:f1:cd: 32:c6:ca:54:50:3b:67:e1:2a:21:cf:56:5b:4a:c1:6f: 78:f2:86:23:01:71:18:e9:a8:9a:52:57:de:83:d0:8b: 44:0d:48:e0:ab:03:16:f2:7d:f7:52:10:7e:23:24:5a: 9b:ad:95:f7:08:f9:22:0f:90:7b:df:3f:bc:ca:b2:41: 90:03:aa:20:cd:fb:97:67:8e:cf:fe:05:12:1d:f1:33: 1d:ab:c1:06:0b:c4:90:60:93:1d:a8:e4:75:23:f0:58: 2e:c2:69:6e:5c:da:67:9d:d3:8c:7d:cf:90:aa:24:38: fc:e0:ce:68:3d:5f:d0:d5:ab:0e:44:9b:5b:0e:3a:3a: ab:f0:bc:30:32:f4:a2:22:9f:2a:4c:83:8c:64:74:b5: 41:d6:cc:ac:bb:f8:84:1e:f7:f9:5a:8d:6a:1b:93:28: 10:2a:5e:6c:b6:41:4a:7c:0a:2a:72:5b:8a:49:21:74 Fingerprint (SHA-256): 57:3F:C9:86:9A:A6:5A:76:7F:9C:E0:C7:2F:48:72:7B:0B:B3:B3:B1:E5:89:34:E7:0A:4C:36:C2:41:32:30:20 Fingerprint (SHA1): 98:67:08:26:81:EC:56:D9:DF:F5:24:22:F8:05:9E:E3:86:37:F3:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #572: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #573: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #574: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #575: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144911 (0x3cafa88f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:49:52 2023 Not After : Wed Oct 18 14:49:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1e:09:16:f1:91:95:2c:ca:c0:86:53:a3:95:88:15: d9:75:9c:66:c0:58:66:f3:dc:3d:04:0c:d6:32:e7:3a: 60:b0:37:99:51:a4:d4:8a:51:ed:59:79:33:bf:29:a3: cb:a8:e9:29:8c:1b:05:f4:f8:ea:7f:29:d9:e9:e4:0a: c4:4e:67:7c:9a:ad:ff:fa:84:9d:f0:da:2c:f0:b0:3d: 7a:b4:48:cf:65:6c:f3:8e:1d:22:7e:13:5a:3c:ea:ba: 12:4d:00:45:ca:8e:d1:09:c8:d3:2c:08:6e:e5:53:b3: 16:f4:56:8a:c0:aa:6c:a9:70:70:ac:bb:23:82:19:e9: 67:77:4d:22:d9:26:11:dd:12:e5:cb:95:c5:a8:cf:01: 6d:f4:df:5e:3d:2d:5d:e8:17:65:31:5c:5a:f3:01:88: 27:55:f4:2a:07:65:20:04:6c:8a:7c:1d:59:e2:45:af: 08:f7:cf:7c:6f:a7:a4:59:2b:d0:5c:13:79:0c:ba:e1: d1:79:6d:3f:83:c3:9c:10:23:51:4a:0e:f4:4d:41:d6: 3a:5f:9d:95:c9:23:57:96:b0:f4:d7:44:a9:78:aa:13: 70:fc:a2:4f:e5:12:6c:08:d0:66:e7:d7:a5:85:b3:27: 0d:3f:f1:cb:56:58:ef:d1:ef:26:78:79:c2:58:11:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:cc:a3:92:df:f3:38:7d:ae:fd:49:d8:53:8a:02:5f: ca:39:62:6d:ba:9d:e3:c7:69:7e:1f:a7:04:38:03:21: ff:fb:af:b4:35:bf:88:c6:70:68:eb:c3:4a:95:97:c5: 0f:ce:d3:1a:4c:08:e6:ff:0c:2d:3a:f1:93:75:44:86: a8:28:08:02:1c:6b:a7:62:6f:2d:2e:a5:17:c8:f1:cd: 32:c6:ca:54:50:3b:67:e1:2a:21:cf:56:5b:4a:c1:6f: 78:f2:86:23:01:71:18:e9:a8:9a:52:57:de:83:d0:8b: 44:0d:48:e0:ab:03:16:f2:7d:f7:52:10:7e:23:24:5a: 9b:ad:95:f7:08:f9:22:0f:90:7b:df:3f:bc:ca:b2:41: 90:03:aa:20:cd:fb:97:67:8e:cf:fe:05:12:1d:f1:33: 1d:ab:c1:06:0b:c4:90:60:93:1d:a8:e4:75:23:f0:58: 2e:c2:69:6e:5c:da:67:9d:d3:8c:7d:cf:90:aa:24:38: fc:e0:ce:68:3d:5f:d0:d5:ab:0e:44:9b:5b:0e:3a:3a: ab:f0:bc:30:32:f4:a2:22:9f:2a:4c:83:8c:64:74:b5: 41:d6:cc:ac:bb:f8:84:1e:f7:f9:5a:8d:6a:1b:93:28: 10:2a:5e:6c:b6:41:4a:7c:0a:2a:72:5b:8a:49:21:74 Fingerprint (SHA-256): 57:3F:C9:86:9A:A6:5A:76:7F:9C:E0:C7:2F:48:72:7B:0B:B3:B3:B1:E5:89:34:E7:0A:4C:36:C2:41:32:30:20 Fingerprint (SHA1): 98:67:08:26:81:EC:56:D9:DF:F5:24:22:F8:05:9E:E3:86:37:F3:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #576: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #577: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #578: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #579: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144911 (0x3cafa88f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:49:52 2023 Not After : Wed Oct 18 14:49:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1e:09:16:f1:91:95:2c:ca:c0:86:53:a3:95:88:15: d9:75:9c:66:c0:58:66:f3:dc:3d:04:0c:d6:32:e7:3a: 60:b0:37:99:51:a4:d4:8a:51:ed:59:79:33:bf:29:a3: cb:a8:e9:29:8c:1b:05:f4:f8:ea:7f:29:d9:e9:e4:0a: c4:4e:67:7c:9a:ad:ff:fa:84:9d:f0:da:2c:f0:b0:3d: 7a:b4:48:cf:65:6c:f3:8e:1d:22:7e:13:5a:3c:ea:ba: 12:4d:00:45:ca:8e:d1:09:c8:d3:2c:08:6e:e5:53:b3: 16:f4:56:8a:c0:aa:6c:a9:70:70:ac:bb:23:82:19:e9: 67:77:4d:22:d9:26:11:dd:12:e5:cb:95:c5:a8:cf:01: 6d:f4:df:5e:3d:2d:5d:e8:17:65:31:5c:5a:f3:01:88: 27:55:f4:2a:07:65:20:04:6c:8a:7c:1d:59:e2:45:af: 08:f7:cf:7c:6f:a7:a4:59:2b:d0:5c:13:79:0c:ba:e1: d1:79:6d:3f:83:c3:9c:10:23:51:4a:0e:f4:4d:41:d6: 3a:5f:9d:95:c9:23:57:96:b0:f4:d7:44:a9:78:aa:13: 70:fc:a2:4f:e5:12:6c:08:d0:66:e7:d7:a5:85:b3:27: 0d:3f:f1:cb:56:58:ef:d1:ef:26:78:79:c2:58:11:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:cc:a3:92:df:f3:38:7d:ae:fd:49:d8:53:8a:02:5f: ca:39:62:6d:ba:9d:e3:c7:69:7e:1f:a7:04:38:03:21: ff:fb:af:b4:35:bf:88:c6:70:68:eb:c3:4a:95:97:c5: 0f:ce:d3:1a:4c:08:e6:ff:0c:2d:3a:f1:93:75:44:86: a8:28:08:02:1c:6b:a7:62:6f:2d:2e:a5:17:c8:f1:cd: 32:c6:ca:54:50:3b:67:e1:2a:21:cf:56:5b:4a:c1:6f: 78:f2:86:23:01:71:18:e9:a8:9a:52:57:de:83:d0:8b: 44:0d:48:e0:ab:03:16:f2:7d:f7:52:10:7e:23:24:5a: 9b:ad:95:f7:08:f9:22:0f:90:7b:df:3f:bc:ca:b2:41: 90:03:aa:20:cd:fb:97:67:8e:cf:fe:05:12:1d:f1:33: 1d:ab:c1:06:0b:c4:90:60:93:1d:a8:e4:75:23:f0:58: 2e:c2:69:6e:5c:da:67:9d:d3:8c:7d:cf:90:aa:24:38: fc:e0:ce:68:3d:5f:d0:d5:ab:0e:44:9b:5b:0e:3a:3a: ab:f0:bc:30:32:f4:a2:22:9f:2a:4c:83:8c:64:74:b5: 41:d6:cc:ac:bb:f8:84:1e:f7:f9:5a:8d:6a:1b:93:28: 10:2a:5e:6c:b6:41:4a:7c:0a:2a:72:5b:8a:49:21:74 Fingerprint (SHA-256): 57:3F:C9:86:9A:A6:5A:76:7F:9C:E0:C7:2F:48:72:7B:0B:B3:B3:B1:E5:89:34:E7:0A:4C:36:C2:41:32:30:20 Fingerprint (SHA1): 98:67:08:26:81:EC:56:D9:DF:F5:24:22:F8:05:9E:E3:86:37:F3:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #580: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144911 (0x3cafa88f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:49:52 2023 Not After : Wed Oct 18 14:49:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1e:09:16:f1:91:95:2c:ca:c0:86:53:a3:95:88:15: d9:75:9c:66:c0:58:66:f3:dc:3d:04:0c:d6:32:e7:3a: 60:b0:37:99:51:a4:d4:8a:51:ed:59:79:33:bf:29:a3: cb:a8:e9:29:8c:1b:05:f4:f8:ea:7f:29:d9:e9:e4:0a: c4:4e:67:7c:9a:ad:ff:fa:84:9d:f0:da:2c:f0:b0:3d: 7a:b4:48:cf:65:6c:f3:8e:1d:22:7e:13:5a:3c:ea:ba: 12:4d:00:45:ca:8e:d1:09:c8:d3:2c:08:6e:e5:53:b3: 16:f4:56:8a:c0:aa:6c:a9:70:70:ac:bb:23:82:19:e9: 67:77:4d:22:d9:26:11:dd:12:e5:cb:95:c5:a8:cf:01: 6d:f4:df:5e:3d:2d:5d:e8:17:65:31:5c:5a:f3:01:88: 27:55:f4:2a:07:65:20:04:6c:8a:7c:1d:59:e2:45:af: 08:f7:cf:7c:6f:a7:a4:59:2b:d0:5c:13:79:0c:ba:e1: d1:79:6d:3f:83:c3:9c:10:23:51:4a:0e:f4:4d:41:d6: 3a:5f:9d:95:c9:23:57:96:b0:f4:d7:44:a9:78:aa:13: 70:fc:a2:4f:e5:12:6c:08:d0:66:e7:d7:a5:85:b3:27: 0d:3f:f1:cb:56:58:ef:d1:ef:26:78:79:c2:58:11:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:cc:a3:92:df:f3:38:7d:ae:fd:49:d8:53:8a:02:5f: ca:39:62:6d:ba:9d:e3:c7:69:7e:1f:a7:04:38:03:21: ff:fb:af:b4:35:bf:88:c6:70:68:eb:c3:4a:95:97:c5: 0f:ce:d3:1a:4c:08:e6:ff:0c:2d:3a:f1:93:75:44:86: a8:28:08:02:1c:6b:a7:62:6f:2d:2e:a5:17:c8:f1:cd: 32:c6:ca:54:50:3b:67:e1:2a:21:cf:56:5b:4a:c1:6f: 78:f2:86:23:01:71:18:e9:a8:9a:52:57:de:83:d0:8b: 44:0d:48:e0:ab:03:16:f2:7d:f7:52:10:7e:23:24:5a: 9b:ad:95:f7:08:f9:22:0f:90:7b:df:3f:bc:ca:b2:41: 90:03:aa:20:cd:fb:97:67:8e:cf:fe:05:12:1d:f1:33: 1d:ab:c1:06:0b:c4:90:60:93:1d:a8:e4:75:23:f0:58: 2e:c2:69:6e:5c:da:67:9d:d3:8c:7d:cf:90:aa:24:38: fc:e0:ce:68:3d:5f:d0:d5:ab:0e:44:9b:5b:0e:3a:3a: ab:f0:bc:30:32:f4:a2:22:9f:2a:4c:83:8c:64:74:b5: 41:d6:cc:ac:bb:f8:84:1e:f7:f9:5a:8d:6a:1b:93:28: 10:2a:5e:6c:b6:41:4a:7c:0a:2a:72:5b:8a:49:21:74 Fingerprint (SHA-256): 57:3F:C9:86:9A:A6:5A:76:7F:9C:E0:C7:2F:48:72:7B:0B:B3:B3:B1:E5:89:34:E7:0A:4C:36:C2:41:32:30:20 Fingerprint (SHA1): 98:67:08:26:81:EC:56:D9:DF:F5:24:22:F8:05:9E:E3:86:37:F3:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #581: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #582: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144911 (0x3cafa88f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:49:52 2023 Not After : Wed Oct 18 14:49:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1e:09:16:f1:91:95:2c:ca:c0:86:53:a3:95:88:15: d9:75:9c:66:c0:58:66:f3:dc:3d:04:0c:d6:32:e7:3a: 60:b0:37:99:51:a4:d4:8a:51:ed:59:79:33:bf:29:a3: cb:a8:e9:29:8c:1b:05:f4:f8:ea:7f:29:d9:e9:e4:0a: c4:4e:67:7c:9a:ad:ff:fa:84:9d:f0:da:2c:f0:b0:3d: 7a:b4:48:cf:65:6c:f3:8e:1d:22:7e:13:5a:3c:ea:ba: 12:4d:00:45:ca:8e:d1:09:c8:d3:2c:08:6e:e5:53:b3: 16:f4:56:8a:c0:aa:6c:a9:70:70:ac:bb:23:82:19:e9: 67:77:4d:22:d9:26:11:dd:12:e5:cb:95:c5:a8:cf:01: 6d:f4:df:5e:3d:2d:5d:e8:17:65:31:5c:5a:f3:01:88: 27:55:f4:2a:07:65:20:04:6c:8a:7c:1d:59:e2:45:af: 08:f7:cf:7c:6f:a7:a4:59:2b:d0:5c:13:79:0c:ba:e1: d1:79:6d:3f:83:c3:9c:10:23:51:4a:0e:f4:4d:41:d6: 3a:5f:9d:95:c9:23:57:96:b0:f4:d7:44:a9:78:aa:13: 70:fc:a2:4f:e5:12:6c:08:d0:66:e7:d7:a5:85:b3:27: 0d:3f:f1:cb:56:58:ef:d1:ef:26:78:79:c2:58:11:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:cc:a3:92:df:f3:38:7d:ae:fd:49:d8:53:8a:02:5f: ca:39:62:6d:ba:9d:e3:c7:69:7e:1f:a7:04:38:03:21: ff:fb:af:b4:35:bf:88:c6:70:68:eb:c3:4a:95:97:c5: 0f:ce:d3:1a:4c:08:e6:ff:0c:2d:3a:f1:93:75:44:86: a8:28:08:02:1c:6b:a7:62:6f:2d:2e:a5:17:c8:f1:cd: 32:c6:ca:54:50:3b:67:e1:2a:21:cf:56:5b:4a:c1:6f: 78:f2:86:23:01:71:18:e9:a8:9a:52:57:de:83:d0:8b: 44:0d:48:e0:ab:03:16:f2:7d:f7:52:10:7e:23:24:5a: 9b:ad:95:f7:08:f9:22:0f:90:7b:df:3f:bc:ca:b2:41: 90:03:aa:20:cd:fb:97:67:8e:cf:fe:05:12:1d:f1:33: 1d:ab:c1:06:0b:c4:90:60:93:1d:a8:e4:75:23:f0:58: 2e:c2:69:6e:5c:da:67:9d:d3:8c:7d:cf:90:aa:24:38: fc:e0:ce:68:3d:5f:d0:d5:ab:0e:44:9b:5b:0e:3a:3a: ab:f0:bc:30:32:f4:a2:22:9f:2a:4c:83:8c:64:74:b5: 41:d6:cc:ac:bb:f8:84:1e:f7:f9:5a:8d:6a:1b:93:28: 10:2a:5e:6c:b6:41:4a:7c:0a:2a:72:5b:8a:49:21:74 Fingerprint (SHA-256): 57:3F:C9:86:9A:A6:5A:76:7F:9C:E0:C7:2F:48:72:7B:0B:B3:B3:B1:E5:89:34:E7:0A:4C:36:C2:41:32:30:20 Fingerprint (SHA1): 98:67:08:26:81:EC:56:D9:DF:F5:24:22:F8:05:9E:E3:86:37:F3:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #583: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #584: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #585: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #586: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144911 (0x3cafa88f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:49:52 2023 Not After : Wed Oct 18 14:49:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1e:09:16:f1:91:95:2c:ca:c0:86:53:a3:95:88:15: d9:75:9c:66:c0:58:66:f3:dc:3d:04:0c:d6:32:e7:3a: 60:b0:37:99:51:a4:d4:8a:51:ed:59:79:33:bf:29:a3: cb:a8:e9:29:8c:1b:05:f4:f8:ea:7f:29:d9:e9:e4:0a: c4:4e:67:7c:9a:ad:ff:fa:84:9d:f0:da:2c:f0:b0:3d: 7a:b4:48:cf:65:6c:f3:8e:1d:22:7e:13:5a:3c:ea:ba: 12:4d:00:45:ca:8e:d1:09:c8:d3:2c:08:6e:e5:53:b3: 16:f4:56:8a:c0:aa:6c:a9:70:70:ac:bb:23:82:19:e9: 67:77:4d:22:d9:26:11:dd:12:e5:cb:95:c5:a8:cf:01: 6d:f4:df:5e:3d:2d:5d:e8:17:65:31:5c:5a:f3:01:88: 27:55:f4:2a:07:65:20:04:6c:8a:7c:1d:59:e2:45:af: 08:f7:cf:7c:6f:a7:a4:59:2b:d0:5c:13:79:0c:ba:e1: d1:79:6d:3f:83:c3:9c:10:23:51:4a:0e:f4:4d:41:d6: 3a:5f:9d:95:c9:23:57:96:b0:f4:d7:44:a9:78:aa:13: 70:fc:a2:4f:e5:12:6c:08:d0:66:e7:d7:a5:85:b3:27: 0d:3f:f1:cb:56:58:ef:d1:ef:26:78:79:c2:58:11:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:cc:a3:92:df:f3:38:7d:ae:fd:49:d8:53:8a:02:5f: ca:39:62:6d:ba:9d:e3:c7:69:7e:1f:a7:04:38:03:21: ff:fb:af:b4:35:bf:88:c6:70:68:eb:c3:4a:95:97:c5: 0f:ce:d3:1a:4c:08:e6:ff:0c:2d:3a:f1:93:75:44:86: a8:28:08:02:1c:6b:a7:62:6f:2d:2e:a5:17:c8:f1:cd: 32:c6:ca:54:50:3b:67:e1:2a:21:cf:56:5b:4a:c1:6f: 78:f2:86:23:01:71:18:e9:a8:9a:52:57:de:83:d0:8b: 44:0d:48:e0:ab:03:16:f2:7d:f7:52:10:7e:23:24:5a: 9b:ad:95:f7:08:f9:22:0f:90:7b:df:3f:bc:ca:b2:41: 90:03:aa:20:cd:fb:97:67:8e:cf:fe:05:12:1d:f1:33: 1d:ab:c1:06:0b:c4:90:60:93:1d:a8:e4:75:23:f0:58: 2e:c2:69:6e:5c:da:67:9d:d3:8c:7d:cf:90:aa:24:38: fc:e0:ce:68:3d:5f:d0:d5:ab:0e:44:9b:5b:0e:3a:3a: ab:f0:bc:30:32:f4:a2:22:9f:2a:4c:83:8c:64:74:b5: 41:d6:cc:ac:bb:f8:84:1e:f7:f9:5a:8d:6a:1b:93:28: 10:2a:5e:6c:b6:41:4a:7c:0a:2a:72:5b:8a:49:21:74 Fingerprint (SHA-256): 57:3F:C9:86:9A:A6:5A:76:7F:9C:E0:C7:2F:48:72:7B:0B:B3:B3:B1:E5:89:34:E7:0A:4C:36:C2:41:32:30:20 Fingerprint (SHA1): 98:67:08:26:81:EC:56:D9:DF:F5:24:22:F8:05:9E:E3:86:37:F3:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #587: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144911 (0x3cafa88f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:49:52 2023 Not After : Wed Oct 18 14:49:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1e:09:16:f1:91:95:2c:ca:c0:86:53:a3:95:88:15: d9:75:9c:66:c0:58:66:f3:dc:3d:04:0c:d6:32:e7:3a: 60:b0:37:99:51:a4:d4:8a:51:ed:59:79:33:bf:29:a3: cb:a8:e9:29:8c:1b:05:f4:f8:ea:7f:29:d9:e9:e4:0a: c4:4e:67:7c:9a:ad:ff:fa:84:9d:f0:da:2c:f0:b0:3d: 7a:b4:48:cf:65:6c:f3:8e:1d:22:7e:13:5a:3c:ea:ba: 12:4d:00:45:ca:8e:d1:09:c8:d3:2c:08:6e:e5:53:b3: 16:f4:56:8a:c0:aa:6c:a9:70:70:ac:bb:23:82:19:e9: 67:77:4d:22:d9:26:11:dd:12:e5:cb:95:c5:a8:cf:01: 6d:f4:df:5e:3d:2d:5d:e8:17:65:31:5c:5a:f3:01:88: 27:55:f4:2a:07:65:20:04:6c:8a:7c:1d:59:e2:45:af: 08:f7:cf:7c:6f:a7:a4:59:2b:d0:5c:13:79:0c:ba:e1: d1:79:6d:3f:83:c3:9c:10:23:51:4a:0e:f4:4d:41:d6: 3a:5f:9d:95:c9:23:57:96:b0:f4:d7:44:a9:78:aa:13: 70:fc:a2:4f:e5:12:6c:08:d0:66:e7:d7:a5:85:b3:27: 0d:3f:f1:cb:56:58:ef:d1:ef:26:78:79:c2:58:11:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:cc:a3:92:df:f3:38:7d:ae:fd:49:d8:53:8a:02:5f: ca:39:62:6d:ba:9d:e3:c7:69:7e:1f:a7:04:38:03:21: ff:fb:af:b4:35:bf:88:c6:70:68:eb:c3:4a:95:97:c5: 0f:ce:d3:1a:4c:08:e6:ff:0c:2d:3a:f1:93:75:44:86: a8:28:08:02:1c:6b:a7:62:6f:2d:2e:a5:17:c8:f1:cd: 32:c6:ca:54:50:3b:67:e1:2a:21:cf:56:5b:4a:c1:6f: 78:f2:86:23:01:71:18:e9:a8:9a:52:57:de:83:d0:8b: 44:0d:48:e0:ab:03:16:f2:7d:f7:52:10:7e:23:24:5a: 9b:ad:95:f7:08:f9:22:0f:90:7b:df:3f:bc:ca:b2:41: 90:03:aa:20:cd:fb:97:67:8e:cf:fe:05:12:1d:f1:33: 1d:ab:c1:06:0b:c4:90:60:93:1d:a8:e4:75:23:f0:58: 2e:c2:69:6e:5c:da:67:9d:d3:8c:7d:cf:90:aa:24:38: fc:e0:ce:68:3d:5f:d0:d5:ab:0e:44:9b:5b:0e:3a:3a: ab:f0:bc:30:32:f4:a2:22:9f:2a:4c:83:8c:64:74:b5: 41:d6:cc:ac:bb:f8:84:1e:f7:f9:5a:8d:6a:1b:93:28: 10:2a:5e:6c:b6:41:4a:7c:0a:2a:72:5b:8a:49:21:74 Fingerprint (SHA-256): 57:3F:C9:86:9A:A6:5A:76:7F:9C:E0:C7:2F:48:72:7B:0B:B3:B3:B1:E5:89:34:E7:0A:4C:36:C2:41:32:30:20 Fingerprint (SHA1): 98:67:08:26:81:EC:56:D9:DF:F5:24:22:F8:05:9E:E3:86:37:F3:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #588: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144911 (0x3cafa88f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:49:52 2023 Not After : Wed Oct 18 14:49:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1e:09:16:f1:91:95:2c:ca:c0:86:53:a3:95:88:15: d9:75:9c:66:c0:58:66:f3:dc:3d:04:0c:d6:32:e7:3a: 60:b0:37:99:51:a4:d4:8a:51:ed:59:79:33:bf:29:a3: cb:a8:e9:29:8c:1b:05:f4:f8:ea:7f:29:d9:e9:e4:0a: c4:4e:67:7c:9a:ad:ff:fa:84:9d:f0:da:2c:f0:b0:3d: 7a:b4:48:cf:65:6c:f3:8e:1d:22:7e:13:5a:3c:ea:ba: 12:4d:00:45:ca:8e:d1:09:c8:d3:2c:08:6e:e5:53:b3: 16:f4:56:8a:c0:aa:6c:a9:70:70:ac:bb:23:82:19:e9: 67:77:4d:22:d9:26:11:dd:12:e5:cb:95:c5:a8:cf:01: 6d:f4:df:5e:3d:2d:5d:e8:17:65:31:5c:5a:f3:01:88: 27:55:f4:2a:07:65:20:04:6c:8a:7c:1d:59:e2:45:af: 08:f7:cf:7c:6f:a7:a4:59:2b:d0:5c:13:79:0c:ba:e1: d1:79:6d:3f:83:c3:9c:10:23:51:4a:0e:f4:4d:41:d6: 3a:5f:9d:95:c9:23:57:96:b0:f4:d7:44:a9:78:aa:13: 70:fc:a2:4f:e5:12:6c:08:d0:66:e7:d7:a5:85:b3:27: 0d:3f:f1:cb:56:58:ef:d1:ef:26:78:79:c2:58:11:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:cc:a3:92:df:f3:38:7d:ae:fd:49:d8:53:8a:02:5f: ca:39:62:6d:ba:9d:e3:c7:69:7e:1f:a7:04:38:03:21: ff:fb:af:b4:35:bf:88:c6:70:68:eb:c3:4a:95:97:c5: 0f:ce:d3:1a:4c:08:e6:ff:0c:2d:3a:f1:93:75:44:86: a8:28:08:02:1c:6b:a7:62:6f:2d:2e:a5:17:c8:f1:cd: 32:c6:ca:54:50:3b:67:e1:2a:21:cf:56:5b:4a:c1:6f: 78:f2:86:23:01:71:18:e9:a8:9a:52:57:de:83:d0:8b: 44:0d:48:e0:ab:03:16:f2:7d:f7:52:10:7e:23:24:5a: 9b:ad:95:f7:08:f9:22:0f:90:7b:df:3f:bc:ca:b2:41: 90:03:aa:20:cd:fb:97:67:8e:cf:fe:05:12:1d:f1:33: 1d:ab:c1:06:0b:c4:90:60:93:1d:a8:e4:75:23:f0:58: 2e:c2:69:6e:5c:da:67:9d:d3:8c:7d:cf:90:aa:24:38: fc:e0:ce:68:3d:5f:d0:d5:ab:0e:44:9b:5b:0e:3a:3a: ab:f0:bc:30:32:f4:a2:22:9f:2a:4c:83:8c:64:74:b5: 41:d6:cc:ac:bb:f8:84:1e:f7:f9:5a:8d:6a:1b:93:28: 10:2a:5e:6c:b6:41:4a:7c:0a:2a:72:5b:8a:49:21:74 Fingerprint (SHA-256): 57:3F:C9:86:9A:A6:5A:76:7F:9C:E0:C7:2F:48:72:7B:0B:B3:B3:B1:E5:89:34:E7:0A:4C:36:C2:41:32:30:20 Fingerprint (SHA1): 98:67:08:26:81:EC:56:D9:DF:F5:24:22:F8:05:9E:E3:86:37:F3:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #589: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144911 (0x3cafa88f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:49:52 2023 Not After : Wed Oct 18 14:49:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1e:09:16:f1:91:95:2c:ca:c0:86:53:a3:95:88:15: d9:75:9c:66:c0:58:66:f3:dc:3d:04:0c:d6:32:e7:3a: 60:b0:37:99:51:a4:d4:8a:51:ed:59:79:33:bf:29:a3: cb:a8:e9:29:8c:1b:05:f4:f8:ea:7f:29:d9:e9:e4:0a: c4:4e:67:7c:9a:ad:ff:fa:84:9d:f0:da:2c:f0:b0:3d: 7a:b4:48:cf:65:6c:f3:8e:1d:22:7e:13:5a:3c:ea:ba: 12:4d:00:45:ca:8e:d1:09:c8:d3:2c:08:6e:e5:53:b3: 16:f4:56:8a:c0:aa:6c:a9:70:70:ac:bb:23:82:19:e9: 67:77:4d:22:d9:26:11:dd:12:e5:cb:95:c5:a8:cf:01: 6d:f4:df:5e:3d:2d:5d:e8:17:65:31:5c:5a:f3:01:88: 27:55:f4:2a:07:65:20:04:6c:8a:7c:1d:59:e2:45:af: 08:f7:cf:7c:6f:a7:a4:59:2b:d0:5c:13:79:0c:ba:e1: d1:79:6d:3f:83:c3:9c:10:23:51:4a:0e:f4:4d:41:d6: 3a:5f:9d:95:c9:23:57:96:b0:f4:d7:44:a9:78:aa:13: 70:fc:a2:4f:e5:12:6c:08:d0:66:e7:d7:a5:85:b3:27: 0d:3f:f1:cb:56:58:ef:d1:ef:26:78:79:c2:58:11:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:cc:a3:92:df:f3:38:7d:ae:fd:49:d8:53:8a:02:5f: ca:39:62:6d:ba:9d:e3:c7:69:7e:1f:a7:04:38:03:21: ff:fb:af:b4:35:bf:88:c6:70:68:eb:c3:4a:95:97:c5: 0f:ce:d3:1a:4c:08:e6:ff:0c:2d:3a:f1:93:75:44:86: a8:28:08:02:1c:6b:a7:62:6f:2d:2e:a5:17:c8:f1:cd: 32:c6:ca:54:50:3b:67:e1:2a:21:cf:56:5b:4a:c1:6f: 78:f2:86:23:01:71:18:e9:a8:9a:52:57:de:83:d0:8b: 44:0d:48:e0:ab:03:16:f2:7d:f7:52:10:7e:23:24:5a: 9b:ad:95:f7:08:f9:22:0f:90:7b:df:3f:bc:ca:b2:41: 90:03:aa:20:cd:fb:97:67:8e:cf:fe:05:12:1d:f1:33: 1d:ab:c1:06:0b:c4:90:60:93:1d:a8:e4:75:23:f0:58: 2e:c2:69:6e:5c:da:67:9d:d3:8c:7d:cf:90:aa:24:38: fc:e0:ce:68:3d:5f:d0:d5:ab:0e:44:9b:5b:0e:3a:3a: ab:f0:bc:30:32:f4:a2:22:9f:2a:4c:83:8c:64:74:b5: 41:d6:cc:ac:bb:f8:84:1e:f7:f9:5a:8d:6a:1b:93:28: 10:2a:5e:6c:b6:41:4a:7c:0a:2a:72:5b:8a:49:21:74 Fingerprint (SHA-256): 57:3F:C9:86:9A:A6:5A:76:7F:9C:E0:C7:2F:48:72:7B:0B:B3:B3:B1:E5:89:34:E7:0A:4C:36:C2:41:32:30:20 Fingerprint (SHA1): 98:67:08:26:81:EC:56:D9:DF:F5:24:22:F8:05:9E:E3:86:37:F3:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #590: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144911 (0x3cafa88f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:49:52 2023 Not After : Wed Oct 18 14:49:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1e:09:16:f1:91:95:2c:ca:c0:86:53:a3:95:88:15: d9:75:9c:66:c0:58:66:f3:dc:3d:04:0c:d6:32:e7:3a: 60:b0:37:99:51:a4:d4:8a:51:ed:59:79:33:bf:29:a3: cb:a8:e9:29:8c:1b:05:f4:f8:ea:7f:29:d9:e9:e4:0a: c4:4e:67:7c:9a:ad:ff:fa:84:9d:f0:da:2c:f0:b0:3d: 7a:b4:48:cf:65:6c:f3:8e:1d:22:7e:13:5a:3c:ea:ba: 12:4d:00:45:ca:8e:d1:09:c8:d3:2c:08:6e:e5:53:b3: 16:f4:56:8a:c0:aa:6c:a9:70:70:ac:bb:23:82:19:e9: 67:77:4d:22:d9:26:11:dd:12:e5:cb:95:c5:a8:cf:01: 6d:f4:df:5e:3d:2d:5d:e8:17:65:31:5c:5a:f3:01:88: 27:55:f4:2a:07:65:20:04:6c:8a:7c:1d:59:e2:45:af: 08:f7:cf:7c:6f:a7:a4:59:2b:d0:5c:13:79:0c:ba:e1: d1:79:6d:3f:83:c3:9c:10:23:51:4a:0e:f4:4d:41:d6: 3a:5f:9d:95:c9:23:57:96:b0:f4:d7:44:a9:78:aa:13: 70:fc:a2:4f:e5:12:6c:08:d0:66:e7:d7:a5:85:b3:27: 0d:3f:f1:cb:56:58:ef:d1:ef:26:78:79:c2:58:11:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:cc:a3:92:df:f3:38:7d:ae:fd:49:d8:53:8a:02:5f: ca:39:62:6d:ba:9d:e3:c7:69:7e:1f:a7:04:38:03:21: ff:fb:af:b4:35:bf:88:c6:70:68:eb:c3:4a:95:97:c5: 0f:ce:d3:1a:4c:08:e6:ff:0c:2d:3a:f1:93:75:44:86: a8:28:08:02:1c:6b:a7:62:6f:2d:2e:a5:17:c8:f1:cd: 32:c6:ca:54:50:3b:67:e1:2a:21:cf:56:5b:4a:c1:6f: 78:f2:86:23:01:71:18:e9:a8:9a:52:57:de:83:d0:8b: 44:0d:48:e0:ab:03:16:f2:7d:f7:52:10:7e:23:24:5a: 9b:ad:95:f7:08:f9:22:0f:90:7b:df:3f:bc:ca:b2:41: 90:03:aa:20:cd:fb:97:67:8e:cf:fe:05:12:1d:f1:33: 1d:ab:c1:06:0b:c4:90:60:93:1d:a8:e4:75:23:f0:58: 2e:c2:69:6e:5c:da:67:9d:d3:8c:7d:cf:90:aa:24:38: fc:e0:ce:68:3d:5f:d0:d5:ab:0e:44:9b:5b:0e:3a:3a: ab:f0:bc:30:32:f4:a2:22:9f:2a:4c:83:8c:64:74:b5: 41:d6:cc:ac:bb:f8:84:1e:f7:f9:5a:8d:6a:1b:93:28: 10:2a:5e:6c:b6:41:4a:7c:0a:2a:72:5b:8a:49:21:74 Fingerprint (SHA-256): 57:3F:C9:86:9A:A6:5A:76:7F:9C:E0:C7:2F:48:72:7B:0B:B3:B3:B1:E5:89:34:E7:0A:4C:36:C2:41:32:30:20 Fingerprint (SHA1): 98:67:08:26:81:EC:56:D9:DF:F5:24:22:F8:05:9E:E3:86:37:F3:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #591: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144911 (0x3cafa88f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:49:52 2023 Not After : Wed Oct 18 14:49:52 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:1e:09:16:f1:91:95:2c:ca:c0:86:53:a3:95:88:15: d9:75:9c:66:c0:58:66:f3:dc:3d:04:0c:d6:32:e7:3a: 60:b0:37:99:51:a4:d4:8a:51:ed:59:79:33:bf:29:a3: cb:a8:e9:29:8c:1b:05:f4:f8:ea:7f:29:d9:e9:e4:0a: c4:4e:67:7c:9a:ad:ff:fa:84:9d:f0:da:2c:f0:b0:3d: 7a:b4:48:cf:65:6c:f3:8e:1d:22:7e:13:5a:3c:ea:ba: 12:4d:00:45:ca:8e:d1:09:c8:d3:2c:08:6e:e5:53:b3: 16:f4:56:8a:c0:aa:6c:a9:70:70:ac:bb:23:82:19:e9: 67:77:4d:22:d9:26:11:dd:12:e5:cb:95:c5:a8:cf:01: 6d:f4:df:5e:3d:2d:5d:e8:17:65:31:5c:5a:f3:01:88: 27:55:f4:2a:07:65:20:04:6c:8a:7c:1d:59:e2:45:af: 08:f7:cf:7c:6f:a7:a4:59:2b:d0:5c:13:79:0c:ba:e1: d1:79:6d:3f:83:c3:9c:10:23:51:4a:0e:f4:4d:41:d6: 3a:5f:9d:95:c9:23:57:96:b0:f4:d7:44:a9:78:aa:13: 70:fc:a2:4f:e5:12:6c:08:d0:66:e7:d7:a5:85:b3:27: 0d:3f:f1:cb:56:58:ef:d1:ef:26:78:79:c2:58:11:b1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:cc:a3:92:df:f3:38:7d:ae:fd:49:d8:53:8a:02:5f: ca:39:62:6d:ba:9d:e3:c7:69:7e:1f:a7:04:38:03:21: ff:fb:af:b4:35:bf:88:c6:70:68:eb:c3:4a:95:97:c5: 0f:ce:d3:1a:4c:08:e6:ff:0c:2d:3a:f1:93:75:44:86: a8:28:08:02:1c:6b:a7:62:6f:2d:2e:a5:17:c8:f1:cd: 32:c6:ca:54:50:3b:67:e1:2a:21:cf:56:5b:4a:c1:6f: 78:f2:86:23:01:71:18:e9:a8:9a:52:57:de:83:d0:8b: 44:0d:48:e0:ab:03:16:f2:7d:f7:52:10:7e:23:24:5a: 9b:ad:95:f7:08:f9:22:0f:90:7b:df:3f:bc:ca:b2:41: 90:03:aa:20:cd:fb:97:67:8e:cf:fe:05:12:1d:f1:33: 1d:ab:c1:06:0b:c4:90:60:93:1d:a8:e4:75:23:f0:58: 2e:c2:69:6e:5c:da:67:9d:d3:8c:7d:cf:90:aa:24:38: fc:e0:ce:68:3d:5f:d0:d5:ab:0e:44:9b:5b:0e:3a:3a: ab:f0:bc:30:32:f4:a2:22:9f:2a:4c:83:8c:64:74:b5: 41:d6:cc:ac:bb:f8:84:1e:f7:f9:5a:8d:6a:1b:93:28: 10:2a:5e:6c:b6:41:4a:7c:0a:2a:72:5b:8a:49:21:74 Fingerprint (SHA-256): 57:3F:C9:86:9A:A6:5A:76:7F:9C:E0:C7:2F:48:72:7B:0B:B3:B3:B1:E5:89:34:E7:0A:4C:36:C2:41:32:30:20 Fingerprint (SHA1): 98:67:08:26:81:EC:56:D9:DF:F5:24:22:F8:05:9E:E3:86:37:F3:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #592: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #593: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #594: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144941 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #595: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #596: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #597: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #598: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1018144942 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #599: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #600: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #601: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #602: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1018144943 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #603: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #604: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #605: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #606: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1018144944 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #607: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #608: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #609: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #610: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1018144945 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #611: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #612: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #613: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #614: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1018144946 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #615: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #616: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #617: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #618: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1018144947 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #619: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #620: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #621: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144941 (0x3cafa8ad) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:07 2023 Not After : Wed Oct 18 14:50:07 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:52:5d:e6:0c:f5:52:a0:39:d9:6e:c3:e1:99:de:8f: db:d5:ba:67:ad:f9:25:df:2b:25:4b:50:72:5b:17:18: 40:dd:53:91:ea:a5:4e:e2:a3:98:9a:6a:5c:ce:a8:82: e3:83:7a:88:f8:1a:8e:a4:8b:a2:fa:ce:e1:92:54:07: 31:4f:03:98:d0:4d:ea:53:7e:86:b8:4a:b2:db:9f:df: 72:97:5f:e4:ea:a9:0f:26:cd:bb:e0:70:6b:5c:f2:fd: a5:dc:5f:83:50:7a:30:10:c0:c0:be:7e:b3:9c:9b:fd: 15:3f:65:fe:bb:0e:26:1e:f3:ff:a6:25:e9:64:cf:e3: da:43:97:08:f6:0b:52:77:dd:c9:48:18:0e:88:06:eb: 0b:8e:35:4c:4c:bc:54:22:1a:35:3b:a7:01:2d:b3:b7: a8:a3:7c:b5:8d:64:b6:6d:6f:53:ec:d6:3c:34:4e:cd: 61:9b:18:3f:b9:4a:f1:23:75:2b:cb:2d:c2:0b:25:5b: 2e:19:47:d1:9d:47:bc:51:37:81:3f:3b:0e:dc:c1:ff: 0c:90:e6:06:e4:75:fb:4c:ca:8d:32:f0:fa:05:ea:b5: 12:2c:d0:0d:ff:75:67:20:f3:36:7e:cd:13:20:ba:df: f2:a2:42:34:8e:d8:69:17:13:b3:74:f6:61:3e:bd:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:df:a2:7d:b1:d3:26:e4:5c:bd:99:eb:a7:cc:dc:d3: 22:18:c7:8c:d7:09:74:46:a4:46:84:4b:5c:e9:26:60: 1c:08:d4:1f:b1:c3:3c:ce:b0:e8:e8:a7:28:9b:ef:3f: b9:3b:6b:a9:e7:4d:6a:7a:fa:09:a9:7c:55:16:b9:05: 90:99:a3:9c:aa:c3:e5:6b:12:e3:ae:f2:57:e9:bd:e1: 37:7d:90:60:ba:1c:69:47:a4:bb:5b:81:f2:e7:27:fe: aa:c7:9e:bd:fa:eb:3a:cb:c0:bd:00:cf:d1:c4:6a:ad: 3e:2d:8e:38:96:ec:70:00:c3:3b:88:27:20:5f:d7:34: cb:e8:e7:32:4f:d0:b3:26:86:a4:a4:ad:16:ce:78:a7: ed:a7:f7:37:42:0c:57:07:d2:ac:26:cd:41:b5:3f:cb: ca:96:df:26:03:a7:46:1f:3d:ed:cd:76:1d:b8:fc:c8: 44:17:c1:e4:8f:15:53:82:ad:6a:7f:38:be:69:4b:df: cc:fb:e1:f4:d5:27:e4:36:32:cf:32:b8:51:e9:e4:8a: 11:73:94:22:32:93:83:56:7c:d8:61:81:6d:b2:a4:00: 27:bd:b6:a9:cb:5e:17:3e:9b:0b:9c:40:7a:c2:01:7c: 23:7e:92:45:eb:2b:8e:6f:b0:0e:39:67:15:f6:2e:ef Fingerprint (SHA-256): BE:E5:A5:F0:68:34:83:C5:73:9F:64:51:17:AA:37:DA:B5:ED:57:9F:B8:48:FE:F8:93:AC:1E:A9:BC:75:FB:E9 Fingerprint (SHA1): 92:91:F3:CD:E9:F5:7B:06:5A:C9:F5:27:BC:3F:CD:38:A5:C4:84:31 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #622: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #623: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #624: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #625: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144941 (0x3cafa8ad) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:07 2023 Not After : Wed Oct 18 14:50:07 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e7:52:5d:e6:0c:f5:52:a0:39:d9:6e:c3:e1:99:de:8f: db:d5:ba:67:ad:f9:25:df:2b:25:4b:50:72:5b:17:18: 40:dd:53:91:ea:a5:4e:e2:a3:98:9a:6a:5c:ce:a8:82: e3:83:7a:88:f8:1a:8e:a4:8b:a2:fa:ce:e1:92:54:07: 31:4f:03:98:d0:4d:ea:53:7e:86:b8:4a:b2:db:9f:df: 72:97:5f:e4:ea:a9:0f:26:cd:bb:e0:70:6b:5c:f2:fd: a5:dc:5f:83:50:7a:30:10:c0:c0:be:7e:b3:9c:9b:fd: 15:3f:65:fe:bb:0e:26:1e:f3:ff:a6:25:e9:64:cf:e3: da:43:97:08:f6:0b:52:77:dd:c9:48:18:0e:88:06:eb: 0b:8e:35:4c:4c:bc:54:22:1a:35:3b:a7:01:2d:b3:b7: a8:a3:7c:b5:8d:64:b6:6d:6f:53:ec:d6:3c:34:4e:cd: 61:9b:18:3f:b9:4a:f1:23:75:2b:cb:2d:c2:0b:25:5b: 2e:19:47:d1:9d:47:bc:51:37:81:3f:3b:0e:dc:c1:ff: 0c:90:e6:06:e4:75:fb:4c:ca:8d:32:f0:fa:05:ea:b5: 12:2c:d0:0d:ff:75:67:20:f3:36:7e:cd:13:20:ba:df: f2:a2:42:34:8e:d8:69:17:13:b3:74:f6:61:3e:bd:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 20:df:a2:7d:b1:d3:26:e4:5c:bd:99:eb:a7:cc:dc:d3: 22:18:c7:8c:d7:09:74:46:a4:46:84:4b:5c:e9:26:60: 1c:08:d4:1f:b1:c3:3c:ce:b0:e8:e8:a7:28:9b:ef:3f: b9:3b:6b:a9:e7:4d:6a:7a:fa:09:a9:7c:55:16:b9:05: 90:99:a3:9c:aa:c3:e5:6b:12:e3:ae:f2:57:e9:bd:e1: 37:7d:90:60:ba:1c:69:47:a4:bb:5b:81:f2:e7:27:fe: aa:c7:9e:bd:fa:eb:3a:cb:c0:bd:00:cf:d1:c4:6a:ad: 3e:2d:8e:38:96:ec:70:00:c3:3b:88:27:20:5f:d7:34: cb:e8:e7:32:4f:d0:b3:26:86:a4:a4:ad:16:ce:78:a7: ed:a7:f7:37:42:0c:57:07:d2:ac:26:cd:41:b5:3f:cb: ca:96:df:26:03:a7:46:1f:3d:ed:cd:76:1d:b8:fc:c8: 44:17:c1:e4:8f:15:53:82:ad:6a:7f:38:be:69:4b:df: cc:fb:e1:f4:d5:27:e4:36:32:cf:32:b8:51:e9:e4:8a: 11:73:94:22:32:93:83:56:7c:d8:61:81:6d:b2:a4:00: 27:bd:b6:a9:cb:5e:17:3e:9b:0b:9c:40:7a:c2:01:7c: 23:7e:92:45:eb:2b:8e:6f:b0:0e:39:67:15:f6:2e:ef Fingerprint (SHA-256): BE:E5:A5:F0:68:34:83:C5:73:9F:64:51:17:AA:37:DA:B5:ED:57:9F:B8:48:FE:F8:93:AC:1E:A9:BC:75:FB:E9 Fingerprint (SHA1): 92:91:F3:CD:E9:F5:7B:06:5A:C9:F5:27:BC:3F:CD:38:A5:C4:84:31 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #626: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #627: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #628: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #629: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144948 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #630: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #631: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #632: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #633: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018144949 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #634: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #635: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #636: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #637: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018144950 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #638: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #639: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #640: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #641: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018144951 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #642: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #643: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #644: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #645: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #646: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #647: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144948 (0x3cafa8b4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:10 2023 Not After : Wed Oct 18 14:50:10 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ec:83:ad:96:2a:c3:3b:5f:1c:39:13:2b:b6:59:fc:c3: b5:28:e5:f1:8e:bb:40:b7:c5:c2:dc:5d:cc:66:1a:3e: 32:75:3f:cd:5b:e6:db:36:da:93:64:a1:1a:6b:ab:14: 31:bc:e5:cf:ee:74:68:b3:d9:8c:dd:5d:46:55:ed:ee: ee:76:82:60:f9:d8:dc:5f:2d:1b:02:19:94:ff:70:9e: ac:52:88:92:5c:2d:18:83:29:2c:1b:c7:f3:8c:4b:ac: 15:6c:04:4d:7d:22:0f:ce:d3:9a:3b:93:66:94:76:6d: 80:cd:e6:1f:d7:4c:9d:b5:d2:ed:76:d6:ec:01:2b:43: 11:95:54:3b:8f:d2:3e:52:54:1e:4e:f8:97:a6:be:c7: 5a:15:80:20:9a:d1:6f:47:72:20:a0:10:75:32:fd:1e: 66:33:d1:5a:3f:54:80:6b:0c:09:02:24:8a:af:b2:aa: ca:d4:64:07:88:9d:c4:f2:83:75:d8:66:33:39:7f:eb: 7d:f6:4d:fb:0e:44:62:81:af:b8:6a:bd:21:f2:18:35: 62:2f:77:62:24:22:bc:bf:76:2e:f1:fd:af:f6:93:f9: 7e:a1:82:81:ce:b7:bb:cd:00:f8:e0:a0:1e:4e:c3:57: a3:04:42:c2:74:61:e5:26:a5:dc:1b:36:5e:70:4b:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d7:ef:29:f9:6b:63:c7:4c:9f:12:ca:ef:27:b9:56:52: 3e:fe:25:e4:61:d7:f9:36:e7:90:e0:b2:2c:c4:66:6c: 36:a1:7f:68:ef:dd:a1:e1:49:88:4b:60:d1:9e:af:e2: e4:a0:22:0a:cc:19:7d:6a:68:39:f5:86:25:40:c6:a0: 11:b9:a6:5f:00:b9:fd:ff:c0:95:89:b6:9b:42:96:87: e5:fd:56:c6:d8:2f:82:03:0a:f7:8c:17:c6:18:d4:94: 26:57:49:11:87:25:b2:c7:f4:ba:28:80:78:4a:9f:dc: 15:e6:16:98:4b:92:66:0d:80:0e:73:61:47:9d:26:46: 4b:df:dc:0f:33:dd:6b:1d:ac:f0:9b:bc:16:1f:a6:da: 14:f2:97:16:a3:fa:a5:42:c8:4c:0a:4d:fa:86:25:78: df:0f:8d:f3:63:4c:9a:7e:67:24:7d:72:68:d4:4c:70: c1:61:e8:7d:fa:56:37:89:3e:60:7b:02:1b:ad:02:d9: b9:dc:c4:72:34:6a:a6:00:57:ea:b9:ef:cb:56:d5:bb: e4:36:a1:4f:87:e7:31:5f:c6:bc:bf:f4:c7:f2:a3:0a: f5:6f:a2:9e:ba:a3:2a:8a:7e:40:1e:71:a1:54:6b:f3: 77:1a:ec:bd:23:3a:9d:4b:56:b0:b6:26:41:db:46:79 Fingerprint (SHA-256): E3:44:ED:2C:DA:67:39:C6:2E:3D:E9:2D:81:C5:B0:A2:D6:98:D3:1D:0C:A4:C5:89:A2:E0:62:8F:39:A2:F4:D5 Fingerprint (SHA1): B2:4B:90:CA:57:B1:1A:36:A5:C6:26:AD:29:0C:20:93:DA:C3:ED:9B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #648: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #649: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #650: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144949 (0x3cafa8b5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:10 2023 Not After : Wed Oct 18 14:50:10 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:c3:ba:af:0b:15:f0:38:2d:86:25:d6:7c:cf:d3:47: c6:7a:95:76:2b:51:43:18:ae:c0:a0:50:1f:57:d9:02: 0c:83:1b:37:34:bf:1c:a0:4d:9f:10:e8:5c:50:e1:44: 08:05:53:af:7c:7a:0b:ef:e6:26:44:c6:5d:b6:3a:ee: 3d:af:42:77:9b:98:b6:8f:d7:fb:ad:c5:5d:f4:0b:cb: 9a:88:64:7a:7b:d1:59:6b:49:79:be:a1:c4:2c:44:69: ad:14:fa:fa:92:88:29:5c:7e:0b:24:82:39:cd:2e:04: cd:bb:1d:5e:5d:ea:e7:e3:6d:2e:38:38:7d:d7:6d:61: cf:87:c9:24:3e:d4:6a:35:70:25:c2:72:05:b9:d1:a0: e4:27:57:94:a4:0b:86:07:25:a8:ec:93:d3:df:0d:0d: 43:a4:c8:69:ee:44:92:2b:d5:06:8f:82:f0:34:b8:0e: 5c:d3:1c:d0:cd:95:c9:95:d6:36:95:de:ba:d9:99:fb: 96:d1:92:76:67:9f:30:3a:d8:5d:cb:d6:61:44:1c:e5: 7a:d3:a2:ad:e4:f1:73:a3:15:34:da:cc:38:92:c0:e6: a3:37:ad:d7:7f:d9:df:2b:3a:42:57:54:aa:95:15:63: 09:95:c4:8b:19:cc:b1:c8:75:df:0f:0e:96:06:77:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 75:bc:37:cc:cd:f8:79:80:e9:15:2b:d0:70:f9:65:18: f7:0a:f4:ca:64:22:f4:b0:d0:f1:e1:9d:da:2b:bb:7f: 09:06:93:d0:8f:ca:8c:0e:42:30:27:12:05:c6:2b:39: de:69:91:ce:13:e6:f0:e3:2e:9c:ce:9a:32:b2:ba:db: 97:f6:c8:9f:bb:ee:ba:35:e5:ff:30:09:39:39:fe:4c: 96:14:6a:a0:c9:66:ab:8d:e3:c3:49:f8:ae:4e:46:ba: 8c:9f:67:2f:ee:d2:d4:43:6e:3b:d3:9e:77:cd:11:7b: 2e:a4:40:ba:da:de:64:df:2c:be:04:2e:c3:03:92:62: 5a:3f:0d:e6:37:0a:e8:16:5d:a3:aa:2f:0f:98:d5:ce: 09:b9:54:e6:ad:ac:44:28:86:27:9c:98:c7:84:40:98: d1:cd:92:cd:44:92:4d:f2:5a:e7:68:10:67:66:02:94: 86:ec:df:46:19:61:60:b7:9e:7d:d0:eb:ef:87:47:80: d0:c4:d9:9c:66:38:3c:97:a0:f7:0b:70:37:5f:00:63: df:e2:8f:e5:fa:3f:c4:2e:91:da:fc:a2:2b:8e:62:04: 58:c7:9d:b6:ff:3e:d4:31:4e:80:ca:ae:64:47:f3:c0: c3:8b:f7:34:d7:d3:5e:07:d0:b5:5e:31:00:0a:fc:16 Fingerprint (SHA-256): 1C:88:8E:D7:46:C4:FD:85:9B:63:18:87:08:18:FF:0C:D8:2F:58:47:74:1A:17:BD:F8:0B:E5:CA:34:E4:D6:C8 Fingerprint (SHA1): 4E:49:C4:B8:7A:B6:5E:EB:8C:7F:4C:B1:F1:39:8F:9C:CD:0C:E5:BD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #651: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #652: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144950 (0x3cafa8b6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:50:11 2023 Not After : Wed Oct 18 14:50:11 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:14:e9:f3:17:aa:6b:62:4c:3b:0e:7c:c4:15:61:f1: 83:1c:d5:08:fa:61:49:e5:64:dc:cd:d1:18:29:e0:de: b8:b1:f6:72:c8:5b:63:68:4d:05:c5:83:a1:88:a9:67: 54:2a:65:23:80:e1:c4:16:16:42:52:6c:9a:12:d8:59: 3e:ac:ae:76:18:d6:09:98:c1:8f:da:c5:0a:08:82:c0: ea:73:68:c2:16:06:df:bd:4c:2f:50:62:9f:b6:b7:8e: f8:d9:db:d2:ee:22:98:73:e9:26:d5:16:83:a7:fc:99: b7:28:90:c4:6e:e3:f4:09:c4:d0:4b:7d:98:f3:db:92: 78:22:64:6e:03:a9:a8:14:27:fd:dd:2a:24:81:6b:8e: 74:a0:3c:57:fc:c3:de:82:9b:db:cf:c9:c4:a3:97:31: 9e:a1:fc:c2:7d:52:23:1c:87:21:85:c7:88:14:88:fb: 69:08:d9:67:ae:89:d2:a3:b2:b2:54:ee:10:c1:84:f3: 0d:67:0a:2e:45:d0:cd:9d:58:af:f4:d4:76:40:87:04: c5:c0:24:a4:8c:a0:df:27:6f:9f:d7:f5:ff:34:5a:4a: 8c:79:a1:c6:56:7a:a4:4e:83:9c:7f:de:e7:12:d9:cb: 54:f5:5f:3b:e9:ab:63:9c:eb:a6:60:f1:ed:36:6c:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:66:12:5e:c4:12:ec:3b:e0:b8:6e:f5:5c:41:a8:40: 3e:d1:ea:90:8f:0c:3d:f9:06:de:64:4e:a0:2a:67:01: 36:52:aa:03:f8:bd:d7:d5:fb:e1:68:68:cf:d5:81:13: 11:27:9d:b0:aa:49:1c:ab:bc:7e:b6:b6:c9:2d:73:cd: 63:3f:30:b8:57:3b:db:58:df:4a:12:3f:3c:e8:be:cd: f5:70:d5:e5:0b:1b:a8:a8:79:0c:71:17:0d:87:d2:09: 2b:ba:3b:b9:12:0c:5a:ed:4a:8b:52:89:8b:ac:08:35: f2:a0:ff:72:02:88:6a:7f:5d:6b:90:0a:e1:af:54:9d: 90:c2:85:c0:fb:6b:26:76:89:6e:0d:00:06:03:b4:0a: 17:b5:0b:b2:f8:93:7b:2a:64:50:be:1c:2f:b4:a1:ce: 58:7e:b0:a3:82:1d:3d:a7:6b:7f:55:f0:0a:dd:3e:70: 67:b5:ce:ad:f6:9f:e1:dd:92:37:db:d4:b6:37:a3:8c: 4b:7e:5f:53:39:66:2c:2f:19:c1:60:56:6a:09:f2:57: 48:25:b2:16:f3:5f:fb:8c:17:1e:75:4f:12:c4:be:2b: fc:78:1c:df:9a:e3:ca:68:14:fb:77:8d:60:3b:8e:dc: e1:0a:54:ce:6e:ee:03:55:42:32:3b:03:a2:8c:89:a7 Fingerprint (SHA-256): 43:28:E5:A9:57:93:66:47:07:6E:3C:83:2B:8A:6E:E4:30:E7:C3:76:B1:5C:B4:71:7A:86:F2:01:73:07:91:15 Fingerprint (SHA1): 9C:09:DA:16:97:27:0D:75:D9:C7:D0:19:35:F5:B7:E4:25:47:DF:E0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #653: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #654: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144952 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #655: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #656: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #657: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #658: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018144953 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #659: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #660: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #661: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #662: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018144954 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #663: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #664: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #665: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #666: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1018144955 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #667: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #668: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #669: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #670: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1018144956 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #671: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #672: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #673: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #674: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #675: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #676: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #677: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144952 (0x3cafa8b8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:12 2023 Not After : Wed Oct 18 14:50:12 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:5f:00:14:a6:ef:fe:22:3b:6a:fd:c2:1f:2e:e9:5f: be:f0:49:b9:80:ff:e8:62:d9:86:a7:6c:ea:dd:ea:ba: dd:51:b3:e9:96:f6:bf:c5:30:86:be:e8:e4:db:78:36: bf:e2:d0:5a:3d:94:8a:51:19:35:0b:23:b7:ea:64:c0: 61:18:cc:8a:f8:79:9c:1a:38:87:67:19:8f:0a:02:52: 02:44:9f:f7:8d:b5:e6:e5:a4:15:c1:81:0e:4b:a1:1e: cc:48:c0:5d:c7:34:5a:9c:5f:9e:ac:c5:61:fb:ac:a8: f6:7a:c2:e0:d0:80:1c:fe:d9:66:c5:44:9c:bf:a4:e3: 78:a5:99:07:36:ae:36:47:05:15:76:82:25:63:0d:1e: c8:30:21:c4:9e:b1:1d:35:9c:d7:31:6f:bd:8d:f0:93: 11:50:cc:71:11:b0:dc:3c:48:4f:c1:7d:62:59:d1:9c: 25:78:b2:7e:b4:6f:f0:d3:39:64:c4:d3:8b:49:ec:45: 64:d5:98:5e:b5:6a:f9:6b:6b:26:f5:50:0f:e0:14:46: 54:34:0d:5c:fc:bc:89:54:bb:6a:5d:a5:f3:47:36:55: de:ce:9a:b4:8a:59:61:36:b3:de:40:59:17:98:46:18: 4e:81:91:1a:bb:e8:5b:af:86:f6:05:5a:4c:cd:bf:bb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c1:91:03:bf:d1:f9:c2:66:31:cb:39:e6:4c:34:bd:32: 85:26:6d:30:f8:3a:d1:1d:ff:6d:96:35:c0:64:d0:e0: 37:2a:e7:e5:fe:0f:37:50:78:92:37:a4:b5:6f:fb:5d: a1:ee:60:a4:27:16:37:15:78:c1:3a:5a:4d:89:8f:68: d2:d1:90:cb:d8:a7:48:05:60:1b:c4:4f:4d:3d:0e:1a: 0d:1d:98:db:fe:49:ad:62:29:d0:fd:da:31:b2:c8:f6: 95:cf:9a:ec:c1:a1:3a:f5:d5:92:86:ec:aa:4b:1b:74: 93:01:0c:c0:f2:5a:8f:68:07:d0:92:69:3d:34:6d:1e: cd:c9:c0:55:1f:46:c7:e9:46:a4:a7:a4:a8:72:dc:f0: d0:07:c6:2e:1e:b0:16:72:37:c9:7e:0c:d1:d3:5d:7c: 64:be:7c:84:87:42:57:82:20:c1:80:68:59:ad:4a:98: 12:02:fc:a1:c0:5a:bc:61:f7:3e:81:05:41:cf:68:4e: 89:8c:a4:4c:fd:2a:5a:c8:49:e2:4e:8a:e6:78:49:b3: 75:c4:27:8b:08:82:97:1a:8c:ea:60:b0:66:31:e7:5f: 5b:4d:c3:04:9a:13:33:f5:e5:7b:19:b3:10:28:3d:b0: 81:53:c4:2c:3f:28:77:9c:97:ae:22:62:8c:dd:24:6f Fingerprint (SHA-256): A1:3C:19:F8:82:B0:7E:F5:01:B8:EE:23:4B:7F:5C:96:E0:CD:7F:05:CB:BA:B8:3F:67:B4:FA:11:E2:BD:07:30 Fingerprint (SHA1): 6D:BB:D9:6E:E8:77:E8:B8:BA:28:B0:9A:94:19:6C:C5:1D:4E:E6:F7 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #678: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #679: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144953 (0x3cafa8b9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:12 2023 Not After : Wed Oct 18 14:50:12 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: df:ff:60:df:94:ca:10:73:31:19:29:c3:7b:76:8f:49: a1:d0:1d:d3:65:88:78:f2:61:8d:d6:4a:83:3a:73:a0: 73:1d:ae:b0:f7:64:ab:a5:4e:a2:3f:47:67:dc:4f:68: 5f:13:4b:73:5c:74:a2:3f:fb:a1:23:05:1e:9e:9b:dc: a2:5b:04:9a:99:21:c0:39:72:25:4d:fb:75:a5:06:ef: ed:4d:cf:1b:b1:b5:2e:03:08:04:33:41:ff:9f:7a:5b: 9c:a7:e5:57:ac:3a:2c:7f:40:60:07:06:45:4d:fe:18: 4a:d9:b1:e4:72:1f:da:fb:7a:07:8d:1f:62:b6:52:ef: 2f:7a:da:78:46:58:52:8e:a7:7b:07:e6:a0:1a:14:8c: 02:4d:a8:5d:0c:29:0a:d7:17:fe:d7:88:3a:b5:1a:c2: 58:b0:0d:3c:af:46:d2:0d:24:f1:0e:3a:bc:8c:86:64: d1:18:d9:e5:f3:4a:c6:4b:f9:81:0b:4d:91:3e:9b:37: 0a:a6:8b:8d:99:00:f8:fc:b5:de:24:83:a6:73:eb:3d: 55:84:e7:d5:e7:01:b0:9e:b2:b6:78:60:66:0d:3e:d0: 50:3e:73:24:43:db:5a:80:f3:78:90:c9:34:cd:6a:0c: e6:ec:c0:ea:73:d1:42:c6:e4:41:2c:6c:1e:c5:2f:21 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ba:ff:19:a2:df:6b:51:00:78:30:a4:0e:8e:fa:c0:28: 94:a9:af:a5:10:ca:d7:83:a1:95:b7:c7:f9:43:60:2c: ec:ea:37:86:85:3f:d5:8a:7a:16:c6:79:4f:8a:5d:ee: 37:2b:d4:d0:c5:b5:a2:a9:47:c1:b1:73:b8:c3:7d:9d: 15:65:e5:59:ac:c8:63:ea:60:c2:81:46:b2:f5:88:08: 24:81:72:bf:9f:42:66:0b:bb:f4:b0:08:f9:c0:87:c8: cd:cc:b6:77:fc:f5:d4:6e:b6:ab:58:18:f5:e5:a1:14: 4b:32:50:89:f2:fc:fd:45:a2:0f:63:ac:da:b1:51:5e: 78:99:06:93:ff:20:28:a2:a9:d3:5c:3b:ed:23:33:22: c1:0d:16:e1:bf:2a:e3:22:8e:99:0f:38:61:35:e0:44: df:ec:e1:6c:fb:c6:df:6f:1d:1b:39:e9:75:58:8c:af: 3e:86:a4:79:1f:13:5b:cb:9a:c5:f5:a0:97:53:fd:39: 90:a4:30:12:67:fb:b9:c2:ae:3f:b2:84:15:d4:eb:81: af:13:4e:4e:37:ee:a4:ff:1b:a1:da:3a:18:14:5d:57: 9a:d9:78:12:ba:82:7b:cc:db:e1:42:e4:14:e9:2d:67: 1d:c6:45:a0:02:0a:d7:ef:59:d0:ac:e7:9f:97:87:c3 Fingerprint (SHA-256): DF:6A:71:59:A5:CE:47:50:5E:9A:DC:71:D7:C5:8E:43:3B:19:14:3F:33:E5:2A:80:4F:44:35:5F:2E:2C:A3:49 Fingerprint (SHA1): 53:35:56:B0:A6:F3:22:CA:35:5D:B6:7E:EA:A2:26:E5:DA:E5:62:D4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #680: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #681: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #682: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144954 (0x3cafa8ba) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:50:13 2023 Not After : Wed Oct 18 14:50:13 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:7d:53:20:9f:5d:ee:d3:16:9d:e9:ef:88:ef:d4:b9: c4:7e:f8:2e:4c:a8:8f:cd:43:8b:a3:3e:a7:af:00:96: 4f:c2:af:2e:1c:5f:07:8f:a5:ee:8e:4f:2a:6b:f6:29: a5:9c:c6:1f:cb:e4:bf:0b:e7:4e:c8:ad:a2:dd:c6:dd: 00:fa:4f:5b:f9:86:bb:06:14:d5:fe:d9:16:e5:12:c5: 59:eb:46:79:a8:8a:6e:01:66:95:40:5e:06:a0:ed:71: 1d:b3:33:3a:20:e5:fd:04:3e:59:b8:b9:9f:54:78:86: 23:cc:2c:9d:f2:2b:89:0d:4e:62:a8:66:4b:3e:da:19: 0a:29:fb:9d:ea:6d:0a:20:a8:92:06:30:d3:c0:27:34: 89:03:f9:06:fd:22:f4:9d:dd:00:d6:60:dc:bd:41:50: 92:07:1d:92:bd:cf:f9:b6:fb:0c:94:12:f0:b7:2f:b8: 08:a4:f9:47:68:36:f4:c3:ab:d6:66:1a:82:6d:19:20: 22:5c:14:70:aa:f1:a9:02:49:d9:34:5e:27:d8:41:d9: e3:bb:f5:ee:af:e9:20:84:1d:30:17:d9:cf:38:e1:98: 73:bf:f9:fe:9b:26:69:e4:e6:90:bb:d8:e6:c4:53:00: 30:c1:d0:1e:2d:76:b5:4f:84:9d:2d:1c:57:c5:aa:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c4:8e:7c:ab:49:be:7f:e4:21:c0:a5:83:f6:53:09:19: c7:f1:dd:1b:39:15:73:37:00:0f:56:64:1d:fe:f6:bc: a3:7f:b7:a6:08:47:42:fd:8a:37:bd:b3:23:46:b0:8d: dc:b2:c2:e5:1c:e8:2d:e2:c7:53:59:48:9c:77:85:33: 8b:4c:0f:bd:81:e7:85:d8:23:42:da:b7:2d:c7:be:79: 11:51:f3:25:0e:87:44:76:11:dd:81:0a:d0:05:be:76: 87:59:6f:4d:28:10:61:6e:fe:7b:46:3d:c4:c0:bb:18: e7:e4:82:10:74:cb:04:bc:e2:b4:13:87:58:3b:43:cb: 21:76:08:8a:58:ee:6f:e3:1b:4b:0f:92:ea:23:44:89: 2c:bb:46:5d:ba:91:8a:d7:49:2f:18:1a:e3:54:6c:1a: 36:5e:c4:43:d1:f3:87:cf:78:0e:27:0f:33:4a:3d:59: 8d:ff:50:eb:9a:44:13:de:5c:97:1b:6a:c3:e1:d2:a6: d0:4f:5b:bd:f4:13:94:76:2b:7c:bd:5e:40:ee:e4:f8: 8d:fa:0c:5f:17:d3:f1:a0:91:35:19:15:1e:f2:22:30: 6b:23:e5:22:fc:91:72:db:5d:07:ae:7a:36:c1:71:d7: 9b:61:c2:1f:4f:3c:59:44:c3:d3:4e:20:9d:c8:84:ef Fingerprint (SHA-256): 96:02:79:61:8A:39:0A:58:AB:CD:DF:E4:56:16:F4:23:1F:D8:30:40:8B:E1:12:34:EF:B0:E3:05:9C:48:07:26 Fingerprint (SHA1): 92:11:FA:4A:20:AE:18:E6:0E:D7:05:4D:18:D5:66:9F:F4:B9:0C:97 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #683: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #684: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144957 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #685: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #686: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #687: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #688: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018144958 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #689: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #690: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #691: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #692: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018144959 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA1Root-1018144850.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #693: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #694: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #695: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #696: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018144960 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #697: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #698: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #699: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144957 (0x3cafa8bd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:14 2023 Not After : Wed Oct 18 14:50:14 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:95:12:02:6f:ef:1f:47:45:59:38:e4:e5:b0:63:35: 42:0d:81:8c:50:6a:d5:a3:e8:b3:a3:81:19:c2:81:03: 9a:e0:36:ec:44:d9:c8:12:c1:6e:4f:87:e1:d7:8f:33: f0:28:50:b6:16:be:45:a8:76:a2:66:88:6a:7b:cd:1f: 2f:cf:ab:9a:69:d7:7b:1a:23:f4:f2:06:d0:76:ff:e6: 61:d9:67:8c:77:a4:63:53:45:78:c4:b7:8b:bf:56:9a: 1e:54:19:4c:83:cc:4c:94:4a:0b:69:60:8e:e8:88:96: 8b:0e:1e:b6:23:db:6a:19:ec:48:01:d7:23:f2:f7:ab: 5e:e2:28:22:cf:f2:f9:05:ce:86:4b:8c:61:30:b7:f8: e5:1c:24:2f:66:f9:40:8f:48:7a:38:b4:51:b5:10:e5: 34:62:ac:60:59:14:90:50:15:e1:94:c0:6a:8b:8d:46: 69:21:34:82:d7:7d:e0:3f:9e:c4:e1:0d:5d:02:3c:de: 5f:87:41:13:f9:12:88:6b:38:fe:ee:a1:f3:ca:fd:b3: e5:e9:6c:09:c0:de:51:27:61:2a:c7:a1:7b:0f:7e:c5: 85:bb:06:f9:80:4d:b9:85:bb:e7:43:c1:78:9d:25:09: 67:2f:f0:6b:e6:22:9d:96:fa:a0:0c:97:cb:12:36:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:be:6a:bb:fb:3e:60:83:54:10:4a:91:78:f2:54:7f: 2f:c1:eb:ce:66:a5:09:99:61:29:77:7d:a2:a6:c2:d3: 26:14:c9:ca:01:96:e2:aa:40:b5:79:64:bb:0e:e8:af: 41:dd:94:3d:bc:aa:4e:8a:fd:85:47:6c:81:5b:9c:5f: aa:a7:1d:96:b0:02:33:24:c8:fb:f2:d7:af:b3:8d:0d: 6d:b8:50:8e:a1:27:b3:78:6a:cb:cf:ec:c7:d5:82:a8: 8a:13:de:77:cd:4a:02:0e:49:bf:a1:90:87:06:8a:b3: 99:59:12:05:75:c2:81:cc:d8:7f:57:27:0d:39:41:08: ef:aa:b7:b8:00:dd:2d:0a:59:1b:76:68:fd:dd:57:65: 0c:aa:9d:53:f3:be:cc:2b:6e:6f:73:22:7b:06:71:e1: 86:04:e9:e9:c3:48:b1:84:af:dd:43:ba:68:c4:cf:70: 3a:ef:39:33:5c:00:f1:cb:7a:fd:07:07:a7:da:76:85: b2:e4:e4:fe:af:b9:b4:6a:25:72:ff:06:fc:de:02:61: 9e:a8:4e:5e:66:99:3d:63:33:a7:4b:8b:e0:b0:8a:ce: d4:69:3e:6e:3c:5b:72:01:fe:6b:d4:5c:10:86:cf:0b: 02:d5:dc:01:4a:fc:b9:b4:1d:1c:1f:8f:1d:4c:05:fc Fingerprint (SHA-256): AC:12:81:6E:F0:31:CB:19:87:37:94:67:F0:BB:4F:38:8E:A8:A0:36:29:E3:ED:2E:FF:19:C5:E5:5F:1C:0B:C3 Fingerprint (SHA1): 5B:C0:30:B0:4D:F8:2D:EB:5B:AC:BB:2C:EE:F9:33:9F:0A:82:2F:59 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #700: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #701: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144961 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #702: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #703: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #704: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144962 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #705: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #706: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #707: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #708: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018144963 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #709: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #710: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018144964 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #711: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #712: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #713: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #714: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #715: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018144965 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-Bridge-1018144851.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #716: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #717: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #718: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #719: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018144966 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #720: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #721: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #722: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #723: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144962 (0x3cafa8c2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:50:16 2023 Not After : Wed Oct 18 14:50:16 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:51:4a:9d:00:8e:7e:6d:d5:f0:48:3c:75:6a:aa:81: a2:f0:8c:1f:48:0d:9c:e8:7b:eb:4e:21:76:76:84:68: ad:a6:0b:ac:c1:c0:0a:91:a5:c3:f0:b3:49:f4:eb:cc: df:48:fd:e4:d8:0c:a5:28:d9:78:c1:be:61:e0:06:7c: ec:cb:96:e8:f9:73:79:38:6e:e3:64:8c:b6:93:0d:71: 19:08:f0:b3:c1:52:c0:39:2d:2b:53:d7:7b:93:c9:2c: f9:05:de:60:e4:a6:da:c1:90:ad:4f:fd:f5:d4:c4:75: 24:a7:83:0e:19:7f:aa:e6:8a:7a:75:3a:b3:16:f3:0b: 24:06:ac:ef:0c:15:39:d4:73:86:4c:40:b2:3d:78:b2: 95:dd:85:79:ac:ce:83:d9:65:9d:34:42:3a:e7:29:76: 7a:ca:f3:42:a5:66:fe:0c:78:ce:f0:c6:c1:4a:a6:aa: d4:e9:9c:55:a6:33:99:1b:2a:36:57:29:a7:55:72:00: 51:4c:83:29:55:ba:de:b8:b9:7f:a9:57:4d:5f:70:17: 5c:e4:67:94:60:44:e5:5c:ff:7a:c8:25:57:57:d5:3b: 4f:1a:51:0a:b3:87:35:37:03:2c:80:6d:48:e8:87:f4: de:fa:d2:e9:cb:79:bd:97:fa:c2:ec:94:fc:2e:95:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:30:b7:9c:f9:ff:9a:b5:18:59:1d:80:ef:4f:8f:4a: 56:a4:3d:f5:8e:6c:9e:ae:96:34:3d:ee:12:80:56:c7: e9:6d:04:73:ce:10:86:6a:1a:2a:5c:8e:f9:7e:52:1a: b8:20:14:65:ae:55:fa:5c:c7:8d:3e:b5:a0:94:9f:69: fc:4e:6a:b7:85:aa:73:5e:ca:b3:39:ba:05:5c:f0:f0: fd:07:d2:c0:6d:32:9e:cb:6a:b2:fd:b4:db:d9:c0:b1: 32:93:9d:4e:90:fa:c0:12:1b:19:e1:5c:d4:4d:a0:5b: 57:6d:c7:02:86:d9:d8:5a:13:ec:9a:90:c1:31:36:38: 40:ea:68:5f:97:ab:13:2a:df:b1:78:71:8b:17:13:a0: c3:b6:a3:59:27:08:b9:c7:65:c8:f8:d3:8e:45:c3:2c: 84:23:3d:ee:a3:ee:c2:d0:44:7a:e4:f3:81:83:e3:98: 9f:f4:f4:f9:07:9b:f6:b2:d8:b3:88:62:45:f3:7f:06: 63:d5:18:da:3e:da:6a:ab:ff:51:fd:1a:c1:b2:40:09: f6:21:7d:a5:34:b4:0c:7d:7d:36:55:37:89:05:d4:33: 69:c5:76:60:f5:1d:12:95:a0:fe:76:a6:25:7d:cb:5e: e4:64:c0:97:00:68:12:67:f8:6a:c5:15:64:ef:92:b3 Fingerprint (SHA-256): 3F:95:06:EA:AF:6E:F5:85:34:5B:0C:6C:AB:A3:D3:80:A4:90:CF:21:30:C4:95:6F:EA:61:DD:27:37:1C:A2:7C Fingerprint (SHA1): 87:07:BD:83:09:84:97:60:7A:3A:C9:78:4E:4C:D6:6B:05:D3:CB:7F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #724: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144962 (0x3cafa8c2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:50:16 2023 Not After : Wed Oct 18 14:50:16 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:51:4a:9d:00:8e:7e:6d:d5:f0:48:3c:75:6a:aa:81: a2:f0:8c:1f:48:0d:9c:e8:7b:eb:4e:21:76:76:84:68: ad:a6:0b:ac:c1:c0:0a:91:a5:c3:f0:b3:49:f4:eb:cc: df:48:fd:e4:d8:0c:a5:28:d9:78:c1:be:61:e0:06:7c: ec:cb:96:e8:f9:73:79:38:6e:e3:64:8c:b6:93:0d:71: 19:08:f0:b3:c1:52:c0:39:2d:2b:53:d7:7b:93:c9:2c: f9:05:de:60:e4:a6:da:c1:90:ad:4f:fd:f5:d4:c4:75: 24:a7:83:0e:19:7f:aa:e6:8a:7a:75:3a:b3:16:f3:0b: 24:06:ac:ef:0c:15:39:d4:73:86:4c:40:b2:3d:78:b2: 95:dd:85:79:ac:ce:83:d9:65:9d:34:42:3a:e7:29:76: 7a:ca:f3:42:a5:66:fe:0c:78:ce:f0:c6:c1:4a:a6:aa: d4:e9:9c:55:a6:33:99:1b:2a:36:57:29:a7:55:72:00: 51:4c:83:29:55:ba:de:b8:b9:7f:a9:57:4d:5f:70:17: 5c:e4:67:94:60:44:e5:5c:ff:7a:c8:25:57:57:d5:3b: 4f:1a:51:0a:b3:87:35:37:03:2c:80:6d:48:e8:87:f4: de:fa:d2:e9:cb:79:bd:97:fa:c2:ec:94:fc:2e:95:65 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ac:30:b7:9c:f9:ff:9a:b5:18:59:1d:80:ef:4f:8f:4a: 56:a4:3d:f5:8e:6c:9e:ae:96:34:3d:ee:12:80:56:c7: e9:6d:04:73:ce:10:86:6a:1a:2a:5c:8e:f9:7e:52:1a: b8:20:14:65:ae:55:fa:5c:c7:8d:3e:b5:a0:94:9f:69: fc:4e:6a:b7:85:aa:73:5e:ca:b3:39:ba:05:5c:f0:f0: fd:07:d2:c0:6d:32:9e:cb:6a:b2:fd:b4:db:d9:c0:b1: 32:93:9d:4e:90:fa:c0:12:1b:19:e1:5c:d4:4d:a0:5b: 57:6d:c7:02:86:d9:d8:5a:13:ec:9a:90:c1:31:36:38: 40:ea:68:5f:97:ab:13:2a:df:b1:78:71:8b:17:13:a0: c3:b6:a3:59:27:08:b9:c7:65:c8:f8:d3:8e:45:c3:2c: 84:23:3d:ee:a3:ee:c2:d0:44:7a:e4:f3:81:83:e3:98: 9f:f4:f4:f9:07:9b:f6:b2:d8:b3:88:62:45:f3:7f:06: 63:d5:18:da:3e:da:6a:ab:ff:51:fd:1a:c1:b2:40:09: f6:21:7d:a5:34:b4:0c:7d:7d:36:55:37:89:05:d4:33: 69:c5:76:60:f5:1d:12:95:a0:fe:76:a6:25:7d:cb:5e: e4:64:c0:97:00:68:12:67:f8:6a:c5:15:64:ef:92:b3 Fingerprint (SHA-256): 3F:95:06:EA:AF:6E:F5:85:34:5B:0C:6C:AB:A3:D3:80:A4:90:CF:21:30:C4:95:6F:EA:61:DD:27:37:1C:A2:7C Fingerprint (SHA1): 87:07:BD:83:09:84:97:60:7A:3A:C9:78:4E:4C:D6:6B:05:D3:CB:7F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #725: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #726: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144967 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #727: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #728: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #729: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144968 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #730: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #731: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #732: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #733: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018144969 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #734: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #735: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018144970 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #736: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #737: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #738: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #739: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #740: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018144971 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-Bridge-1018144852.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #741: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #742: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #743: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #744: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018144972 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #745: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #746: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #747: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #748: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018144973 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-BridgeNavy-1018144853.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #749: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #750: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #751: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #752: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018144974 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #753: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #754: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #755: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #756: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144968 (0x3cafa8c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:50:18 2023 Not After : Wed Oct 18 14:50:18 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:10:ab:18:61:1f:bb:16:58:76:81:b0:94:e1:87:8a: 1d:0d:48:fc:ec:b8:9d:d9:4c:b7:a7:01:97:74:b5:45: 91:d0:35:a8:ea:3e:c0:b2:69:2f:31:4c:76:18:85:b5: 4f:a6:19:67:44:d7:f5:6b:06:cc:8c:4e:4f:c9:86:03: 58:8b:b0:05:09:fe:e3:7c:08:68:c7:a0:b8:b9:5c:39: 5f:81:d2:bf:aa:83:fc:4e:5c:17:87:18:c0:d7:37:2e: 36:60:37:4c:07:9b:a5:75:32:02:ec:4d:5a:e7:04:4f: 66:42:3c:42:5c:ba:6a:36:85:4e:d9:55:37:aa:27:71: a7:d1:a7:b6:30:f9:11:ec:56:49:15:ec:31:26:98:bb: 5e:fb:c7:f5:5d:1c:44:12:22:c8:31:a8:99:91:e0:85: 1b:69:32:15:7b:49:17:c5:f0:7f:60:a4:62:29:e5:c4: 2f:b9:0e:ac:13:19:7e:10:a5:6d:ec:9c:cd:0e:13:b5: d5:00:c7:c5:90:cd:f9:17:c1:07:4e:e0:14:ee:ae:75: cd:d8:06:7c:46:aa:83:39:46:a3:cb:78:a5:04:81:d6: 56:21:aa:eb:f5:27:d6:4b:e0:6f:c9:5a:59:6a:98:66: f2:1c:46:32:34:7c:91:99:91:b5:f0:77:de:f0:81:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:e9:7e:2a:40:1b:ca:73:1f:e1:0b:57:8e:1a:84:f8: 6e:75:bc:34:0e:94:49:9c:06:f9:9c:91:41:83:db:f4: 86:9a:9f:18:81:4d:df:12:8b:a0:fb:e6:73:0f:4b:5e: 77:8f:fe:75:3f:2e:86:14:ca:56:dd:4b:e0:76:2d:1a: 6b:38:b0:80:41:5f:2e:71:50:cc:be:0b:8e:59:d0:cc: 7a:93:df:f0:24:8b:3b:0b:26:02:6c:36:d7:12:5a:e6: ce:98:35:98:46:c8:1e:f3:be:d0:ba:30:4d:89:54:48: 2d:c8:9d:fe:c2:7c:07:bc:c0:41:85:f2:a2:26:b9:ba: 29:db:d6:de:34:64:72:4d:38:75:87:ee:9a:3c:0c:20: ff:65:19:59:e2:9d:55:4c:8e:a9:33:ef:1a:f1:e7:78: e8:39:c1:5c:26:bc:35:9a:c2:76:4f:6a:a2:88:f5:1f: fd:33:79:45:be:7b:9f:ac:d0:e6:74:bf:4c:34:d4:28: 77:90:6e:e4:a0:6a:3c:00:dd:c7:19:d3:5c:2c:c2:b6: f8:40:85:84:2c:41:6b:d0:d6:6e:cd:45:92:75:94:a1: 14:4e:66:57:0f:46:82:52:84:5b:46:60:f4:55:8b:15: 84:09:3a:51:73:8f:c7:f8:2c:f9:d7:fb:9a:cc:8c:ff Fingerprint (SHA-256): 58:34:67:62:FC:D4:49:55:D1:54:81:5A:45:B6:95:BB:58:5C:26:C4:53:9B:12:B4:D1:FD:B7:7A:AE:44:8D:51 Fingerprint (SHA1): F0:98:41:A1:64:B3:9F:21:A0:88:63:9E:C9:5D:5C:BF:66:53:B2:C9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #757: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144968 (0x3cafa8c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:50:18 2023 Not After : Wed Oct 18 14:50:18 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:10:ab:18:61:1f:bb:16:58:76:81:b0:94:e1:87:8a: 1d:0d:48:fc:ec:b8:9d:d9:4c:b7:a7:01:97:74:b5:45: 91:d0:35:a8:ea:3e:c0:b2:69:2f:31:4c:76:18:85:b5: 4f:a6:19:67:44:d7:f5:6b:06:cc:8c:4e:4f:c9:86:03: 58:8b:b0:05:09:fe:e3:7c:08:68:c7:a0:b8:b9:5c:39: 5f:81:d2:bf:aa:83:fc:4e:5c:17:87:18:c0:d7:37:2e: 36:60:37:4c:07:9b:a5:75:32:02:ec:4d:5a:e7:04:4f: 66:42:3c:42:5c:ba:6a:36:85:4e:d9:55:37:aa:27:71: a7:d1:a7:b6:30:f9:11:ec:56:49:15:ec:31:26:98:bb: 5e:fb:c7:f5:5d:1c:44:12:22:c8:31:a8:99:91:e0:85: 1b:69:32:15:7b:49:17:c5:f0:7f:60:a4:62:29:e5:c4: 2f:b9:0e:ac:13:19:7e:10:a5:6d:ec:9c:cd:0e:13:b5: d5:00:c7:c5:90:cd:f9:17:c1:07:4e:e0:14:ee:ae:75: cd:d8:06:7c:46:aa:83:39:46:a3:cb:78:a5:04:81:d6: 56:21:aa:eb:f5:27:d6:4b:e0:6f:c9:5a:59:6a:98:66: f2:1c:46:32:34:7c:91:99:91:b5:f0:77:de:f0:81:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:e9:7e:2a:40:1b:ca:73:1f:e1:0b:57:8e:1a:84:f8: 6e:75:bc:34:0e:94:49:9c:06:f9:9c:91:41:83:db:f4: 86:9a:9f:18:81:4d:df:12:8b:a0:fb:e6:73:0f:4b:5e: 77:8f:fe:75:3f:2e:86:14:ca:56:dd:4b:e0:76:2d:1a: 6b:38:b0:80:41:5f:2e:71:50:cc:be:0b:8e:59:d0:cc: 7a:93:df:f0:24:8b:3b:0b:26:02:6c:36:d7:12:5a:e6: ce:98:35:98:46:c8:1e:f3:be:d0:ba:30:4d:89:54:48: 2d:c8:9d:fe:c2:7c:07:bc:c0:41:85:f2:a2:26:b9:ba: 29:db:d6:de:34:64:72:4d:38:75:87:ee:9a:3c:0c:20: ff:65:19:59:e2:9d:55:4c:8e:a9:33:ef:1a:f1:e7:78: e8:39:c1:5c:26:bc:35:9a:c2:76:4f:6a:a2:88:f5:1f: fd:33:79:45:be:7b:9f:ac:d0:e6:74:bf:4c:34:d4:28: 77:90:6e:e4:a0:6a:3c:00:dd:c7:19:d3:5c:2c:c2:b6: f8:40:85:84:2c:41:6b:d0:d6:6e:cd:45:92:75:94:a1: 14:4e:66:57:0f:46:82:52:84:5b:46:60:f4:55:8b:15: 84:09:3a:51:73:8f:c7:f8:2c:f9:d7:fb:9a:cc:8c:ff Fingerprint (SHA-256): 58:34:67:62:FC:D4:49:55:D1:54:81:5A:45:B6:95:BB:58:5C:26:C4:53:9B:12:B4:D1:FD:B7:7A:AE:44:8D:51 Fingerprint (SHA1): F0:98:41:A1:64:B3:9F:21:A0:88:63:9E:C9:5D:5C:BF:66:53:B2:C9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #758: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #759: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144967 (0x3cafa8c7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:50:18 2023 Not After : Wed Oct 18 14:50:18 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:d5:e0:92:e0:e9:c3:78:61:06:ca:b9:b0:38:44:ac: 8f:1c:ca:8a:d1:29:e7:c2:69:46:79:f2:cb:80:29:1f: 71:61:bb:29:46:3d:68:a0:04:c4:7d:9d:44:77:6a:5b: ed:cc:fe:80:dc:b7:fa:03:59:af:c9:ed:5a:fb:b1:ac: 9e:b6:cc:e3:76:37:0f:06:e3:f5:2b:a3:d2:33:9d:8c: 33:54:10:6c:44:b9:e8:e0:5b:a9:75:97:48:57:6b:a3: 02:35:80:f5:21:24:57:1f:eb:17:7f:20:a2:d9:e3:2d: d4:64:95:78:a2:bb:74:e4:05:7c:c0:4a:30:09:07:fa: b0:33:e2:ca:3c:80:52:05:40:5e:14:d5:0e:40:74:8b: 2b:11:30:45:87:bd:fc:da:5d:9c:99:65:fd:3d:2c:55: ad:0b:51:0e:03:1c:1b:9d:21:00:72:c9:8b:57:7b:3e: e3:be:a8:84:f6:84:e5:12:71:22:62:a0:89:1b:a8:b9: 09:92:81:b0:93:e1:bb:7d:f1:f3:3f:8f:ab:1e:10:5b: 0b:3e:32:e3:d4:d3:c0:35:fa:2a:ad:29:09:5b:b1:57: a5:f1:0c:b3:76:9c:dc:d8:35:7e:b9:07:2d:6a:f8:ce: 36:d6:8e:64:e4:2e:62:a3:eb:63:b5:2e:12:f9:fe:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 63:47:11:14:02:b4:77:c7:15:a1:cb:b8:9c:29:2d:4b: af:b4:3f:8e:db:61:70:3c:d2:b4:86:05:d9:d5:66:5a: 3c:d3:97:95:ab:13:8e:32:b2:1d:45:ec:b6:dd:d7:cc: 9c:1f:61:06:b5:03:0d:49:e4:91:7a:12:a0:4c:60:7d: 9d:52:21:50:45:56:83:1c:fe:93:69:de:07:8a:34:ae: 71:13:43:19:dd:22:1a:74:8f:da:37:47:7b:a5:47:21: d9:43:b5:41:2a:9a:37:8b:ff:e9:66:89:bc:e2:6c:18: 3d:2b:74:ee:44:81:f5:59:c5:6a:20:c0:9e:4c:6e:52: ce:f7:51:96:01:5b:b0:27:9e:5b:11:bc:b5:27:d9:84: fb:df:51:33:b3:f1:60:34:96:8d:52:ee:57:7a:ff:87: 3f:35:fa:84:2c:ee:c3:6f:72:8c:05:d0:c6:09:ac:85: bd:a2:6b:84:9f:df:e1:cb:ef:bf:20:a6:11:18:32:f5: 3a:04:ff:dc:88:e7:27:27:ad:76:5c:8e:c5:23:22:87: 9a:17:e4:4d:f4:e7:70:75:f7:c3:d6:c8:f3:c5:78:0e: ed:a6:cd:33:e8:5a:90:6a:7b:ba:cf:f1:1b:d9:45:03: 6d:2e:93:47:a3:fe:95:70:86:dc:85:83:fd:7f:e8:64 Fingerprint (SHA-256): 7C:CB:59:E0:5B:37:B4:93:38:0E:70:AB:A3:DF:D3:41:54:9C:F5:3F:08:A8:50:86:5F:52:69:DC:A1:EA:36:B3 Fingerprint (SHA1): 08:51:CD:2D:89:C5:84:F7:02:74:D2:DB:48:2E:1D:C8:EE:FE:EC:C3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #760: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144968 (0x3cafa8c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:50:18 2023 Not After : Wed Oct 18 14:50:18 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:10:ab:18:61:1f:bb:16:58:76:81:b0:94:e1:87:8a: 1d:0d:48:fc:ec:b8:9d:d9:4c:b7:a7:01:97:74:b5:45: 91:d0:35:a8:ea:3e:c0:b2:69:2f:31:4c:76:18:85:b5: 4f:a6:19:67:44:d7:f5:6b:06:cc:8c:4e:4f:c9:86:03: 58:8b:b0:05:09:fe:e3:7c:08:68:c7:a0:b8:b9:5c:39: 5f:81:d2:bf:aa:83:fc:4e:5c:17:87:18:c0:d7:37:2e: 36:60:37:4c:07:9b:a5:75:32:02:ec:4d:5a:e7:04:4f: 66:42:3c:42:5c:ba:6a:36:85:4e:d9:55:37:aa:27:71: a7:d1:a7:b6:30:f9:11:ec:56:49:15:ec:31:26:98:bb: 5e:fb:c7:f5:5d:1c:44:12:22:c8:31:a8:99:91:e0:85: 1b:69:32:15:7b:49:17:c5:f0:7f:60:a4:62:29:e5:c4: 2f:b9:0e:ac:13:19:7e:10:a5:6d:ec:9c:cd:0e:13:b5: d5:00:c7:c5:90:cd:f9:17:c1:07:4e:e0:14:ee:ae:75: cd:d8:06:7c:46:aa:83:39:46:a3:cb:78:a5:04:81:d6: 56:21:aa:eb:f5:27:d6:4b:e0:6f:c9:5a:59:6a:98:66: f2:1c:46:32:34:7c:91:99:91:b5:f0:77:de:f0:81:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:e9:7e:2a:40:1b:ca:73:1f:e1:0b:57:8e:1a:84:f8: 6e:75:bc:34:0e:94:49:9c:06:f9:9c:91:41:83:db:f4: 86:9a:9f:18:81:4d:df:12:8b:a0:fb:e6:73:0f:4b:5e: 77:8f:fe:75:3f:2e:86:14:ca:56:dd:4b:e0:76:2d:1a: 6b:38:b0:80:41:5f:2e:71:50:cc:be:0b:8e:59:d0:cc: 7a:93:df:f0:24:8b:3b:0b:26:02:6c:36:d7:12:5a:e6: ce:98:35:98:46:c8:1e:f3:be:d0:ba:30:4d:89:54:48: 2d:c8:9d:fe:c2:7c:07:bc:c0:41:85:f2:a2:26:b9:ba: 29:db:d6:de:34:64:72:4d:38:75:87:ee:9a:3c:0c:20: ff:65:19:59:e2:9d:55:4c:8e:a9:33:ef:1a:f1:e7:78: e8:39:c1:5c:26:bc:35:9a:c2:76:4f:6a:a2:88:f5:1f: fd:33:79:45:be:7b:9f:ac:d0:e6:74:bf:4c:34:d4:28: 77:90:6e:e4:a0:6a:3c:00:dd:c7:19:d3:5c:2c:c2:b6: f8:40:85:84:2c:41:6b:d0:d6:6e:cd:45:92:75:94:a1: 14:4e:66:57:0f:46:82:52:84:5b:46:60:f4:55:8b:15: 84:09:3a:51:73:8f:c7:f8:2c:f9:d7:fb:9a:cc:8c:ff Fingerprint (SHA-256): 58:34:67:62:FC:D4:49:55:D1:54:81:5A:45:B6:95:BB:58:5C:26:C4:53:9B:12:B4:D1:FD:B7:7A:AE:44:8D:51 Fingerprint (SHA1): F0:98:41:A1:64:B3:9F:21:A0:88:63:9E:C9:5D:5C:BF:66:53:B2:C9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #761: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144968 (0x3cafa8c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:50:18 2023 Not After : Wed Oct 18 14:50:18 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:10:ab:18:61:1f:bb:16:58:76:81:b0:94:e1:87:8a: 1d:0d:48:fc:ec:b8:9d:d9:4c:b7:a7:01:97:74:b5:45: 91:d0:35:a8:ea:3e:c0:b2:69:2f:31:4c:76:18:85:b5: 4f:a6:19:67:44:d7:f5:6b:06:cc:8c:4e:4f:c9:86:03: 58:8b:b0:05:09:fe:e3:7c:08:68:c7:a0:b8:b9:5c:39: 5f:81:d2:bf:aa:83:fc:4e:5c:17:87:18:c0:d7:37:2e: 36:60:37:4c:07:9b:a5:75:32:02:ec:4d:5a:e7:04:4f: 66:42:3c:42:5c:ba:6a:36:85:4e:d9:55:37:aa:27:71: a7:d1:a7:b6:30:f9:11:ec:56:49:15:ec:31:26:98:bb: 5e:fb:c7:f5:5d:1c:44:12:22:c8:31:a8:99:91:e0:85: 1b:69:32:15:7b:49:17:c5:f0:7f:60:a4:62:29:e5:c4: 2f:b9:0e:ac:13:19:7e:10:a5:6d:ec:9c:cd:0e:13:b5: d5:00:c7:c5:90:cd:f9:17:c1:07:4e:e0:14:ee:ae:75: cd:d8:06:7c:46:aa:83:39:46:a3:cb:78:a5:04:81:d6: 56:21:aa:eb:f5:27:d6:4b:e0:6f:c9:5a:59:6a:98:66: f2:1c:46:32:34:7c:91:99:91:b5:f0:77:de:f0:81:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:e9:7e:2a:40:1b:ca:73:1f:e1:0b:57:8e:1a:84:f8: 6e:75:bc:34:0e:94:49:9c:06:f9:9c:91:41:83:db:f4: 86:9a:9f:18:81:4d:df:12:8b:a0:fb:e6:73:0f:4b:5e: 77:8f:fe:75:3f:2e:86:14:ca:56:dd:4b:e0:76:2d:1a: 6b:38:b0:80:41:5f:2e:71:50:cc:be:0b:8e:59:d0:cc: 7a:93:df:f0:24:8b:3b:0b:26:02:6c:36:d7:12:5a:e6: ce:98:35:98:46:c8:1e:f3:be:d0:ba:30:4d:89:54:48: 2d:c8:9d:fe:c2:7c:07:bc:c0:41:85:f2:a2:26:b9:ba: 29:db:d6:de:34:64:72:4d:38:75:87:ee:9a:3c:0c:20: ff:65:19:59:e2:9d:55:4c:8e:a9:33:ef:1a:f1:e7:78: e8:39:c1:5c:26:bc:35:9a:c2:76:4f:6a:a2:88:f5:1f: fd:33:79:45:be:7b:9f:ac:d0:e6:74:bf:4c:34:d4:28: 77:90:6e:e4:a0:6a:3c:00:dd:c7:19:d3:5c:2c:c2:b6: f8:40:85:84:2c:41:6b:d0:d6:6e:cd:45:92:75:94:a1: 14:4e:66:57:0f:46:82:52:84:5b:46:60:f4:55:8b:15: 84:09:3a:51:73:8f:c7:f8:2c:f9:d7:fb:9a:cc:8c:ff Fingerprint (SHA-256): 58:34:67:62:FC:D4:49:55:D1:54:81:5A:45:B6:95:BB:58:5C:26:C4:53:9B:12:B4:D1:FD:B7:7A:AE:44:8D:51 Fingerprint (SHA1): F0:98:41:A1:64:B3:9F:21:A0:88:63:9E:C9:5D:5C:BF:66:53:B2:C9 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #762: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #763: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144975 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #764: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #765: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #766: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144976 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #767: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #768: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #769: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #770: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1018144977 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #771: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #772: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #773: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #774: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1018144978 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #775: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #776: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #777: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #778: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1018144979 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #779: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #780: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1018144980 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #781: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #782: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #783: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #784: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #785: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018144981 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #786: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #787: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #788: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #789: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018144982 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #790: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #791: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #792: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #793: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018144983 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #794: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #795: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #796: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #797: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018144984 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #798: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #799: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #800: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144975 (0x3cafa8cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:50:21 2023 Not After : Wed Oct 18 14:50:21 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ee:77:40:78:fe:2b:6b:5c:a3:dc:66:92:74:98:9d:55: b0:f2:cf:ad:d7:ab:87:15:d8:fa:55:68:79:21:10:f6: d9:be:af:af:37:c2:ff:2f:50:d8:72:cc:73:fd:09:47: 7c:04:4b:41:d4:d4:00:c2:89:03:2d:43:a7:fb:c8:a7: 6e:f4:04:c3:99:03:b5:e1:05:51:70:3e:b8:e3:14:35: 38:d9:e4:bb:12:5d:6a:c1:de:fc:fe:86:24:c5:cd:f8: 4a:2c:20:58:5c:15:c3:34:ac:b6:e5:4d:08:45:55:46: aa:3e:ee:ea:6e:a3:95:a1:97:7b:67:0f:e9:72:fa:29: 12:d3:8c:b5:59:83:43:07:08:29:57:27:13:23:01:22: 6c:e0:de:c2:03:f9:74:49:bb:22:d2:32:9c:37:1d:91: aa:f4:54:80:8c:2c:03:09:f0:b9:e9:f8:99:8f:73:d7: 44:91:96:d6:53:78:ed:22:a1:d3:90:cd:63:85:23:f4: 02:1a:79:4c:82:6f:82:37:29:39:db:64:45:34:77:9c: df:4d:07:22:68:1b:08:70:43:ec:fd:e7:85:bd:73:df: 23:f8:86:d7:38:02:33:7d:05:a0:5e:84:a5:4a:ff:0b: 63:03:cd:4f:97:c0:fb:86:7f:8b:93:a2:f7:6d:fd:07 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:b3:f2:15:c7:b0:d4:cf:e5:bb:3b:f1:40:6d:f2:0d: b4:17:27:72:3c:cf:4c:e4:de:16:ee:45:b7:d0:43:bb: 2f:e0:2a:50:df:05:f2:24:81:4f:66:4f:f4:d1:1a:a2: 82:ae:ee:62:ec:78:b2:ad:09:c2:58:40:24:29:3f:96: fb:1e:ac:f7:f9:18:f8:5a:fc:87:32:d2:b7:51:7a:2f: c6:46:2b:b2:fb:21:4a:71:7d:b6:6e:e9:6e:e1:9b:34: db:a8:81:44:09:d4:22:c5:4a:a7:d3:91:1f:67:08:28: d1:3f:83:49:da:dd:08:68:a7:65:61:02:4d:c8:e2:15: 24:8a:74:88:50:15:9c:fa:d3:f1:3d:31:c0:44:bc:61: b8:00:4d:79:33:61:19:c6:10:8d:d9:7c:ee:f4:7e:9c: 6f:b8:ce:5a:ac:f9:9e:3f:ef:a3:aa:ac:ab:60:31:2d: 6c:2b:43:e9:09:97:3e:22:f6:00:49:85:8d:f8:c9:ae: 1a:f5:57:8b:6c:f6:f2:7f:9c:87:fc:ed:b6:68:18:cc: 11:79:b0:b3:8f:65:a1:a1:41:2e:fa:e8:00:97:5f:7b: 33:03:12:b1:1c:1e:cc:0e:2c:82:b6:25:c7:94:51:6c: 4e:ce:ed:bb:17:78:63:37:31:fd:9d:34:06:76:5f:32 Fingerprint (SHA-256): 9C:C8:B9:72:10:4C:FC:59:92:56:24:A3:0B:AA:7C:7A:6D:6F:F0:71:1D:8A:29:2C:26:F7:EB:78:BB:06:DE:27 Fingerprint (SHA1): 77:54:EE:A0:8D:6B:71:8F:0F:F0:F5:C1:2E:21:C5:27:22:A0:2E:7B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #801: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #802: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #803: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #804: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #805: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #806: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #807: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #808: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #809: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144976 (0x3cafa8d0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:50:22 2023 Not After : Wed Oct 18 14:50:22 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:25:e0:44:e2:aa:09:91:81:77:08:0b:d4:01:c1:88: 43:5a:e2:0c:89:b9:71:d0:c2:f1:18:61:38:a8:a1:c4: 48:c7:81:d3:92:77:37:1b:25:d5:01:f8:44:c3:46:24: 76:9c:d0:f6:dd:1b:ec:d7:14:6a:cc:b2:a5:e5:ec:f0: 97:ad:7a:75:e4:1f:88:0c:94:87:80:7f:74:c3:55:53: 13:57:27:fe:a0:22:b6:32:6f:0d:14:7a:cb:01:e4:a5: cd:04:ca:96:a1:49:02:4b:90:d6:c7:2e:b9:93:fb:d3: 12:f3:1b:cc:a9:77:0b:21:cf:91:d4:12:f8:1a:be:ba: 34:2e:a7:4b:74:c2:da:b9:ec:0a:7a:c6:73:e3:f5:43: 6e:18:ef:69:31:c0:cc:24:d6:b4:47:7c:ce:0e:02:a5: 92:38:61:4b:90:b8:a9:01:93:a8:ab:aa:42:03:c9:b8: ce:19:8d:0c:44:33:d0:79:07:bd:6b:f1:7f:7c:62:57: 2f:72:92:9a:83:96:a6:bf:9e:fa:fa:5d:36:b6:e7:c4: 67:f2:5d:50:78:5c:81:1b:d7:df:4e:b3:40:8b:be:33: ad:c8:f9:97:95:21:2b:96:ea:bb:98:3a:55:ed:48:ef: 16:27:33:d2:fa:32:fb:ea:3d:01:76:90:9e:e7:f8:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:35:1b:c8:bb:73:d5:bf:3f:00:0b:28:ad:9f:5d:5c: 39:05:a9:08:db:f1:6c:78:1c:72:89:7b:d5:9c:93:03: 15:3d:dc:9e:cb:67:dc:f3:dc:75:f0:71:45:cf:70:a8: ee:d0:c2:55:ec:01:c0:22:ae:0c:bb:8f:f5:ce:da:21: a8:38:94:50:19:ba:2e:ad:10:55:a0:18:1c:f5:47:2b: b3:38:5a:d4:ac:a6:c0:a3:ec:2f:4f:73:df:27:02:b3: 66:75:3b:c7:51:29:e6:44:3a:58:69:a4:ca:c9:d8:94: 9e:66:bf:27:71:2c:f9:58:74:43:9b:42:8e:99:13:05: 00:58:08:61:02:76:ed:a5:37:1a:2f:d1:7f:ba:54:47: af:27:e2:ea:5e:8e:07:83:71:b7:75:66:ce:02:cb:6d: 5c:e1:bc:6d:b2:7f:be:18:a1:7f:99:c1:cf:08:85:47: ee:1f:85:c5:a0:72:5b:5c:e6:b3:42:93:01:21:34:f2: dd:45:b7:cc:06:2f:ec:c1:64:fb:60:9b:1b:cd:52:69: bc:41:a0:d5:57:e0:1d:f7:29:2a:48:c3:3a:cf:45:35: 92:c1:93:a9:a6:7d:6d:73:df:92:66:85:9c:75:96:0f: 8e:cf:c5:c9:86:df:4a:a0:b8:64:5a:a2:bb:0a:e1:e7 Fingerprint (SHA-256): 31:C4:16:93:CD:75:A8:30:25:4A:14:06:5C:03:35:CE:DA:46:44:8C:6E:E4:4E:6E:04:1F:0B:01:EF:16:6F:16 Fingerprint (SHA1): 67:45:16:8C:0A:02:8C:6D:5B:A1:5D:F2:CC:07:65:27:2B:91:D2:5B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #810: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #811: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #812: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #813: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #814: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #815: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #816: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #817: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #818: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #819: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #820: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #821: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #822: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #823: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #824: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #825: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #826: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #827: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #828: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144985 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #829: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #830: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #831: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #832: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018144986 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #833: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #834: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #835: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #836: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018144987 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #837: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #838: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #839: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #840: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1018144988 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #841: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #842: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #843: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #844: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018144989 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #845: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #846: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #847: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #848: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1018144990 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #849: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #850: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #851: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #852: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1018144991 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #853: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #854: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #855: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #856: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1018144992 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #857: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #858: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #859: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #860: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1018144993 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #861: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #862: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #863: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144985 (0x3cafa8d9) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:26 2023 Not After : Wed Oct 18 14:50:26 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: ab:8f:84:2d:21:fc:ce:b0:17:d0:35:c2:00:5f:7c:9e: b6:0a:d3:f4:4c:48:6b:51:f0:8f:bf:dd:ca:10:cf:98: 5a:dd:ad:c7:b1:0f:74:8a:f3:00:fa:0d:f1:33:bb:ef: 1d:e9:53:22:a0:70:d6:6e:a0:82:5b:c0:3c:e1:f5:be: 2b:ef:58:54:a3:dd:98:e9:b5:34:68:a0:6e:4d:ef:92: eb:e2:f3:50:f7:0c:1b:2e:68:84:0f:98:45:c4:ff:5f: 04:c1:7f:b2:34:83:56:42:cd:3b:0b:18:09:25:56:52: 5f:9f:00:d8:9a:30:64:7b:44:73:35:04:07:48:6d:8e: a1:49:e4:93:63:a1:b3:45:88:ac:b2:a6:63:d7:4e:ae: 38:7a:0b:94:7a:77:f0:42:0a:78:f9:90:14:41:62:e1: f4:12:26:f8:7d:54:4e:cc:d7:68:09:78:17:54:d9:95: 9f:4d:28:b0:b8:a2:5d:c9:b8:55:49:05:76:c4:17:dd: 31:72:03:75:58:6f:bc:eb:d4:5b:a1:72:ab:72:3a:cc: 11:1d:34:52:5e:12:d0:35:87:05:a0:bc:d1:25:01:25: 67:15:d9:5c:69:5a:27:32:9b:e9:5e:cb:22:c0:e8:21: ea:b6:cd:c0:a9:4f:41:4b:0c:bd:6d:7e:ec:42:d3:f5 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:e1:ea:52:1c:03:48:e1:91:7f:49:ac: 38:57:ab:a6:c2:34:01:91:e6:54:3f:87:36:4c:ec:35: 4a:02:1c:07:43:c0:80:00:d3:79:22:dc:c1:fb:d1:4c: d4:b1:70:04:10:28:ff:42:5a:28:7f:27:31:81:28 Fingerprint (SHA-256): 19:F3:05:EC:DB:DF:BB:2A:9E:C4:DC:5F:E1:C2:B7:D3:7F:F6:03:FD:30:0C:F9:97:79:2F:9B:BD:02:E3:5B:38 Fingerprint (SHA1): 94:F2:B8:DC:84:03:ED:9A:B1:5D:79:FA:36:9F:CA:B2:33:2F:1E:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #864: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144985 (0x3cafa8d9) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:26 2023 Not After : Wed Oct 18 14:50:26 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: ab:8f:84:2d:21:fc:ce:b0:17:d0:35:c2:00:5f:7c:9e: b6:0a:d3:f4:4c:48:6b:51:f0:8f:bf:dd:ca:10:cf:98: 5a:dd:ad:c7:b1:0f:74:8a:f3:00:fa:0d:f1:33:bb:ef: 1d:e9:53:22:a0:70:d6:6e:a0:82:5b:c0:3c:e1:f5:be: 2b:ef:58:54:a3:dd:98:e9:b5:34:68:a0:6e:4d:ef:92: eb:e2:f3:50:f7:0c:1b:2e:68:84:0f:98:45:c4:ff:5f: 04:c1:7f:b2:34:83:56:42:cd:3b:0b:18:09:25:56:52: 5f:9f:00:d8:9a:30:64:7b:44:73:35:04:07:48:6d:8e: a1:49:e4:93:63:a1:b3:45:88:ac:b2:a6:63:d7:4e:ae: 38:7a:0b:94:7a:77:f0:42:0a:78:f9:90:14:41:62:e1: f4:12:26:f8:7d:54:4e:cc:d7:68:09:78:17:54:d9:95: 9f:4d:28:b0:b8:a2:5d:c9:b8:55:49:05:76:c4:17:dd: 31:72:03:75:58:6f:bc:eb:d4:5b:a1:72:ab:72:3a:cc: 11:1d:34:52:5e:12:d0:35:87:05:a0:bc:d1:25:01:25: 67:15:d9:5c:69:5a:27:32:9b:e9:5e:cb:22:c0:e8:21: ea:b6:cd:c0:a9:4f:41:4b:0c:bd:6d:7e:ec:42:d3:f5 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:e1:ea:52:1c:03:48:e1:91:7f:49:ac: 38:57:ab:a6:c2:34:01:91:e6:54:3f:87:36:4c:ec:35: 4a:02:1c:07:43:c0:80:00:d3:79:22:dc:c1:fb:d1:4c: d4:b1:70:04:10:28:ff:42:5a:28:7f:27:31:81:28 Fingerprint (SHA-256): 19:F3:05:EC:DB:DF:BB:2A:9E:C4:DC:5F:E1:C2:B7:D3:7F:F6:03:FD:30:0C:F9:97:79:2F:9B:BD:02:E3:5B:38 Fingerprint (SHA1): 94:F2:B8:DC:84:03:ED:9A:B1:5D:79:FA:36:9F:CA:B2:33:2F:1E:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #865: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144985 (0x3cafa8d9) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:26 2023 Not After : Wed Oct 18 14:50:26 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: ab:8f:84:2d:21:fc:ce:b0:17:d0:35:c2:00:5f:7c:9e: b6:0a:d3:f4:4c:48:6b:51:f0:8f:bf:dd:ca:10:cf:98: 5a:dd:ad:c7:b1:0f:74:8a:f3:00:fa:0d:f1:33:bb:ef: 1d:e9:53:22:a0:70:d6:6e:a0:82:5b:c0:3c:e1:f5:be: 2b:ef:58:54:a3:dd:98:e9:b5:34:68:a0:6e:4d:ef:92: eb:e2:f3:50:f7:0c:1b:2e:68:84:0f:98:45:c4:ff:5f: 04:c1:7f:b2:34:83:56:42:cd:3b:0b:18:09:25:56:52: 5f:9f:00:d8:9a:30:64:7b:44:73:35:04:07:48:6d:8e: a1:49:e4:93:63:a1:b3:45:88:ac:b2:a6:63:d7:4e:ae: 38:7a:0b:94:7a:77:f0:42:0a:78:f9:90:14:41:62:e1: f4:12:26:f8:7d:54:4e:cc:d7:68:09:78:17:54:d9:95: 9f:4d:28:b0:b8:a2:5d:c9:b8:55:49:05:76:c4:17:dd: 31:72:03:75:58:6f:bc:eb:d4:5b:a1:72:ab:72:3a:cc: 11:1d:34:52:5e:12:d0:35:87:05:a0:bc:d1:25:01:25: 67:15:d9:5c:69:5a:27:32:9b:e9:5e:cb:22:c0:e8:21: ea:b6:cd:c0:a9:4f:41:4b:0c:bd:6d:7e:ec:42:d3:f5 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:e1:ea:52:1c:03:48:e1:91:7f:49:ac: 38:57:ab:a6:c2:34:01:91:e6:54:3f:87:36:4c:ec:35: 4a:02:1c:07:43:c0:80:00:d3:79:22:dc:c1:fb:d1:4c: d4:b1:70:04:10:28:ff:42:5a:28:7f:27:31:81:28 Fingerprint (SHA-256): 19:F3:05:EC:DB:DF:BB:2A:9E:C4:DC:5F:E1:C2:B7:D3:7F:F6:03:FD:30:0C:F9:97:79:2F:9B:BD:02:E3:5B:38 Fingerprint (SHA1): 94:F2:B8:DC:84:03:ED:9A:B1:5D:79:FA:36:9F:CA:B2:33:2F:1E:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #866: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144985 (0x3cafa8d9) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:26 2023 Not After : Wed Oct 18 14:50:26 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: ab:8f:84:2d:21:fc:ce:b0:17:d0:35:c2:00:5f:7c:9e: b6:0a:d3:f4:4c:48:6b:51:f0:8f:bf:dd:ca:10:cf:98: 5a:dd:ad:c7:b1:0f:74:8a:f3:00:fa:0d:f1:33:bb:ef: 1d:e9:53:22:a0:70:d6:6e:a0:82:5b:c0:3c:e1:f5:be: 2b:ef:58:54:a3:dd:98:e9:b5:34:68:a0:6e:4d:ef:92: eb:e2:f3:50:f7:0c:1b:2e:68:84:0f:98:45:c4:ff:5f: 04:c1:7f:b2:34:83:56:42:cd:3b:0b:18:09:25:56:52: 5f:9f:00:d8:9a:30:64:7b:44:73:35:04:07:48:6d:8e: a1:49:e4:93:63:a1:b3:45:88:ac:b2:a6:63:d7:4e:ae: 38:7a:0b:94:7a:77:f0:42:0a:78:f9:90:14:41:62:e1: f4:12:26:f8:7d:54:4e:cc:d7:68:09:78:17:54:d9:95: 9f:4d:28:b0:b8:a2:5d:c9:b8:55:49:05:76:c4:17:dd: 31:72:03:75:58:6f:bc:eb:d4:5b:a1:72:ab:72:3a:cc: 11:1d:34:52:5e:12:d0:35:87:05:a0:bc:d1:25:01:25: 67:15:d9:5c:69:5a:27:32:9b:e9:5e:cb:22:c0:e8:21: ea:b6:cd:c0:a9:4f:41:4b:0c:bd:6d:7e:ec:42:d3:f5 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1d:00:e1:ea:52:1c:03:48:e1:91:7f:49:ac: 38:57:ab:a6:c2:34:01:91:e6:54:3f:87:36:4c:ec:35: 4a:02:1c:07:43:c0:80:00:d3:79:22:dc:c1:fb:d1:4c: d4:b1:70:04:10:28:ff:42:5a:28:7f:27:31:81:28 Fingerprint (SHA-256): 19:F3:05:EC:DB:DF:BB:2A:9E:C4:DC:5F:E1:C2:B7:D3:7F:F6:03:FD:30:0C:F9:97:79:2F:9B:BD:02:E3:5B:38 Fingerprint (SHA1): 94:F2:B8:DC:84:03:ED:9A:B1:5D:79:FA:36:9F:CA:B2:33:2F:1E:A3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #867: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #868: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #869: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #870: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #871: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #872: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #873: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #874: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #875: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #876: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #877: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #878: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #879: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #880: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #881: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #882: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #883: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #884: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #885: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #886: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #887: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #888: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #889: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #890: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #891: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #892: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #893: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #894: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018145031Z nextupdate=20241018145031Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 14:50:31 2023 Next Update: Fri Oct 18 14:50:31 2024 CRL Extensions: chains.sh: #895: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018145031Z nextupdate=20241018145031Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:50:31 2023 Next Update: Fri Oct 18 14:50:31 2024 CRL Extensions: chains.sh: #896: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018145031Z nextupdate=20241018145031Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 14:50:31 2023 Next Update: Fri Oct 18 14:50:31 2024 CRL Extensions: chains.sh: #897: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018145031Z nextupdate=20241018145031Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 14:50:31 2023 Next Update: Fri Oct 18 14:50:31 2024 CRL Extensions: chains.sh: #898: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018145032Z addcert 14 20231018145032Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 14:50:32 2023 Next Update: Fri Oct 18 14:50:31 2024 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Wed Oct 18 14:50:32 2023 CRL Extensions: chains.sh: #899: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018145033Z addcert 15 20231018145033Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:50:33 2023 Next Update: Fri Oct 18 14:50:31 2024 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Wed Oct 18 14:50:33 2023 CRL Extensions: chains.sh: #900: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #901: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #902: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #903: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #904: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #905: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #906: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #907: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #908: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #909: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:28 2023 Not After : Wed Oct 18 14:50:28 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:c2:00:6d:40:2d:ef:dd:63:e0:a4:04:19:de:be:a4: 33:cd:7e:f2:c1:a6:a0:fa:23:e7:9d:71:72:5e:0a:58: e9:54:11:b6:9e:bf:d1:25:8a:83:14:26:bf:73:09:ff: bc:3b:28:56:19:34:dd:67:21:fe:a7:8a:81:91:8e:36: 81:eb:b1:0c:bb:7d:1d:15:fd:fd:6b:bb:95:47:0a:16: 36:dd:da:21:fc:bb:66:d7:e9:4e:4e:4e:42:f2:8d:6a: bb:f7:6a:b0:37:75:3c:c6:3a:eb:bc:e0:07:0d:52:1e: 71:f4:40:ef:86:33:2b:0f:9c:ce:29:f7:73:41:96:7a: a6:93:c8:0d:5f:7a:70:a8:ae:a3:9b:84:ce:66:8f:c6: ea:5d:cf:bc:53:2b:d1:2b:3d:cb:5f:58:3f:fc:ee:9e: 40:73:52:17:7b:dd:48:d4:69:53:6c:0c:e4:47:14:0d: 22:37:3f:9d:48:3b:72:14:c1:b4:0d:ed:c5:a4:82:28: 82:67:67:86:2c:18:df:d9:3f:67:79:a5:50:94:f3:ea: f6:df:4d:cf:ca:b8:68:3e:7b:a2:75:e8:d3:af:c3:b3: 01:aa:b7:38:cd:26:4f:64:de:16:ae:09:41:3c:c1:0a: 3f:7e:e8:21:60:ff:c8:38:46:7a:90:b3:29:75:06:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d8:e3:54:eb:b7:cb:cf:11:c2:ac:5c:2d:14:c7:c7:25: e0:be:c1:ed:c0:df:30:07:21:0e:cd:f5:e0:d8:38:c0: 01:84:fa:f4:cf:36:1b:3d:82:75:3f:73:8f:fb:9a:74: c4:8c:e7:e1:df:55:b5:56:fc:36:78:31:93:88:2d:d1: fa:bb:78:70:bb:cc:7f:9e:33:ae:50:2d:c3:6b:75:7c: 79:80:1f:86:25:d4:0e:91:3e:7c:64:3a:64:96:19:18: a2:11:b7:54:4c:d0:cf:a5:61:e3:f8:f6:49:84:78:7c: 45:a8:ac:94:ab:ee:20:55:1a:75:64:c4:6d:23:4b:e4: b7:a6:69:b0:12:24:73:16:d1:08:e4:83:eb:dd:88:c7: 8e:da:f0:5a:a7:8f:5e:a0:e6:a3:db:50:f5:b0:bd:7f: ec:e0:4d:c8:32:4c:91:be:e9:53:b3:d6:cf:03:2c:4a: 13:44:25:dd:b1:2d:1a:a3:a6:a8:ee:47:16:2b:74:90: 20:f2:90:ba:38:76:4b:ef:5b:38:89:32:5e:95:87:2a: f9:1a:c9:5a:75:c9:91:b1:21:5d:09:ab:43:63:5a:8b: 30:42:2c:19:05:c0:24:25:ba:fb:c8:18:cd:b9:de:64: b6:d9:4b:4a:56:03:12:d3:dc:84:c2:ad:47:e6:f8:b1 Fingerprint (SHA-256): D0:3C:19:83:EA:AF:F1:58:13:BE:5A:B9:62:CD:CC:EC:C0:AE:F1:FC:22:A9:8E:ED:00:68:93:AF:F4:50:A8:D5 Fingerprint (SHA1): 07:76:67:64:F3:A2:E7:AA:5B:67:88:87:B3:9E:5D:A7:18:60:27:02 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #910: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #911: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:28 2023 Not After : Wed Oct 18 14:50:28 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:c2:00:6d:40:2d:ef:dd:63:e0:a4:04:19:de:be:a4: 33:cd:7e:f2:c1:a6:a0:fa:23:e7:9d:71:72:5e:0a:58: e9:54:11:b6:9e:bf:d1:25:8a:83:14:26:bf:73:09:ff: bc:3b:28:56:19:34:dd:67:21:fe:a7:8a:81:91:8e:36: 81:eb:b1:0c:bb:7d:1d:15:fd:fd:6b:bb:95:47:0a:16: 36:dd:da:21:fc:bb:66:d7:e9:4e:4e:4e:42:f2:8d:6a: bb:f7:6a:b0:37:75:3c:c6:3a:eb:bc:e0:07:0d:52:1e: 71:f4:40:ef:86:33:2b:0f:9c:ce:29:f7:73:41:96:7a: a6:93:c8:0d:5f:7a:70:a8:ae:a3:9b:84:ce:66:8f:c6: ea:5d:cf:bc:53:2b:d1:2b:3d:cb:5f:58:3f:fc:ee:9e: 40:73:52:17:7b:dd:48:d4:69:53:6c:0c:e4:47:14:0d: 22:37:3f:9d:48:3b:72:14:c1:b4:0d:ed:c5:a4:82:28: 82:67:67:86:2c:18:df:d9:3f:67:79:a5:50:94:f3:ea: f6:df:4d:cf:ca:b8:68:3e:7b:a2:75:e8:d3:af:c3:b3: 01:aa:b7:38:cd:26:4f:64:de:16:ae:09:41:3c:c1:0a: 3f:7e:e8:21:60:ff:c8:38:46:7a:90:b3:29:75:06:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d8:e3:54:eb:b7:cb:cf:11:c2:ac:5c:2d:14:c7:c7:25: e0:be:c1:ed:c0:df:30:07:21:0e:cd:f5:e0:d8:38:c0: 01:84:fa:f4:cf:36:1b:3d:82:75:3f:73:8f:fb:9a:74: c4:8c:e7:e1:df:55:b5:56:fc:36:78:31:93:88:2d:d1: fa:bb:78:70:bb:cc:7f:9e:33:ae:50:2d:c3:6b:75:7c: 79:80:1f:86:25:d4:0e:91:3e:7c:64:3a:64:96:19:18: a2:11:b7:54:4c:d0:cf:a5:61:e3:f8:f6:49:84:78:7c: 45:a8:ac:94:ab:ee:20:55:1a:75:64:c4:6d:23:4b:e4: b7:a6:69:b0:12:24:73:16:d1:08:e4:83:eb:dd:88:c7: 8e:da:f0:5a:a7:8f:5e:a0:e6:a3:db:50:f5:b0:bd:7f: ec:e0:4d:c8:32:4c:91:be:e9:53:b3:d6:cf:03:2c:4a: 13:44:25:dd:b1:2d:1a:a3:a6:a8:ee:47:16:2b:74:90: 20:f2:90:ba:38:76:4b:ef:5b:38:89:32:5e:95:87:2a: f9:1a:c9:5a:75:c9:91:b1:21:5d:09:ab:43:63:5a:8b: 30:42:2c:19:05:c0:24:25:ba:fb:c8:18:cd:b9:de:64: b6:d9:4b:4a:56:03:12:d3:dc:84:c2:ad:47:e6:f8:b1 Fingerprint (SHA-256): D0:3C:19:83:EA:AF:F1:58:13:BE:5A:B9:62:CD:CC:EC:C0:AE:F1:FC:22:A9:8E:ED:00:68:93:AF:F4:50:A8:D5 Fingerprint (SHA1): 07:76:67:64:F3:A2:E7:AA:5B:67:88:87:B3:9E:5D:A7:18:60:27:02 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #912: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #913: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #914: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144994 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #915: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #916: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #917: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #918: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1018144995 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #919: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #920: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #921: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018144870.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #922: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018144854.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #923: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #924: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #925: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018144870.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #926: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1018144996 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #927: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #928: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #929: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018144870.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #930: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018144855.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #931: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #932: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #933: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #934: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1018144997 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #935: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #936: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #937: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018144870.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #938: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018144856.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #939: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #940: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #941: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018144870.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #942: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018144857.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #943: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #944: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018145038Z nextupdate=20241018145038Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 14:50:38 2023 Next Update: Fri Oct 18 14:50:38 2024 CRL Extensions: chains.sh: #945: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018145038Z nextupdate=20241018145038Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:50:38 2023 Next Update: Fri Oct 18 14:50:38 2024 CRL Extensions: chains.sh: #946: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018145038Z nextupdate=20241018145038Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 14:50:38 2023 Next Update: Fri Oct 18 14:50:38 2024 CRL Extensions: chains.sh: #947: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018145038Z nextupdate=20241018145038Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 14:50:38 2023 Next Update: Fri Oct 18 14:50:38 2024 CRL Extensions: chains.sh: #948: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018145039Z addcert 20 20231018145039Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:50:39 2023 Next Update: Fri Oct 18 14:50:38 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 14:50:39 2023 CRL Extensions: chains.sh: #949: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018145040Z addcert 40 20231018145040Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:50:40 2023 Next Update: Fri Oct 18 14:50:38 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 14:50:39 2023 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Wed Oct 18 14:50:40 2023 CRL Extensions: chains.sh: #950: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #951: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #952: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #953: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144994 (0x3cafa8e2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:34 2023 Not After : Wed Oct 18 14:50:34 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:b7:f3:d8:51:f7:a9:08:00:79:17:52:42:cc:97:55: 92:11:8a:35:64:d9:dc:c2:a4:cc:b7:89:e6:af:ea:cb: 36:f0:17:8a:48:15:21:0d:8f:ba:85:55:35:bb:c2:9d: e7:cf:83:5b:46:22:0e:9a:f2:07:39:79:6e:ac:17:53: 89:63:92:d8:e5:6a:4e:a9:56:3c:fd:37:1a:ed:8b:e7: 3d:54:12:14:03:99:a7:48:55:2e:33:43:92:ee:dc:96: 1e:d6:bf:5b:61:a0:88:4f:3e:54:61:7d:c0:1a:c0:fe: 09:30:e0:47:25:48:cd:a4:5e:47:0d:9e:cc:6c:9c:39: ea:ff:6c:1d:19:63:85:9b:2d:a4:0f:4f:2b:ea:b5:b3: 71:f2:04:5b:5e:66:2b:9d:93:da:a5:5a:24:e3:91:f6: e2:c6:4d:98:ea:26:8c:21:af:c6:fd:f2:21:d9:c9:0e: cc:33:5f:7d:58:9d:ea:cc:e2:5b:69:82:9b:81:57:b6: 3c:52:4e:01:0e:25:e2:4f:2b:16:9f:cc:e7:04:87:0a: a6:8a:a5:2b:ca:e6:7e:dd:a2:5c:af:01:09:f3:d4:81: 26:d4:b4:8a:97:2f:8f:d3:ab:01:7e:99:e8:ff:b1:0b: c0:f9:a3:e4:d0:de:4b:be:36:d2:3f:ee:d9:30:0b:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:13:6f:07:35:ef:ac:a4:87:d0:90:4c:dd:43:72:b3: ef:3e:57:f8:2e:e1:af:d6:c0:32:8c:66:5e:03:f6:0e: ea:f7:96:2c:7e:43:59:ac:58:f3:cf:99:ad:d1:27:89: da:50:34:a7:4c:67:a7:ea:7e:4f:33:f3:39:f0:6d:17: 4d:d1:7f:1c:19:4b:70:c7:b0:e6:77:59:a3:c4:e4:b2: 92:f4:dd:ad:bc:2f:04:a3:ce:ca:7e:9e:af:d2:7d:ae: 80:42:c9:17:a6:b8:84:50:1b:00:4b:b4:cf:42:9c:71: 4e:ee:3d:3d:b2:13:eb:96:c7:c8:ce:5b:e3:c5:9b:69: 2c:2c:c3:db:9c:e7:f1:8b:54:6c:8f:2a:79:2c:05:48: f8:f8:89:f2:f1:81:8f:33:54:3f:52:80:14:65:49:e8: 2c:04:f0:86:d3:c1:7a:c8:2d:28:2a:b3:cd:ea:00:58: 30:87:27:a2:f8:13:44:fa:d2:d8:66:20:c3:77:a7:07: 11:6d:eb:74:44:08:d4:51:3f:37:72:8d:24:ae:8d:f1: f6:6a:06:04:2e:66:a1:38:d1:83:18:1e:73:13:1d:6b: c0:11:5a:a4:74:e3:73:e5:57:d4:6e:65:0c:19:5b:2e: 3c:3f:4b:1f:4a:0f:fd:94:24:d2:5d:68:46:9b:5a:e5 Fingerprint (SHA-256): FA:FC:18:5F:68:40:71:7F:7A:A5:AB:C2:17:D8:77:B4:7E:B7:F7:C0:1C:EF:98:FA:5D:D9:B8:EE:EB:BD:39:A6 Fingerprint (SHA1): 18:1C:CB:D1:12:D2:4D:CB:D2:AE:26:F5:45:EC:E8:51:78:75:03:DD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #954: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #955: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144994 (0x3cafa8e2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:34 2023 Not After : Wed Oct 18 14:50:34 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:b7:f3:d8:51:f7:a9:08:00:79:17:52:42:cc:97:55: 92:11:8a:35:64:d9:dc:c2:a4:cc:b7:89:e6:af:ea:cb: 36:f0:17:8a:48:15:21:0d:8f:ba:85:55:35:bb:c2:9d: e7:cf:83:5b:46:22:0e:9a:f2:07:39:79:6e:ac:17:53: 89:63:92:d8:e5:6a:4e:a9:56:3c:fd:37:1a:ed:8b:e7: 3d:54:12:14:03:99:a7:48:55:2e:33:43:92:ee:dc:96: 1e:d6:bf:5b:61:a0:88:4f:3e:54:61:7d:c0:1a:c0:fe: 09:30:e0:47:25:48:cd:a4:5e:47:0d:9e:cc:6c:9c:39: ea:ff:6c:1d:19:63:85:9b:2d:a4:0f:4f:2b:ea:b5:b3: 71:f2:04:5b:5e:66:2b:9d:93:da:a5:5a:24:e3:91:f6: e2:c6:4d:98:ea:26:8c:21:af:c6:fd:f2:21:d9:c9:0e: cc:33:5f:7d:58:9d:ea:cc:e2:5b:69:82:9b:81:57:b6: 3c:52:4e:01:0e:25:e2:4f:2b:16:9f:cc:e7:04:87:0a: a6:8a:a5:2b:ca:e6:7e:dd:a2:5c:af:01:09:f3:d4:81: 26:d4:b4:8a:97:2f:8f:d3:ab:01:7e:99:e8:ff:b1:0b: c0:f9:a3:e4:d0:de:4b:be:36:d2:3f:ee:d9:30:0b:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:13:6f:07:35:ef:ac:a4:87:d0:90:4c:dd:43:72:b3: ef:3e:57:f8:2e:e1:af:d6:c0:32:8c:66:5e:03:f6:0e: ea:f7:96:2c:7e:43:59:ac:58:f3:cf:99:ad:d1:27:89: da:50:34:a7:4c:67:a7:ea:7e:4f:33:f3:39:f0:6d:17: 4d:d1:7f:1c:19:4b:70:c7:b0:e6:77:59:a3:c4:e4:b2: 92:f4:dd:ad:bc:2f:04:a3:ce:ca:7e:9e:af:d2:7d:ae: 80:42:c9:17:a6:b8:84:50:1b:00:4b:b4:cf:42:9c:71: 4e:ee:3d:3d:b2:13:eb:96:c7:c8:ce:5b:e3:c5:9b:69: 2c:2c:c3:db:9c:e7:f1:8b:54:6c:8f:2a:79:2c:05:48: f8:f8:89:f2:f1:81:8f:33:54:3f:52:80:14:65:49:e8: 2c:04:f0:86:d3:c1:7a:c8:2d:28:2a:b3:cd:ea:00:58: 30:87:27:a2:f8:13:44:fa:d2:d8:66:20:c3:77:a7:07: 11:6d:eb:74:44:08:d4:51:3f:37:72:8d:24:ae:8d:f1: f6:6a:06:04:2e:66:a1:38:d1:83:18:1e:73:13:1d:6b: c0:11:5a:a4:74:e3:73:e5:57:d4:6e:65:0c:19:5b:2e: 3c:3f:4b:1f:4a:0f:fd:94:24:d2:5d:68:46:9b:5a:e5 Fingerprint (SHA-256): FA:FC:18:5F:68:40:71:7F:7A:A5:AB:C2:17:D8:77:B4:7E:B7:F7:C0:1C:EF:98:FA:5D:D9:B8:EE:EB:BD:39:A6 Fingerprint (SHA1): 18:1C:CB:D1:12:D2:4D:CB:D2:AE:26:F5:45:EC:E8:51:78:75:03:DD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #956: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #957: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #958: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018144998 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #959: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #960: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #961: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #962: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018144999 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #963: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #964: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #965: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #966: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018145000 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #967: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #968: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #969: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #970: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1018145001 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #971: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #972: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #973: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145002 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #974: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #975: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #976: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #977: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1018145003 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #978: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #979: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #980: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #981: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1018145004 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #982: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #983: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #984: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #985: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #986: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144998 (0x3cafa8e6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:50:40 2023 Not After : Wed Oct 18 14:50:40 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:aa:10:87:31:ce:f6:d8:a0:6b:e0:c9:4b:68:0e:c0: ca:f4:fd:79:2f:04:41:04:ee:e9:15:cc:c3:4c:ee:3f: 72:f1:8b:e2:aa:fa:e7:b6:1f:59:02:25:67:c7:77:4e: 06:e5:52:9e:54:c4:cd:9f:a0:44:63:61:0c:8e:43:34: 61:d2:96:c6:50:b2:d8:e1:9a:3e:59:b9:88:34:e3:df: 36:cd:8f:66:65:46:7b:cd:e9:b6:af:8b:34:37:d5:67: 26:2e:e6:53:ef:f9:a4:32:25:f7:09:b5:f2:b1:44:ff: 65:4d:70:77:e2:4b:be:2a:8c:77:f2:2e:bf:e9:a4:a7: a0:80:cf:02:10:d7:dd:94:1f:68:bd:37:f6:8a:b7:d0: 30:31:57:8a:e8:95:dd:0e:1a:99:2c:2d:f3:d3:e9:03: f3:5f:9f:37:7a:40:2a:bb:c3:8b:75:ca:20:43:2e:9c: 10:ba:44:c2:b4:9f:61:01:50:c3:89:7e:60:0d:e1:99: fd:23:7e:30:e9:2f:b3:98:29:5a:1e:d7:2f:9c:d1:cd: 84:f2:cc:44:ab:8b:b1:5a:37:29:f8:7b:16:d2:45:c7: 50:ac:33:c9:1f:be:eb:75:c2:2f:42:91:e6:24:4d:9f: 6c:c8:60:7e:1d:8a:25:89:b8:38:94:85:3b:bf:5b:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:48:82:c6:c6:f3:c4:0c:0f:78:77:9f:3d:cf:23:c0: bb:8c:be:c6:cc:76:0e:1a:9b:54:09:cd:d3:75:72:a9: b5:26:57:06:0f:83:48:70:a0:2b:e9:46:21:f1:42:22: 15:e6:e0:1f:b5:e6:da:b7:75:02:5f:10:d8:b2:30:43: df:66:36:99:ae:36:46:2f:c9:13:74:a3:f7:69:c0:bd: a4:cb:81:74:5d:15:4a:b7:ae:06:80:ba:3d:0f:e6:6b: 48:34:b0:34:3a:4f:c4:4c:25:12:af:02:69:02:03:60: b5:c7:f6:66:43:39:2d:5c:33:d1:90:5b:8d:0f:91:a4: 9a:9f:80:e0:93:af:73:66:3a:cd:14:8d:ed:0d:40:bb: 52:b0:25:30:27:23:23:07:10:f5:88:da:25:85:89:f6: 0e:6b:5a:19:db:9a:eb:5c:69:ed:81:ca:33:e9:cb:72: ca:2d:94:79:f4:d0:83:63:72:c8:1b:1c:14:1f:87:a6: 10:c8:1b:c8:6e:85:a3:53:88:3c:67:90:56:25:3c:9b: d4:f9:9f:91:6b:44:b9:f1:80:c6:53:74:e0:33:b7:83: 65:cc:72:72:e0:de:4b:d2:fb:59:c8:07:97:44:73:64: f2:7d:63:e8:f3:e9:5e:b1:fd:f3:a9:7d:89:92:b6:38 Fingerprint (SHA-256): 1E:20:63:81:66:49:88:78:DB:50:55:0C:7A:EA:B8:28:94:09:6E:56:46:8F:DC:5B:CC:13:DD:46:CE:22:F1:A8 Fingerprint (SHA1): A5:EF:C2:F9:98:56:D5:E1:E5:DA:A7:19:56:76:95:FA:1C:66:C5:69 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #987: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145000 (0x3cafa8e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:50:41 2023 Not After : Wed Oct 18 14:50:41 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 93:01:bf:a2:85:1d:b6:28:66:0e:60:7a:58:42:b0:0d: a4:68:7f:3f:91:75:01:bb:7c:93:23:89:61:37:2c:c0: 40:65:f5:06:31:58:f9:04:1e:10:12:e6:31:d9:1d:fb: 28:17:30:65:d6:84:6b:f0:66:ca:71:d3:53:dc:e0:f3: 62:bd:87:2c:ab:7f:1e:df:71:49:09:72:7b:f7:a1:6a: ff:b3:40:da:c1:91:5e:7f:48:e8:1e:76:ed:30:25:e6: 84:4e:ec:b8:ef:68:34:cd:da:2b:69:ce:c7:5d:dc:07: 00:9b:36:fb:98:ac:76:4a:17:b6:7d:4f:6f:47:56:07: cd:48:8f:c6:7f:f7:bd:5e:c1:6c:b9:d2:78:f4:d4:f3: 59:ea:f8:2e:1f:dd:f5:4a:bc:55:01:d0:6d:7b:a8:b7: 28:b4:86:e8:70:3e:be:82:8e:24:e7:e4:4b:48:ae:65: bd:ed:c5:83:d2:c2:d9:13:5e:71:10:cc:23:0c:f2:b1: 3f:4d:d1:98:92:80:d1:7e:c9:36:06:19:77:a1:43:ad: 9e:18:17:6c:ae:bc:ed:e4:94:a0:13:21:15:66:aa:de: 28:74:b0:e9:62:e9:89:cc:cd:aa:08:cb:d8:d8:b5:6c: c3:9a:7b:db:94:8a:1c:e4:88:bd:5c:3a:1f:e9:f9:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:f9:6f:40:48:ce:c6:51:b3:7b:80:b0:48:65:54:16: c2:b0:00:b3:f3:15:3e:0e:39:05:27:77:ee:17:b6:91: a5:26:3c:4a:75:f0:c1:fe:a3:26:9d:57:88:c8:96:6d: 72:fd:d8:21:d1:ff:7f:e0:97:6b:f5:16:d3:a7:88:dc: 24:24:e2:e9:85:65:7e:f9:49:89:50:77:63:0f:73:69: 0a:75:0d:ae:40:fa:7d:51:bd:f8:48:2a:7f:ac:5c:d4: e2:51:71:b9:07:02:f1:f3:e2:66:46:23:74:9e:6c:dd: 3a:75:52:d5:c5:c2:00:16:75:f4:fb:87:bc:23:b8:77: 5b:47:db:a8:ad:5e:f5:20:13:b3:ba:63:17:27:cc:53: 89:1d:5b:d7:93:02:fc:03:0a:5a:45:8f:6a:0e:a0:c7: 6d:d1:e7:2d:4e:16:f7:28:c0:fd:b0:e0:c4:0a:b9:34: 18:04:fd:52:4e:02:0b:87:88:52:e3:0c:c7:28:20:35: 5f:d5:36:50:8c:f0:cd:da:82:6e:d2:f8:09:29:1f:ec: 10:ed:2e:63:12:0f:65:21:cd:1d:0f:4f:17:b2:5d:f7: 8b:5b:9b:9e:3b:ee:bc:ac:0e:44:c7:d1:d4:98:0c:bb: 8d:4a:2c:7b:dc:eb:7b:bf:78:a0:9b:91:bd:34:5f:05 Fingerprint (SHA-256): D3:A3:49:92:58:6E:AA:C0:CE:CA:0B:73:B0:EA:4A:6B:02:DB:4F:B3:E8:29:F0:A0:FA:91:F4:4B:92:07:14:70 Fingerprint (SHA1): C2:E2:A9:33:35:F6:19:A1:E2:3E:7F:49:06:AB:D0:3C:A1:F5:AE:AF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #988: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144998 (0x3cafa8e6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:50:40 2023 Not After : Wed Oct 18 14:50:40 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:aa:10:87:31:ce:f6:d8:a0:6b:e0:c9:4b:68:0e:c0: ca:f4:fd:79:2f:04:41:04:ee:e9:15:cc:c3:4c:ee:3f: 72:f1:8b:e2:aa:fa:e7:b6:1f:59:02:25:67:c7:77:4e: 06:e5:52:9e:54:c4:cd:9f:a0:44:63:61:0c:8e:43:34: 61:d2:96:c6:50:b2:d8:e1:9a:3e:59:b9:88:34:e3:df: 36:cd:8f:66:65:46:7b:cd:e9:b6:af:8b:34:37:d5:67: 26:2e:e6:53:ef:f9:a4:32:25:f7:09:b5:f2:b1:44:ff: 65:4d:70:77:e2:4b:be:2a:8c:77:f2:2e:bf:e9:a4:a7: a0:80:cf:02:10:d7:dd:94:1f:68:bd:37:f6:8a:b7:d0: 30:31:57:8a:e8:95:dd:0e:1a:99:2c:2d:f3:d3:e9:03: f3:5f:9f:37:7a:40:2a:bb:c3:8b:75:ca:20:43:2e:9c: 10:ba:44:c2:b4:9f:61:01:50:c3:89:7e:60:0d:e1:99: fd:23:7e:30:e9:2f:b3:98:29:5a:1e:d7:2f:9c:d1:cd: 84:f2:cc:44:ab:8b:b1:5a:37:29:f8:7b:16:d2:45:c7: 50:ac:33:c9:1f:be:eb:75:c2:2f:42:91:e6:24:4d:9f: 6c:c8:60:7e:1d:8a:25:89:b8:38:94:85:3b:bf:5b:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:48:82:c6:c6:f3:c4:0c:0f:78:77:9f:3d:cf:23:c0: bb:8c:be:c6:cc:76:0e:1a:9b:54:09:cd:d3:75:72:a9: b5:26:57:06:0f:83:48:70:a0:2b:e9:46:21:f1:42:22: 15:e6:e0:1f:b5:e6:da:b7:75:02:5f:10:d8:b2:30:43: df:66:36:99:ae:36:46:2f:c9:13:74:a3:f7:69:c0:bd: a4:cb:81:74:5d:15:4a:b7:ae:06:80:ba:3d:0f:e6:6b: 48:34:b0:34:3a:4f:c4:4c:25:12:af:02:69:02:03:60: b5:c7:f6:66:43:39:2d:5c:33:d1:90:5b:8d:0f:91:a4: 9a:9f:80:e0:93:af:73:66:3a:cd:14:8d:ed:0d:40:bb: 52:b0:25:30:27:23:23:07:10:f5:88:da:25:85:89:f6: 0e:6b:5a:19:db:9a:eb:5c:69:ed:81:ca:33:e9:cb:72: ca:2d:94:79:f4:d0:83:63:72:c8:1b:1c:14:1f:87:a6: 10:c8:1b:c8:6e:85:a3:53:88:3c:67:90:56:25:3c:9b: d4:f9:9f:91:6b:44:b9:f1:80:c6:53:74:e0:33:b7:83: 65:cc:72:72:e0:de:4b:d2:fb:59:c8:07:97:44:73:64: f2:7d:63:e8:f3:e9:5e:b1:fd:f3:a9:7d:89:92:b6:38 Fingerprint (SHA-256): 1E:20:63:81:66:49:88:78:DB:50:55:0C:7A:EA:B8:28:94:09:6E:56:46:8F:DC:5B:CC:13:DD:46:CE:22:F1:A8 Fingerprint (SHA1): A5:EF:C2:F9:98:56:D5:E1:E5:DA:A7:19:56:76:95:FA:1C:66:C5:69 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #989: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #990: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144998 (0x3cafa8e6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:50:40 2023 Not After : Wed Oct 18 14:50:40 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:aa:10:87:31:ce:f6:d8:a0:6b:e0:c9:4b:68:0e:c0: ca:f4:fd:79:2f:04:41:04:ee:e9:15:cc:c3:4c:ee:3f: 72:f1:8b:e2:aa:fa:e7:b6:1f:59:02:25:67:c7:77:4e: 06:e5:52:9e:54:c4:cd:9f:a0:44:63:61:0c:8e:43:34: 61:d2:96:c6:50:b2:d8:e1:9a:3e:59:b9:88:34:e3:df: 36:cd:8f:66:65:46:7b:cd:e9:b6:af:8b:34:37:d5:67: 26:2e:e6:53:ef:f9:a4:32:25:f7:09:b5:f2:b1:44:ff: 65:4d:70:77:e2:4b:be:2a:8c:77:f2:2e:bf:e9:a4:a7: a0:80:cf:02:10:d7:dd:94:1f:68:bd:37:f6:8a:b7:d0: 30:31:57:8a:e8:95:dd:0e:1a:99:2c:2d:f3:d3:e9:03: f3:5f:9f:37:7a:40:2a:bb:c3:8b:75:ca:20:43:2e:9c: 10:ba:44:c2:b4:9f:61:01:50:c3:89:7e:60:0d:e1:99: fd:23:7e:30:e9:2f:b3:98:29:5a:1e:d7:2f:9c:d1:cd: 84:f2:cc:44:ab:8b:b1:5a:37:29:f8:7b:16:d2:45:c7: 50:ac:33:c9:1f:be:eb:75:c2:2f:42:91:e6:24:4d:9f: 6c:c8:60:7e:1d:8a:25:89:b8:38:94:85:3b:bf:5b:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:48:82:c6:c6:f3:c4:0c:0f:78:77:9f:3d:cf:23:c0: bb:8c:be:c6:cc:76:0e:1a:9b:54:09:cd:d3:75:72:a9: b5:26:57:06:0f:83:48:70:a0:2b:e9:46:21:f1:42:22: 15:e6:e0:1f:b5:e6:da:b7:75:02:5f:10:d8:b2:30:43: df:66:36:99:ae:36:46:2f:c9:13:74:a3:f7:69:c0:bd: a4:cb:81:74:5d:15:4a:b7:ae:06:80:ba:3d:0f:e6:6b: 48:34:b0:34:3a:4f:c4:4c:25:12:af:02:69:02:03:60: b5:c7:f6:66:43:39:2d:5c:33:d1:90:5b:8d:0f:91:a4: 9a:9f:80:e0:93:af:73:66:3a:cd:14:8d:ed:0d:40:bb: 52:b0:25:30:27:23:23:07:10:f5:88:da:25:85:89:f6: 0e:6b:5a:19:db:9a:eb:5c:69:ed:81:ca:33:e9:cb:72: ca:2d:94:79:f4:d0:83:63:72:c8:1b:1c:14:1f:87:a6: 10:c8:1b:c8:6e:85:a3:53:88:3c:67:90:56:25:3c:9b: d4:f9:9f:91:6b:44:b9:f1:80:c6:53:74:e0:33:b7:83: 65:cc:72:72:e0:de:4b:d2:fb:59:c8:07:97:44:73:64: f2:7d:63:e8:f3:e9:5e:b1:fd:f3:a9:7d:89:92:b6:38 Fingerprint (SHA-256): 1E:20:63:81:66:49:88:78:DB:50:55:0C:7A:EA:B8:28:94:09:6E:56:46:8F:DC:5B:CC:13:DD:46:CE:22:F1:A8 Fingerprint (SHA1): A5:EF:C2:F9:98:56:D5:E1:E5:DA:A7:19:56:76:95:FA:1C:66:C5:69 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #991: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145000 (0x3cafa8e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:50:41 2023 Not After : Wed Oct 18 14:50:41 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 93:01:bf:a2:85:1d:b6:28:66:0e:60:7a:58:42:b0:0d: a4:68:7f:3f:91:75:01:bb:7c:93:23:89:61:37:2c:c0: 40:65:f5:06:31:58:f9:04:1e:10:12:e6:31:d9:1d:fb: 28:17:30:65:d6:84:6b:f0:66:ca:71:d3:53:dc:e0:f3: 62:bd:87:2c:ab:7f:1e:df:71:49:09:72:7b:f7:a1:6a: ff:b3:40:da:c1:91:5e:7f:48:e8:1e:76:ed:30:25:e6: 84:4e:ec:b8:ef:68:34:cd:da:2b:69:ce:c7:5d:dc:07: 00:9b:36:fb:98:ac:76:4a:17:b6:7d:4f:6f:47:56:07: cd:48:8f:c6:7f:f7:bd:5e:c1:6c:b9:d2:78:f4:d4:f3: 59:ea:f8:2e:1f:dd:f5:4a:bc:55:01:d0:6d:7b:a8:b7: 28:b4:86:e8:70:3e:be:82:8e:24:e7:e4:4b:48:ae:65: bd:ed:c5:83:d2:c2:d9:13:5e:71:10:cc:23:0c:f2:b1: 3f:4d:d1:98:92:80:d1:7e:c9:36:06:19:77:a1:43:ad: 9e:18:17:6c:ae:bc:ed:e4:94:a0:13:21:15:66:aa:de: 28:74:b0:e9:62:e9:89:cc:cd:aa:08:cb:d8:d8:b5:6c: c3:9a:7b:db:94:8a:1c:e4:88:bd:5c:3a:1f:e9:f9:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:f9:6f:40:48:ce:c6:51:b3:7b:80:b0:48:65:54:16: c2:b0:00:b3:f3:15:3e:0e:39:05:27:77:ee:17:b6:91: a5:26:3c:4a:75:f0:c1:fe:a3:26:9d:57:88:c8:96:6d: 72:fd:d8:21:d1:ff:7f:e0:97:6b:f5:16:d3:a7:88:dc: 24:24:e2:e9:85:65:7e:f9:49:89:50:77:63:0f:73:69: 0a:75:0d:ae:40:fa:7d:51:bd:f8:48:2a:7f:ac:5c:d4: e2:51:71:b9:07:02:f1:f3:e2:66:46:23:74:9e:6c:dd: 3a:75:52:d5:c5:c2:00:16:75:f4:fb:87:bc:23:b8:77: 5b:47:db:a8:ad:5e:f5:20:13:b3:ba:63:17:27:cc:53: 89:1d:5b:d7:93:02:fc:03:0a:5a:45:8f:6a:0e:a0:c7: 6d:d1:e7:2d:4e:16:f7:28:c0:fd:b0:e0:c4:0a:b9:34: 18:04:fd:52:4e:02:0b:87:88:52:e3:0c:c7:28:20:35: 5f:d5:36:50:8c:f0:cd:da:82:6e:d2:f8:09:29:1f:ec: 10:ed:2e:63:12:0f:65:21:cd:1d:0f:4f:17:b2:5d:f7: 8b:5b:9b:9e:3b:ee:bc:ac:0e:44:c7:d1:d4:98:0c:bb: 8d:4a:2c:7b:dc:eb:7b:bf:78:a0:9b:91:bd:34:5f:05 Fingerprint (SHA-256): D3:A3:49:92:58:6E:AA:C0:CE:CA:0B:73:B0:EA:4A:6B:02:DB:4F:B3:E8:29:F0:A0:FA:91:F4:4B:92:07:14:70 Fingerprint (SHA1): C2:E2:A9:33:35:F6:19:A1:E2:3E:7F:49:06:AB:D0:3C:A1:F5:AE:AF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #992: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #993: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #994: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #995: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144998 (0x3cafa8e6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:50:40 2023 Not After : Wed Oct 18 14:50:40 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:aa:10:87:31:ce:f6:d8:a0:6b:e0:c9:4b:68:0e:c0: ca:f4:fd:79:2f:04:41:04:ee:e9:15:cc:c3:4c:ee:3f: 72:f1:8b:e2:aa:fa:e7:b6:1f:59:02:25:67:c7:77:4e: 06:e5:52:9e:54:c4:cd:9f:a0:44:63:61:0c:8e:43:34: 61:d2:96:c6:50:b2:d8:e1:9a:3e:59:b9:88:34:e3:df: 36:cd:8f:66:65:46:7b:cd:e9:b6:af:8b:34:37:d5:67: 26:2e:e6:53:ef:f9:a4:32:25:f7:09:b5:f2:b1:44:ff: 65:4d:70:77:e2:4b:be:2a:8c:77:f2:2e:bf:e9:a4:a7: a0:80:cf:02:10:d7:dd:94:1f:68:bd:37:f6:8a:b7:d0: 30:31:57:8a:e8:95:dd:0e:1a:99:2c:2d:f3:d3:e9:03: f3:5f:9f:37:7a:40:2a:bb:c3:8b:75:ca:20:43:2e:9c: 10:ba:44:c2:b4:9f:61:01:50:c3:89:7e:60:0d:e1:99: fd:23:7e:30:e9:2f:b3:98:29:5a:1e:d7:2f:9c:d1:cd: 84:f2:cc:44:ab:8b:b1:5a:37:29:f8:7b:16:d2:45:c7: 50:ac:33:c9:1f:be:eb:75:c2:2f:42:91:e6:24:4d:9f: 6c:c8:60:7e:1d:8a:25:89:b8:38:94:85:3b:bf:5b:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:48:82:c6:c6:f3:c4:0c:0f:78:77:9f:3d:cf:23:c0: bb:8c:be:c6:cc:76:0e:1a:9b:54:09:cd:d3:75:72:a9: b5:26:57:06:0f:83:48:70:a0:2b:e9:46:21:f1:42:22: 15:e6:e0:1f:b5:e6:da:b7:75:02:5f:10:d8:b2:30:43: df:66:36:99:ae:36:46:2f:c9:13:74:a3:f7:69:c0:bd: a4:cb:81:74:5d:15:4a:b7:ae:06:80:ba:3d:0f:e6:6b: 48:34:b0:34:3a:4f:c4:4c:25:12:af:02:69:02:03:60: b5:c7:f6:66:43:39:2d:5c:33:d1:90:5b:8d:0f:91:a4: 9a:9f:80:e0:93:af:73:66:3a:cd:14:8d:ed:0d:40:bb: 52:b0:25:30:27:23:23:07:10:f5:88:da:25:85:89:f6: 0e:6b:5a:19:db:9a:eb:5c:69:ed:81:ca:33:e9:cb:72: ca:2d:94:79:f4:d0:83:63:72:c8:1b:1c:14:1f:87:a6: 10:c8:1b:c8:6e:85:a3:53:88:3c:67:90:56:25:3c:9b: d4:f9:9f:91:6b:44:b9:f1:80:c6:53:74:e0:33:b7:83: 65:cc:72:72:e0:de:4b:d2:fb:59:c8:07:97:44:73:64: f2:7d:63:e8:f3:e9:5e:b1:fd:f3:a9:7d:89:92:b6:38 Fingerprint (SHA-256): 1E:20:63:81:66:49:88:78:DB:50:55:0C:7A:EA:B8:28:94:09:6E:56:46:8F:DC:5B:CC:13:DD:46:CE:22:F1:A8 Fingerprint (SHA1): A5:EF:C2:F9:98:56:D5:E1:E5:DA:A7:19:56:76:95:FA:1C:66:C5:69 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #996: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145002 (0x3cafa8ea) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 14:50:42 2023 Not After : Wed Oct 18 14:50:42 2073 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:6e:a4:d5:e3:7e:6d:7d:a1:0e:4a:6c:7e:4d:de:c1: 1f:93:dc:35:74:8b:e9:d6:a7:af:c0:0f:6f:19:f2:e0: 97:4b:37:27:f9:11:dd:f3:bd:d7:7b:07:6e:0a:e9:c8: b1:2d:9c:14:6c:a1:01:56:6e:0a:55:27:36:ad:79:ee: ca:d9:92:a3:9f:4a:86:8b:bf:3a:0a:a0:6a:14:1a:a7: bd:c4:e3:f0:30:2c:a3:ab:d6:9b:55:9f:38:e6:ca:31: e3:a1:81:62:76:fb:bc:8f:92:06:13:bc:f0:a8:d9:3f: de:ab:35:40:f8:d1:d1:71:73:71:32:e2:79:4f:77:f3: 36:17:7e:32:b7:aa:c0:95:b4:8e:72:97:53:ce:db:bf: 0f:60:09:e0:d5:ee:82:29:80:22:0d:13:2f:68:20:e9: 00:b0:e3:20:e5:3f:70:ee:58:7c:73:87:29:32:2c:e6: f1:4e:dd:ff:16:99:6e:30:11:d6:15:7f:c5:e6:59:5b: 06:69:4e:41:f2:6d:48:60:d8:4d:ca:2a:b5:4d:38:26: 0e:da:dd:a4:c4:4e:30:2d:71:cb:12:c2:61:46:ed:ec: 78:43:1c:2d:f5:04:e7:83:95:76:9d:99:06:d7:ff:e6: 2f:06:0f:d4:8c:1a:58:4a:aa:09:c8:c3:da:81:a3:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 43:61:22:47:d3:ce:30:74:05:a7:9d:3b:90:04:79:5e: be:19:95:51:e3:03:12:b3:44:76:0f:b9:02:c2:7e:ed: c1:c2:10:69:36:be:4c:b6:cd:30:3c:09:30:77:96:27: 8f:ae:ad:28:05:85:f3:40:4a:9d:f2:2f:4e:3b:c8:e1: 70:36:60:bd:d4:74:dd:a2:11:ac:87:32:8a:2e:b8:2b: 1e:9b:e2:75:d0:84:55:8f:4b:93:04:79:8e:6b:83:57: f4:3d:bc:48:46:58:9b:be:49:30:87:f3:7e:4c:de:85: 2a:29:fe:ec:bb:5f:92:6a:04:77:d7:62:39:82:a3:4c: 51:22:23:7c:c7:59:cc:ec:47:ce:b3:f1:6a:72:db:3b: 04:f2:2d:1b:4d:f8:2b:01:70:81:4f:02:29:95:06:7f: 24:17:6e:d9:7a:39:ac:6d:57:34:3a:35:d7:eb:e0:48: 11:ef:b7:cc:47:97:92:e9:1e:1c:1f:a3:2e:5a:2b:0f: 55:f3:17:36:79:dc:99:9e:eb:01:2c:9b:d5:4d:51:fd: 48:53:28:4d:ee:21:b6:31:78:c2:64:c7:fe:fa:26:4b: 60:8b:f4:1d:74:25:c6:54:30:8f:c5:ee:f0:58:69:73: 13:29:62:ab:26:07:73:ca:29:4e:5e:0e:25:2b:09:45 Fingerprint (SHA-256): B4:00:55:56:BD:F5:C0:6C:5F:CA:32:BE:D7:2A:7A:B3:8F:95:B0:BA:DD:20:55:9B:61:E8:3F:F4:84:11:7F:A6 Fingerprint (SHA1): E8:9C:2A:9A:01:49:D2:C4:01:AE:99:4F:73:64:7D:E0:4A:87:D5:8A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #997: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018144998 (0x3cafa8e6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:50:40 2023 Not After : Wed Oct 18 14:50:40 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:aa:10:87:31:ce:f6:d8:a0:6b:e0:c9:4b:68:0e:c0: ca:f4:fd:79:2f:04:41:04:ee:e9:15:cc:c3:4c:ee:3f: 72:f1:8b:e2:aa:fa:e7:b6:1f:59:02:25:67:c7:77:4e: 06:e5:52:9e:54:c4:cd:9f:a0:44:63:61:0c:8e:43:34: 61:d2:96:c6:50:b2:d8:e1:9a:3e:59:b9:88:34:e3:df: 36:cd:8f:66:65:46:7b:cd:e9:b6:af:8b:34:37:d5:67: 26:2e:e6:53:ef:f9:a4:32:25:f7:09:b5:f2:b1:44:ff: 65:4d:70:77:e2:4b:be:2a:8c:77:f2:2e:bf:e9:a4:a7: a0:80:cf:02:10:d7:dd:94:1f:68:bd:37:f6:8a:b7:d0: 30:31:57:8a:e8:95:dd:0e:1a:99:2c:2d:f3:d3:e9:03: f3:5f:9f:37:7a:40:2a:bb:c3:8b:75:ca:20:43:2e:9c: 10:ba:44:c2:b4:9f:61:01:50:c3:89:7e:60:0d:e1:99: fd:23:7e:30:e9:2f:b3:98:29:5a:1e:d7:2f:9c:d1:cd: 84:f2:cc:44:ab:8b:b1:5a:37:29:f8:7b:16:d2:45:c7: 50:ac:33:c9:1f:be:eb:75:c2:2f:42:91:e6:24:4d:9f: 6c:c8:60:7e:1d:8a:25:89:b8:38:94:85:3b:bf:5b:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 96:48:82:c6:c6:f3:c4:0c:0f:78:77:9f:3d:cf:23:c0: bb:8c:be:c6:cc:76:0e:1a:9b:54:09:cd:d3:75:72:a9: b5:26:57:06:0f:83:48:70:a0:2b:e9:46:21:f1:42:22: 15:e6:e0:1f:b5:e6:da:b7:75:02:5f:10:d8:b2:30:43: df:66:36:99:ae:36:46:2f:c9:13:74:a3:f7:69:c0:bd: a4:cb:81:74:5d:15:4a:b7:ae:06:80:ba:3d:0f:e6:6b: 48:34:b0:34:3a:4f:c4:4c:25:12:af:02:69:02:03:60: b5:c7:f6:66:43:39:2d:5c:33:d1:90:5b:8d:0f:91:a4: 9a:9f:80:e0:93:af:73:66:3a:cd:14:8d:ed:0d:40:bb: 52:b0:25:30:27:23:23:07:10:f5:88:da:25:85:89:f6: 0e:6b:5a:19:db:9a:eb:5c:69:ed:81:ca:33:e9:cb:72: ca:2d:94:79:f4:d0:83:63:72:c8:1b:1c:14:1f:87:a6: 10:c8:1b:c8:6e:85:a3:53:88:3c:67:90:56:25:3c:9b: d4:f9:9f:91:6b:44:b9:f1:80:c6:53:74:e0:33:b7:83: 65:cc:72:72:e0:de:4b:d2:fb:59:c8:07:97:44:73:64: f2:7d:63:e8:f3:e9:5e:b1:fd:f3:a9:7d:89:92:b6:38 Fingerprint (SHA-256): 1E:20:63:81:66:49:88:78:DB:50:55:0C:7A:EA:B8:28:94:09:6E:56:46:8F:DC:5B:CC:13:DD:46:CE:22:F1:A8 Fingerprint (SHA1): A5:EF:C2:F9:98:56:D5:E1:E5:DA:A7:19:56:76:95:FA:1C:66:C5:69 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #998: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #999: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1000: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1001: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1002: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1003: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145003 (0x3cafa8eb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 14:50:42 2023 Not After : Wed Oct 18 14:50:42 2028 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:c2:63:89:69:1d:e2:23:08:69:68:2d:f1:93:34:f0: e0:73:63:ee:42:ae:8c:17:67:74:ae:1f:e6:c6:00:f2: 82:cd:54:ed:3c:b0:5e:be:ba:04:0c:b4:84:61:a7:9b: 9a:23:40:e5:df:32:e9:93:b2:46:ad:ad:c9:56:44:b7: 58:5b:56:fc:fe:1b:4c:9d:28:ab:eb:80:35:ac:a7:28: b3:2b:13:7d:5d:c5:ea:43:ba:2c:6f:a4:bb:1d:f9:29: b0:5a:47:39:1e:ae:29:16:83:e5:af:8d:a5:0c:63:22: 08:62:d5:9c:43:df:4e:cc:b5:0c:8b:4f:fd:4b:8e:79: 5d:fd:6d:7e:7b:85:43:61:ad:d9:bc:46:65:61:96:02: 6d:84:40:ac:35:d3:ab:69:51:e4:4b:ef:27:0a:3c:4d: 0d:94:89:f9:d7:3f:23:6a:0c:a1:7c:a5:9a:91:8a:02: b0:b1:15:9d:13:51:27:25:48:76:f9:53:95:f4:0d:dc: 35:8a:7c:33:3f:17:27:88:94:a5:ca:c7:32:92:a8:cc: 99:bd:29:e3:e4:f4:68:33:4f:50:77:79:12:3e:31:f6: 7a:fc:7c:9e:b1:93:f6:28:ec:50:9a:a0:d6:26:3c:9a: 83:96:45:61:c2:96:a2:0b:e2:3b:16:e5:ea:5e:93:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:fb:f6:8f:ae:32:48:d7:e7:2f:56:dc:ec:7a:37:66: 6f:88:4c:01:7d:d0:36:2e:d3:52:36:5a:1c:a2:a4:69: d2:27:95:b5:b0:77:2e:43:4f:86:b9:e4:07:ad:d3:2c: a2:64:e8:50:25:b8:06:3c:86:61:d7:d9:99:11:e8:ca: 7f:d7:8a:2e:00:34:c6:e5:00:3b:24:ec:58:34:6c:2d: 12:55:e4:5f:6c:5a:20:f1:1e:3b:27:2a:f7:2b:4e:a2: 7b:d1:cc:ce:ce:57:cb:fc:5d:7d:23:ba:9a:10:f8:ea: 1c:0f:8a:0e:c3:7c:89:ac:e4:f0:bf:92:26:0a:60:b9: af:34:85:be:dd:fe:58:d2:46:5d:d7:18:58:3d:9f:0e: c0:67:55:3d:d7:97:fe:5c:54:62:b7:b1:fe:ac:6e:1b: ee:5a:50:b3:65:d4:ee:0f:da:89:29:4a:28:2c:25:95: f9:ef:84:44:02:72:03:50:04:d3:5b:d5:d7:b6:b6:30: df:21:a7:3c:93:7b:4b:f1:e6:70:1e:31:5a:8e:6d:16: 53:81:43:40:2c:3d:86:21:79:50:d3:f7:61:b6:9c:b6: 95:a8:c2:a1:84:32:cb:46:ef:6b:9e:d5:b7:1c:55:0f: 62:07:86:08:d6:97:ef:4d:0e:c3:9e:17:6d:d5:06:a7 Fingerprint (SHA-256): C0:BC:4C:6D:D7:77:01:45:55:77:4B:C7:65:FB:83:39:E7:53:B3:DB:87:15:D9:42:09:6E:F4:13:D1:63:4B:82 Fingerprint (SHA1): 6A:43:3D:05:38:47:35:69:80:CF:DB:74:B3:97:A0:42:B8:DE:75:92 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1004: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1005: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1006: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1007: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1008: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1009: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1010: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1011: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1012: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1013: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1014: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1015: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1016: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1017: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1018: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bar.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1019: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=site.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1020: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=Honest Achmed,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1021: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=OtherOrg,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1022: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1023: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=testfoo.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1024: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test3.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1025: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1026: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1027: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1028: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1029: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 520 at Wed Oct 18 14:50:45 UTC 2023 kill -USR1 520 httpserv: normal termination httpserv -b -p 10007 2>/dev/null; httpserv with PID 520 killed at Wed Oct 18 14:50:45 UTC 2023 httpserv starting at Wed Oct 18 14:50:45 UTC 2023 httpserv -D -p 10007 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/aiahttp/http_pid.17687 & trying to connect to httpserv at Wed Oct 18 14:50:45 UTC 2023 tstclnt -4 -p 10007 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:10007 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 12895 >/dev/null 2>/dev/null httpserv with PID 12895 found at Wed Oct 18 14:50:45 UTC 2023 httpserv with PID 12895 started at Wed Oct 18 14:50:45 UTC 2023 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1030: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1031: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145005 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1032: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1033: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1034: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145006 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1035: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1036: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1037: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1038: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018145007 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1039: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1040: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018145008 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1041: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1042: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1043: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1044: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1045: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1018145009 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1046: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1047: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1048: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1049: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1050: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145006 (0x3cafa8ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:50:46 2023 Not After : Wed Oct 18 14:50:46 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:f9:7f:fe:53:02:32:7c:89:b6:db:af:77:5e:66:45: fe:63:d8:6a:46:4a:43:57:4e:da:04:8a:fb:e5:b1:a5: de:03:74:8f:29:36:7e:6b:97:5b:22:3b:bf:e5:f1:49: d2:6a:be:20:5c:de:46:8f:3f:45:e3:8e:ad:ce:37:68: 2e:9a:3d:07:0c:b9:74:9a:83:15:0e:31:c2:4b:10:e0: c7:98:1c:7a:d5:e5:da:91:38:db:ed:e7:43:da:e3:5c: fa:dd:f7:90:67:98:d5:7d:03:42:b4:c2:95:0f:40:3c: aa:96:4b:46:e0:94:8e:93:2d:f3:17:b8:bf:76:fa:0a: 81:f3:ea:b7:d1:fd:cd:eb:71:a3:31:29:57:22:77:01: b9:d2:b7:8d:a2:07:3d:c5:5d:49:c0:f4:d2:84:03:48: 49:bb:0a:11:03:b4:c2:8f:18:52:22:39:2b:37:79:35: 17:2b:67:cd:ba:76:63:4e:c1:96:04:03:70:6f:5e:58: 1a:17:d0:fe:1b:bb:52:83:e9:f8:e3:4d:af:49:4b:8a: 03:25:88:8b:58:7f:af:37:5a:6d:4c:44:bd:1d:b6:65: 69:be:da:7f:a3:74:73:bf:10:d4:c6:c4:04:2e:6c:e1: 6b:d8:eb:c8:59:28:30:6d:28:82:4b:bd:5c:81:ab:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:d8:f5:ab:f4:81:2d:8e:d2:d5:8e:4b:90:e3:e2:7d: b0:d2:c4:d7:21:f3:2e:bb:5f:7a:2c:fa:1e:85:ab:84: c2:ee:7d:73:ed:25:92:72:fd:cb:c7:05:bf:c1:6a:04: a3:72:4b:bc:5a:f0:1e:3d:d9:36:1b:8e:54:07:a9:e1: 7b:c3:65:9b:2a:4a:5e:50:9c:1e:7b:18:3c:4a:84:81: b9:65:1d:a2:f4:82:81:d8:41:c7:c7:46:69:17:af:48: d0:3a:19:73:b4:c4:ed:7c:5a:03:3f:61:f0:94:d1:8e: db:38:44:1c:06:42:a6:95:29:18:c3:ab:d7:bb:4d:cb: 55:4c:35:4b:20:35:97:47:f0:d8:8a:63:1e:2b:26:02: d9:84:87:37:99:cb:a8:4c:74:8d:fd:5e:6e:a0:02:7a: 78:14:77:db:9c:60:a1:fe:51:1c:82:d7:bf:46:fa:4c: 28:2a:5a:85:09:fd:f1:79:16:57:60:ca:b5:72:54:56: fa:ad:4b:49:5f:f5:c7:50:63:54:49:c7:30:db:cd:22: 61:e0:57:68:68:b3:fc:d5:de:0e:e1:62:6f:3b:3d:c1: 0c:18:c0:00:23:c6:b0:d7:b9:f5:15:18:e8:96:d1:ee: 30:46:3b:99:08:53:39:a5:45:b7:9f:b2:fa:47:d3:62 Fingerprint (SHA-256): BA:F2:19:B1:F7:43:02:C5:6A:F5:22:37:CD:03:24:A6:1C:57:75:A3:2A:A5:50:04:57:BC:1D:F4:1B:7B:58:42 Fingerprint (SHA1): 8F:4A:FA:8F:2B:A9:90:E5:91:99:11:52:7B:D7:FA:1F:DE:E9:E6:4C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1051: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145005 (0x3cafa8ed) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:50:45 2023 Not After : Wed Oct 18 14:50:45 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:81:da:7c:be:95:0d:d5:20:ef:62:a1:e2:bc:6e:ab: 80:21:70:87:99:7d:07:19:16:91:ec:05:33:72:55:20: 88:1c:19:f9:f2:d5:ea:74:71:28:53:a0:a0:72:95:7e: 84:12:16:3c:eb:22:92:c9:5a:31:5a:3e:fb:1a:81:bd: 06:18:5d:d2:20:f8:49:a8:57:0b:c6:8f:b2:03:fd:a7: 2a:c1:fe:f9:0c:0c:0a:09:ff:33:6e:0c:72:d1:64:14: 65:44:6b:fe:06:18:f6:59:18:8d:27:9e:ac:41:24:ee: 81:83:e1:d1:93:ae:aa:1a:f1:85:85:9d:41:64:65:a0: 95:3e:53:5a:ee:cd:3a:be:83:09:53:89:f6:f9:31:55: e4:5a:8e:ac:c5:59:4a:e5:18:40:66:80:29:fe:16:cb: 75:40:1c:c5:f7:8b:46:09:66:0d:44:9a:b4:5c:78:76: a4:6e:5a:40:42:6b:d3:b6:2c:2e:d9:1e:dd:04:b3:4b: 9f:80:5f:4e:aa:b3:dc:c4:f7:5d:65:68:ee:b5:52:8f: 44:8c:e9:72:a1:9f:cc:1e:df:5d:07:cc:df:50:40:8e: 06:91:38:cb:43:a0:80:c0:27:79:8e:2c:f4:b2:b4:23: 99:bb:49:cd:28:f8:15:af:66:fe:87:3b:ad:a8:a0:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:02:21:dd:82:47:cb:6d:cd:fa:bc:f7:80:ce:ec:f0: 7f:c8:cc:6c:d5:97:f7:f2:8a:ff:74:ca:d6:d3:9b:72: 0b:d4:e1:94:5a:29:98:7b:1c:c7:9b:8a:6c:39:76:c9: ad:88:2b:f4:29:a8:79:db:a2:0d:00:fa:8b:74:62:dd: 04:50:04:5d:ee:2d:e0:00:06:4f:2d:be:92:cc:e1:6c: f2:4b:ee:22:44:88:05:68:91:75:93:46:ba:95:b0:29: e8:e6:00:ab:ec:03:15:2d:07:06:13:8f:95:73:3b:2d: 8d:f0:d2:79:c9:50:78:b7:76:6d:81:57:44:d7:1d:ce: c4:33:00:42:ea:13:4a:68:8c:a0:d5:dc:c3:cc:04:ac: 67:31:f2:fa:02:88:f6:71:b4:04:38:56:c9:77:fb:de: 6c:79:48:c5:39:f8:cc:f5:da:73:eb:9a:65:c5:b2:f2: d1:5b:46:a5:86:c5:fb:12:51:a8:41:cd:84:c6:4e:0e: 4b:44:75:28:41:36:6f:3f:e3:13:99:9b:df:63:c4:1f: 19:ae:04:f1:cc:f0:a8:7d:c4:92:3e:cb:02:bd:32:33: 18:10:38:3d:6c:dd:23:9c:f2:6c:4f:52:81:8a:cf:74: 37:10:e0:d4:ff:32:60:22:e6:2f:73:46:0a:ac:6b:d2 Fingerprint (SHA-256): 64:24:2E:42:AC:B9:89:A6:64:CC:74:16:83:DC:EE:1F:95:A3:D8:0C:CD:32:08:E0:AD:6D:5E:CC:59:58:72:EF Fingerprint (SHA1): E3:09:C4:42:8E:58:82:B1:AB:9C:1B:F7:B9:91:68:C8:8E:E2:02:CF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1052: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1053: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1054: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1055: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145005 (0x3cafa8ed) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:50:45 2023 Not After : Wed Oct 18 14:50:45 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:81:da:7c:be:95:0d:d5:20:ef:62:a1:e2:bc:6e:ab: 80:21:70:87:99:7d:07:19:16:91:ec:05:33:72:55:20: 88:1c:19:f9:f2:d5:ea:74:71:28:53:a0:a0:72:95:7e: 84:12:16:3c:eb:22:92:c9:5a:31:5a:3e:fb:1a:81:bd: 06:18:5d:d2:20:f8:49:a8:57:0b:c6:8f:b2:03:fd:a7: 2a:c1:fe:f9:0c:0c:0a:09:ff:33:6e:0c:72:d1:64:14: 65:44:6b:fe:06:18:f6:59:18:8d:27:9e:ac:41:24:ee: 81:83:e1:d1:93:ae:aa:1a:f1:85:85:9d:41:64:65:a0: 95:3e:53:5a:ee:cd:3a:be:83:09:53:89:f6:f9:31:55: e4:5a:8e:ac:c5:59:4a:e5:18:40:66:80:29:fe:16:cb: 75:40:1c:c5:f7:8b:46:09:66:0d:44:9a:b4:5c:78:76: a4:6e:5a:40:42:6b:d3:b6:2c:2e:d9:1e:dd:04:b3:4b: 9f:80:5f:4e:aa:b3:dc:c4:f7:5d:65:68:ee:b5:52:8f: 44:8c:e9:72:a1:9f:cc:1e:df:5d:07:cc:df:50:40:8e: 06:91:38:cb:43:a0:80:c0:27:79:8e:2c:f4:b2:b4:23: 99:bb:49:cd:28:f8:15:af:66:fe:87:3b:ad:a8:a0:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:02:21:dd:82:47:cb:6d:cd:fa:bc:f7:80:ce:ec:f0: 7f:c8:cc:6c:d5:97:f7:f2:8a:ff:74:ca:d6:d3:9b:72: 0b:d4:e1:94:5a:29:98:7b:1c:c7:9b:8a:6c:39:76:c9: ad:88:2b:f4:29:a8:79:db:a2:0d:00:fa:8b:74:62:dd: 04:50:04:5d:ee:2d:e0:00:06:4f:2d:be:92:cc:e1:6c: f2:4b:ee:22:44:88:05:68:91:75:93:46:ba:95:b0:29: e8:e6:00:ab:ec:03:15:2d:07:06:13:8f:95:73:3b:2d: 8d:f0:d2:79:c9:50:78:b7:76:6d:81:57:44:d7:1d:ce: c4:33:00:42:ea:13:4a:68:8c:a0:d5:dc:c3:cc:04:ac: 67:31:f2:fa:02:88:f6:71:b4:04:38:56:c9:77:fb:de: 6c:79:48:c5:39:f8:cc:f5:da:73:eb:9a:65:c5:b2:f2: d1:5b:46:a5:86:c5:fb:12:51:a8:41:cd:84:c6:4e:0e: 4b:44:75:28:41:36:6f:3f:e3:13:99:9b:df:63:c4:1f: 19:ae:04:f1:cc:f0:a8:7d:c4:92:3e:cb:02:bd:32:33: 18:10:38:3d:6c:dd:23:9c:f2:6c:4f:52:81:8a:cf:74: 37:10:e0:d4:ff:32:60:22:e6:2f:73:46:0a:ac:6b:d2 Fingerprint (SHA-256): 64:24:2E:42:AC:B9:89:A6:64:CC:74:16:83:DC:EE:1F:95:A3:D8:0C:CD:32:08:E0:AD:6D:5E:CC:59:58:72:EF Fingerprint (SHA1): E3:09:C4:42:8E:58:82:B1:AB:9C:1B:F7:B9:91:68:C8:8E:E2:02:CF Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1056: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145006 (0x3cafa8ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:50:46 2023 Not After : Wed Oct 18 14:50:46 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:f9:7f:fe:53:02:32:7c:89:b6:db:af:77:5e:66:45: fe:63:d8:6a:46:4a:43:57:4e:da:04:8a:fb:e5:b1:a5: de:03:74:8f:29:36:7e:6b:97:5b:22:3b:bf:e5:f1:49: d2:6a:be:20:5c:de:46:8f:3f:45:e3:8e:ad:ce:37:68: 2e:9a:3d:07:0c:b9:74:9a:83:15:0e:31:c2:4b:10:e0: c7:98:1c:7a:d5:e5:da:91:38:db:ed:e7:43:da:e3:5c: fa:dd:f7:90:67:98:d5:7d:03:42:b4:c2:95:0f:40:3c: aa:96:4b:46:e0:94:8e:93:2d:f3:17:b8:bf:76:fa:0a: 81:f3:ea:b7:d1:fd:cd:eb:71:a3:31:29:57:22:77:01: b9:d2:b7:8d:a2:07:3d:c5:5d:49:c0:f4:d2:84:03:48: 49:bb:0a:11:03:b4:c2:8f:18:52:22:39:2b:37:79:35: 17:2b:67:cd:ba:76:63:4e:c1:96:04:03:70:6f:5e:58: 1a:17:d0:fe:1b:bb:52:83:e9:f8:e3:4d:af:49:4b:8a: 03:25:88:8b:58:7f:af:37:5a:6d:4c:44:bd:1d:b6:65: 69:be:da:7f:a3:74:73:bf:10:d4:c6:c4:04:2e:6c:e1: 6b:d8:eb:c8:59:28:30:6d:28:82:4b:bd:5c:81:ab:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:d8:f5:ab:f4:81:2d:8e:d2:d5:8e:4b:90:e3:e2:7d: b0:d2:c4:d7:21:f3:2e:bb:5f:7a:2c:fa:1e:85:ab:84: c2:ee:7d:73:ed:25:92:72:fd:cb:c7:05:bf:c1:6a:04: a3:72:4b:bc:5a:f0:1e:3d:d9:36:1b:8e:54:07:a9:e1: 7b:c3:65:9b:2a:4a:5e:50:9c:1e:7b:18:3c:4a:84:81: b9:65:1d:a2:f4:82:81:d8:41:c7:c7:46:69:17:af:48: d0:3a:19:73:b4:c4:ed:7c:5a:03:3f:61:f0:94:d1:8e: db:38:44:1c:06:42:a6:95:29:18:c3:ab:d7:bb:4d:cb: 55:4c:35:4b:20:35:97:47:f0:d8:8a:63:1e:2b:26:02: d9:84:87:37:99:cb:a8:4c:74:8d:fd:5e:6e:a0:02:7a: 78:14:77:db:9c:60:a1:fe:51:1c:82:d7:bf:46:fa:4c: 28:2a:5a:85:09:fd:f1:79:16:57:60:ca:b5:72:54:56: fa:ad:4b:49:5f:f5:c7:50:63:54:49:c7:30:db:cd:22: 61:e0:57:68:68:b3:fc:d5:de:0e:e1:62:6f:3b:3d:c1: 0c:18:c0:00:23:c6:b0:d7:b9:f5:15:18:e8:96:d1:ee: 30:46:3b:99:08:53:39:a5:45:b7:9f:b2:fa:47:d3:62 Fingerprint (SHA-256): BA:F2:19:B1:F7:43:02:C5:6A:F5:22:37:CD:03:24:A6:1C:57:75:A3:2A:A5:50:04:57:BC:1D:F4:1B:7B:58:42 Fingerprint (SHA1): 8F:4A:FA:8F:2B:A9:90:E5:91:99:11:52:7B:D7:FA:1F:DE:E9:E6:4C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1057: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1058: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1059: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1060: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1061: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1062: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145006 (0x3cafa8ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:50:46 2023 Not After : Wed Oct 18 14:50:46 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:f9:7f:fe:53:02:32:7c:89:b6:db:af:77:5e:66:45: fe:63:d8:6a:46:4a:43:57:4e:da:04:8a:fb:e5:b1:a5: de:03:74:8f:29:36:7e:6b:97:5b:22:3b:bf:e5:f1:49: d2:6a:be:20:5c:de:46:8f:3f:45:e3:8e:ad:ce:37:68: 2e:9a:3d:07:0c:b9:74:9a:83:15:0e:31:c2:4b:10:e0: c7:98:1c:7a:d5:e5:da:91:38:db:ed:e7:43:da:e3:5c: fa:dd:f7:90:67:98:d5:7d:03:42:b4:c2:95:0f:40:3c: aa:96:4b:46:e0:94:8e:93:2d:f3:17:b8:bf:76:fa:0a: 81:f3:ea:b7:d1:fd:cd:eb:71:a3:31:29:57:22:77:01: b9:d2:b7:8d:a2:07:3d:c5:5d:49:c0:f4:d2:84:03:48: 49:bb:0a:11:03:b4:c2:8f:18:52:22:39:2b:37:79:35: 17:2b:67:cd:ba:76:63:4e:c1:96:04:03:70:6f:5e:58: 1a:17:d0:fe:1b:bb:52:83:e9:f8:e3:4d:af:49:4b:8a: 03:25:88:8b:58:7f:af:37:5a:6d:4c:44:bd:1d:b6:65: 69:be:da:7f:a3:74:73:bf:10:d4:c6:c4:04:2e:6c:e1: 6b:d8:eb:c8:59:28:30:6d:28:82:4b:bd:5c:81:ab:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:d8:f5:ab:f4:81:2d:8e:d2:d5:8e:4b:90:e3:e2:7d: b0:d2:c4:d7:21:f3:2e:bb:5f:7a:2c:fa:1e:85:ab:84: c2:ee:7d:73:ed:25:92:72:fd:cb:c7:05:bf:c1:6a:04: a3:72:4b:bc:5a:f0:1e:3d:d9:36:1b:8e:54:07:a9:e1: 7b:c3:65:9b:2a:4a:5e:50:9c:1e:7b:18:3c:4a:84:81: b9:65:1d:a2:f4:82:81:d8:41:c7:c7:46:69:17:af:48: d0:3a:19:73:b4:c4:ed:7c:5a:03:3f:61:f0:94:d1:8e: db:38:44:1c:06:42:a6:95:29:18:c3:ab:d7:bb:4d:cb: 55:4c:35:4b:20:35:97:47:f0:d8:8a:63:1e:2b:26:02: d9:84:87:37:99:cb:a8:4c:74:8d:fd:5e:6e:a0:02:7a: 78:14:77:db:9c:60:a1:fe:51:1c:82:d7:bf:46:fa:4c: 28:2a:5a:85:09:fd:f1:79:16:57:60:ca:b5:72:54:56: fa:ad:4b:49:5f:f5:c7:50:63:54:49:c7:30:db:cd:22: 61:e0:57:68:68:b3:fc:d5:de:0e:e1:62:6f:3b:3d:c1: 0c:18:c0:00:23:c6:b0:d7:b9:f5:15:18:e8:96:d1:ee: 30:46:3b:99:08:53:39:a5:45:b7:9f:b2:fa:47:d3:62 Fingerprint (SHA-256): BA:F2:19:B1:F7:43:02:C5:6A:F5:22:37:CD:03:24:A6:1C:57:75:A3:2A:A5:50:04:57:BC:1D:F4:1B:7B:58:42 Fingerprint (SHA1): 8F:4A:FA:8F:2B:A9:90:E5:91:99:11:52:7B:D7:FA:1F:DE:E9:E6:4C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1063: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145006 (0x3cafa8ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:50:46 2023 Not After : Wed Oct 18 14:50:46 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b7:f9:7f:fe:53:02:32:7c:89:b6:db:af:77:5e:66:45: fe:63:d8:6a:46:4a:43:57:4e:da:04:8a:fb:e5:b1:a5: de:03:74:8f:29:36:7e:6b:97:5b:22:3b:bf:e5:f1:49: d2:6a:be:20:5c:de:46:8f:3f:45:e3:8e:ad:ce:37:68: 2e:9a:3d:07:0c:b9:74:9a:83:15:0e:31:c2:4b:10:e0: c7:98:1c:7a:d5:e5:da:91:38:db:ed:e7:43:da:e3:5c: fa:dd:f7:90:67:98:d5:7d:03:42:b4:c2:95:0f:40:3c: aa:96:4b:46:e0:94:8e:93:2d:f3:17:b8:bf:76:fa:0a: 81:f3:ea:b7:d1:fd:cd:eb:71:a3:31:29:57:22:77:01: b9:d2:b7:8d:a2:07:3d:c5:5d:49:c0:f4:d2:84:03:48: 49:bb:0a:11:03:b4:c2:8f:18:52:22:39:2b:37:79:35: 17:2b:67:cd:ba:76:63:4e:c1:96:04:03:70:6f:5e:58: 1a:17:d0:fe:1b:bb:52:83:e9:f8:e3:4d:af:49:4b:8a: 03:25:88:8b:58:7f:af:37:5a:6d:4c:44:bd:1d:b6:65: 69:be:da:7f:a3:74:73:bf:10:d4:c6:c4:04:2e:6c:e1: 6b:d8:eb:c8:59:28:30:6d:28:82:4b:bd:5c:81:ab:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:d8:f5:ab:f4:81:2d:8e:d2:d5:8e:4b:90:e3:e2:7d: b0:d2:c4:d7:21:f3:2e:bb:5f:7a:2c:fa:1e:85:ab:84: c2:ee:7d:73:ed:25:92:72:fd:cb:c7:05:bf:c1:6a:04: a3:72:4b:bc:5a:f0:1e:3d:d9:36:1b:8e:54:07:a9:e1: 7b:c3:65:9b:2a:4a:5e:50:9c:1e:7b:18:3c:4a:84:81: b9:65:1d:a2:f4:82:81:d8:41:c7:c7:46:69:17:af:48: d0:3a:19:73:b4:c4:ed:7c:5a:03:3f:61:f0:94:d1:8e: db:38:44:1c:06:42:a6:95:29:18:c3:ab:d7:bb:4d:cb: 55:4c:35:4b:20:35:97:47:f0:d8:8a:63:1e:2b:26:02: d9:84:87:37:99:cb:a8:4c:74:8d:fd:5e:6e:a0:02:7a: 78:14:77:db:9c:60:a1:fe:51:1c:82:d7:bf:46:fa:4c: 28:2a:5a:85:09:fd:f1:79:16:57:60:ca:b5:72:54:56: fa:ad:4b:49:5f:f5:c7:50:63:54:49:c7:30:db:cd:22: 61:e0:57:68:68:b3:fc:d5:de:0e:e1:62:6f:3b:3d:c1: 0c:18:c0:00:23:c6:b0:d7:b9:f5:15:18:e8:96:d1:ee: 30:46:3b:99:08:53:39:a5:45:b7:9f:b2:fa:47:d3:62 Fingerprint (SHA-256): BA:F2:19:B1:F7:43:02:C5:6A:F5:22:37:CD:03:24:A6:1C:57:75:A3:2A:A5:50:04:57:BC:1D:F4:1B:7B:58:42 Fingerprint (SHA1): 8F:4A:FA:8F:2B:A9:90:E5:91:99:11:52:7B:D7:FA:1F:DE:E9:E6:4C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1064: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1065: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1066: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1067: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1068: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1069: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145005 (0x3cafa8ed) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:50:45 2023 Not After : Wed Oct 18 14:50:45 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:81:da:7c:be:95:0d:d5:20:ef:62:a1:e2:bc:6e:ab: 80:21:70:87:99:7d:07:19:16:91:ec:05:33:72:55:20: 88:1c:19:f9:f2:d5:ea:74:71:28:53:a0:a0:72:95:7e: 84:12:16:3c:eb:22:92:c9:5a:31:5a:3e:fb:1a:81:bd: 06:18:5d:d2:20:f8:49:a8:57:0b:c6:8f:b2:03:fd:a7: 2a:c1:fe:f9:0c:0c:0a:09:ff:33:6e:0c:72:d1:64:14: 65:44:6b:fe:06:18:f6:59:18:8d:27:9e:ac:41:24:ee: 81:83:e1:d1:93:ae:aa:1a:f1:85:85:9d:41:64:65:a0: 95:3e:53:5a:ee:cd:3a:be:83:09:53:89:f6:f9:31:55: e4:5a:8e:ac:c5:59:4a:e5:18:40:66:80:29:fe:16:cb: 75:40:1c:c5:f7:8b:46:09:66:0d:44:9a:b4:5c:78:76: a4:6e:5a:40:42:6b:d3:b6:2c:2e:d9:1e:dd:04:b3:4b: 9f:80:5f:4e:aa:b3:dc:c4:f7:5d:65:68:ee:b5:52:8f: 44:8c:e9:72:a1:9f:cc:1e:df:5d:07:cc:df:50:40:8e: 06:91:38:cb:43:a0:80:c0:27:79:8e:2c:f4:b2:b4:23: 99:bb:49:cd:28:f8:15:af:66:fe:87:3b:ad:a8:a0:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:02:21:dd:82:47:cb:6d:cd:fa:bc:f7:80:ce:ec:f0: 7f:c8:cc:6c:d5:97:f7:f2:8a:ff:74:ca:d6:d3:9b:72: 0b:d4:e1:94:5a:29:98:7b:1c:c7:9b:8a:6c:39:76:c9: ad:88:2b:f4:29:a8:79:db:a2:0d:00:fa:8b:74:62:dd: 04:50:04:5d:ee:2d:e0:00:06:4f:2d:be:92:cc:e1:6c: f2:4b:ee:22:44:88:05:68:91:75:93:46:ba:95:b0:29: e8:e6:00:ab:ec:03:15:2d:07:06:13:8f:95:73:3b:2d: 8d:f0:d2:79:c9:50:78:b7:76:6d:81:57:44:d7:1d:ce: c4:33:00:42:ea:13:4a:68:8c:a0:d5:dc:c3:cc:04:ac: 67:31:f2:fa:02:88:f6:71:b4:04:38:56:c9:77:fb:de: 6c:79:48:c5:39:f8:cc:f5:da:73:eb:9a:65:c5:b2:f2: d1:5b:46:a5:86:c5:fb:12:51:a8:41:cd:84:c6:4e:0e: 4b:44:75:28:41:36:6f:3f:e3:13:99:9b:df:63:c4:1f: 19:ae:04:f1:cc:f0:a8:7d:c4:92:3e:cb:02:bd:32:33: 18:10:38:3d:6c:dd:23:9c:f2:6c:4f:52:81:8a:cf:74: 37:10:e0:d4:ff:32:60:22:e6:2f:73:46:0a:ac:6b:d2 Fingerprint (SHA-256): 64:24:2E:42:AC:B9:89:A6:64:CC:74:16:83:DC:EE:1F:95:A3:D8:0C:CD:32:08:E0:AD:6D:5E:CC:59:58:72:EF Fingerprint (SHA1): E3:09:C4:42:8E:58:82:B1:AB:9C:1B:F7:B9:91:68:C8:8E:E2:02:CF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1070: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145005 (0x3cafa8ed) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:50:45 2023 Not After : Wed Oct 18 14:50:45 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:81:da:7c:be:95:0d:d5:20:ef:62:a1:e2:bc:6e:ab: 80:21:70:87:99:7d:07:19:16:91:ec:05:33:72:55:20: 88:1c:19:f9:f2:d5:ea:74:71:28:53:a0:a0:72:95:7e: 84:12:16:3c:eb:22:92:c9:5a:31:5a:3e:fb:1a:81:bd: 06:18:5d:d2:20:f8:49:a8:57:0b:c6:8f:b2:03:fd:a7: 2a:c1:fe:f9:0c:0c:0a:09:ff:33:6e:0c:72:d1:64:14: 65:44:6b:fe:06:18:f6:59:18:8d:27:9e:ac:41:24:ee: 81:83:e1:d1:93:ae:aa:1a:f1:85:85:9d:41:64:65:a0: 95:3e:53:5a:ee:cd:3a:be:83:09:53:89:f6:f9:31:55: e4:5a:8e:ac:c5:59:4a:e5:18:40:66:80:29:fe:16:cb: 75:40:1c:c5:f7:8b:46:09:66:0d:44:9a:b4:5c:78:76: a4:6e:5a:40:42:6b:d3:b6:2c:2e:d9:1e:dd:04:b3:4b: 9f:80:5f:4e:aa:b3:dc:c4:f7:5d:65:68:ee:b5:52:8f: 44:8c:e9:72:a1:9f:cc:1e:df:5d:07:cc:df:50:40:8e: 06:91:38:cb:43:a0:80:c0:27:79:8e:2c:f4:b2:b4:23: 99:bb:49:cd:28:f8:15:af:66:fe:87:3b:ad:a8:a0:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:02:21:dd:82:47:cb:6d:cd:fa:bc:f7:80:ce:ec:f0: 7f:c8:cc:6c:d5:97:f7:f2:8a:ff:74:ca:d6:d3:9b:72: 0b:d4:e1:94:5a:29:98:7b:1c:c7:9b:8a:6c:39:76:c9: ad:88:2b:f4:29:a8:79:db:a2:0d:00:fa:8b:74:62:dd: 04:50:04:5d:ee:2d:e0:00:06:4f:2d:be:92:cc:e1:6c: f2:4b:ee:22:44:88:05:68:91:75:93:46:ba:95:b0:29: e8:e6:00:ab:ec:03:15:2d:07:06:13:8f:95:73:3b:2d: 8d:f0:d2:79:c9:50:78:b7:76:6d:81:57:44:d7:1d:ce: c4:33:00:42:ea:13:4a:68:8c:a0:d5:dc:c3:cc:04:ac: 67:31:f2:fa:02:88:f6:71:b4:04:38:56:c9:77:fb:de: 6c:79:48:c5:39:f8:cc:f5:da:73:eb:9a:65:c5:b2:f2: d1:5b:46:a5:86:c5:fb:12:51:a8:41:cd:84:c6:4e:0e: 4b:44:75:28:41:36:6f:3f:e3:13:99:9b:df:63:c4:1f: 19:ae:04:f1:cc:f0:a8:7d:c4:92:3e:cb:02:bd:32:33: 18:10:38:3d:6c:dd:23:9c:f2:6c:4f:52:81:8a:cf:74: 37:10:e0:d4:ff:32:60:22:e6:2f:73:46:0a:ac:6b:d2 Fingerprint (SHA-256): 64:24:2E:42:AC:B9:89:A6:64:CC:74:16:83:DC:EE:1F:95:A3:D8:0C:CD:32:08:E0:AD:6D:5E:CC:59:58:72:EF Fingerprint (SHA1): E3:09:C4:42:8E:58:82:B1:AB:9C:1B:F7:B9:91:68:C8:8E:E2:02:CF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1071: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1072: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145010 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1073: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1074: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1075: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145011 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1076: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1077: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1078: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145012 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1079: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1080: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1081: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145013 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1082: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1083: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1084: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145014 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1085: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1086: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1087: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145015 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1088: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1089: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1090: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145016 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1091: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1092: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1093: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145017 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1094: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1095: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1096: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145018 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1097: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1098: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1099: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1100: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1018145019 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1101: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1102: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1018145020 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1103: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1104: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1018145021 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1105: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1106: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1107: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1108: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1109: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1018145022 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1110: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1111: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1018145023 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1112: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1113: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1018145024 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1114: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1115: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1116: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1117: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1118: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1018145025 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1119: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1120: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1018145026 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1121: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1122: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1018145027 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1123: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1124: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1125: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1126: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1127: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1018145028 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1128: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1129: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1018145029 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1130: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1131: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1018145030 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1132: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1133: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #1134: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1135: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1136: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1018145031 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1137: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1138: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1139: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1140: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018145032 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1141: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1142: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145010 (0x3cafa8f2) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Wed Oct 18 14:50:48 2023 Not After : Wed Oct 18 14:50:48 2073 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:da:fd:a0:12:45:37:db:fa:a8:60:e1:3e:e1:d7:08: 2a:a3:4b:0a:e1:57:69:1d:a3:c1:6d:ea:4f:66:a8:38: ae:f9:0d:fa:64:29:86:e9:6c:95:80:57:8b:22:f8:ab: 0a:d8:cd:4b:2a:63:b1:35:c6:32:9b:60:35:f4:40:41: 96:c3:11:10:66:0d:c0:99:75:f8:81:09:0c:f9:1a:17: 5e:ee:7b:60:09:e0:e4:37:93:3d:5d:b1:4d:3e:48:55: a8:a8:b6:17:47:e3:51:73:6e:59:29:19:e2:1a:74:bb: 76:e7:39:ef:68:e2:86:15:a5:c1:be:e8:ee:8a:29:c1: e7:6d:85:cf:40:ae:1f:48:7a:2d:c3:01:69:10:57:9c: bb:52:9a:3c:89:37:a7:5f:05:7d:fc:64:c8:0d:94:23: ea:c4:41:93:45:d0:58:71:ef:65:bb:a5:44:b4:40:3d: 69:08:1e:f2:70:ac:20:f5:46:6b:fc:04:0e:c1:ab:c9: 7a:18:c3:df:c4:77:dc:65:a4:bc:ac:82:42:94:23:95: a4:ac:a3:38:e8:55:c9:15:fe:1d:db:16:12:a9:f9:8e: 0f:8f:96:9c:03:ca:b0:9f:4a:c2:ae:4b:71:41:4a:f1: 3a:0a:25:10:d3:c3:69:6c:c1:1d:66:be:3e:a3:6d:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0c:2c:a3:73:3c:c8:91:c1:da:65:fd:c3:27:cc:5e:88: a2:6e:ca:79:d2:1a:c5:1e:36:a9:80:40:17:87:cc:fe: 38:38:13:cb:cd:58:46:b0:02:ec:33:4e:55:83:e8:76: 22:aa:62:af:13:06:76:6f:ed:ed:66:12:87:ed:c7:5b: 58:26:6b:bd:9d:7e:36:8a:f5:45:da:4d:55:2b:4e:fe: c3:14:4d:46:29:52:69:66:7e:8b:27:51:10:ea:7f:27: 7c:9c:56:25:6f:26:d0:30:26:bf:c9:eb:15:34:80:65: 97:81:f0:dc:d1:12:c9:17:65:19:f3:46:24:d4:ab:ac: 44:7e:7b:53:a6:65:70:38:48:c1:66:a5:3d:6d:2a:49: 5a:46:99:a7:3b:6a:bc:f6:21:20:d4:4b:e7:ad:10:4a: e1:64:6a:48:05:f4:cb:04:51:f7:a7:2d:42:d6:f8:43: f6:9f:4a:ce:37:61:ed:4b:13:19:2c:ff:fb:12:69:64: 49:2f:c3:b5:78:f4:e5:0f:05:b1:13:82:71:74:89:84: 4a:5b:99:dc:d1:08:ef:b7:74:50:b4:45:3d:bf:27:f6: 26:76:9b:80:44:e4:d2:05:d1:28:13:5b:a9:e9:6e:df: 2f:d4:3f:67:9d:a0:a9:03:46:22:f2:de:0d:40:9e:24 Fingerprint (SHA-256): F2:17:C5:97:32:40:73:BF:FD:C6:A4:DB:49:44:2C:CD:2D:0F:C0:79:7D:BE:81:94:BC:0E:DB:03:57:CE:D8:A8 Fingerprint (SHA1): 68:25:40:B3:96:64:F0:BF:7C:40:58:99:5B:16:D5:B2:3E:04:44:63 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1143: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145011 (0x3cafa8f3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Wed Oct 18 14:50:48 2023 Not After : Wed Oct 18 14:50:48 2073 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: da:7a:04:6e:66:50:d1:68:a7:e4:91:96:b0:0f:1c:d4: a5:10:26:39:12:ce:69:fd:46:25:ab:22:1a:70:ec:cc: 0c:d8:1a:d1:7d:23:51:2b:1f:51:23:3e:cb:cf:f3:cd: ce:b1:8b:94:43:a1:d7:78:31:6a:90:28:8d:be:02:d7: e0:d4:c9:47:43:53:19:96:00:74:87:0e:f1:0d:fc:12: c3:68:79:3f:4b:b8:cb:f8:37:c2:f1:0a:0d:3e:20:f2: 13:24:fc:1a:a5:62:71:98:e1:92:5d:c9:0b:1b:e2:6f: 82:b7:09:9f:e7:ed:9e:d1:f9:d9:06:ee:32:e6:c2:82: cb:f2:1f:48:f3:e2:23:e7:8d:2d:62:d9:e4:53:77:11: 26:a5:2e:eb:8b:2e:32:0b:be:0e:c6:79:86:d9:c1:18: ec:84:2a:00:6d:23:81:ad:57:62:a2:58:3b:48:2a:81: 5f:41:c9:c3:ec:8b:b0:35:05:55:b8:79:87:a6:0d:6c: 41:28:03:50:bf:f0:e8:25:d4:a9:51:35:33:95:0b:32: fb:01:54:ef:2a:27:55:4e:d1:43:cb:65:ac:6e:a2:c7: e1:56:79:87:48:4e:61:57:e4:4d:f0:4f:d2:6d:66:ab: ad:9e:15:c8:9c:de:c4:e0:9c:89:c4:8c:60:1a:59:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7e:18:9e:93:3b:21:bd:26:5c:a5:77:d4:0e:d1:5c:e3: 5a:95:c3:cf:ba:c1:3b:49:06:cf:c7:e4:b0:8a:42:c0: 4d:f4:0d:2e:ce:81:ba:a2:e9:6d:16:d0:a2:ff:a8:fb: dc:9e:6a:47:4a:12:d1:d1:ad:c5:ea:28:f5:8e:43:6b: b5:85:ac:02:b9:0f:f0:b9:ad:25:17:d8:00:78:3d:7b: 36:c6:73:ef:48:f7:75:18:6f:c6:a7:ac:19:e7:44:24: 5a:8a:89:15:93:ab:5f:45:5b:04:b6:ae:66:3a:b1:12: 8e:cc:ad:3e:0f:3e:57:6e:90:20:7b:b6:1d:11:ac:20: 67:48:6b:06:ff:ef:8d:ea:1f:26:4b:1c:93:9c:19:56: c7:91:7d:65:a7:a4:ea:b3:a9:6b:96:2f:4b:21:72:1c: 9d:28:79:5c:73:0e:8a:66:61:4f:df:12:67:4b:59:8b: 39:1f:48:81:51:a9:93:f4:25:3c:0d:3c:d8:0e:89:7a: fc:31:86:41:35:9c:99:0a:df:e8:90:d3:33:df:a1:37: e4:91:d6:8e:6d:58:24:93:4d:05:8a:07:30:b0:5e:c8: 7a:0c:2e:b7:0c:0b:22:53:71:54:6d:b2:41:bb:cd:05: 68:98:b5:c5:08:9f:04:23:28:ad:83:bd:a5:1c:5b:bb Fingerprint (SHA-256): 4C:5E:A7:EE:B0:36:9F:17:D9:BD:30:27:E9:5F:C3:2D:67:3D:8C:AE:A5:0C:EC:00:7D:EC:7C:21:9D:04:CA:8B Fingerprint (SHA1): 46:F6:E2:81:F2:94:59:CE:C0:BC:29:E2:4A:5B:30:ED:43:6E:CA:52 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1144: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145012 (0x3cafa8f4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Wed Oct 18 14:50:49 2023 Not After : Wed Oct 18 14:50:49 2073 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:71:dc:37:fa:0f:3a:f4:24:11:d5:16:5f:35:c4:93: 9e:0b:b9:ad:08:53:ad:ce:24:9f:87:64:05:97:c9:da: db:54:00:23:87:31:02:d6:d2:74:78:e0:1b:5e:54:3a: d5:63:60:d9:23:68:a5:0e:9e:73:41:64:d0:95:76:ed: b8:25:ac:e3:4a:61:ad:c4:7f:43:5f:62:da:39:fd:2d: a1:66:52:17:1f:1f:35:6e:8d:33:68:ad:bb:ff:b0:84: 06:ed:3a:e9:da:e8:5f:72:92:4e:5e:25:ce:7b:a5:c0: e7:3f:cf:fd:ee:b0:60:a5:e2:5f:f2:49:24:a0:29:70: b5:ff:1d:bb:4f:95:46:e7:16:2e:36:fb:97:a5:a2:1e: 23:ff:ef:03:a6:63:95:29:b6:4d:1b:d3:66:74:a9:4c: 06:1b:e4:ed:04:ab:6e:a8:c0:96:f1:cc:32:b1:88:b1: 87:5d:8f:0b:c7:d8:3f:15:c0:ad:e8:01:6d:30:23:b0: d6:00:be:e7:b9:f4:8b:d8:b4:e9:7e:eb:32:60:2a:8f: 2d:ca:ac:8d:f3:8b:cf:f5:f8:f3:fb:9d:2b:8b:55:29: 36:66:0c:9b:c0:37:4e:fd:df:ae:03:93:62:99:96:26: 33:a4:8f:9a:02:be:74:c2:85:30:bf:f1:7f:f4:c3:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 74:5e:3b:e5:3b:f2:22:c0:bc:8f:43:94:69:ca:91:9f: 64:75:3e:a1:9e:1d:c1:17:08:65:37:0f:a4:63:25:78: ba:48:13:87:75:5f:73:78:24:4f:94:bb:d6:fd:08:32: 4d:37:f5:31:9e:e8:45:8c:9c:0e:72:e2:01:ba:a3:83: 0c:f8:17:6f:bc:0d:1e:7a:a3:a3:5c:7e:9e:33:34:a0: 92:8b:82:6b:95:b1:76:30:af:e5:af:f7:df:27:f5:9a: b1:48:cd:52:76:33:59:de:03:8f:87:1d:95:2a:d9:37: 43:a8:32:a1:8b:05:7f:3a:76:cd:86:46:57:cb:c7:65: f7:e7:32:2f:c2:49:db:46:67:f8:3f:44:f2:c0:6e:95: 31:8b:df:34:e0:3d:42:30:60:d1:cf:38:eb:75:5c:4e: 38:33:b4:04:fd:df:f5:c2:43:bc:a8:80:8b:24:23:76: fe:8f:85:0b:2e:69:78:79:87:d5:32:15:62:b3:89:75: ca:34:b1:c5:4f:8d:27:5e:3b:c7:63:95:0d:54:72:ba: b7:5a:7b:e0:db:08:7b:06:6a:f3:1b:63:f4:88:9f:ae: 28:fa:f3:60:bc:79:9e:13:d3:68:0f:24:6c:a4:82:31: 9e:40:3e:85:e5:4d:a3:b9:b4:d5:d6:0f:48:56:9b:4e Fingerprint (SHA-256): DD:E7:54:ED:73:84:9D:D0:D8:6D:9F:0B:A7:B3:FE:1A:99:CF:27:22:FF:DA:66:EE:25:B5:DC:5D:07:85:D6:2D Fingerprint (SHA1): 4E:A3:75:E3:9D:AF:29:87:D6:CD:74:DA:9C:07:D2:48:59:08:10:AB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1145: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145013 (0x3cafa8f5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Wed Oct 18 14:50:49 2023 Not After : Wed Oct 18 14:50:49 2073 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:ed:95:91:49:89:8b:46:90:47:c1:bb:12:bd:dd:76: f9:33:f5:99:a7:40:b1:54:18:08:1a:78:ec:3b:01:1f: 15:94:6d:52:64:0c:c0:57:2f:49:38:ee:c7:54:98:51: ac:92:30:36:e9:a9:87:ca:d6:3c:e2:27:89:f6:5b:d3: 25:af:03:2b:cf:56:9a:71:f1:c3:3b:35:a0:64:4b:65: 60:94:84:00:00:a4:ab:1b:c8:50:f2:51:38:5b:29:c0: 80:55:1c:61:78:ee:f5:77:07:a4:d9:e0:ed:de:aa:e9: 27:7e:83:40:36:35:fc:6a:e8:8a:95:0a:33:0c:82:a8: 77:ce:d6:d6:ef:9c:f3:9c:18:0f:ba:05:c8:5a:ae:c7: ac:dc:2c:43:77:56:91:e1:a7:24:98:c4:71:b1:3d:0b: 4d:a2:88:e4:54:11:81:1e:77:58:07:41:50:09:40:d6: 10:b3:37:86:a4:55:25:98:3c:4d:a5:fb:87:9d:c8:1f: db:5d:b9:63:80:a6:e0:2c:2a:0a:8f:f3:54:07:8c:23: 20:cd:b5:14:35:42:71:7d:c9:f6:44:65:ef:0f:7b:a6: af:8a:4a:b0:78:c0:3b:4f:01:36:7c:23:fc:15:00:c3: 62:27:41:17:4b:f7:4b:72:7d:e5:77:87:b4:fe:dd:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 29:b3:8c:9e:9a:cc:82:68:b2:de:77:c3:ef:9b:7d:ab: 3f:07:74:f7:de:63:e6:f4:dd:79:da:25:97:a1:fe:f3: d9:da:84:e9:0a:05:6b:9c:80:cd:3c:82:d0:7b:1c:ee: 98:ae:e8:54:64:33:a3:7d:db:97:6b:f2:5c:d9:b6:9c: 1e:64:de:e9:fb:d7:f7:83:58:df:bd:fa:83:84:19:97: 76:e6:b6:fb:a9:c4:c4:b4:84:2f:d8:66:c9:66:fd:73: 5b:54:07:21:c7:41:4f:79:09:15:ba:dd:cf:2a:6c:4e: b0:a7:75:81:c6:b2:9a:b5:ae:20:97:38:d7:fb:55:f6: 1f:45:61:21:a8:3b:f5:b4:5b:4e:e7:3e:73:81:24:78: 59:85:3c:37:7f:64:04:d3:8b:d7:d3:22:6f:f3:9f:eb: 06:1f:84:e1:d0:ab:b5:6b:be:9f:5f:02:3d:56:5a:fc: 05:a9:27:ea:d5:68:10:70:a8:9c:e2:c8:8a:80:cd:46: 91:3e:ce:9e:dc:4a:7e:7f:85:0f:7a:30:d5:22:a7:c9: 00:15:3c:6c:f6:49:9b:b6:9c:43:da:c9:db:36:5c:69: 5c:65:c6:f7:3f:04:c6:e0:3d:c9:bf:4c:83:c2:8e:e8: a1:e5:b4:48:0e:68:ec:e7:24:85:b2:9d:7c:cf:01:c5 Fingerprint (SHA-256): C9:A0:97:DE:45:4F:98:6D:6D:E5:33:C6:B5:86:F6:98:00:9B:A2:2D:E5:39:19:63:31:0C:34:6B:00:4B:20:CE Fingerprint (SHA1): 84:FD:4F:A0:C5:B9:93:C5:C2:26:13:4A:94:DC:A3:CE:F1:68:D7:4C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1146: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145014 (0x3cafa8f6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Wed Oct 18 14:50:50 2023 Not After : Wed Oct 18 14:50:50 2073 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:91:4f:ad:5e:ff:0a:51:39:42:39:09:91:77:94:bc: e1:91:5e:68:c8:45:aa:69:42:4e:d9:f2:81:e3:2a:39: 9d:59:ef:ba:e2:2f:a6:ff:2f:d2:db:32:50:11:e0:61: 70:4e:57:97:0e:f8:a5:42:36:b6:38:09:06:58:47:e6: 44:40:49:59:e7:0d:1f:2c:11:a8:e0:f8:49:45:e6:3c: 18:91:0c:7b:b4:c0:3c:ec:6b:80:c6:f1:da:59:42:84: 52:e0:c6:f3:fc:43:22:2a:d8:6e:f3:51:1b:97:c9:70: bf:78:26:2c:aa:2d:e5:e7:f2:d3:8e:72:1e:d0:7a:af: 1a:ea:e3:c7:34:d3:2f:64:dd:df:bc:fb:6d:f3:63:8b: 11:8c:5f:aa:12:ed:83:c7:d1:80:a2:b3:a4:f1:7a:c3: 56:06:74:c1:19:08:42:c4:e3:33:1c:21:16:ec:9e:c6: f3:f9:fb:53:b1:d4:ea:36:de:04:4c:70:ce:42:9b:13: da:d6:cf:f6:12:84:d8:a4:00:99:6f:d2:85:58:8e:cf: c7:75:cd:07:ba:e1:1b:6c:b9:0b:b0:88:22:af:a5:c3: 76:02:26:93:1f:f6:44:1e:db:17:57:2c:cf:5c:4a:a0: 7f:20:b4:6f:06:8f:d2:2d:3f:8a:d3:99:b3:61:39:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 17:6c:c5:58:76:66:1f:e9:f6:cc:ad:18:db:a0:30:c7: 73:9d:b5:b1:db:f7:53:40:4f:5d:8f:90:53:60:0b:ce: 02:e0:16:ba:96:4d:8f:fc:d8:c0:e9:a1:3c:f7:a0:57: 5a:68:05:04:c4:6c:ca:04:00:8a:e8:ee:a8:1e:e6:32: 31:ab:a1:dd:d8:4d:00:de:4f:18:ae:ed:70:fb:1a:1b: bc:94:35:bb:e1:7e:3f:85:78:ee:93:1a:a4:8f:ba:e8: 84:84:1b:97:6a:b6:07:c8:73:a0:75:da:30:4e:4a:7a: cf:93:50:7a:3e:a7:7b:75:d3:c1:ec:bf:7c:72:9e:50: d9:b8:51:5b:04:fe:9a:6d:04:dd:d9:8d:98:cc:10:ec: e0:43:85:a3:ad:64:b3:a8:b6:11:62:14:a4:93:3e:7d: 31:b7:e6:84:26:1b:0e:42:1f:bb:02:f4:7e:53:60:6c: 88:c7:f5:fc:fe:2c:91:5e:6c:88:8d:66:7e:55:59:e0: 4a:b5:a7:42:1f:17:3b:0d:84:65:10:11:a1:d3:20:9c: 17:d7:59:2f:27:2a:2e:bf:93:bd:a0:f5:4d:da:99:58: 52:0c:a3:24:3d:47:84:6c:58:84:3c:8b:d9:de:02:b3: dc:52:19:dd:0b:d2:d6:32:2a:48:d8:df:7c:a8:48:81 Fingerprint (SHA-256): 64:78:94:B9:97:4F:E6:50:20:EE:00:CD:C4:A6:FE:2D:CF:C7:3E:D1:EC:98:B2:EB:31:4D:37:23:9C:7F:C7:A2 Fingerprint (SHA1): 71:CC:04:2D:A3:26:4A:AA:FA:9D:56:BC:CB:BB:FA:96:B3:86:FC:1C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1147: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145015 (0x3cafa8f7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Wed Oct 18 14:50:50 2023 Not After : Wed Oct 18 14:50:50 2073 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:2b:e0:24:91:b4:25:d6:06:31:83:13:9e:d9:5e:91: 90:e0:59:a8:ca:ba:62:39:ba:1e:80:e1:01:8e:b7:8a: a8:8f:77:38:a8:68:ac:e1:53:d3:4f:ec:bf:48:ff:83: 33:06:06:e8:8a:1a:2d:e1:04:56:76:54:8e:f3:df:c0: 2a:8e:d9:3a:dc:aa:7f:4b:cf:ae:1b:7b:bb:00:0a:5d: db:53:ff:34:b5:9d:79:8f:e4:89:07:dc:fc:0d:e2:a9: 16:7f:0f:91:7f:60:3e:5a:4f:e1:f9:0e:f9:2c:e4:51: 8b:26:75:55:e3:03:5b:18:f8:a9:1d:af:4e:f1:1d:b4: c1:e7:4c:f2:a6:36:e9:d6:20:b9:14:c0:dd:9a:51:5d: 6e:48:bf:b0:d8:2a:9b:ea:8a:96:b3:a8:56:a8:06:fc: 7e:18:25:56:c0:74:52:f0:95:df:f5:f2:34:f0:dd:3b: 47:c1:4e:94:29:21:bb:05:42:fd:10:1b:c1:aa:e6:dd: 66:05:87:02:dc:ae:dc:95:2d:4a:60:93:e6:a4:8a:df: a8:cc:a9:4c:25:3f:b7:a5:24:37:66:d0:79:a8:8b:ec: b5:53:22:4f:e6:08:78:4d:71:0a:c0:29:4e:d1:fa:d7: 9f:cf:0f:62:34:19:66:fb:46:09:d3:a9:a3:d5:9a:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 10:70:60:6c:a8:ce:90:ca:55:e3:43:6a:17:7b:5b:bc: c6:87:e8:92:11:63:5b:72:2d:1a:97:ca:c9:5a:c4:24: 43:84:14:38:24:5a:d1:70:f3:f2:49:bb:45:3e:a5:80: 7c:df:6b:39:9c:b5:84:91:cc:ea:9f:d0:f1:b9:a6:c6: 92:18:3f:e8:79:fe:37:b1:c4:5f:c8:92:3c:c2:0a:1f: 90:d1:63:ed:8b:c2:3b:64:89:6c:73:89:13:f8:c8:5a: 84:5d:34:bd:52:af:73:20:c9:0e:43:f2:a6:cb:63:95: 73:42:d7:24:31:95:73:d5:ef:3f:5c:e3:b7:16:67:f8: c2:fa:4c:55:98:ba:d0:c1:64:a4:a4:60:56:15:e2:e4: 73:2d:ee:cc:43:b6:0f:c3:51:85:1d:ef:76:f0:c9:45: c9:c9:1e:5d:19:d9:b8:5d:38:3f:f9:33:99:f9:42:16: 36:17:8f:8c:9b:8e:fa:f2:33:1b:f9:d3:aa:77:6d:58: 70:4c:63:a4:91:48:b4:cf:5a:dc:ce:16:50:f9:4d:34: bd:24:6a:63:59:a6:ed:b2:40:2c:94:70:ad:d2:f4:13: a2:6c:89:0a:f5:cd:0d:ce:62:c0:bc:9d:df:65:93:26: 24:83:73:78:3e:74:4b:01:c1:5f:91:0d:b4:34:15:e7 Fingerprint (SHA-256): 9F:5B:38:2C:E6:6B:C4:70:DA:CE:F2:C4:8F:F5:82:88:79:C6:DE:AB:F2:20:A5:85:6F:DA:47:BE:F9:E0:74:AE Fingerprint (SHA1): 45:BC:FE:1E:93:51:D7:74:CC:28:94:32:D5:5D:DB:81:23:AB:AE:21 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1148: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145016 (0x3cafa8f8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Wed Oct 18 14:50:51 2023 Not After : Wed Oct 18 14:50:51 2073 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:4f:cf:cd:c2:b1:1a:6a:10:fa:ad:83:cc:eb:76:f1: 2e:f6:0f:bc:09:a9:b1:5d:3e:d5:3e:bc:46:6e:49:2c: 13:09:34:7b:eb:c1:5b:0c:d4:bd:86:8d:73:59:30:75: ef:f1:9c:5b:2a:1d:18:84:fb:ea:08:0b:c3:ef:b6:a6: eb:05:2c:81:41:88:4f:fc:89:d0:eb:15:f5:5e:c5:82: 96:4e:f1:70:4a:53:f4:1f:1c:88:04:13:03:dd:3f:ad: 33:fc:51:fc:ed:3e:5c:3c:50:f7:5a:9f:4b:95:3f:c3: 11:53:fd:6b:10:61:c9:66:7f:2b:1f:7a:ff:8b:28:1b: 1f:f0:72:3a:d7:00:ae:bc:3e:c9:68:0c:ab:aa:d0:83: ae:d5:51:ec:93:24:6a:c3:66:88:70:73:3b:4d:f1:43: 3e:c5:75:6c:cd:ca:22:0e:ef:db:11:45:32:f3:7a:4a: 40:27:33:d4:bc:fc:db:db:c8:be:89:7c:1e:a2:de:e4: d5:11:54:49:e1:86:62:b3:43:db:fa:de:36:c0:60:a3: f9:bf:17:6f:da:15:ea:df:a5:8e:7f:dd:f1:59:4f:f5: 7a:eb:48:87:34:a3:62:ed:26:e4:3b:97:06:aa:fa:b2: c0:89:e2:12:f8:6a:78:16:58:39:2f:e9:5e:7a:dc:6f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:6e:fd:ac:f8:79:4b:e6:54:bd:16:ab:a2:7d:b3:7f: 5d:8f:00:36:f6:b8:1f:30:9b:8a:bb:8e:72:4f:42:1e: 16:16:18:47:37:78:18:d2:89:28:75:22:1b:78:f0:df: 32:e4:a4:30:d8:bc:3a:e7:28:dd:9f:94:2c:10:16:ee: 57:b7:68:07:ea:8f:35:55:5b:a4:1c:f5:e3:76:0a:b8: 2b:b5:8a:69:a7:a2:14:a7:c0:38:6d:83:d4:ad:3e:ea: 71:92:ca:e8:cd:10:05:ac:ab:78:9a:02:6b:4c:d7:47: e8:06:8b:cc:33:a8:55:f3:f1:6c:b1:70:ee:ce:24:ce: a6:58:6f:c1:04:51:e1:ce:41:12:9d:39:40:ba:7b:f3: 4c:40:30:0c:63:77:78:3e:de:59:9b:65:18:4e:c7:56: 04:0e:24:cd:61:38:18:55:60:28:17:0b:5b:6c:c7:dd: 1f:79:57:b3:ef:92:39:a6:d0:91:8c:7a:5e:3a:1a:0f: 85:d6:5d:40:b2:d5:8f:33:a3:34:d7:5b:45:11:69:3f: 8a:09:1b:5e:00:b7:00:e1:8c:69:87:80:fe:1a:06:a2: 27:f2:38:9f:6a:61:d5:e5:8d:b3:ea:13:17:39:e7:74: 9c:0d:5b:d4:c6:83:c8:51:3f:e9:02:f3:69:94:cf:bf Fingerprint (SHA-256): FD:E5:82:0B:3D:87:D7:59:D7:74:84:31:F9:57:CE:E8:B0:5E:1A:42:4B:E3:55:1B:AE:BA:00:BA:2C:7B:B6:15 Fingerprint (SHA1): C8:9B:92:99:C5:2E:24:C1:B1:08:4E:C9:B9:3A:74:AD:28:60:4C:C0 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1149: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145017 (0x3cafa8f9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Wed Oct 18 14:50:51 2023 Not After : Wed Oct 18 14:50:51 2073 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:a2:4c:95:ab:38:d9:85:2c:a3:bf:5b:d7:73:89:c0: 40:85:84:fa:aa:9f:c3:51:02:2f:ff:99:dd:62:5f:8d: 59:d5:6a:7c:0f:39:aa:94:fd:7c:bd:ad:61:e9:bf:2e: 92:d3:ab:55:ac:70:70:50:b8:9f:86:6a:34:b1:49:80: 69:06:a3:6e:a2:39:e8:fc:49:49:26:7d:44:a4:7d:2c: f3:8d:20:17:b6:9c:fd:21:b7:ef:93:c5:1d:48:05:7c: c3:e2:08:f8:63:e3:42:ec:d9:fe:cb:79:fd:d7:8c:23: 75:ad:42:a2:67:24:11:60:9d:41:34:6e:7a:0a:b2:37: 39:5c:22:60:4e:76:37:65:fc:df:7e:76:10:05:45:c1: f2:bb:72:99:9c:55:ba:6c:a1:34:94:37:2d:42:39:dc: 51:8c:12:9a:a0:3b:c1:9f:2c:b1:88:ac:55:2c:9a:0e: 8d:a5:06:86:21:8e:3b:a1:49:76:1b:a3:b6:b0:5a:ba: 22:f4:4d:b6:9b:31:2b:3c:9a:94:d8:af:1c:b3:32:0d: 0f:a7:bf:9e:5f:e6:ce:c7:0c:07:53:13:cb:2b:60:77: ea:5d:d2:ab:11:23:95:1a:91:a9:18:46:8e:1b:6a:bc: 2a:24:fe:b2:ad:b1:28:80:01:8c:87:7a:1b:6a:2b:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 99:b2:10:16:8a:aa:87:f0:c8:64:00:cf:fb:ab:62:62: b4:6d:5f:cf:df:03:1c:a0:cc:6d:d2:78:e6:1a:3b:9c: e2:19:28:5f:df:9e:89:d1:0a:db:64:46:01:d5:99:fd: c4:8e:38:b9:86:e7:af:d9:b7:e9:ef:54:f8:04:31:a3: e0:36:b1:f0:d8:f6:dc:bd:49:ca:72:ba:cc:5b:62:f9: 38:3f:7f:6b:b6:d9:75:34:1d:95:35:91:26:86:d8:4f: 51:0f:de:b0:00:e5:08:f8:78:e7:f3:8e:7c:18:f2:db: b7:ee:85:7f:cf:4a:d4:8c:18:f7:55:69:ae:ff:b2:36: 2b:4b:e9:ae:41:00:97:14:cc:d1:fe:a5:c4:9f:89:d9: 68:d3:51:f4:9b:5d:ae:14:3f:2d:da:26:35:8b:74:4e: 9a:40:cd:e6:e9:30:cb:d9:b8:00:b3:c2:fd:b1:70:ca: d4:c9:00:3f:5a:dc:1d:9d:cd:b2:24:c2:e7:31:50:21: 98:33:f5:6f:dc:8a:ae:79:df:ad:cf:6e:24:54:29:fc: 83:5f:fc:a4:49:5e:38:c7:0c:92:78:a9:3b:73:97:02: 8c:12:17:c6:19:2a:f6:34:11:6e:86:b9:6d:03:12:b0: 5b:13:f1:d5:15:9a:27:20:8c:e0:fb:49:15:1f:cc:85 Fingerprint (SHA-256): 44:DE:36:13:63:CC:D2:D6:90:81:C2:B5:83:C4:63:FD:89:1A:CF:DF:28:F8:FC:B5:32:07:37:76:99:FA:32:1E Fingerprint (SHA1): 01:F9:31:CE:50:CB:7F:78:20:6D:26:A0:66:12:87:8F:8D:5F:72:DA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1150: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145018 (0x3cafa8fa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Wed Oct 18 14:50:51 2023 Not After : Wed Oct 18 14:50:51 2073 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:1c:8f:f2:10:5f:de:17:9e:dc:8a:3b:2c:3d:13:e9: 3c:d0:46:74:bf:0f:9d:d2:e8:9d:db:f6:2f:80:68:b8: 71:c7:23:0e:80:38:71:63:ad:2d:09:8a:cd:6a:a8:a7: c2:c2:8e:3e:7d:66:1e:d4:af:44:03:99:ab:cf:e0:3f: af:7e:d9:d1:07:89:6d:be:e2:32:13:80:22:16:28:6e: 17:52:1b:98:b4:d3:03:00:4c:5b:1c:09:3f:c9:ed:bc: 7c:32:c6:ea:d9:48:90:5a:fa:19:55:ec:91:e4:a7:bc: 42:04:f3:f3:2b:cc:e8:52:a7:15:ad:ce:ae:63:a5:a1: 8f:ee:76:8e:69:a7:46:1d:cb:55:4d:f7:90:83:c5:86: 40:b1:ed:64:47:38:14:c6:8a:2a:91:3c:85:56:90:84: 52:5a:bf:d5:33:c9:db:b9:ad:3f:a2:80:24:f3:a6:ab: 23:c4:be:ea:ab:c9:de:4e:e6:dd:70:a0:23:ad:84:d8: 24:8a:36:b8:d4:e4:8e:e7:df:7c:de:63:b5:36:85:08: ec:b8:5c:42:2f:8c:47:5f:55:91:07:e9:f1:ac:c3:89: 2d:fb:09:b0:0f:80:63:98:d5:38:3b:59:b9:a3:12:49: a8:b2:ad:ec:f8:3b:91:2d:1d:dd:5a:be:37:09:2a:bd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5b:17:3f:b7:b1:99:bc:e2:9e:b1:89:d0:fa:ca:d7:fa: d6:91:98:9a:96:cd:b6:c9:14:08:96:02:87:ca:2d:a4: bf:b0:c1:17:0c:af:d3:9d:08:93:8d:97:e7:6c:40:b5: 3d:4e:b7:3c:90:ca:d2:09:59:8c:d2:b7:4f:97:a2:08: 6d:14:a9:ad:e2:a4:f0:5c:d7:10:70:9e:52:ec:ca:49: b6:04:a3:ad:a2:ba:7e:f7:c8:ec:db:5f:64:2a:26:aa: a9:25:30:69:be:21:b1:cb:1b:62:99:ac:cd:f0:da:06: 0e:3d:17:c8:81:c7:6e:ee:a5:12:fd:be:a2:9f:b7:41: 05:bb:ba:a6:49:ad:6e:16:74:4c:0d:20:88:9f:8e:6f: 2b:6b:4f:9c:af:d5:65:78:a4:12:6a:80:15:7a:f8:ec: 6f:4b:64:95:4e:55:66:3f:65:4e:2a:07:ca:00:1f:a2: 86:a2:1b:02:15:0f:6b:8d:80:d5:74:62:e7:43:3b:96: 20:14:85:ba:00:b1:29:17:59:a9:77:3e:10:ed:5f:48: 55:44:ca:66:72:0a:0c:f5:20:c9:b8:bd:0b:ca:49:68: 57:5d:a6:6c:49:e1:29:41:8b:ee:83:11:a5:30:ed:69: 85:3e:33:1b:6d:fe:97:5f:97:e0:6a:9b:5a:f8:8c:fe Fingerprint (SHA-256): 4F:68:BB:25:24:5E:36:3C:1E:25:FE:C6:BB:56:54:5E:DA:BC:64:A1:63:FB:4F:C7:8F:67:C1:6C:C9:A9:F3:44 Fingerprint (SHA1): 2E:7F:0C:CF:DA:8E:8C:FB:8F:71:FB:D9:5B:49:A4:80:F7:65:18:DC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1151: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1152: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145033 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1153: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1154: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1155: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1156: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018145034 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1157: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1158: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1159: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1160: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018145035 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1161: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1162: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1163: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1164: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018145036 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1165: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1166: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1167: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145033 (0x3cafa909) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:56 2023 Not After : Wed Oct 18 14:50:56 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:f1:8b:9e:2b:7f:1b:d8:28:cc:19:f6:6e:58:11:ba: d6:cc:40:02:5d:c4:88:2e:bc:b8:17:f5:62:8e:4c:01: ba:72:74:6a:85:9b:6e:16:ed:97:de:59:b3:b7:51:06: a1:b3:ac:40:54:9a:99:1f:65:dc:2e:d7:81:31:73:5d: a6:40:5a:2c:f3:40:e4:5e:ef:17:61:d2:ce:cb:9f:c5: f7:13:fd:d0:1f:bb:09:b7:4e:b6:b8:c6:a3:b3:7c:fb: 02:94:9f:03:74:29:d2:7a:25:87:ca:0c:4c:6e:21:6c: bf:56:2c:3c:80:af:a5:bb:bf:0c:70:cf:a7:31:17:73: ed:a5:71:73:01:2a:75:7f:32:be:b8:6d:15:d0:f0:a1: 97:45:f2:40:a7:c5:6e:58:a8:20:a2:ae:07:f1:4c:72: 41:2e:cc:7f:ec:2f:fe:df:90:b3:01:25:79:bf:b5:d9: 0d:2d:ab:9d:0e:4f:8b:8a:d1:81:4b:eb:5c:d7:59:4d: e2:ad:8b:0e:c4:e9:83:cd:5a:34:17:0c:02:70:13:4c: 82:3c:e0:07:2a:d3:45:67:a8:d5:59:ac:b6:00:41:d1: 6c:9c:fe:3e:ef:90:d2:a2:0c:70:0b:32:1d:62:e7:59: 8e:1b:49:9a:d9:bd:ac:1f:69:07:4e:f4:9d:1d:21:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:63:e7:f0:74:dd:99:ec:4f:49:35:cc:08:84:1b:00: 19:00:b4:7a:e9:4d:a4:75:a5:84:d5:0e:9e:52:b7:10: 86:8e:77:a0:0f:6a:41:72:b3:08:4a:d3:38:9c:ae:7b: 9d:d5:7c:62:5a:9d:9f:c1:a8:1b:47:a3:b3:e0:d2:ef: ca:f9:7a:d2:b8:ac:64:a3:50:6b:df:d6:22:4e:30:71: 03:3e:b4:aa:2e:c5:21:b3:0c:34:f0:40:80:f4:17:06: 3a:59:62:5a:bd:de:60:94:35:1e:60:ea:c2:c8:45:ad: a7:a7:17:6e:12:d6:9d:c0:26:17:78:92:4b:5e:5e:57: d5:36:2d:b2:6e:51:2d:d5:f4:13:fa:2e:aa:0a:dd:38: 9d:b2:e2:5e:52:95:60:38:fd:40:2d:b6:12:72:d1:4e: c6:16:9e:fa:e5:95:26:ef:c7:2e:ca:dc:af:7c:73:36: 00:eb:ab:c8:cf:32:ef:c5:06:e1:42:3c:4b:d5:c8:46: e3:0b:28:23:a2:6b:8b:24:05:7f:07:23:4c:e7:27:ca: f8:06:37:86:18:e7:10:2c:3f:43:8d:65:0f:cd:a9:1c: d5:ec:45:69:70:cc:16:e3:a1:76:65:66:18:57:d8:ab: 4b:0b:16:72:4b:1c:37:43:4b:ca:89:76:01:1d:1b:07 Fingerprint (SHA-256): BB:F3:29:4D:A4:B8:AE:24:B2:1D:15:B1:31:61:A5:5C:5C:70:23:B0:71:52:37:CE:4B:6D:A0:A1:4D:00:ED:28 Fingerprint (SHA1): B8:DA:A9:C6:2C:62:B7:2C:CD:8F:14:3E:E1:A5:93:B3:E2:4F:85:9F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1168: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1169: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145034 (0x3cafa90a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:56 2023 Not After : Wed Oct 18 14:50:56 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:3c:92:f2:37:77:30:b3:9f:90:67:ca:6d:f5:a4:75: d5:a2:99:bc:b9:70:ad:b6:8e:b4:d1:f4:49:87:a1:f3: 95:7a:d6:25:3d:9e:00:9d:3f:23:78:7b:c2:19:3d:e6: c0:e0:11:99:2e:d0:f6:3e:aa:41:7f:45:57:ec:cd:8a: 39:4a:34:38:65:37:a6:90:4f:71:ee:5d:9f:91:6f:a5: 92:fa:36:22:fd:9a:61:68:1b:21:e3:fc:fd:25:ff:ae: 17:f7:19:b1:8e:00:9f:3c:b7:f9:3d:ad:ab:a1:2f:f7: e9:56:62:17:fb:45:95:06:e3:b5:d7:51:98:27:33:1b: 34:83:67:43:70:e5:52:22:08:f2:b1:4b:72:d8:5c:a5: 26:c9:7f:25:e3:18:ef:d1:55:8e:5f:57:75:6e:38:f0: dd:d2:f2:bf:eb:7f:c7:a2:be:69:13:7c:3b:d3:93:6a: 21:cd:86:e3:eb:5d:0b:13:9c:b6:e3:b8:77:06:6c:9d: 3c:4a:ec:40:48:24:da:bf:d3:5e:09:35:3d:4a:a3:c4: 03:6c:ea:93:75:4c:cb:16:0f:2f:b4:40:d6:89:d3:04: a9:40:17:c1:99:df:37:4e:1a:fc:ec:eb:f5:7f:db:91: f8:45:8a:aa:c5:0d:75:2d:a1:08:69:fe:25:17:56:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:62:32:c8:f7:4b:75:32:12:8a:a7:09:15:db:4e:c7: 28:55:6f:f3:1f:6f:7d:73:88:fb:c9:81:05:57:04:d2: d4:e2:41:6d:63:49:4e:06:2d:06:0a:df:85:06:6f:c8: 72:cc:90:9d:12:2b:cf:de:82:9b:09:94:ab:89:5c:4c: 5b:f3:33:c3:7f:a5:4f:04:01:64:e0:04:7d:14:43:44: 8f:ce:5b:18:b2:72:c9:f5:96:e5:49:4b:e5:39:50:73: aa:96:80:d5:75:77:59:a1:1c:2f:45:ee:c0:d2:3b:65: 4c:2b:e8:ce:3e:49:70:a8:fe:63:79:d8:f8:75:b8:aa: 8c:8a:cc:95:12:26:6c:34:f8:cf:db:8c:6d:0b:82:11: a6:e7:ba:13:d0:42:d8:d2:d0:bc:74:ea:77:ce:72:09: 94:eb:be:00:21:5a:5d:d1:d3:22:df:74:70:76:6d:7c: 16:38:e0:2c:89:a4:13:e7:4a:29:6d:d4:6c:72:a6:f0: ee:13:34:08:08:b4:b0:56:02:a3:4d:f9:f8:f2:22:59: 8f:cd:a9:32:e3:75:2d:37:c8:14:0a:4a:7d:c8:4b:dc: 75:49:56:ce:ab:92:a5:47:90:39:40:09:b5:99:2c:7a: 51:eb:53:c1:cc:d5:58:f8:5f:bf:f5:5f:f0:ed:6c:1d Fingerprint (SHA-256): 4F:38:7B:0D:EF:12:FF:B6:F1:E5:FE:3D:B6:0C:C7:D1:57:DE:23:D0:61:DE:95:33:21:A0:47:55:31:2C:65:05 Fingerprint (SHA1): C5:D9:5B:C0:4F:A6:01:7D:4B:D3:07:61:EB:34:9E:22:AA:27:24:03 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1170: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1171: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145035 (0x3cafa90b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:50:56 2023 Not After : Wed Oct 18 14:50:56 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:59:67:b8:3e:7a:8f:b5:1c:52:21:4d:f1:dd:50:36: 7d:61:4d:12:84:6a:3d:fe:bc:16:20:3b:4b:f4:4a:99: 45:e0:84:a8:17:a7:41:6e:d4:58:0c:ce:e4:17:f2:2f: 7b:a7:02:4d:49:20:66:97:ed:4d:8b:c0:99:54:95:3d: 1c:e2:94:54:96:1c:fc:35:8c:57:e8:8e:ca:33:d6:2c: 52:9d:a7:8c:d6:1a:ad:f2:86:30:6f:f4:a1:2f:5b:71: 9e:55:a8:5e:2e:ab:05:89:2f:8a:84:ca:31:a3:78:f5: f9:09:73:2b:a0:4e:7b:8c:9b:a7:e6:eb:04:fe:29:44: c9:40:01:d9:7f:28:26:a5:97:3f:61:ca:83:4d:6b:9d: 9e:c0:65:e5:d5:e4:02:6f:db:eb:a6:23:1e:25:05:9b: 8f:e3:1a:ae:37:6d:d1:a5:db:8e:29:5c:10:70:b7:e0: ed:8f:5e:df:76:7f:f7:96:6a:7b:79:38:64:3b:f0:88: 11:3a:3b:3f:b8:79:fe:26:5c:b8:d5:94:d2:a8:49:0e: e6:e0:32:64:8b:ac:9a:22:c4:8c:08:59:f3:d2:88:05: 41:f2:c7:58:11:09:51:6d:b1:3b:37:b3:34:78:e5:d1: be:5f:15:43:f7:21:f4:ec:eb:ce:e2:dc:9b:5c:33:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:89:39:d8:68:a0:69:53:7f:bd:2c:0f:50:e1:e6:f5: 13:0b:5f:4e:51:56:89:ec:33:7f:6a:22:7e:d5:27:e7: 0a:39:a2:a6:f8:0f:45:cb:40:8c:e7:0c:7d:46:a7:ad: b3:b4:e7:c0:8e:48:ed:72:35:16:61:8f:91:83:73:0b: 48:e4:bb:cb:53:4d:7d:b5:6f:e4:3c:1c:9b:a0:17:60: 3b:eb:e6:50:70:e3:ae:99:b1:7b:48:a2:53:d5:f7:7d: a7:9b:7f:0e:33:46:43:f7:e8:71:cd:b6:39:37:af:57: 81:c2:ca:c2:4e:90:52:1c:37:26:b3:b4:05:5c:7d:31: 4e:aa:bf:4f:e8:35:2a:7c:0f:36:4a:ea:a3:8d:f2:c2: 28:6d:57:4b:48:bd:6c:91:3c:24:46:d9:76:91:87:9b: 90:e2:10:25:0e:a8:4f:11:63:59:a4:22:d2:83:67:5e: e7:b6:5d:4c:cb:88:2f:4c:46:5f:7b:5c:ac:81:67:af: 7a:ca:97:86:0a:77:ca:66:0d:94:47:dd:33:93:30:9c: aa:19:84:71:be:87:25:00:f8:31:48:58:5e:b7:75:62: 70:ae:5a:b1:f1:2a:45:a2:77:64:fe:b0:2e:b3:db:f3: 0e:c6:12:95:f7:70:63:da:0d:db:ea:a2:f6:52:21:be Fingerprint (SHA-256): E0:7B:9C:C1:B4:C2:5C:12:3B:C8:58:1D:8B:9F:17:C8:12:64:C4:2C:4B:36:6B:73:06:60:FD:EF:4F:C2:A8:03 Fingerprint (SHA1): E0:25:84:F4:BA:B7:50:B9:8F:C3:66:63:E9:00:15:EF:ED:7F:6C:45 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1172: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1173: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1174: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1175: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1176: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145033 (0x3cafa909) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:56 2023 Not After : Wed Oct 18 14:50:56 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:f1:8b:9e:2b:7f:1b:d8:28:cc:19:f6:6e:58:11:ba: d6:cc:40:02:5d:c4:88:2e:bc:b8:17:f5:62:8e:4c:01: ba:72:74:6a:85:9b:6e:16:ed:97:de:59:b3:b7:51:06: a1:b3:ac:40:54:9a:99:1f:65:dc:2e:d7:81:31:73:5d: a6:40:5a:2c:f3:40:e4:5e:ef:17:61:d2:ce:cb:9f:c5: f7:13:fd:d0:1f:bb:09:b7:4e:b6:b8:c6:a3:b3:7c:fb: 02:94:9f:03:74:29:d2:7a:25:87:ca:0c:4c:6e:21:6c: bf:56:2c:3c:80:af:a5:bb:bf:0c:70:cf:a7:31:17:73: ed:a5:71:73:01:2a:75:7f:32:be:b8:6d:15:d0:f0:a1: 97:45:f2:40:a7:c5:6e:58:a8:20:a2:ae:07:f1:4c:72: 41:2e:cc:7f:ec:2f:fe:df:90:b3:01:25:79:bf:b5:d9: 0d:2d:ab:9d:0e:4f:8b:8a:d1:81:4b:eb:5c:d7:59:4d: e2:ad:8b:0e:c4:e9:83:cd:5a:34:17:0c:02:70:13:4c: 82:3c:e0:07:2a:d3:45:67:a8:d5:59:ac:b6:00:41:d1: 6c:9c:fe:3e:ef:90:d2:a2:0c:70:0b:32:1d:62:e7:59: 8e:1b:49:9a:d9:bd:ac:1f:69:07:4e:f4:9d:1d:21:7b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a5:63:e7:f0:74:dd:99:ec:4f:49:35:cc:08:84:1b:00: 19:00:b4:7a:e9:4d:a4:75:a5:84:d5:0e:9e:52:b7:10: 86:8e:77:a0:0f:6a:41:72:b3:08:4a:d3:38:9c:ae:7b: 9d:d5:7c:62:5a:9d:9f:c1:a8:1b:47:a3:b3:e0:d2:ef: ca:f9:7a:d2:b8:ac:64:a3:50:6b:df:d6:22:4e:30:71: 03:3e:b4:aa:2e:c5:21:b3:0c:34:f0:40:80:f4:17:06: 3a:59:62:5a:bd:de:60:94:35:1e:60:ea:c2:c8:45:ad: a7:a7:17:6e:12:d6:9d:c0:26:17:78:92:4b:5e:5e:57: d5:36:2d:b2:6e:51:2d:d5:f4:13:fa:2e:aa:0a:dd:38: 9d:b2:e2:5e:52:95:60:38:fd:40:2d:b6:12:72:d1:4e: c6:16:9e:fa:e5:95:26:ef:c7:2e:ca:dc:af:7c:73:36: 00:eb:ab:c8:cf:32:ef:c5:06:e1:42:3c:4b:d5:c8:46: e3:0b:28:23:a2:6b:8b:24:05:7f:07:23:4c:e7:27:ca: f8:06:37:86:18:e7:10:2c:3f:43:8d:65:0f:cd:a9:1c: d5:ec:45:69:70:cc:16:e3:a1:76:65:66:18:57:d8:ab: 4b:0b:16:72:4b:1c:37:43:4b:ca:89:76:01:1d:1b:07 Fingerprint (SHA-256): BB:F3:29:4D:A4:B8:AE:24:B2:1D:15:B1:31:61:A5:5C:5C:70:23:B0:71:52:37:CE:4B:6D:A0:A1:4D:00:ED:28 Fingerprint (SHA1): B8:DA:A9:C6:2C:62:B7:2C:CD:8F:14:3E:E1:A5:93:B3:E2:4F:85:9F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1177: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1178: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145034 (0x3cafa90a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:56 2023 Not After : Wed Oct 18 14:50:56 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:3c:92:f2:37:77:30:b3:9f:90:67:ca:6d:f5:a4:75: d5:a2:99:bc:b9:70:ad:b6:8e:b4:d1:f4:49:87:a1:f3: 95:7a:d6:25:3d:9e:00:9d:3f:23:78:7b:c2:19:3d:e6: c0:e0:11:99:2e:d0:f6:3e:aa:41:7f:45:57:ec:cd:8a: 39:4a:34:38:65:37:a6:90:4f:71:ee:5d:9f:91:6f:a5: 92:fa:36:22:fd:9a:61:68:1b:21:e3:fc:fd:25:ff:ae: 17:f7:19:b1:8e:00:9f:3c:b7:f9:3d:ad:ab:a1:2f:f7: e9:56:62:17:fb:45:95:06:e3:b5:d7:51:98:27:33:1b: 34:83:67:43:70:e5:52:22:08:f2:b1:4b:72:d8:5c:a5: 26:c9:7f:25:e3:18:ef:d1:55:8e:5f:57:75:6e:38:f0: dd:d2:f2:bf:eb:7f:c7:a2:be:69:13:7c:3b:d3:93:6a: 21:cd:86:e3:eb:5d:0b:13:9c:b6:e3:b8:77:06:6c:9d: 3c:4a:ec:40:48:24:da:bf:d3:5e:09:35:3d:4a:a3:c4: 03:6c:ea:93:75:4c:cb:16:0f:2f:b4:40:d6:89:d3:04: a9:40:17:c1:99:df:37:4e:1a:fc:ec:eb:f5:7f:db:91: f8:45:8a:aa:c5:0d:75:2d:a1:08:69:fe:25:17:56:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:62:32:c8:f7:4b:75:32:12:8a:a7:09:15:db:4e:c7: 28:55:6f:f3:1f:6f:7d:73:88:fb:c9:81:05:57:04:d2: d4:e2:41:6d:63:49:4e:06:2d:06:0a:df:85:06:6f:c8: 72:cc:90:9d:12:2b:cf:de:82:9b:09:94:ab:89:5c:4c: 5b:f3:33:c3:7f:a5:4f:04:01:64:e0:04:7d:14:43:44: 8f:ce:5b:18:b2:72:c9:f5:96:e5:49:4b:e5:39:50:73: aa:96:80:d5:75:77:59:a1:1c:2f:45:ee:c0:d2:3b:65: 4c:2b:e8:ce:3e:49:70:a8:fe:63:79:d8:f8:75:b8:aa: 8c:8a:cc:95:12:26:6c:34:f8:cf:db:8c:6d:0b:82:11: a6:e7:ba:13:d0:42:d8:d2:d0:bc:74:ea:77:ce:72:09: 94:eb:be:00:21:5a:5d:d1:d3:22:df:74:70:76:6d:7c: 16:38:e0:2c:89:a4:13:e7:4a:29:6d:d4:6c:72:a6:f0: ee:13:34:08:08:b4:b0:56:02:a3:4d:f9:f8:f2:22:59: 8f:cd:a9:32:e3:75:2d:37:c8:14:0a:4a:7d:c8:4b:dc: 75:49:56:ce:ab:92:a5:47:90:39:40:09:b5:99:2c:7a: 51:eb:53:c1:cc:d5:58:f8:5f:bf:f5:5f:f0:ed:6c:1d Fingerprint (SHA-256): 4F:38:7B:0D:EF:12:FF:B6:F1:E5:FE:3D:B6:0C:C7:D1:57:DE:23:D0:61:DE:95:33:21:A0:47:55:31:2C:65:05 Fingerprint (SHA1): C5:D9:5B:C0:4F:A6:01:7D:4B:D3:07:61:EB:34:9E:22:AA:27:24:03 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1179: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1180: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145035 (0x3cafa90b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:50:56 2023 Not After : Wed Oct 18 14:50:56 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b1:59:67:b8:3e:7a:8f:b5:1c:52:21:4d:f1:dd:50:36: 7d:61:4d:12:84:6a:3d:fe:bc:16:20:3b:4b:f4:4a:99: 45:e0:84:a8:17:a7:41:6e:d4:58:0c:ce:e4:17:f2:2f: 7b:a7:02:4d:49:20:66:97:ed:4d:8b:c0:99:54:95:3d: 1c:e2:94:54:96:1c:fc:35:8c:57:e8:8e:ca:33:d6:2c: 52:9d:a7:8c:d6:1a:ad:f2:86:30:6f:f4:a1:2f:5b:71: 9e:55:a8:5e:2e:ab:05:89:2f:8a:84:ca:31:a3:78:f5: f9:09:73:2b:a0:4e:7b:8c:9b:a7:e6:eb:04:fe:29:44: c9:40:01:d9:7f:28:26:a5:97:3f:61:ca:83:4d:6b:9d: 9e:c0:65:e5:d5:e4:02:6f:db:eb:a6:23:1e:25:05:9b: 8f:e3:1a:ae:37:6d:d1:a5:db:8e:29:5c:10:70:b7:e0: ed:8f:5e:df:76:7f:f7:96:6a:7b:79:38:64:3b:f0:88: 11:3a:3b:3f:b8:79:fe:26:5c:b8:d5:94:d2:a8:49:0e: e6:e0:32:64:8b:ac:9a:22:c4:8c:08:59:f3:d2:88:05: 41:f2:c7:58:11:09:51:6d:b1:3b:37:b3:34:78:e5:d1: be:5f:15:43:f7:21:f4:ec:eb:ce:e2:dc:9b:5c:33:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:89:39:d8:68:a0:69:53:7f:bd:2c:0f:50:e1:e6:f5: 13:0b:5f:4e:51:56:89:ec:33:7f:6a:22:7e:d5:27:e7: 0a:39:a2:a6:f8:0f:45:cb:40:8c:e7:0c:7d:46:a7:ad: b3:b4:e7:c0:8e:48:ed:72:35:16:61:8f:91:83:73:0b: 48:e4:bb:cb:53:4d:7d:b5:6f:e4:3c:1c:9b:a0:17:60: 3b:eb:e6:50:70:e3:ae:99:b1:7b:48:a2:53:d5:f7:7d: a7:9b:7f:0e:33:46:43:f7:e8:71:cd:b6:39:37:af:57: 81:c2:ca:c2:4e:90:52:1c:37:26:b3:b4:05:5c:7d:31: 4e:aa:bf:4f:e8:35:2a:7c:0f:36:4a:ea:a3:8d:f2:c2: 28:6d:57:4b:48:bd:6c:91:3c:24:46:d9:76:91:87:9b: 90:e2:10:25:0e:a8:4f:11:63:59:a4:22:d2:83:67:5e: e7:b6:5d:4c:cb:88:2f:4c:46:5f:7b:5c:ac:81:67:af: 7a:ca:97:86:0a:77:ca:66:0d:94:47:dd:33:93:30:9c: aa:19:84:71:be:87:25:00:f8:31:48:58:5e:b7:75:62: 70:ae:5a:b1:f1:2a:45:a2:77:64:fe:b0:2e:b3:db:f3: 0e:c6:12:95:f7:70:63:da:0d:db:ea:a2:f6:52:21:be Fingerprint (SHA-256): E0:7B:9C:C1:B4:C2:5C:12:3B:C8:58:1D:8B:9F:17:C8:12:64:C4:2C:4B:36:6B:73:06:60:FD:EF:4F:C2:A8:03 Fingerprint (SHA1): E0:25:84:F4:BA:B7:50:B9:8F:C3:66:63:E9:00:15:EF:ED:7F:6C:45 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1181: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1182: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1183: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145037 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1184: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1185: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1186: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1187: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018145038 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1188: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1189: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1190: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1191: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018145039 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1192: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1193: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1194: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1195: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018145040 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1196: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1197: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1198: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1199: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018145041 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1200: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1201: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1202: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145037 (0x3cafa90d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:58 2023 Not After : Wed Oct 18 14:50:58 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:8b:5e:32:d8:13:bb:d2:6e:a2:d4:30:8c:8a:dd:ab: 71:25:30:d4:f7:58:e2:3f:7d:df:4f:93:3c:79:a8:ad: 7b:04:80:6e:c7:5d:9b:50:84:02:58:dd:6d:70:1a:60: 8d:b0:d8:ad:71:bb:37:98:5e:d3:76:2c:51:3e:13:8f: d2:69:64:d2:5a:03:c6:9b:6a:72:2f:f6:80:44:db:aa: 39:f6:fa:ec:86:ea:01:29:15:45:6a:54:b5:0f:3d:47: 0c:9e:39:90:35:0d:01:44:f0:c2:54:79:89:0c:9c:34: bd:83:be:9e:1b:56:3d:f6:f7:35:e6:c7:cf:15:32:22: 36:3c:09:bd:ee:9b:a5:15:8b:0d:49:7a:c1:96:52:a1: a3:9e:7f:af:62:4a:b4:d2:29:49:d0:fe:64:1b:ae:23: 72:a8:22:c3:17:1d:5e:91:39:3a:dc:75:5e:3c:f2:9c: b6:4b:35:62:df:94:74:c8:f2:a8:7c:6b:94:ba:0a:b2: cd:33:c0:31:4a:08:23:49:43:f3:cb:38:48:93:1b:45: 48:19:df:a6:62:2c:58:9f:8a:08:ed:71:03:c5:a8:f1: 02:30:d0:9d:6c:9f:03:ba:08:10:96:c7:03:49:32:d9: dc:53:18:4f:bc:52:c1:12:f7:c0:bb:22:12:a5:4c:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:19:32:f6:10:33:8e:fe:d8:52:80:e8:12:79:6b:db: 8e:89:ef:e5:b6:c7:41:7a:2d:3b:21:60:0d:1b:26:3b: d6:2f:cd:34:56:0b:95:24:3a:bd:b5:1e:67:7f:32:6f: fc:51:ec:51:3c:d9:00:a5:c9:04:af:0e:9a:9c:32:26: 13:0b:a7:08:f7:0b:84:e4:8f:6b:73:67:be:a1:f8:4d: 18:14:85:1d:54:fb:a2:7e:17:2f:73:b3:df:f1:a7:f9: 0e:b0:83:1c:22:04:b3:77:9a:51:4e:d2:f7:e4:9b:f7: 2b:21:69:8e:35:0b:54:2c:7a:a8:1c:cd:98:5b:b8:7a: 0b:4d:2c:93:0c:33:00:63:33:92:0f:d8:08:42:c8:f6: 5f:3b:cf:df:25:3a:dd:77:9e:f5:bd:35:0c:b3:2b:08: b4:57:c7:87:cf:14:80:f3:56:3e:21:e0:f2:8e:e3:67: b6:76:ff:31:ee:c8:c1:4c:11:91:e5:f3:68:e8:0e:be: 5e:2c:d5:e4:31:c2:a3:38:0b:fb:d3:05:80:bf:57:78: 76:6d:02:b8:a6:e1:5c:2e:16:a1:2c:2a:7c:1f:bd:5d: 5d:c9:b3:c5:7c:d8:d1:d4:74:3c:72:66:6d:a5:08:6d: cc:bb:50:f3:5b:f1:35:f4:93:b3:c0:3d:7b:ab:98:58 Fingerprint (SHA-256): 9E:B5:77:61:7F:96:E9:FC:2E:19:28:76:5D:26:A2:93:A3:2B:EA:5B:0B:FD:3C:18:11:84:0B:58:60:D0:15:9B Fingerprint (SHA1): CA:C5:DF:08:1F:A2:0C:C3:8A:15:94:FF:A2:74:6D:78:A5:83:C6:E8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1203: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1204: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145038 (0x3cafa90e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:58 2023 Not After : Wed Oct 18 14:50:58 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:ae:52:bc:72:24:d7:cf:6a:78:a7:af:53:c4:03:93: a3:58:4c:a4:a4:6c:7a:67:13:62:12:97:36:fe:dc:ac: df:94:e6:35:29:27:ed:fe:8e:79:43:7a:d7:01:b1:9d: d5:0c:ae:c4:6c:a3:09:53:9d:81:77:8b:c0:e9:95:74: 12:4e:75:02:36:94:ff:f2:1d:2e:98:99:c3:ad:01:ef: ea:12:bf:ff:b1:64:38:b0:ba:c1:1a:a0:cc:a0:ab:d4: e9:4f:0c:93:7c:70:c6:94:78:10:47:46:27:c8:a5:0a: c8:e8:2b:9c:1c:a5:f4:f4:c0:02:7f:14:4a:b1:9a:f4: 66:7d:18:da:e6:16:af:98:f2:70:35:8a:5f:26:da:de: 92:b4:af:d3:11:8f:4c:ac:4a:78:91:98:39:64:d7:15: fb:c0:b6:66:7b:7a:11:68:40:ca:8d:6c:c2:bf:2b:d4: 0f:00:2c:f2:db:2c:3b:f7:1d:4b:e3:99:e0:fd:46:09: aa:e5:b8:35:d7:f2:17:1f:ca:cf:f2:89:ba:de:04:a3: 63:0e:1f:a2:81:e6:3b:8d:11:49:9e:53:e6:91:06:28: 42:0c:4e:35:61:99:b1:88:25:87:fd:b8:fa:02:14:0e: 31:ff:47:1e:54:df:62:e1:b2:18:a2:89:69:30:ed:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:d6:1a:82:fa:f3:98:0a:28:cb:17:a7:88:2b:2f:d5: f6:f8:d6:b4:4b:99:1e:f6:88:29:e0:98:59:c8:9f:06: 60:dc:c3:6b:e3:70:12:58:be:d8:b5:ff:5d:6c:2a:a5: 83:26:47:9d:a7:e3:11:a1:e3:05:e5:69:44:08:fc:12: c0:7c:25:91:42:4b:a8:b0:85:15:b0:3f:34:94:f6:a9: 1f:83:6b:e5:ee:ef:8d:7e:63:0a:28:44:75:e0:dc:20: b1:3e:43:0a:0e:09:24:f7:9e:51:d4:04:e3:8a:3f:3a: 06:eb:ff:0b:63:5d:29:69:ab:9a:b7:e4:09:c4:9b:6e: 2e:52:dc:94:5a:1f:64:15:ca:ad:56:86:52:ac:34:f6: 23:2d:e7:d1:e9:65:e1:66:a1:34:89:72:41:6c:a9:e0: 50:36:c8:72:be:ec:41:b6:5d:fa:5a:7b:6e:19:d1:7c: 2e:2d:81:9c:6e:e4:fa:69:75:93:9e:72:ca:bf:00:71: dd:18:70:4f:f9:aa:b7:fa:f9:32:40:ca:70:62:5e:3e: 56:90:65:ea:fa:a2:2e:ed:4e:39:b3:21:37:33:dc:bf: 07:cf:82:69:e0:91:9f:c0:c3:b4:38:3e:12:c0:49:7e: e8:ff:e2:04:15:dd:f6:0a:5b:71:fe:4a:80:04:d7:35 Fingerprint (SHA-256): 66:6C:16:69:6B:0C:6B:E5:2B:0D:ED:34:BE:7B:1D:32:BC:6D:55:18:E7:63:94:DE:8F:F4:0F:7A:FD:50:01:47 Fingerprint (SHA1): 46:88:5E:82:26:8F:BD:7A:1D:FA:6D:13:3C:D2:5F:45:19:80:BA:7D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1205: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1206: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145039 (0x3cafa90f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:50:59 2023 Not After : Wed Oct 18 14:50:59 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:1a:80:87:98:0d:91:a8:4f:ee:0d:89:66:6d:30:f0: e3:11:71:7c:71:26:ee:da:95:d5:82:b4:b5:46:8a:60: 94:2f:0d:11:70:72:3d:5e:47:b1:2c:3e:ae:5e:35:30: 68:68:37:c9:ad:b8:4f:4d:f1:c2:6f:1c:b5:38:23:4b: 5e:e3:0c:23:1a:50:46:db:71:2f:6e:1a:92:14:e5:17: 5d:cb:c9:bd:fe:ec:34:30:93:32:fb:d5:27:6a:79:bf: 99:4c:06:33:8d:d8:bc:f4:5c:0f:25:19:89:c0:06:8c: a8:a1:a9:fe:2a:a6:36:ee:3f:a9:57:19:1b:bd:88:3c: 13:32:33:e3:d8:fa:8e:26:2e:4c:9b:19:00:1a:7a:06: 14:81:80:d2:f2:0d:bb:c1:f1:c0:ed:a7:5c:ab:49:4c: cd:4d:88:70:23:b1:f7:39:5e:68:93:d6:e6:80:80:6f: cd:78:ed:d5:2e:46:0b:ab:6b:ce:01:d1:85:df:b3:96: 41:a5:c2:24:06:ab:d0:fd:17:94:83:49:cb:b4:ef:2a: ae:94:e3:7e:3b:2e:2d:cf:6e:ec:f1:80:6e:49:bd:71: ea:55:b3:4a:ad:63:d0:c7:f9:a1:c3:50:af:f3:d9:2e: 24:c9:d6:1b:30:fd:0a:99:ed:19:72:89:5d:5b:89:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:6a:d2:50:d1:da:7c:db:a0:37:ae:6d:09:f8:e7:96: 8e:44:5c:6b:52:fa:2e:1f:83:88:5c:98:26:c2:b5:2c: 44:20:d2:c4:31:d5:df:4c:0b:5f:a8:92:29:f8:29:6c: 7b:5f:7e:33:b4:6f:e5:6c:8b:37:6c:a1:ba:ad:e5:62: 50:28:3b:f2:c4:e9:71:1b:f7:60:f2:91:1c:ed:09:e0: fd:bd:d5:92:70:0b:50:08:0c:98:19:8f:38:27:27:83: 46:eb:ee:0f:d1:b8:c0:8b:95:78:26:4c:2b:3e:09:81: 05:9e:71:35:2c:46:c1:61:13:e2:a3:16:2e:69:40:f5: 7e:d5:6a:bc:61:27:9d:3a:42:e0:89:71:68:97:de:bf: ba:f0:f9:92:1d:92:8e:d0:63:63:bf:68:ae:63:f6:bf: b7:2a:ac:1c:f7:95:d0:c7:51:5e:d8:4f:7c:7f:e8:dd: fd:76:f3:ee:63:78:db:18:14:1f:e7:ef:09:9d:93:00: 98:ac:5a:fa:e6:cc:b7:38:4b:16:8d:50:f0:d5:bc:55: 03:3b:44:3d:3c:57:5d:10:05:01:b7:70:b7:18:ea:d7: 86:37:7c:c8:8c:27:8a:d9:d5:d3:02:d8:49:3f:7b:c8: e2:b9:84:bd:e9:b9:0a:ed:ed:2b:20:d1:d6:df:e2:b7 Fingerprint (SHA-256): 75:6F:38:8B:27:C7:C3:19:76:0A:B6:1C:EF:F7:C4:F5:DB:19:B4:EA:EF:7E:B8:B6:58:AE:79:A5:B5:D2:29:6D Fingerprint (SHA1): 90:34:3A:F7:56:AF:15:01:AC:C6:74:D2:9E:0A:56:FF:82:1E:3D:60 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1207: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1208: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1209: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1210: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1211: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145037 (0x3cafa90d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:58 2023 Not After : Wed Oct 18 14:50:58 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:8b:5e:32:d8:13:bb:d2:6e:a2:d4:30:8c:8a:dd:ab: 71:25:30:d4:f7:58:e2:3f:7d:df:4f:93:3c:79:a8:ad: 7b:04:80:6e:c7:5d:9b:50:84:02:58:dd:6d:70:1a:60: 8d:b0:d8:ad:71:bb:37:98:5e:d3:76:2c:51:3e:13:8f: d2:69:64:d2:5a:03:c6:9b:6a:72:2f:f6:80:44:db:aa: 39:f6:fa:ec:86:ea:01:29:15:45:6a:54:b5:0f:3d:47: 0c:9e:39:90:35:0d:01:44:f0:c2:54:79:89:0c:9c:34: bd:83:be:9e:1b:56:3d:f6:f7:35:e6:c7:cf:15:32:22: 36:3c:09:bd:ee:9b:a5:15:8b:0d:49:7a:c1:96:52:a1: a3:9e:7f:af:62:4a:b4:d2:29:49:d0:fe:64:1b:ae:23: 72:a8:22:c3:17:1d:5e:91:39:3a:dc:75:5e:3c:f2:9c: b6:4b:35:62:df:94:74:c8:f2:a8:7c:6b:94:ba:0a:b2: cd:33:c0:31:4a:08:23:49:43:f3:cb:38:48:93:1b:45: 48:19:df:a6:62:2c:58:9f:8a:08:ed:71:03:c5:a8:f1: 02:30:d0:9d:6c:9f:03:ba:08:10:96:c7:03:49:32:d9: dc:53:18:4f:bc:52:c1:12:f7:c0:bb:22:12:a5:4c:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:19:32:f6:10:33:8e:fe:d8:52:80:e8:12:79:6b:db: 8e:89:ef:e5:b6:c7:41:7a:2d:3b:21:60:0d:1b:26:3b: d6:2f:cd:34:56:0b:95:24:3a:bd:b5:1e:67:7f:32:6f: fc:51:ec:51:3c:d9:00:a5:c9:04:af:0e:9a:9c:32:26: 13:0b:a7:08:f7:0b:84:e4:8f:6b:73:67:be:a1:f8:4d: 18:14:85:1d:54:fb:a2:7e:17:2f:73:b3:df:f1:a7:f9: 0e:b0:83:1c:22:04:b3:77:9a:51:4e:d2:f7:e4:9b:f7: 2b:21:69:8e:35:0b:54:2c:7a:a8:1c:cd:98:5b:b8:7a: 0b:4d:2c:93:0c:33:00:63:33:92:0f:d8:08:42:c8:f6: 5f:3b:cf:df:25:3a:dd:77:9e:f5:bd:35:0c:b3:2b:08: b4:57:c7:87:cf:14:80:f3:56:3e:21:e0:f2:8e:e3:67: b6:76:ff:31:ee:c8:c1:4c:11:91:e5:f3:68:e8:0e:be: 5e:2c:d5:e4:31:c2:a3:38:0b:fb:d3:05:80:bf:57:78: 76:6d:02:b8:a6:e1:5c:2e:16:a1:2c:2a:7c:1f:bd:5d: 5d:c9:b3:c5:7c:d8:d1:d4:74:3c:72:66:6d:a5:08:6d: cc:bb:50:f3:5b:f1:35:f4:93:b3:c0:3d:7b:ab:98:58 Fingerprint (SHA-256): 9E:B5:77:61:7F:96:E9:FC:2E:19:28:76:5D:26:A2:93:A3:2B:EA:5B:0B:FD:3C:18:11:84:0B:58:60:D0:15:9B Fingerprint (SHA1): CA:C5:DF:08:1F:A2:0C:C3:8A:15:94:FF:A2:74:6D:78:A5:83:C6:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1212: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1213: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145038 (0x3cafa90e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:58 2023 Not After : Wed Oct 18 14:50:58 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:ae:52:bc:72:24:d7:cf:6a:78:a7:af:53:c4:03:93: a3:58:4c:a4:a4:6c:7a:67:13:62:12:97:36:fe:dc:ac: df:94:e6:35:29:27:ed:fe:8e:79:43:7a:d7:01:b1:9d: d5:0c:ae:c4:6c:a3:09:53:9d:81:77:8b:c0:e9:95:74: 12:4e:75:02:36:94:ff:f2:1d:2e:98:99:c3:ad:01:ef: ea:12:bf:ff:b1:64:38:b0:ba:c1:1a:a0:cc:a0:ab:d4: e9:4f:0c:93:7c:70:c6:94:78:10:47:46:27:c8:a5:0a: c8:e8:2b:9c:1c:a5:f4:f4:c0:02:7f:14:4a:b1:9a:f4: 66:7d:18:da:e6:16:af:98:f2:70:35:8a:5f:26:da:de: 92:b4:af:d3:11:8f:4c:ac:4a:78:91:98:39:64:d7:15: fb:c0:b6:66:7b:7a:11:68:40:ca:8d:6c:c2:bf:2b:d4: 0f:00:2c:f2:db:2c:3b:f7:1d:4b:e3:99:e0:fd:46:09: aa:e5:b8:35:d7:f2:17:1f:ca:cf:f2:89:ba:de:04:a3: 63:0e:1f:a2:81:e6:3b:8d:11:49:9e:53:e6:91:06:28: 42:0c:4e:35:61:99:b1:88:25:87:fd:b8:fa:02:14:0e: 31:ff:47:1e:54:df:62:e1:b2:18:a2:89:69:30:ed:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:d6:1a:82:fa:f3:98:0a:28:cb:17:a7:88:2b:2f:d5: f6:f8:d6:b4:4b:99:1e:f6:88:29:e0:98:59:c8:9f:06: 60:dc:c3:6b:e3:70:12:58:be:d8:b5:ff:5d:6c:2a:a5: 83:26:47:9d:a7:e3:11:a1:e3:05:e5:69:44:08:fc:12: c0:7c:25:91:42:4b:a8:b0:85:15:b0:3f:34:94:f6:a9: 1f:83:6b:e5:ee:ef:8d:7e:63:0a:28:44:75:e0:dc:20: b1:3e:43:0a:0e:09:24:f7:9e:51:d4:04:e3:8a:3f:3a: 06:eb:ff:0b:63:5d:29:69:ab:9a:b7:e4:09:c4:9b:6e: 2e:52:dc:94:5a:1f:64:15:ca:ad:56:86:52:ac:34:f6: 23:2d:e7:d1:e9:65:e1:66:a1:34:89:72:41:6c:a9:e0: 50:36:c8:72:be:ec:41:b6:5d:fa:5a:7b:6e:19:d1:7c: 2e:2d:81:9c:6e:e4:fa:69:75:93:9e:72:ca:bf:00:71: dd:18:70:4f:f9:aa:b7:fa:f9:32:40:ca:70:62:5e:3e: 56:90:65:ea:fa:a2:2e:ed:4e:39:b3:21:37:33:dc:bf: 07:cf:82:69:e0:91:9f:c0:c3:b4:38:3e:12:c0:49:7e: e8:ff:e2:04:15:dd:f6:0a:5b:71:fe:4a:80:04:d7:35 Fingerprint (SHA-256): 66:6C:16:69:6B:0C:6B:E5:2B:0D:ED:34:BE:7B:1D:32:BC:6D:55:18:E7:63:94:DE:8F:F4:0F:7A:FD:50:01:47 Fingerprint (SHA1): 46:88:5E:82:26:8F:BD:7A:1D:FA:6D:13:3C:D2:5F:45:19:80:BA:7D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1214: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1215: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145039 (0x3cafa90f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:50:59 2023 Not After : Wed Oct 18 14:50:59 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:1a:80:87:98:0d:91:a8:4f:ee:0d:89:66:6d:30:f0: e3:11:71:7c:71:26:ee:da:95:d5:82:b4:b5:46:8a:60: 94:2f:0d:11:70:72:3d:5e:47:b1:2c:3e:ae:5e:35:30: 68:68:37:c9:ad:b8:4f:4d:f1:c2:6f:1c:b5:38:23:4b: 5e:e3:0c:23:1a:50:46:db:71:2f:6e:1a:92:14:e5:17: 5d:cb:c9:bd:fe:ec:34:30:93:32:fb:d5:27:6a:79:bf: 99:4c:06:33:8d:d8:bc:f4:5c:0f:25:19:89:c0:06:8c: a8:a1:a9:fe:2a:a6:36:ee:3f:a9:57:19:1b:bd:88:3c: 13:32:33:e3:d8:fa:8e:26:2e:4c:9b:19:00:1a:7a:06: 14:81:80:d2:f2:0d:bb:c1:f1:c0:ed:a7:5c:ab:49:4c: cd:4d:88:70:23:b1:f7:39:5e:68:93:d6:e6:80:80:6f: cd:78:ed:d5:2e:46:0b:ab:6b:ce:01:d1:85:df:b3:96: 41:a5:c2:24:06:ab:d0:fd:17:94:83:49:cb:b4:ef:2a: ae:94:e3:7e:3b:2e:2d:cf:6e:ec:f1:80:6e:49:bd:71: ea:55:b3:4a:ad:63:d0:c7:f9:a1:c3:50:af:f3:d9:2e: 24:c9:d6:1b:30:fd:0a:99:ed:19:72:89:5d:5b:89:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:6a:d2:50:d1:da:7c:db:a0:37:ae:6d:09:f8:e7:96: 8e:44:5c:6b:52:fa:2e:1f:83:88:5c:98:26:c2:b5:2c: 44:20:d2:c4:31:d5:df:4c:0b:5f:a8:92:29:f8:29:6c: 7b:5f:7e:33:b4:6f:e5:6c:8b:37:6c:a1:ba:ad:e5:62: 50:28:3b:f2:c4:e9:71:1b:f7:60:f2:91:1c:ed:09:e0: fd:bd:d5:92:70:0b:50:08:0c:98:19:8f:38:27:27:83: 46:eb:ee:0f:d1:b8:c0:8b:95:78:26:4c:2b:3e:09:81: 05:9e:71:35:2c:46:c1:61:13:e2:a3:16:2e:69:40:f5: 7e:d5:6a:bc:61:27:9d:3a:42:e0:89:71:68:97:de:bf: ba:f0:f9:92:1d:92:8e:d0:63:63:bf:68:ae:63:f6:bf: b7:2a:ac:1c:f7:95:d0:c7:51:5e:d8:4f:7c:7f:e8:dd: fd:76:f3:ee:63:78:db:18:14:1f:e7:ef:09:9d:93:00: 98:ac:5a:fa:e6:cc:b7:38:4b:16:8d:50:f0:d5:bc:55: 03:3b:44:3d:3c:57:5d:10:05:01:b7:70:b7:18:ea:d7: 86:37:7c:c8:8c:27:8a:d9:d5:d3:02:d8:49:3f:7b:c8: e2:b9:84:bd:e9:b9:0a:ed:ed:2b:20:d1:d6:df:e2:b7 Fingerprint (SHA-256): 75:6F:38:8B:27:C7:C3:19:76:0A:B6:1C:EF:F7:C4:F5:DB:19:B4:EA:EF:7E:B8:B6:58:AE:79:A5:B5:D2:29:6D Fingerprint (SHA1): 90:34:3A:F7:56:AF:15:01:AC:C6:74:D2:9E:0A:56:FF:82:1E:3D:60 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1216: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1217: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145037 (0x3cafa90d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:58 2023 Not After : Wed Oct 18 14:50:58 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:8b:5e:32:d8:13:bb:d2:6e:a2:d4:30:8c:8a:dd:ab: 71:25:30:d4:f7:58:e2:3f:7d:df:4f:93:3c:79:a8:ad: 7b:04:80:6e:c7:5d:9b:50:84:02:58:dd:6d:70:1a:60: 8d:b0:d8:ad:71:bb:37:98:5e:d3:76:2c:51:3e:13:8f: d2:69:64:d2:5a:03:c6:9b:6a:72:2f:f6:80:44:db:aa: 39:f6:fa:ec:86:ea:01:29:15:45:6a:54:b5:0f:3d:47: 0c:9e:39:90:35:0d:01:44:f0:c2:54:79:89:0c:9c:34: bd:83:be:9e:1b:56:3d:f6:f7:35:e6:c7:cf:15:32:22: 36:3c:09:bd:ee:9b:a5:15:8b:0d:49:7a:c1:96:52:a1: a3:9e:7f:af:62:4a:b4:d2:29:49:d0:fe:64:1b:ae:23: 72:a8:22:c3:17:1d:5e:91:39:3a:dc:75:5e:3c:f2:9c: b6:4b:35:62:df:94:74:c8:f2:a8:7c:6b:94:ba:0a:b2: cd:33:c0:31:4a:08:23:49:43:f3:cb:38:48:93:1b:45: 48:19:df:a6:62:2c:58:9f:8a:08:ed:71:03:c5:a8:f1: 02:30:d0:9d:6c:9f:03:ba:08:10:96:c7:03:49:32:d9: dc:53:18:4f:bc:52:c1:12:f7:c0:bb:22:12:a5:4c:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:19:32:f6:10:33:8e:fe:d8:52:80:e8:12:79:6b:db: 8e:89:ef:e5:b6:c7:41:7a:2d:3b:21:60:0d:1b:26:3b: d6:2f:cd:34:56:0b:95:24:3a:bd:b5:1e:67:7f:32:6f: fc:51:ec:51:3c:d9:00:a5:c9:04:af:0e:9a:9c:32:26: 13:0b:a7:08:f7:0b:84:e4:8f:6b:73:67:be:a1:f8:4d: 18:14:85:1d:54:fb:a2:7e:17:2f:73:b3:df:f1:a7:f9: 0e:b0:83:1c:22:04:b3:77:9a:51:4e:d2:f7:e4:9b:f7: 2b:21:69:8e:35:0b:54:2c:7a:a8:1c:cd:98:5b:b8:7a: 0b:4d:2c:93:0c:33:00:63:33:92:0f:d8:08:42:c8:f6: 5f:3b:cf:df:25:3a:dd:77:9e:f5:bd:35:0c:b3:2b:08: b4:57:c7:87:cf:14:80:f3:56:3e:21:e0:f2:8e:e3:67: b6:76:ff:31:ee:c8:c1:4c:11:91:e5:f3:68:e8:0e:be: 5e:2c:d5:e4:31:c2:a3:38:0b:fb:d3:05:80:bf:57:78: 76:6d:02:b8:a6:e1:5c:2e:16:a1:2c:2a:7c:1f:bd:5d: 5d:c9:b3:c5:7c:d8:d1:d4:74:3c:72:66:6d:a5:08:6d: cc:bb:50:f3:5b:f1:35:f4:93:b3:c0:3d:7b:ab:98:58 Fingerprint (SHA-256): 9E:B5:77:61:7F:96:E9:FC:2E:19:28:76:5D:26:A2:93:A3:2B:EA:5B:0B:FD:3C:18:11:84:0B:58:60:D0:15:9B Fingerprint (SHA1): CA:C5:DF:08:1F:A2:0C:C3:8A:15:94:FF:A2:74:6D:78:A5:83:C6:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1218: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145037 (0x3cafa90d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:58 2023 Not After : Wed Oct 18 14:50:58 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:8b:5e:32:d8:13:bb:d2:6e:a2:d4:30:8c:8a:dd:ab: 71:25:30:d4:f7:58:e2:3f:7d:df:4f:93:3c:79:a8:ad: 7b:04:80:6e:c7:5d:9b:50:84:02:58:dd:6d:70:1a:60: 8d:b0:d8:ad:71:bb:37:98:5e:d3:76:2c:51:3e:13:8f: d2:69:64:d2:5a:03:c6:9b:6a:72:2f:f6:80:44:db:aa: 39:f6:fa:ec:86:ea:01:29:15:45:6a:54:b5:0f:3d:47: 0c:9e:39:90:35:0d:01:44:f0:c2:54:79:89:0c:9c:34: bd:83:be:9e:1b:56:3d:f6:f7:35:e6:c7:cf:15:32:22: 36:3c:09:bd:ee:9b:a5:15:8b:0d:49:7a:c1:96:52:a1: a3:9e:7f:af:62:4a:b4:d2:29:49:d0:fe:64:1b:ae:23: 72:a8:22:c3:17:1d:5e:91:39:3a:dc:75:5e:3c:f2:9c: b6:4b:35:62:df:94:74:c8:f2:a8:7c:6b:94:ba:0a:b2: cd:33:c0:31:4a:08:23:49:43:f3:cb:38:48:93:1b:45: 48:19:df:a6:62:2c:58:9f:8a:08:ed:71:03:c5:a8:f1: 02:30:d0:9d:6c:9f:03:ba:08:10:96:c7:03:49:32:d9: dc:53:18:4f:bc:52:c1:12:f7:c0:bb:22:12:a5:4c:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:19:32:f6:10:33:8e:fe:d8:52:80:e8:12:79:6b:db: 8e:89:ef:e5:b6:c7:41:7a:2d:3b:21:60:0d:1b:26:3b: d6:2f:cd:34:56:0b:95:24:3a:bd:b5:1e:67:7f:32:6f: fc:51:ec:51:3c:d9:00:a5:c9:04:af:0e:9a:9c:32:26: 13:0b:a7:08:f7:0b:84:e4:8f:6b:73:67:be:a1:f8:4d: 18:14:85:1d:54:fb:a2:7e:17:2f:73:b3:df:f1:a7:f9: 0e:b0:83:1c:22:04:b3:77:9a:51:4e:d2:f7:e4:9b:f7: 2b:21:69:8e:35:0b:54:2c:7a:a8:1c:cd:98:5b:b8:7a: 0b:4d:2c:93:0c:33:00:63:33:92:0f:d8:08:42:c8:f6: 5f:3b:cf:df:25:3a:dd:77:9e:f5:bd:35:0c:b3:2b:08: b4:57:c7:87:cf:14:80:f3:56:3e:21:e0:f2:8e:e3:67: b6:76:ff:31:ee:c8:c1:4c:11:91:e5:f3:68:e8:0e:be: 5e:2c:d5:e4:31:c2:a3:38:0b:fb:d3:05:80:bf:57:78: 76:6d:02:b8:a6:e1:5c:2e:16:a1:2c:2a:7c:1f:bd:5d: 5d:c9:b3:c5:7c:d8:d1:d4:74:3c:72:66:6d:a5:08:6d: cc:bb:50:f3:5b:f1:35:f4:93:b3:c0:3d:7b:ab:98:58 Fingerprint (SHA-256): 9E:B5:77:61:7F:96:E9:FC:2E:19:28:76:5D:26:A2:93:A3:2B:EA:5B:0B:FD:3C:18:11:84:0B:58:60:D0:15:9B Fingerprint (SHA1): CA:C5:DF:08:1F:A2:0C:C3:8A:15:94:FF:A2:74:6D:78:A5:83:C6:E8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1219: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145038 (0x3cafa90e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:58 2023 Not After : Wed Oct 18 14:50:58 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:ae:52:bc:72:24:d7:cf:6a:78:a7:af:53:c4:03:93: a3:58:4c:a4:a4:6c:7a:67:13:62:12:97:36:fe:dc:ac: df:94:e6:35:29:27:ed:fe:8e:79:43:7a:d7:01:b1:9d: d5:0c:ae:c4:6c:a3:09:53:9d:81:77:8b:c0:e9:95:74: 12:4e:75:02:36:94:ff:f2:1d:2e:98:99:c3:ad:01:ef: ea:12:bf:ff:b1:64:38:b0:ba:c1:1a:a0:cc:a0:ab:d4: e9:4f:0c:93:7c:70:c6:94:78:10:47:46:27:c8:a5:0a: c8:e8:2b:9c:1c:a5:f4:f4:c0:02:7f:14:4a:b1:9a:f4: 66:7d:18:da:e6:16:af:98:f2:70:35:8a:5f:26:da:de: 92:b4:af:d3:11:8f:4c:ac:4a:78:91:98:39:64:d7:15: fb:c0:b6:66:7b:7a:11:68:40:ca:8d:6c:c2:bf:2b:d4: 0f:00:2c:f2:db:2c:3b:f7:1d:4b:e3:99:e0:fd:46:09: aa:e5:b8:35:d7:f2:17:1f:ca:cf:f2:89:ba:de:04:a3: 63:0e:1f:a2:81:e6:3b:8d:11:49:9e:53:e6:91:06:28: 42:0c:4e:35:61:99:b1:88:25:87:fd:b8:fa:02:14:0e: 31:ff:47:1e:54:df:62:e1:b2:18:a2:89:69:30:ed:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:d6:1a:82:fa:f3:98:0a:28:cb:17:a7:88:2b:2f:d5: f6:f8:d6:b4:4b:99:1e:f6:88:29:e0:98:59:c8:9f:06: 60:dc:c3:6b:e3:70:12:58:be:d8:b5:ff:5d:6c:2a:a5: 83:26:47:9d:a7:e3:11:a1:e3:05:e5:69:44:08:fc:12: c0:7c:25:91:42:4b:a8:b0:85:15:b0:3f:34:94:f6:a9: 1f:83:6b:e5:ee:ef:8d:7e:63:0a:28:44:75:e0:dc:20: b1:3e:43:0a:0e:09:24:f7:9e:51:d4:04:e3:8a:3f:3a: 06:eb:ff:0b:63:5d:29:69:ab:9a:b7:e4:09:c4:9b:6e: 2e:52:dc:94:5a:1f:64:15:ca:ad:56:86:52:ac:34:f6: 23:2d:e7:d1:e9:65:e1:66:a1:34:89:72:41:6c:a9:e0: 50:36:c8:72:be:ec:41:b6:5d:fa:5a:7b:6e:19:d1:7c: 2e:2d:81:9c:6e:e4:fa:69:75:93:9e:72:ca:bf:00:71: dd:18:70:4f:f9:aa:b7:fa:f9:32:40:ca:70:62:5e:3e: 56:90:65:ea:fa:a2:2e:ed:4e:39:b3:21:37:33:dc:bf: 07:cf:82:69:e0:91:9f:c0:c3:b4:38:3e:12:c0:49:7e: e8:ff:e2:04:15:dd:f6:0a:5b:71:fe:4a:80:04:d7:35 Fingerprint (SHA-256): 66:6C:16:69:6B:0C:6B:E5:2B:0D:ED:34:BE:7B:1D:32:BC:6D:55:18:E7:63:94:DE:8F:F4:0F:7A:FD:50:01:47 Fingerprint (SHA1): 46:88:5E:82:26:8F:BD:7A:1D:FA:6D:13:3C:D2:5F:45:19:80:BA:7D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1220: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145038 (0x3cafa90e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:50:58 2023 Not After : Wed Oct 18 14:50:58 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:ae:52:bc:72:24:d7:cf:6a:78:a7:af:53:c4:03:93: a3:58:4c:a4:a4:6c:7a:67:13:62:12:97:36:fe:dc:ac: df:94:e6:35:29:27:ed:fe:8e:79:43:7a:d7:01:b1:9d: d5:0c:ae:c4:6c:a3:09:53:9d:81:77:8b:c0:e9:95:74: 12:4e:75:02:36:94:ff:f2:1d:2e:98:99:c3:ad:01:ef: ea:12:bf:ff:b1:64:38:b0:ba:c1:1a:a0:cc:a0:ab:d4: e9:4f:0c:93:7c:70:c6:94:78:10:47:46:27:c8:a5:0a: c8:e8:2b:9c:1c:a5:f4:f4:c0:02:7f:14:4a:b1:9a:f4: 66:7d:18:da:e6:16:af:98:f2:70:35:8a:5f:26:da:de: 92:b4:af:d3:11:8f:4c:ac:4a:78:91:98:39:64:d7:15: fb:c0:b6:66:7b:7a:11:68:40:ca:8d:6c:c2:bf:2b:d4: 0f:00:2c:f2:db:2c:3b:f7:1d:4b:e3:99:e0:fd:46:09: aa:e5:b8:35:d7:f2:17:1f:ca:cf:f2:89:ba:de:04:a3: 63:0e:1f:a2:81:e6:3b:8d:11:49:9e:53:e6:91:06:28: 42:0c:4e:35:61:99:b1:88:25:87:fd:b8:fa:02:14:0e: 31:ff:47:1e:54:df:62:e1:b2:18:a2:89:69:30:ed:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 23:d6:1a:82:fa:f3:98:0a:28:cb:17:a7:88:2b:2f:d5: f6:f8:d6:b4:4b:99:1e:f6:88:29:e0:98:59:c8:9f:06: 60:dc:c3:6b:e3:70:12:58:be:d8:b5:ff:5d:6c:2a:a5: 83:26:47:9d:a7:e3:11:a1:e3:05:e5:69:44:08:fc:12: c0:7c:25:91:42:4b:a8:b0:85:15:b0:3f:34:94:f6:a9: 1f:83:6b:e5:ee:ef:8d:7e:63:0a:28:44:75:e0:dc:20: b1:3e:43:0a:0e:09:24:f7:9e:51:d4:04:e3:8a:3f:3a: 06:eb:ff:0b:63:5d:29:69:ab:9a:b7:e4:09:c4:9b:6e: 2e:52:dc:94:5a:1f:64:15:ca:ad:56:86:52:ac:34:f6: 23:2d:e7:d1:e9:65:e1:66:a1:34:89:72:41:6c:a9:e0: 50:36:c8:72:be:ec:41:b6:5d:fa:5a:7b:6e:19:d1:7c: 2e:2d:81:9c:6e:e4:fa:69:75:93:9e:72:ca:bf:00:71: dd:18:70:4f:f9:aa:b7:fa:f9:32:40:ca:70:62:5e:3e: 56:90:65:ea:fa:a2:2e:ed:4e:39:b3:21:37:33:dc:bf: 07:cf:82:69:e0:91:9f:c0:c3:b4:38:3e:12:c0:49:7e: e8:ff:e2:04:15:dd:f6:0a:5b:71:fe:4a:80:04:d7:35 Fingerprint (SHA-256): 66:6C:16:69:6B:0C:6B:E5:2B:0D:ED:34:BE:7B:1D:32:BC:6D:55:18:E7:63:94:DE:8F:F4:0F:7A:FD:50:01:47 Fingerprint (SHA1): 46:88:5E:82:26:8F:BD:7A:1D:FA:6D:13:3C:D2:5F:45:19:80:BA:7D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1221: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145039 (0x3cafa90f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:50:59 2023 Not After : Wed Oct 18 14:50:59 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:1a:80:87:98:0d:91:a8:4f:ee:0d:89:66:6d:30:f0: e3:11:71:7c:71:26:ee:da:95:d5:82:b4:b5:46:8a:60: 94:2f:0d:11:70:72:3d:5e:47:b1:2c:3e:ae:5e:35:30: 68:68:37:c9:ad:b8:4f:4d:f1:c2:6f:1c:b5:38:23:4b: 5e:e3:0c:23:1a:50:46:db:71:2f:6e:1a:92:14:e5:17: 5d:cb:c9:bd:fe:ec:34:30:93:32:fb:d5:27:6a:79:bf: 99:4c:06:33:8d:d8:bc:f4:5c:0f:25:19:89:c0:06:8c: a8:a1:a9:fe:2a:a6:36:ee:3f:a9:57:19:1b:bd:88:3c: 13:32:33:e3:d8:fa:8e:26:2e:4c:9b:19:00:1a:7a:06: 14:81:80:d2:f2:0d:bb:c1:f1:c0:ed:a7:5c:ab:49:4c: cd:4d:88:70:23:b1:f7:39:5e:68:93:d6:e6:80:80:6f: cd:78:ed:d5:2e:46:0b:ab:6b:ce:01:d1:85:df:b3:96: 41:a5:c2:24:06:ab:d0:fd:17:94:83:49:cb:b4:ef:2a: ae:94:e3:7e:3b:2e:2d:cf:6e:ec:f1:80:6e:49:bd:71: ea:55:b3:4a:ad:63:d0:c7:f9:a1:c3:50:af:f3:d9:2e: 24:c9:d6:1b:30:fd:0a:99:ed:19:72:89:5d:5b:89:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:6a:d2:50:d1:da:7c:db:a0:37:ae:6d:09:f8:e7:96: 8e:44:5c:6b:52:fa:2e:1f:83:88:5c:98:26:c2:b5:2c: 44:20:d2:c4:31:d5:df:4c:0b:5f:a8:92:29:f8:29:6c: 7b:5f:7e:33:b4:6f:e5:6c:8b:37:6c:a1:ba:ad:e5:62: 50:28:3b:f2:c4:e9:71:1b:f7:60:f2:91:1c:ed:09:e0: fd:bd:d5:92:70:0b:50:08:0c:98:19:8f:38:27:27:83: 46:eb:ee:0f:d1:b8:c0:8b:95:78:26:4c:2b:3e:09:81: 05:9e:71:35:2c:46:c1:61:13:e2:a3:16:2e:69:40:f5: 7e:d5:6a:bc:61:27:9d:3a:42:e0:89:71:68:97:de:bf: ba:f0:f9:92:1d:92:8e:d0:63:63:bf:68:ae:63:f6:bf: b7:2a:ac:1c:f7:95:d0:c7:51:5e:d8:4f:7c:7f:e8:dd: fd:76:f3:ee:63:78:db:18:14:1f:e7:ef:09:9d:93:00: 98:ac:5a:fa:e6:cc:b7:38:4b:16:8d:50:f0:d5:bc:55: 03:3b:44:3d:3c:57:5d:10:05:01:b7:70:b7:18:ea:d7: 86:37:7c:c8:8c:27:8a:d9:d5:d3:02:d8:49:3f:7b:c8: e2:b9:84:bd:e9:b9:0a:ed:ed:2b:20:d1:d6:df:e2:b7 Fingerprint (SHA-256): 75:6F:38:8B:27:C7:C3:19:76:0A:B6:1C:EF:F7:C4:F5:DB:19:B4:EA:EF:7E:B8:B6:58:AE:79:A5:B5:D2:29:6D Fingerprint (SHA1): 90:34:3A:F7:56:AF:15:01:AC:C6:74:D2:9E:0A:56:FF:82:1E:3D:60 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1222: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145039 (0x3cafa90f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:50:59 2023 Not After : Wed Oct 18 14:50:59 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:1a:80:87:98:0d:91:a8:4f:ee:0d:89:66:6d:30:f0: e3:11:71:7c:71:26:ee:da:95:d5:82:b4:b5:46:8a:60: 94:2f:0d:11:70:72:3d:5e:47:b1:2c:3e:ae:5e:35:30: 68:68:37:c9:ad:b8:4f:4d:f1:c2:6f:1c:b5:38:23:4b: 5e:e3:0c:23:1a:50:46:db:71:2f:6e:1a:92:14:e5:17: 5d:cb:c9:bd:fe:ec:34:30:93:32:fb:d5:27:6a:79:bf: 99:4c:06:33:8d:d8:bc:f4:5c:0f:25:19:89:c0:06:8c: a8:a1:a9:fe:2a:a6:36:ee:3f:a9:57:19:1b:bd:88:3c: 13:32:33:e3:d8:fa:8e:26:2e:4c:9b:19:00:1a:7a:06: 14:81:80:d2:f2:0d:bb:c1:f1:c0:ed:a7:5c:ab:49:4c: cd:4d:88:70:23:b1:f7:39:5e:68:93:d6:e6:80:80:6f: cd:78:ed:d5:2e:46:0b:ab:6b:ce:01:d1:85:df:b3:96: 41:a5:c2:24:06:ab:d0:fd:17:94:83:49:cb:b4:ef:2a: ae:94:e3:7e:3b:2e:2d:cf:6e:ec:f1:80:6e:49:bd:71: ea:55:b3:4a:ad:63:d0:c7:f9:a1:c3:50:af:f3:d9:2e: 24:c9:d6:1b:30:fd:0a:99:ed:19:72:89:5d:5b:89:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3c:6a:d2:50:d1:da:7c:db:a0:37:ae:6d:09:f8:e7:96: 8e:44:5c:6b:52:fa:2e:1f:83:88:5c:98:26:c2:b5:2c: 44:20:d2:c4:31:d5:df:4c:0b:5f:a8:92:29:f8:29:6c: 7b:5f:7e:33:b4:6f:e5:6c:8b:37:6c:a1:ba:ad:e5:62: 50:28:3b:f2:c4:e9:71:1b:f7:60:f2:91:1c:ed:09:e0: fd:bd:d5:92:70:0b:50:08:0c:98:19:8f:38:27:27:83: 46:eb:ee:0f:d1:b8:c0:8b:95:78:26:4c:2b:3e:09:81: 05:9e:71:35:2c:46:c1:61:13:e2:a3:16:2e:69:40:f5: 7e:d5:6a:bc:61:27:9d:3a:42:e0:89:71:68:97:de:bf: ba:f0:f9:92:1d:92:8e:d0:63:63:bf:68:ae:63:f6:bf: b7:2a:ac:1c:f7:95:d0:c7:51:5e:d8:4f:7c:7f:e8:dd: fd:76:f3:ee:63:78:db:18:14:1f:e7:ef:09:9d:93:00: 98:ac:5a:fa:e6:cc:b7:38:4b:16:8d:50:f0:d5:bc:55: 03:3b:44:3d:3c:57:5d:10:05:01:b7:70:b7:18:ea:d7: 86:37:7c:c8:8c:27:8a:d9:d5:d3:02:d8:49:3f:7b:c8: e2:b9:84:bd:e9:b9:0a:ed:ed:2b:20:d1:d6:df:e2:b7 Fingerprint (SHA-256): 75:6F:38:8B:27:C7:C3:19:76:0A:B6:1C:EF:F7:C4:F5:DB:19:B4:EA:EF:7E:B8:B6:58:AE:79:A5:B5:D2:29:6D Fingerprint (SHA1): 90:34:3A:F7:56:AF:15:01:AC:C6:74:D2:9E:0A:56:FF:82:1E:3D:60 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1223: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1224: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145042 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1225: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1226: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1227: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1228: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018145043 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1229: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1230: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1231: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1232: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018145044 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1233: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1234: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1235: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1236: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1018145045 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1237: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1238: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1239: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1240: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018145046 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1241: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1242: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1243: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1244: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018145047 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1245: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1246: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #1247: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1248: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1018145048 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1249: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1250: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1251: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #1252: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #1253: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1254: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #1255: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145042 (0x3cafa912) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:51:01 2023 Not After : Wed Oct 18 14:51:01 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:ac:4d:ae:48:8f:98:82:67:ac:52:86:29:35:20:f1: 80:9d:28:10:b9:45:53:9a:f1:4a:b0:bc:79:6f:4c:06: c4:ab:0d:de:f3:0d:f5:c4:03:18:8b:98:2b:c2:49:9c: aa:67:76:2a:6f:14:a7:10:10:20:6b:fb:79:d1:26:9a: 92:98:0c:f3:b5:ed:34:50:70:56:61:56:3e:d3:4e:07: 35:ce:55:2a:83:6a:66:65:45:31:4a:9f:07:40:f6:bc: 05:c9:ad:64:49:54:43:ae:68:2c:44:65:10:1a:37:70: d4:80:9a:3f:9a:fe:ca:45:20:7f:88:ec:e4:c4:17:6b: bf:57:98:ff:4c:57:df:e7:a3:51:3c:58:a2:b6:63:51: 55:ef:eb:83:1c:5d:fc:d0:06:67:8c:37:0f:a8:9a:0d: 9d:db:e7:dc:38:69:50:e9:07:23:d2:6d:2e:54:84:c0: 4c:8b:1c:00:e3:61:e3:00:aa:a4:bf:8e:91:c0:8d:e1: de:ae:ab:56:16:0e:73:d1:7c:36:aa:68:34:cf:7b:a3: 6d:fa:98:aa:a2:eb:f3:5c:fa:60:75:f4:a3:22:b7:bb: 3c:ae:d8:79:38:dc:61:31:b7:64:59:02:80:8b:4c:0d: 60:ea:f8:8d:1b:c4:01:2c:d0:24:ea:2a:8c:ae:ec:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:25:ce:0e:a3:2d:c8:bb:4d:ab:de:8e:75:f6:f3:48: 67:3d:e7:2e:61:b9:cd:7b:9f:ad:e0:88:43:e3:36:f1: 56:ef:fe:1b:8b:2f:4f:6e:65:86:b6:fd:59:8c:54:f1: ae:0b:20:a2:57:ca:ca:6e:8f:47:bd:d7:8f:37:13:34: 5d:b0:11:ca:f4:20:db:a2:a9:47:0f:6a:69:db:df:fb: a9:b2:dd:e0:19:ce:5a:fa:2f:24:96:3b:cc:b0:96:91: 07:a1:33:81:eb:54:91:a5:ea:03:2a:a8:92:d7:79:ae: 3b:ff:f3:61:f0:6a:2d:30:e2:a4:ee:98:23:42:a7:53: 52:cf:b4:88:b9:38:0d:40:6a:6e:8b:43:03:69:22:22: a8:7f:10:69:70:cd:6d:b6:d7:ef:fb:bd:c6:38:0d:1c: e5:cb:ec:2a:50:bb:8e:76:b1:c2:a8:6c:03:64:00:7d: 70:3a:28:04:a3:60:04:d0:70:a6:1a:76:07:ee:a2:b0: 3a:fb:15:11:e9:28:dd:ce:f4:f0:de:14:53:97:74:ea: 0e:21:81:23:15:94:1d:13:a2:b4:50:0b:0c:0d:45:ff: 7e:f5:32:fa:40:24:44:4f:3e:01:5e:68:ca:f9:0e:3c: c0:67:37:61:52:62:e0:85:0f:31:bc:eb:98:03:de:e1 Fingerprint (SHA-256): D1:5E:EC:E3:85:D6:DE:EC:B6:85:EC:38:89:72:D8:02:57:FE:AA:0A:CD:E0:D9:90:D0:83:F1:19:BD:23:52:E8 Fingerprint (SHA1): 7E:56:B7:7A:56:B7:38:E8:B9:EE:26:B6:7D:58:E1:9C:A3:81:AA:C3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1256: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1257: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1258: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1259: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145042 (0x3cafa912) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:51:01 2023 Not After : Wed Oct 18 14:51:01 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:ac:4d:ae:48:8f:98:82:67:ac:52:86:29:35:20:f1: 80:9d:28:10:b9:45:53:9a:f1:4a:b0:bc:79:6f:4c:06: c4:ab:0d:de:f3:0d:f5:c4:03:18:8b:98:2b:c2:49:9c: aa:67:76:2a:6f:14:a7:10:10:20:6b:fb:79:d1:26:9a: 92:98:0c:f3:b5:ed:34:50:70:56:61:56:3e:d3:4e:07: 35:ce:55:2a:83:6a:66:65:45:31:4a:9f:07:40:f6:bc: 05:c9:ad:64:49:54:43:ae:68:2c:44:65:10:1a:37:70: d4:80:9a:3f:9a:fe:ca:45:20:7f:88:ec:e4:c4:17:6b: bf:57:98:ff:4c:57:df:e7:a3:51:3c:58:a2:b6:63:51: 55:ef:eb:83:1c:5d:fc:d0:06:67:8c:37:0f:a8:9a:0d: 9d:db:e7:dc:38:69:50:e9:07:23:d2:6d:2e:54:84:c0: 4c:8b:1c:00:e3:61:e3:00:aa:a4:bf:8e:91:c0:8d:e1: de:ae:ab:56:16:0e:73:d1:7c:36:aa:68:34:cf:7b:a3: 6d:fa:98:aa:a2:eb:f3:5c:fa:60:75:f4:a3:22:b7:bb: 3c:ae:d8:79:38:dc:61:31:b7:64:59:02:80:8b:4c:0d: 60:ea:f8:8d:1b:c4:01:2c:d0:24:ea:2a:8c:ae:ec:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:25:ce:0e:a3:2d:c8:bb:4d:ab:de:8e:75:f6:f3:48: 67:3d:e7:2e:61:b9:cd:7b:9f:ad:e0:88:43:e3:36:f1: 56:ef:fe:1b:8b:2f:4f:6e:65:86:b6:fd:59:8c:54:f1: ae:0b:20:a2:57:ca:ca:6e:8f:47:bd:d7:8f:37:13:34: 5d:b0:11:ca:f4:20:db:a2:a9:47:0f:6a:69:db:df:fb: a9:b2:dd:e0:19:ce:5a:fa:2f:24:96:3b:cc:b0:96:91: 07:a1:33:81:eb:54:91:a5:ea:03:2a:a8:92:d7:79:ae: 3b:ff:f3:61:f0:6a:2d:30:e2:a4:ee:98:23:42:a7:53: 52:cf:b4:88:b9:38:0d:40:6a:6e:8b:43:03:69:22:22: a8:7f:10:69:70:cd:6d:b6:d7:ef:fb:bd:c6:38:0d:1c: e5:cb:ec:2a:50:bb:8e:76:b1:c2:a8:6c:03:64:00:7d: 70:3a:28:04:a3:60:04:d0:70:a6:1a:76:07:ee:a2:b0: 3a:fb:15:11:e9:28:dd:ce:f4:f0:de:14:53:97:74:ea: 0e:21:81:23:15:94:1d:13:a2:b4:50:0b:0c:0d:45:ff: 7e:f5:32:fa:40:24:44:4f:3e:01:5e:68:ca:f9:0e:3c: c0:67:37:61:52:62:e0:85:0f:31:bc:eb:98:03:de:e1 Fingerprint (SHA-256): D1:5E:EC:E3:85:D6:DE:EC:B6:85:EC:38:89:72:D8:02:57:FE:AA:0A:CD:E0:D9:90:D0:83:F1:19:BD:23:52:E8 Fingerprint (SHA1): 7E:56:B7:7A:56:B7:38:E8:B9:EE:26:B6:7D:58:E1:9C:A3:81:AA:C3 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1260: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1261: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1262: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145049 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1263: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1264: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1265: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1266: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018145050 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1267: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1268: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #1269: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1270: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1018145051 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1271: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1272: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #1273: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1274: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1018145052 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1275: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1276: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1277: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1278: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1018145053 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1279: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1280: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #1281: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1282: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1018145054 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1283: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1284: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #1285: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1286: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1018145055 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1287: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1288: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1289: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1290: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1018145056 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1291: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1292: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #1293: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1294: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1018145057 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1295: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1296: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #1297: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1298: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1018145058 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1299: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1300: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1301: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1302: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1018145059 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1303: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1304: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #1305: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1306: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1018145060 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1307: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1308: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #1309: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1310: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1018145061 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1311: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1312: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1313: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1314: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1018145062 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1315: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1316: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #1317: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1318: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1018145063 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1319: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1320: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #1321: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1322: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1018145064 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1323: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1324: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #1325: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1326: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1018145065 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1327: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1328: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #1329: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1330: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1018145066 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1331: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1332: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #1333: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1334: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1018145067 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1335: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1336: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #1337: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1338: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1018145068 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1339: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1340: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #1341: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1342: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1018145069 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1343: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1344: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #1345: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1346: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1018145070 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1347: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1348: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #1349: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1350: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1018145071 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1351: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1352: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #1353: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1354: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1018145072 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1355: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1356: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #1357: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1358: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1018145073 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1359: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1360: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #1361: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1362: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1018145074 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1363: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1364: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #1365: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1366: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1018145075 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1367: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1368: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #1369: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1370: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1018145076 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1371: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1372: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #1373: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1374: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1018145077 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1375: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1376: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #1377: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1378: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1018145078 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1379: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1380: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1381: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145049 (0x3cafa919) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:51:04 2023 Not After : Wed Oct 18 14:51:04 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:81:5a:33:f3:4d:a5:e0:8e:43:65:6e:57:d0:55:ed: b6:59:5c:41:bc:91:ab:80:36:00:db:ed:b3:62:6e:e7: df:31:9c:7f:be:7d:ad:29:1a:c3:b8:84:23:cc:8e:68: 8a:7d:1f:93:17:cb:ca:27:0e:d5:2c:5b:53:86:eb:64: 50:70:6b:dc:ea:42:d5:3e:8d:e1:d0:a7:43:92:4a:e2: a8:cb:ef:2e:d7:a8:3c:f0:a0:11:c4:83:b0:85:7b:89: 98:75:f1:d8:cc:2f:7e:cd:24:89:a2:ef:ec:8b:cd:5a: 91:b9:8d:b5:31:7c:7f:52:73:29:b7:71:00:2b:48:49: ef:e4:ef:6b:98:d5:8a:1b:52:47:47:38:fa:88:e0:ca: d3:e8:3d:95:f5:b4:61:56:5b:1b:2c:09:78:c3:2c:f5: 9f:b4:35:cd:39:8b:7a:4f:4e:50:ea:c9:66:89:b1:86: 93:5b:79:e2:9f:3d:62:c5:01:67:32:8a:75:b1:ef:7f: 7c:39:db:97:e6:70:21:9c:84:d7:28:cd:d1:f6:aa:de: db:7e:74:91:dd:64:e8:2b:f1:bd:8a:dd:a2:8d:b5:46: a0:f8:b0:66:9d:be:85:28:50:61:0a:c2:33:30:3a:2f: 18:53:33:49:65:4f:d7:f5:16:44:68:b0:f4:cc:9b:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:d0:e5:1f:ef:a7:8e:b0:8a:32:46:84:9b:a5:56:15: 9e:80:50:8d:59:18:5e:9d:fd:7d:f5:08:3f:1a:33:0c: df:7b:b7:a8:1d:b8:7b:21:b0:f6:d6:f2:21:fc:0e:9e: c0:15:93:d2:4f:f1:2a:07:37:af:63:a4:93:f5:85:66: a7:ed:f2:3a:68:ed:eb:55:95:f9:23:19:1e:89:82:28: ce:ff:5b:25:f1:bb:d3:11:39:36:25:5c:8c:5d:a5:cc: c4:38:d4:7d:19:39:99:02:27:c0:3e:65:9c:bb:b9:47: 70:42:0f:7c:c9:24:fb:f6:59:75:1f:7e:9b:b8:4d:8f: 3a:9d:dc:1d:6a:7e:07:86:46:dc:e5:ef:06:4b:d3:f2: 8d:c8:4c:db:7b:7e:95:65:f1:25:a9:b8:bc:94:23:a0: 08:22:11:4e:64:81:80:0d:12:fb:48:8a:5c:8d:12:89: e3:6a:1a:4b:d5:32:99:5b:8b:d7:d5:32:a2:a9:e3:ee: fb:69:bd:13:52:47:ed:b4:e9:4a:89:ee:83:cc:13:5d: 80:cf:2b:32:4d:e7:ef:20:3e:37:07:7f:db:ae:16:77: 14:a6:7e:76:9a:20:73:42:78:4b:c5:5d:82:f3:19:1a: 62:49:25:f0:97:b1:0b:00:2d:15:ca:8d:ac:b3:89:d4 Fingerprint (SHA-256): 3E:1C:69:D1:F3:72:14:35:BA:FE:4E:2C:21:2B:E6:BB:31:D6:71:9E:FE:A0:38:B6:B3:5B:D0:14:01:54:3D:13 Fingerprint (SHA1): BC:A2:76:8C:BA:BA:C7:71:FC:E7:97:30:04:58:CC:0A:65:4A:EF:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1382: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1383: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145049 (0x3cafa919) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:51:04 2023 Not After : Wed Oct 18 14:51:04 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:81:5a:33:f3:4d:a5:e0:8e:43:65:6e:57:d0:55:ed: b6:59:5c:41:bc:91:ab:80:36:00:db:ed:b3:62:6e:e7: df:31:9c:7f:be:7d:ad:29:1a:c3:b8:84:23:cc:8e:68: 8a:7d:1f:93:17:cb:ca:27:0e:d5:2c:5b:53:86:eb:64: 50:70:6b:dc:ea:42:d5:3e:8d:e1:d0:a7:43:92:4a:e2: a8:cb:ef:2e:d7:a8:3c:f0:a0:11:c4:83:b0:85:7b:89: 98:75:f1:d8:cc:2f:7e:cd:24:89:a2:ef:ec:8b:cd:5a: 91:b9:8d:b5:31:7c:7f:52:73:29:b7:71:00:2b:48:49: ef:e4:ef:6b:98:d5:8a:1b:52:47:47:38:fa:88:e0:ca: d3:e8:3d:95:f5:b4:61:56:5b:1b:2c:09:78:c3:2c:f5: 9f:b4:35:cd:39:8b:7a:4f:4e:50:ea:c9:66:89:b1:86: 93:5b:79:e2:9f:3d:62:c5:01:67:32:8a:75:b1:ef:7f: 7c:39:db:97:e6:70:21:9c:84:d7:28:cd:d1:f6:aa:de: db:7e:74:91:dd:64:e8:2b:f1:bd:8a:dd:a2:8d:b5:46: a0:f8:b0:66:9d:be:85:28:50:61:0a:c2:33:30:3a:2f: 18:53:33:49:65:4f:d7:f5:16:44:68:b0:f4:cc:9b:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:d0:e5:1f:ef:a7:8e:b0:8a:32:46:84:9b:a5:56:15: 9e:80:50:8d:59:18:5e:9d:fd:7d:f5:08:3f:1a:33:0c: df:7b:b7:a8:1d:b8:7b:21:b0:f6:d6:f2:21:fc:0e:9e: c0:15:93:d2:4f:f1:2a:07:37:af:63:a4:93:f5:85:66: a7:ed:f2:3a:68:ed:eb:55:95:f9:23:19:1e:89:82:28: ce:ff:5b:25:f1:bb:d3:11:39:36:25:5c:8c:5d:a5:cc: c4:38:d4:7d:19:39:99:02:27:c0:3e:65:9c:bb:b9:47: 70:42:0f:7c:c9:24:fb:f6:59:75:1f:7e:9b:b8:4d:8f: 3a:9d:dc:1d:6a:7e:07:86:46:dc:e5:ef:06:4b:d3:f2: 8d:c8:4c:db:7b:7e:95:65:f1:25:a9:b8:bc:94:23:a0: 08:22:11:4e:64:81:80:0d:12:fb:48:8a:5c:8d:12:89: e3:6a:1a:4b:d5:32:99:5b:8b:d7:d5:32:a2:a9:e3:ee: fb:69:bd:13:52:47:ed:b4:e9:4a:89:ee:83:cc:13:5d: 80:cf:2b:32:4d:e7:ef:20:3e:37:07:7f:db:ae:16:77: 14:a6:7e:76:9a:20:73:42:78:4b:c5:5d:82:f3:19:1a: 62:49:25:f0:97:b1:0b:00:2d:15:ca:8d:ac:b3:89:d4 Fingerprint (SHA-256): 3E:1C:69:D1:F3:72:14:35:BA:FE:4E:2C:21:2B:E6:BB:31:D6:71:9E:FE:A0:38:B6:B3:5B:D0:14:01:54:3D:13 Fingerprint (SHA1): BC:A2:76:8C:BA:BA:C7:71:FC:E7:97:30:04:58:CC:0A:65:4A:EF:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1384: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1385: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1386: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1387: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145049 (0x3cafa919) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:51:04 2023 Not After : Wed Oct 18 14:51:04 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:81:5a:33:f3:4d:a5:e0:8e:43:65:6e:57:d0:55:ed: b6:59:5c:41:bc:91:ab:80:36:00:db:ed:b3:62:6e:e7: df:31:9c:7f:be:7d:ad:29:1a:c3:b8:84:23:cc:8e:68: 8a:7d:1f:93:17:cb:ca:27:0e:d5:2c:5b:53:86:eb:64: 50:70:6b:dc:ea:42:d5:3e:8d:e1:d0:a7:43:92:4a:e2: a8:cb:ef:2e:d7:a8:3c:f0:a0:11:c4:83:b0:85:7b:89: 98:75:f1:d8:cc:2f:7e:cd:24:89:a2:ef:ec:8b:cd:5a: 91:b9:8d:b5:31:7c:7f:52:73:29:b7:71:00:2b:48:49: ef:e4:ef:6b:98:d5:8a:1b:52:47:47:38:fa:88:e0:ca: d3:e8:3d:95:f5:b4:61:56:5b:1b:2c:09:78:c3:2c:f5: 9f:b4:35:cd:39:8b:7a:4f:4e:50:ea:c9:66:89:b1:86: 93:5b:79:e2:9f:3d:62:c5:01:67:32:8a:75:b1:ef:7f: 7c:39:db:97:e6:70:21:9c:84:d7:28:cd:d1:f6:aa:de: db:7e:74:91:dd:64:e8:2b:f1:bd:8a:dd:a2:8d:b5:46: a0:f8:b0:66:9d:be:85:28:50:61:0a:c2:33:30:3a:2f: 18:53:33:49:65:4f:d7:f5:16:44:68:b0:f4:cc:9b:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:d0:e5:1f:ef:a7:8e:b0:8a:32:46:84:9b:a5:56:15: 9e:80:50:8d:59:18:5e:9d:fd:7d:f5:08:3f:1a:33:0c: df:7b:b7:a8:1d:b8:7b:21:b0:f6:d6:f2:21:fc:0e:9e: c0:15:93:d2:4f:f1:2a:07:37:af:63:a4:93:f5:85:66: a7:ed:f2:3a:68:ed:eb:55:95:f9:23:19:1e:89:82:28: ce:ff:5b:25:f1:bb:d3:11:39:36:25:5c:8c:5d:a5:cc: c4:38:d4:7d:19:39:99:02:27:c0:3e:65:9c:bb:b9:47: 70:42:0f:7c:c9:24:fb:f6:59:75:1f:7e:9b:b8:4d:8f: 3a:9d:dc:1d:6a:7e:07:86:46:dc:e5:ef:06:4b:d3:f2: 8d:c8:4c:db:7b:7e:95:65:f1:25:a9:b8:bc:94:23:a0: 08:22:11:4e:64:81:80:0d:12:fb:48:8a:5c:8d:12:89: e3:6a:1a:4b:d5:32:99:5b:8b:d7:d5:32:a2:a9:e3:ee: fb:69:bd:13:52:47:ed:b4:e9:4a:89:ee:83:cc:13:5d: 80:cf:2b:32:4d:e7:ef:20:3e:37:07:7f:db:ae:16:77: 14:a6:7e:76:9a:20:73:42:78:4b:c5:5d:82:f3:19:1a: 62:49:25:f0:97:b1:0b:00:2d:15:ca:8d:ac:b3:89:d4 Fingerprint (SHA-256): 3E:1C:69:D1:F3:72:14:35:BA:FE:4E:2C:21:2B:E6:BB:31:D6:71:9E:FE:A0:38:B6:B3:5B:D0:14:01:54:3D:13 Fingerprint (SHA1): BC:A2:76:8C:BA:BA:C7:71:FC:E7:97:30:04:58:CC:0A:65:4A:EF:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1388: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1389: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1390: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1391: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145049 (0x3cafa919) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:51:04 2023 Not After : Wed Oct 18 14:51:04 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:81:5a:33:f3:4d:a5:e0:8e:43:65:6e:57:d0:55:ed: b6:59:5c:41:bc:91:ab:80:36:00:db:ed:b3:62:6e:e7: df:31:9c:7f:be:7d:ad:29:1a:c3:b8:84:23:cc:8e:68: 8a:7d:1f:93:17:cb:ca:27:0e:d5:2c:5b:53:86:eb:64: 50:70:6b:dc:ea:42:d5:3e:8d:e1:d0:a7:43:92:4a:e2: a8:cb:ef:2e:d7:a8:3c:f0:a0:11:c4:83:b0:85:7b:89: 98:75:f1:d8:cc:2f:7e:cd:24:89:a2:ef:ec:8b:cd:5a: 91:b9:8d:b5:31:7c:7f:52:73:29:b7:71:00:2b:48:49: ef:e4:ef:6b:98:d5:8a:1b:52:47:47:38:fa:88:e0:ca: d3:e8:3d:95:f5:b4:61:56:5b:1b:2c:09:78:c3:2c:f5: 9f:b4:35:cd:39:8b:7a:4f:4e:50:ea:c9:66:89:b1:86: 93:5b:79:e2:9f:3d:62:c5:01:67:32:8a:75:b1:ef:7f: 7c:39:db:97:e6:70:21:9c:84:d7:28:cd:d1:f6:aa:de: db:7e:74:91:dd:64:e8:2b:f1:bd:8a:dd:a2:8d:b5:46: a0:f8:b0:66:9d:be:85:28:50:61:0a:c2:33:30:3a:2f: 18:53:33:49:65:4f:d7:f5:16:44:68:b0:f4:cc:9b:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:d0:e5:1f:ef:a7:8e:b0:8a:32:46:84:9b:a5:56:15: 9e:80:50:8d:59:18:5e:9d:fd:7d:f5:08:3f:1a:33:0c: df:7b:b7:a8:1d:b8:7b:21:b0:f6:d6:f2:21:fc:0e:9e: c0:15:93:d2:4f:f1:2a:07:37:af:63:a4:93:f5:85:66: a7:ed:f2:3a:68:ed:eb:55:95:f9:23:19:1e:89:82:28: ce:ff:5b:25:f1:bb:d3:11:39:36:25:5c:8c:5d:a5:cc: c4:38:d4:7d:19:39:99:02:27:c0:3e:65:9c:bb:b9:47: 70:42:0f:7c:c9:24:fb:f6:59:75:1f:7e:9b:b8:4d:8f: 3a:9d:dc:1d:6a:7e:07:86:46:dc:e5:ef:06:4b:d3:f2: 8d:c8:4c:db:7b:7e:95:65:f1:25:a9:b8:bc:94:23:a0: 08:22:11:4e:64:81:80:0d:12:fb:48:8a:5c:8d:12:89: e3:6a:1a:4b:d5:32:99:5b:8b:d7:d5:32:a2:a9:e3:ee: fb:69:bd:13:52:47:ed:b4:e9:4a:89:ee:83:cc:13:5d: 80:cf:2b:32:4d:e7:ef:20:3e:37:07:7f:db:ae:16:77: 14:a6:7e:76:9a:20:73:42:78:4b:c5:5d:82:f3:19:1a: 62:49:25:f0:97:b1:0b:00:2d:15:ca:8d:ac:b3:89:d4 Fingerprint (SHA-256): 3E:1C:69:D1:F3:72:14:35:BA:FE:4E:2C:21:2B:E6:BB:31:D6:71:9E:FE:A0:38:B6:B3:5B:D0:14:01:54:3D:13 Fingerprint (SHA1): BC:A2:76:8C:BA:BA:C7:71:FC:E7:97:30:04:58:CC:0A:65:4A:EF:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1392: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145049 (0x3cafa919) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:51:04 2023 Not After : Wed Oct 18 14:51:04 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:81:5a:33:f3:4d:a5:e0:8e:43:65:6e:57:d0:55:ed: b6:59:5c:41:bc:91:ab:80:36:00:db:ed:b3:62:6e:e7: df:31:9c:7f:be:7d:ad:29:1a:c3:b8:84:23:cc:8e:68: 8a:7d:1f:93:17:cb:ca:27:0e:d5:2c:5b:53:86:eb:64: 50:70:6b:dc:ea:42:d5:3e:8d:e1:d0:a7:43:92:4a:e2: a8:cb:ef:2e:d7:a8:3c:f0:a0:11:c4:83:b0:85:7b:89: 98:75:f1:d8:cc:2f:7e:cd:24:89:a2:ef:ec:8b:cd:5a: 91:b9:8d:b5:31:7c:7f:52:73:29:b7:71:00:2b:48:49: ef:e4:ef:6b:98:d5:8a:1b:52:47:47:38:fa:88:e0:ca: d3:e8:3d:95:f5:b4:61:56:5b:1b:2c:09:78:c3:2c:f5: 9f:b4:35:cd:39:8b:7a:4f:4e:50:ea:c9:66:89:b1:86: 93:5b:79:e2:9f:3d:62:c5:01:67:32:8a:75:b1:ef:7f: 7c:39:db:97:e6:70:21:9c:84:d7:28:cd:d1:f6:aa:de: db:7e:74:91:dd:64:e8:2b:f1:bd:8a:dd:a2:8d:b5:46: a0:f8:b0:66:9d:be:85:28:50:61:0a:c2:33:30:3a:2f: 18:53:33:49:65:4f:d7:f5:16:44:68:b0:f4:cc:9b:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:d0:e5:1f:ef:a7:8e:b0:8a:32:46:84:9b:a5:56:15: 9e:80:50:8d:59:18:5e:9d:fd:7d:f5:08:3f:1a:33:0c: df:7b:b7:a8:1d:b8:7b:21:b0:f6:d6:f2:21:fc:0e:9e: c0:15:93:d2:4f:f1:2a:07:37:af:63:a4:93:f5:85:66: a7:ed:f2:3a:68:ed:eb:55:95:f9:23:19:1e:89:82:28: ce:ff:5b:25:f1:bb:d3:11:39:36:25:5c:8c:5d:a5:cc: c4:38:d4:7d:19:39:99:02:27:c0:3e:65:9c:bb:b9:47: 70:42:0f:7c:c9:24:fb:f6:59:75:1f:7e:9b:b8:4d:8f: 3a:9d:dc:1d:6a:7e:07:86:46:dc:e5:ef:06:4b:d3:f2: 8d:c8:4c:db:7b:7e:95:65:f1:25:a9:b8:bc:94:23:a0: 08:22:11:4e:64:81:80:0d:12:fb:48:8a:5c:8d:12:89: e3:6a:1a:4b:d5:32:99:5b:8b:d7:d5:32:a2:a9:e3:ee: fb:69:bd:13:52:47:ed:b4:e9:4a:89:ee:83:cc:13:5d: 80:cf:2b:32:4d:e7:ef:20:3e:37:07:7f:db:ae:16:77: 14:a6:7e:76:9a:20:73:42:78:4b:c5:5d:82:f3:19:1a: 62:49:25:f0:97:b1:0b:00:2d:15:ca:8d:ac:b3:89:d4 Fingerprint (SHA-256): 3E:1C:69:D1:F3:72:14:35:BA:FE:4E:2C:21:2B:E6:BB:31:D6:71:9E:FE:A0:38:B6:B3:5B:D0:14:01:54:3D:13 Fingerprint (SHA1): BC:A2:76:8C:BA:BA:C7:71:FC:E7:97:30:04:58:CC:0A:65:4A:EF:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1393: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1394: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145049 (0x3cafa919) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:51:04 2023 Not After : Wed Oct 18 14:51:04 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:81:5a:33:f3:4d:a5:e0:8e:43:65:6e:57:d0:55:ed: b6:59:5c:41:bc:91:ab:80:36:00:db:ed:b3:62:6e:e7: df:31:9c:7f:be:7d:ad:29:1a:c3:b8:84:23:cc:8e:68: 8a:7d:1f:93:17:cb:ca:27:0e:d5:2c:5b:53:86:eb:64: 50:70:6b:dc:ea:42:d5:3e:8d:e1:d0:a7:43:92:4a:e2: a8:cb:ef:2e:d7:a8:3c:f0:a0:11:c4:83:b0:85:7b:89: 98:75:f1:d8:cc:2f:7e:cd:24:89:a2:ef:ec:8b:cd:5a: 91:b9:8d:b5:31:7c:7f:52:73:29:b7:71:00:2b:48:49: ef:e4:ef:6b:98:d5:8a:1b:52:47:47:38:fa:88:e0:ca: d3:e8:3d:95:f5:b4:61:56:5b:1b:2c:09:78:c3:2c:f5: 9f:b4:35:cd:39:8b:7a:4f:4e:50:ea:c9:66:89:b1:86: 93:5b:79:e2:9f:3d:62:c5:01:67:32:8a:75:b1:ef:7f: 7c:39:db:97:e6:70:21:9c:84:d7:28:cd:d1:f6:aa:de: db:7e:74:91:dd:64:e8:2b:f1:bd:8a:dd:a2:8d:b5:46: a0:f8:b0:66:9d:be:85:28:50:61:0a:c2:33:30:3a:2f: 18:53:33:49:65:4f:d7:f5:16:44:68:b0:f4:cc:9b:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:d0:e5:1f:ef:a7:8e:b0:8a:32:46:84:9b:a5:56:15: 9e:80:50:8d:59:18:5e:9d:fd:7d:f5:08:3f:1a:33:0c: df:7b:b7:a8:1d:b8:7b:21:b0:f6:d6:f2:21:fc:0e:9e: c0:15:93:d2:4f:f1:2a:07:37:af:63:a4:93:f5:85:66: a7:ed:f2:3a:68:ed:eb:55:95:f9:23:19:1e:89:82:28: ce:ff:5b:25:f1:bb:d3:11:39:36:25:5c:8c:5d:a5:cc: c4:38:d4:7d:19:39:99:02:27:c0:3e:65:9c:bb:b9:47: 70:42:0f:7c:c9:24:fb:f6:59:75:1f:7e:9b:b8:4d:8f: 3a:9d:dc:1d:6a:7e:07:86:46:dc:e5:ef:06:4b:d3:f2: 8d:c8:4c:db:7b:7e:95:65:f1:25:a9:b8:bc:94:23:a0: 08:22:11:4e:64:81:80:0d:12:fb:48:8a:5c:8d:12:89: e3:6a:1a:4b:d5:32:99:5b:8b:d7:d5:32:a2:a9:e3:ee: fb:69:bd:13:52:47:ed:b4:e9:4a:89:ee:83:cc:13:5d: 80:cf:2b:32:4d:e7:ef:20:3e:37:07:7f:db:ae:16:77: 14:a6:7e:76:9a:20:73:42:78:4b:c5:5d:82:f3:19:1a: 62:49:25:f0:97:b1:0b:00:2d:15:ca:8d:ac:b3:89:d4 Fingerprint (SHA-256): 3E:1C:69:D1:F3:72:14:35:BA:FE:4E:2C:21:2B:E6:BB:31:D6:71:9E:FE:A0:38:B6:B3:5B:D0:14:01:54:3D:13 Fingerprint (SHA1): BC:A2:76:8C:BA:BA:C7:71:FC:E7:97:30:04:58:CC:0A:65:4A:EF:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1395: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1396: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1397: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1398: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145049 (0x3cafa919) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:51:04 2023 Not After : Wed Oct 18 14:51:04 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:81:5a:33:f3:4d:a5:e0:8e:43:65:6e:57:d0:55:ed: b6:59:5c:41:bc:91:ab:80:36:00:db:ed:b3:62:6e:e7: df:31:9c:7f:be:7d:ad:29:1a:c3:b8:84:23:cc:8e:68: 8a:7d:1f:93:17:cb:ca:27:0e:d5:2c:5b:53:86:eb:64: 50:70:6b:dc:ea:42:d5:3e:8d:e1:d0:a7:43:92:4a:e2: a8:cb:ef:2e:d7:a8:3c:f0:a0:11:c4:83:b0:85:7b:89: 98:75:f1:d8:cc:2f:7e:cd:24:89:a2:ef:ec:8b:cd:5a: 91:b9:8d:b5:31:7c:7f:52:73:29:b7:71:00:2b:48:49: ef:e4:ef:6b:98:d5:8a:1b:52:47:47:38:fa:88:e0:ca: d3:e8:3d:95:f5:b4:61:56:5b:1b:2c:09:78:c3:2c:f5: 9f:b4:35:cd:39:8b:7a:4f:4e:50:ea:c9:66:89:b1:86: 93:5b:79:e2:9f:3d:62:c5:01:67:32:8a:75:b1:ef:7f: 7c:39:db:97:e6:70:21:9c:84:d7:28:cd:d1:f6:aa:de: db:7e:74:91:dd:64:e8:2b:f1:bd:8a:dd:a2:8d:b5:46: a0:f8:b0:66:9d:be:85:28:50:61:0a:c2:33:30:3a:2f: 18:53:33:49:65:4f:d7:f5:16:44:68:b0:f4:cc:9b:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:d0:e5:1f:ef:a7:8e:b0:8a:32:46:84:9b:a5:56:15: 9e:80:50:8d:59:18:5e:9d:fd:7d:f5:08:3f:1a:33:0c: df:7b:b7:a8:1d:b8:7b:21:b0:f6:d6:f2:21:fc:0e:9e: c0:15:93:d2:4f:f1:2a:07:37:af:63:a4:93:f5:85:66: a7:ed:f2:3a:68:ed:eb:55:95:f9:23:19:1e:89:82:28: ce:ff:5b:25:f1:bb:d3:11:39:36:25:5c:8c:5d:a5:cc: c4:38:d4:7d:19:39:99:02:27:c0:3e:65:9c:bb:b9:47: 70:42:0f:7c:c9:24:fb:f6:59:75:1f:7e:9b:b8:4d:8f: 3a:9d:dc:1d:6a:7e:07:86:46:dc:e5:ef:06:4b:d3:f2: 8d:c8:4c:db:7b:7e:95:65:f1:25:a9:b8:bc:94:23:a0: 08:22:11:4e:64:81:80:0d:12:fb:48:8a:5c:8d:12:89: e3:6a:1a:4b:d5:32:99:5b:8b:d7:d5:32:a2:a9:e3:ee: fb:69:bd:13:52:47:ed:b4:e9:4a:89:ee:83:cc:13:5d: 80:cf:2b:32:4d:e7:ef:20:3e:37:07:7f:db:ae:16:77: 14:a6:7e:76:9a:20:73:42:78:4b:c5:5d:82:f3:19:1a: 62:49:25:f0:97:b1:0b:00:2d:15:ca:8d:ac:b3:89:d4 Fingerprint (SHA-256): 3E:1C:69:D1:F3:72:14:35:BA:FE:4E:2C:21:2B:E6:BB:31:D6:71:9E:FE:A0:38:B6:B3:5B:D0:14:01:54:3D:13 Fingerprint (SHA1): BC:A2:76:8C:BA:BA:C7:71:FC:E7:97:30:04:58:CC:0A:65:4A:EF:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1399: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145049 (0x3cafa919) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:51:04 2023 Not After : Wed Oct 18 14:51:04 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:81:5a:33:f3:4d:a5:e0:8e:43:65:6e:57:d0:55:ed: b6:59:5c:41:bc:91:ab:80:36:00:db:ed:b3:62:6e:e7: df:31:9c:7f:be:7d:ad:29:1a:c3:b8:84:23:cc:8e:68: 8a:7d:1f:93:17:cb:ca:27:0e:d5:2c:5b:53:86:eb:64: 50:70:6b:dc:ea:42:d5:3e:8d:e1:d0:a7:43:92:4a:e2: a8:cb:ef:2e:d7:a8:3c:f0:a0:11:c4:83:b0:85:7b:89: 98:75:f1:d8:cc:2f:7e:cd:24:89:a2:ef:ec:8b:cd:5a: 91:b9:8d:b5:31:7c:7f:52:73:29:b7:71:00:2b:48:49: ef:e4:ef:6b:98:d5:8a:1b:52:47:47:38:fa:88:e0:ca: d3:e8:3d:95:f5:b4:61:56:5b:1b:2c:09:78:c3:2c:f5: 9f:b4:35:cd:39:8b:7a:4f:4e:50:ea:c9:66:89:b1:86: 93:5b:79:e2:9f:3d:62:c5:01:67:32:8a:75:b1:ef:7f: 7c:39:db:97:e6:70:21:9c:84:d7:28:cd:d1:f6:aa:de: db:7e:74:91:dd:64:e8:2b:f1:bd:8a:dd:a2:8d:b5:46: a0:f8:b0:66:9d:be:85:28:50:61:0a:c2:33:30:3a:2f: 18:53:33:49:65:4f:d7:f5:16:44:68:b0:f4:cc:9b:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:d0:e5:1f:ef:a7:8e:b0:8a:32:46:84:9b:a5:56:15: 9e:80:50:8d:59:18:5e:9d:fd:7d:f5:08:3f:1a:33:0c: df:7b:b7:a8:1d:b8:7b:21:b0:f6:d6:f2:21:fc:0e:9e: c0:15:93:d2:4f:f1:2a:07:37:af:63:a4:93:f5:85:66: a7:ed:f2:3a:68:ed:eb:55:95:f9:23:19:1e:89:82:28: ce:ff:5b:25:f1:bb:d3:11:39:36:25:5c:8c:5d:a5:cc: c4:38:d4:7d:19:39:99:02:27:c0:3e:65:9c:bb:b9:47: 70:42:0f:7c:c9:24:fb:f6:59:75:1f:7e:9b:b8:4d:8f: 3a:9d:dc:1d:6a:7e:07:86:46:dc:e5:ef:06:4b:d3:f2: 8d:c8:4c:db:7b:7e:95:65:f1:25:a9:b8:bc:94:23:a0: 08:22:11:4e:64:81:80:0d:12:fb:48:8a:5c:8d:12:89: e3:6a:1a:4b:d5:32:99:5b:8b:d7:d5:32:a2:a9:e3:ee: fb:69:bd:13:52:47:ed:b4:e9:4a:89:ee:83:cc:13:5d: 80:cf:2b:32:4d:e7:ef:20:3e:37:07:7f:db:ae:16:77: 14:a6:7e:76:9a:20:73:42:78:4b:c5:5d:82:f3:19:1a: 62:49:25:f0:97:b1:0b:00:2d:15:ca:8d:ac:b3:89:d4 Fingerprint (SHA-256): 3E:1C:69:D1:F3:72:14:35:BA:FE:4E:2C:21:2B:E6:BB:31:D6:71:9E:FE:A0:38:B6:B3:5B:D0:14:01:54:3D:13 Fingerprint (SHA1): BC:A2:76:8C:BA:BA:C7:71:FC:E7:97:30:04:58:CC:0A:65:4A:EF:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1400: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145049 (0x3cafa919) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:51:04 2023 Not After : Wed Oct 18 14:51:04 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:81:5a:33:f3:4d:a5:e0:8e:43:65:6e:57:d0:55:ed: b6:59:5c:41:bc:91:ab:80:36:00:db:ed:b3:62:6e:e7: df:31:9c:7f:be:7d:ad:29:1a:c3:b8:84:23:cc:8e:68: 8a:7d:1f:93:17:cb:ca:27:0e:d5:2c:5b:53:86:eb:64: 50:70:6b:dc:ea:42:d5:3e:8d:e1:d0:a7:43:92:4a:e2: a8:cb:ef:2e:d7:a8:3c:f0:a0:11:c4:83:b0:85:7b:89: 98:75:f1:d8:cc:2f:7e:cd:24:89:a2:ef:ec:8b:cd:5a: 91:b9:8d:b5:31:7c:7f:52:73:29:b7:71:00:2b:48:49: ef:e4:ef:6b:98:d5:8a:1b:52:47:47:38:fa:88:e0:ca: d3:e8:3d:95:f5:b4:61:56:5b:1b:2c:09:78:c3:2c:f5: 9f:b4:35:cd:39:8b:7a:4f:4e:50:ea:c9:66:89:b1:86: 93:5b:79:e2:9f:3d:62:c5:01:67:32:8a:75:b1:ef:7f: 7c:39:db:97:e6:70:21:9c:84:d7:28:cd:d1:f6:aa:de: db:7e:74:91:dd:64:e8:2b:f1:bd:8a:dd:a2:8d:b5:46: a0:f8:b0:66:9d:be:85:28:50:61:0a:c2:33:30:3a:2f: 18:53:33:49:65:4f:d7:f5:16:44:68:b0:f4:cc:9b:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:d0:e5:1f:ef:a7:8e:b0:8a:32:46:84:9b:a5:56:15: 9e:80:50:8d:59:18:5e:9d:fd:7d:f5:08:3f:1a:33:0c: df:7b:b7:a8:1d:b8:7b:21:b0:f6:d6:f2:21:fc:0e:9e: c0:15:93:d2:4f:f1:2a:07:37:af:63:a4:93:f5:85:66: a7:ed:f2:3a:68:ed:eb:55:95:f9:23:19:1e:89:82:28: ce:ff:5b:25:f1:bb:d3:11:39:36:25:5c:8c:5d:a5:cc: c4:38:d4:7d:19:39:99:02:27:c0:3e:65:9c:bb:b9:47: 70:42:0f:7c:c9:24:fb:f6:59:75:1f:7e:9b:b8:4d:8f: 3a:9d:dc:1d:6a:7e:07:86:46:dc:e5:ef:06:4b:d3:f2: 8d:c8:4c:db:7b:7e:95:65:f1:25:a9:b8:bc:94:23:a0: 08:22:11:4e:64:81:80:0d:12:fb:48:8a:5c:8d:12:89: e3:6a:1a:4b:d5:32:99:5b:8b:d7:d5:32:a2:a9:e3:ee: fb:69:bd:13:52:47:ed:b4:e9:4a:89:ee:83:cc:13:5d: 80:cf:2b:32:4d:e7:ef:20:3e:37:07:7f:db:ae:16:77: 14:a6:7e:76:9a:20:73:42:78:4b:c5:5d:82:f3:19:1a: 62:49:25:f0:97:b1:0b:00:2d:15:ca:8d:ac:b3:89:d4 Fingerprint (SHA-256): 3E:1C:69:D1:F3:72:14:35:BA:FE:4E:2C:21:2B:E6:BB:31:D6:71:9E:FE:A0:38:B6:B3:5B:D0:14:01:54:3D:13 Fingerprint (SHA1): BC:A2:76:8C:BA:BA:C7:71:FC:E7:97:30:04:58:CC:0A:65:4A:EF:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1401: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145049 (0x3cafa919) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:51:04 2023 Not After : Wed Oct 18 14:51:04 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:81:5a:33:f3:4d:a5:e0:8e:43:65:6e:57:d0:55:ed: b6:59:5c:41:bc:91:ab:80:36:00:db:ed:b3:62:6e:e7: df:31:9c:7f:be:7d:ad:29:1a:c3:b8:84:23:cc:8e:68: 8a:7d:1f:93:17:cb:ca:27:0e:d5:2c:5b:53:86:eb:64: 50:70:6b:dc:ea:42:d5:3e:8d:e1:d0:a7:43:92:4a:e2: a8:cb:ef:2e:d7:a8:3c:f0:a0:11:c4:83:b0:85:7b:89: 98:75:f1:d8:cc:2f:7e:cd:24:89:a2:ef:ec:8b:cd:5a: 91:b9:8d:b5:31:7c:7f:52:73:29:b7:71:00:2b:48:49: ef:e4:ef:6b:98:d5:8a:1b:52:47:47:38:fa:88:e0:ca: d3:e8:3d:95:f5:b4:61:56:5b:1b:2c:09:78:c3:2c:f5: 9f:b4:35:cd:39:8b:7a:4f:4e:50:ea:c9:66:89:b1:86: 93:5b:79:e2:9f:3d:62:c5:01:67:32:8a:75:b1:ef:7f: 7c:39:db:97:e6:70:21:9c:84:d7:28:cd:d1:f6:aa:de: db:7e:74:91:dd:64:e8:2b:f1:bd:8a:dd:a2:8d:b5:46: a0:f8:b0:66:9d:be:85:28:50:61:0a:c2:33:30:3a:2f: 18:53:33:49:65:4f:d7:f5:16:44:68:b0:f4:cc:9b:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:d0:e5:1f:ef:a7:8e:b0:8a:32:46:84:9b:a5:56:15: 9e:80:50:8d:59:18:5e:9d:fd:7d:f5:08:3f:1a:33:0c: df:7b:b7:a8:1d:b8:7b:21:b0:f6:d6:f2:21:fc:0e:9e: c0:15:93:d2:4f:f1:2a:07:37:af:63:a4:93:f5:85:66: a7:ed:f2:3a:68:ed:eb:55:95:f9:23:19:1e:89:82:28: ce:ff:5b:25:f1:bb:d3:11:39:36:25:5c:8c:5d:a5:cc: c4:38:d4:7d:19:39:99:02:27:c0:3e:65:9c:bb:b9:47: 70:42:0f:7c:c9:24:fb:f6:59:75:1f:7e:9b:b8:4d:8f: 3a:9d:dc:1d:6a:7e:07:86:46:dc:e5:ef:06:4b:d3:f2: 8d:c8:4c:db:7b:7e:95:65:f1:25:a9:b8:bc:94:23:a0: 08:22:11:4e:64:81:80:0d:12:fb:48:8a:5c:8d:12:89: e3:6a:1a:4b:d5:32:99:5b:8b:d7:d5:32:a2:a9:e3:ee: fb:69:bd:13:52:47:ed:b4:e9:4a:89:ee:83:cc:13:5d: 80:cf:2b:32:4d:e7:ef:20:3e:37:07:7f:db:ae:16:77: 14:a6:7e:76:9a:20:73:42:78:4b:c5:5d:82:f3:19:1a: 62:49:25:f0:97:b1:0b:00:2d:15:ca:8d:ac:b3:89:d4 Fingerprint (SHA-256): 3E:1C:69:D1:F3:72:14:35:BA:FE:4E:2C:21:2B:E6:BB:31:D6:71:9E:FE:A0:38:B6:B3:5B:D0:14:01:54:3D:13 Fingerprint (SHA1): BC:A2:76:8C:BA:BA:C7:71:FC:E7:97:30:04:58:CC:0A:65:4A:EF:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1402: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145049 (0x3cafa919) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:51:04 2023 Not After : Wed Oct 18 14:51:04 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:81:5a:33:f3:4d:a5:e0:8e:43:65:6e:57:d0:55:ed: b6:59:5c:41:bc:91:ab:80:36:00:db:ed:b3:62:6e:e7: df:31:9c:7f:be:7d:ad:29:1a:c3:b8:84:23:cc:8e:68: 8a:7d:1f:93:17:cb:ca:27:0e:d5:2c:5b:53:86:eb:64: 50:70:6b:dc:ea:42:d5:3e:8d:e1:d0:a7:43:92:4a:e2: a8:cb:ef:2e:d7:a8:3c:f0:a0:11:c4:83:b0:85:7b:89: 98:75:f1:d8:cc:2f:7e:cd:24:89:a2:ef:ec:8b:cd:5a: 91:b9:8d:b5:31:7c:7f:52:73:29:b7:71:00:2b:48:49: ef:e4:ef:6b:98:d5:8a:1b:52:47:47:38:fa:88:e0:ca: d3:e8:3d:95:f5:b4:61:56:5b:1b:2c:09:78:c3:2c:f5: 9f:b4:35:cd:39:8b:7a:4f:4e:50:ea:c9:66:89:b1:86: 93:5b:79:e2:9f:3d:62:c5:01:67:32:8a:75:b1:ef:7f: 7c:39:db:97:e6:70:21:9c:84:d7:28:cd:d1:f6:aa:de: db:7e:74:91:dd:64:e8:2b:f1:bd:8a:dd:a2:8d:b5:46: a0:f8:b0:66:9d:be:85:28:50:61:0a:c2:33:30:3a:2f: 18:53:33:49:65:4f:d7:f5:16:44:68:b0:f4:cc:9b:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:d0:e5:1f:ef:a7:8e:b0:8a:32:46:84:9b:a5:56:15: 9e:80:50:8d:59:18:5e:9d:fd:7d:f5:08:3f:1a:33:0c: df:7b:b7:a8:1d:b8:7b:21:b0:f6:d6:f2:21:fc:0e:9e: c0:15:93:d2:4f:f1:2a:07:37:af:63:a4:93:f5:85:66: a7:ed:f2:3a:68:ed:eb:55:95:f9:23:19:1e:89:82:28: ce:ff:5b:25:f1:bb:d3:11:39:36:25:5c:8c:5d:a5:cc: c4:38:d4:7d:19:39:99:02:27:c0:3e:65:9c:bb:b9:47: 70:42:0f:7c:c9:24:fb:f6:59:75:1f:7e:9b:b8:4d:8f: 3a:9d:dc:1d:6a:7e:07:86:46:dc:e5:ef:06:4b:d3:f2: 8d:c8:4c:db:7b:7e:95:65:f1:25:a9:b8:bc:94:23:a0: 08:22:11:4e:64:81:80:0d:12:fb:48:8a:5c:8d:12:89: e3:6a:1a:4b:d5:32:99:5b:8b:d7:d5:32:a2:a9:e3:ee: fb:69:bd:13:52:47:ed:b4:e9:4a:89:ee:83:cc:13:5d: 80:cf:2b:32:4d:e7:ef:20:3e:37:07:7f:db:ae:16:77: 14:a6:7e:76:9a:20:73:42:78:4b:c5:5d:82:f3:19:1a: 62:49:25:f0:97:b1:0b:00:2d:15:ca:8d:ac:b3:89:d4 Fingerprint (SHA-256): 3E:1C:69:D1:F3:72:14:35:BA:FE:4E:2C:21:2B:E6:BB:31:D6:71:9E:FE:A0:38:B6:B3:5B:D0:14:01:54:3D:13 Fingerprint (SHA1): BC:A2:76:8C:BA:BA:C7:71:FC:E7:97:30:04:58:CC:0A:65:4A:EF:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1403: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145049 (0x3cafa919) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:51:04 2023 Not After : Wed Oct 18 14:51:04 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:81:5a:33:f3:4d:a5:e0:8e:43:65:6e:57:d0:55:ed: b6:59:5c:41:bc:91:ab:80:36:00:db:ed:b3:62:6e:e7: df:31:9c:7f:be:7d:ad:29:1a:c3:b8:84:23:cc:8e:68: 8a:7d:1f:93:17:cb:ca:27:0e:d5:2c:5b:53:86:eb:64: 50:70:6b:dc:ea:42:d5:3e:8d:e1:d0:a7:43:92:4a:e2: a8:cb:ef:2e:d7:a8:3c:f0:a0:11:c4:83:b0:85:7b:89: 98:75:f1:d8:cc:2f:7e:cd:24:89:a2:ef:ec:8b:cd:5a: 91:b9:8d:b5:31:7c:7f:52:73:29:b7:71:00:2b:48:49: ef:e4:ef:6b:98:d5:8a:1b:52:47:47:38:fa:88:e0:ca: d3:e8:3d:95:f5:b4:61:56:5b:1b:2c:09:78:c3:2c:f5: 9f:b4:35:cd:39:8b:7a:4f:4e:50:ea:c9:66:89:b1:86: 93:5b:79:e2:9f:3d:62:c5:01:67:32:8a:75:b1:ef:7f: 7c:39:db:97:e6:70:21:9c:84:d7:28:cd:d1:f6:aa:de: db:7e:74:91:dd:64:e8:2b:f1:bd:8a:dd:a2:8d:b5:46: a0:f8:b0:66:9d:be:85:28:50:61:0a:c2:33:30:3a:2f: 18:53:33:49:65:4f:d7:f5:16:44:68:b0:f4:cc:9b:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:d0:e5:1f:ef:a7:8e:b0:8a:32:46:84:9b:a5:56:15: 9e:80:50:8d:59:18:5e:9d:fd:7d:f5:08:3f:1a:33:0c: df:7b:b7:a8:1d:b8:7b:21:b0:f6:d6:f2:21:fc:0e:9e: c0:15:93:d2:4f:f1:2a:07:37:af:63:a4:93:f5:85:66: a7:ed:f2:3a:68:ed:eb:55:95:f9:23:19:1e:89:82:28: ce:ff:5b:25:f1:bb:d3:11:39:36:25:5c:8c:5d:a5:cc: c4:38:d4:7d:19:39:99:02:27:c0:3e:65:9c:bb:b9:47: 70:42:0f:7c:c9:24:fb:f6:59:75:1f:7e:9b:b8:4d:8f: 3a:9d:dc:1d:6a:7e:07:86:46:dc:e5:ef:06:4b:d3:f2: 8d:c8:4c:db:7b:7e:95:65:f1:25:a9:b8:bc:94:23:a0: 08:22:11:4e:64:81:80:0d:12:fb:48:8a:5c:8d:12:89: e3:6a:1a:4b:d5:32:99:5b:8b:d7:d5:32:a2:a9:e3:ee: fb:69:bd:13:52:47:ed:b4:e9:4a:89:ee:83:cc:13:5d: 80:cf:2b:32:4d:e7:ef:20:3e:37:07:7f:db:ae:16:77: 14:a6:7e:76:9a:20:73:42:78:4b:c5:5d:82:f3:19:1a: 62:49:25:f0:97:b1:0b:00:2d:15:ca:8d:ac:b3:89:d4 Fingerprint (SHA-256): 3E:1C:69:D1:F3:72:14:35:BA:FE:4E:2C:21:2B:E6:BB:31:D6:71:9E:FE:A0:38:B6:B3:5B:D0:14:01:54:3D:13 Fingerprint (SHA1): BC:A2:76:8C:BA:BA:C7:71:FC:E7:97:30:04:58:CC:0A:65:4A:EF:D5 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1404: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1405: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1406: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145079 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1407: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1408: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #1409: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1410: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1018145080 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1411: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1412: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #1413: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1414: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1018145081 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1415: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1416: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #1417: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1418: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1018145082 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1419: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1420: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #1421: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1422: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1018145083 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1423: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1424: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #1425: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1426: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1018145084 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1427: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1428: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #1429: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1430: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1018145085 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1431: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1432: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1433: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145079 (0x3cafa937) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:51:20 2023 Not After : Wed Oct 18 14:51:20 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:fd:9b:e8:64:f4:08:45:27:a0:bd:27:d0:8e:b5:5e: 5d:18:b0:9d:34:59:e0:2a:a0:85:7f:05:57:46:91:f7: 15:5b:e6:93:24:3d:83:6c:91:59:3a:ae:0c:a3:2f:9c: d4:ca:49:60:ce:0d:96:80:bb:6f:1b:db:20:07:4b:80: 73:81:91:66:1c:df:50:a8:63:af:de:a2:de:3b:61:dd: 70:9d:6e:59:c6:3e:34:17:f5:60:1e:ef:04:57:20:cb: 12:dd:ff:76:d0:fb:53:a3:4f:ce:65:75:ef:59:0b:a3: 5c:00:b6:5c:3c:5a:9d:fc:f2:18:55:d8:c1:8f:96:96: 3e:b4:5f:13:79:f0:25:73:6b:3a:00:f4:0e:07:9e:06: 1e:3d:09:aa:1f:be:b8:eb:65:34:d7:cc:2a:c0:38:7c: d4:34:7e:fc:75:3f:d5:84:a5:19:67:cb:cf:2f:b0:f7: df:3f:ca:7c:cf:1e:57:42:f1:67:8b:e8:9b:82:97:2e: 32:1b:d9:7a:77:06:b4:f0:40:b6:5e:15:64:88:1e:a8: ba:89:76:0b:1b:7c:2b:fe:a5:ab:35:c6:17:ee:01:e0: 0b:6e:c8:ab:eb:c0:2d:27:b2:7f:31:f0:53:98:bd:f8: 94:35:a7:b1:63:c1:9a:79:08:b6:94:55:b4:e9:f1:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:5a:da:3e:70:8d:1d:d9:a9:99:44:08:d4:71:a4:46: ad:73:15:76:f0:f1:36:26:a3:0e:3b:74:9a:45:71:54: 84:b7:99:8f:03:fe:ba:84:56:ec:ac:2a:cf:67:67:38: 48:9b:f3:05:bc:94:fc:a8:85:47:b9:94:0e:78:70:7d: 8c:25:2a:cf:44:fb:34:f4:1e:3a:af:39:e1:6d:a7:21: 46:18:fe:6f:76:15:6d:2a:3a:88:b5:7c:5b:b4:a7:70: 21:f8:d2:9f:1b:ad:1d:c9:47:9e:57:86:7e:1a:24:b3: dd:19:0d:b3:f6:a7:4f:c8:83:0d:61:9b:6e:52:72:b9: 28:44:a3:f5:a1:7a:07:16:61:14:6d:46:4a:4b:67:d5: a2:7f:60:61:65:de:2a:d6:33:c3:c4:8e:ef:31:42:fa: f5:fb:f0:d3:35:62:52:65:ab:24:06:7b:0f:8f:e2:20: db:ae:1f:d0:19:ac:e3:55:3f:f2:b4:65:fd:9a:bd:81: 14:e4:46:02:81:cd:5f:71:19:99:d4:9a:1f:65:02:2f: 1b:bc:98:75:ba:b9:e0:94:0b:39:ee:0b:d4:a7:9c:12: 4e:43:f2:7e:27:0e:75:ef:44:13:95:a4:93:aa:9a:4a: 61:f0:66:78:c5:29:ae:9d:17:f0:d5:db:0e:56:86:40 Fingerprint (SHA-256): 8A:3E:17:FB:6E:CB:B1:23:D0:8B:03:49:90:AA:5C:25:E5:1A:78:CE:E3:51:F5:6D:EA:F1:69:FE:BA:D5:22:77 Fingerprint (SHA1): C6:18:EF:BA:8B:75:67:BB:DF:1A:A3:66:00:47:56:1C:6F:0A:01:E4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1434: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1435: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1436: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1437: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145079 (0x3cafa937) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:51:20 2023 Not After : Wed Oct 18 14:51:20 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:fd:9b:e8:64:f4:08:45:27:a0:bd:27:d0:8e:b5:5e: 5d:18:b0:9d:34:59:e0:2a:a0:85:7f:05:57:46:91:f7: 15:5b:e6:93:24:3d:83:6c:91:59:3a:ae:0c:a3:2f:9c: d4:ca:49:60:ce:0d:96:80:bb:6f:1b:db:20:07:4b:80: 73:81:91:66:1c:df:50:a8:63:af:de:a2:de:3b:61:dd: 70:9d:6e:59:c6:3e:34:17:f5:60:1e:ef:04:57:20:cb: 12:dd:ff:76:d0:fb:53:a3:4f:ce:65:75:ef:59:0b:a3: 5c:00:b6:5c:3c:5a:9d:fc:f2:18:55:d8:c1:8f:96:96: 3e:b4:5f:13:79:f0:25:73:6b:3a:00:f4:0e:07:9e:06: 1e:3d:09:aa:1f:be:b8:eb:65:34:d7:cc:2a:c0:38:7c: d4:34:7e:fc:75:3f:d5:84:a5:19:67:cb:cf:2f:b0:f7: df:3f:ca:7c:cf:1e:57:42:f1:67:8b:e8:9b:82:97:2e: 32:1b:d9:7a:77:06:b4:f0:40:b6:5e:15:64:88:1e:a8: ba:89:76:0b:1b:7c:2b:fe:a5:ab:35:c6:17:ee:01:e0: 0b:6e:c8:ab:eb:c0:2d:27:b2:7f:31:f0:53:98:bd:f8: 94:35:a7:b1:63:c1:9a:79:08:b6:94:55:b4:e9:f1:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b0:5a:da:3e:70:8d:1d:d9:a9:99:44:08:d4:71:a4:46: ad:73:15:76:f0:f1:36:26:a3:0e:3b:74:9a:45:71:54: 84:b7:99:8f:03:fe:ba:84:56:ec:ac:2a:cf:67:67:38: 48:9b:f3:05:bc:94:fc:a8:85:47:b9:94:0e:78:70:7d: 8c:25:2a:cf:44:fb:34:f4:1e:3a:af:39:e1:6d:a7:21: 46:18:fe:6f:76:15:6d:2a:3a:88:b5:7c:5b:b4:a7:70: 21:f8:d2:9f:1b:ad:1d:c9:47:9e:57:86:7e:1a:24:b3: dd:19:0d:b3:f6:a7:4f:c8:83:0d:61:9b:6e:52:72:b9: 28:44:a3:f5:a1:7a:07:16:61:14:6d:46:4a:4b:67:d5: a2:7f:60:61:65:de:2a:d6:33:c3:c4:8e:ef:31:42:fa: f5:fb:f0:d3:35:62:52:65:ab:24:06:7b:0f:8f:e2:20: db:ae:1f:d0:19:ac:e3:55:3f:f2:b4:65:fd:9a:bd:81: 14:e4:46:02:81:cd:5f:71:19:99:d4:9a:1f:65:02:2f: 1b:bc:98:75:ba:b9:e0:94:0b:39:ee:0b:d4:a7:9c:12: 4e:43:f2:7e:27:0e:75:ef:44:13:95:a4:93:aa:9a:4a: 61:f0:66:78:c5:29:ae:9d:17:f0:d5:db:0e:56:86:40 Fingerprint (SHA-256): 8A:3E:17:FB:6E:CB:B1:23:D0:8B:03:49:90:AA:5C:25:E5:1A:78:CE:E3:51:F5:6D:EA:F1:69:FE:BA:D5:22:77 Fingerprint (SHA1): C6:18:EF:BA:8B:75:67:BB:DF:1A:A3:66:00:47:56:1C:6F:0A:01:E4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1438: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1439: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1440: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1441: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145086 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1442: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1443: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1444: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1445: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018145087 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1446: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1447: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1448: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1449: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018145088 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1450: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1451: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1452: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1453: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018145089 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1454: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1455: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1456: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1457: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1458: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1459: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145086 (0x3cafa93e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:51:23 2023 Not After : Wed Oct 18 14:51:23 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cc:38:91:84:c7:2a:12:6c:9b:e6:be:af:9e:6e:69:99: 50:6f:99:1e:b2:64:a5:6f:22:19:f3:6e:3f:c4:71:55: 17:b4:c8:4b:9a:7c:f6:5e:f6:25:4b:ca:bd:57:43:19: 16:d6:2b:13:c9:35:25:a6:6a:a5:af:70:e2:5f:4c:da: 60:45:4f:24:3e:e7:16:19:a1:88:aa:b4:49:e6:5f:7e: 09:f6:e3:90:38:fa:34:b1:95:74:cd:79:30:ef:27:64: a2:6a:a9:57:28:91:70:8b:ea:ca:a8:e9:90:a4:09:09: 4e:d3:73:ed:fa:6f:66:58:22:25:43:2f:4e:94:c3:a5: a7:5d:fc:a9:5e:2e:b5:0a:f5:01:80:52:a8:c5:44:40: f4:ad:cd:da:1f:53:52:8c:a0:69:b9:d4:95:c2:74:df: f3:df:23:87:5e:7c:f9:31:ce:33:83:dd:63:83:e4:8a: 67:96:ce:85:60:5b:6f:0a:1a:50:bb:66:7e:bc:50:0b: fa:1f:42:f5:27:bb:cd:f5:3f:a4:e2:c7:0d:87:db:75: 76:ec:51:3f:61:7a:e2:e9:73:0e:ee:6f:c1:82:01:aa: cb:90:9d:d0:20:68:c4:4a:17:d1:ad:0f:db:5f:6e:6d: 9b:8a:91:75:11:5c:d8:40:ef:98:e7:73:23:d1:a7:67 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 92:99:44:93:7d:c3:fd:6d:d6:89:44:c8:7e:b8:14:db: a9:9e:6f:35:b3:03:4a:bf:a9:c3:a7:91:f8:71:6a:52: d5:2d:2f:0c:ba:58:ec:f5:1f:42:ae:7b:1e:a5:92:2e: b6:8d:2a:96:a3:f8:15:e6:c8:15:6a:e1:f4:9e:ba:78: 41:a0:7c:c5:b4:e2:29:7a:bd:d9:96:18:db:16:05:83: 36:b2:ac:c7:f9:41:b8:0a:e5:83:50:ff:f6:f8:d6:04: b8:df:be:37:49:98:08:e0:e1:c4:08:40:8a:04:6e:86: 4d:75:81:82:7f:39:73:aa:36:c7:1b:4a:29:c7:27:9e: 2a:09:e4:8f:ba:d6:32:0a:28:79:c8:4b:8d:19:da:76: d6:8e:a8:11:6f:86:66:c2:50:b9:e4:d0:eb:5b:04:1b: 89:5c:38:8b:20:82:a0:45:16:f1:44:f8:c2:1a:aa:72: 19:bd:ca:1d:2e:f9:fd:f8:f1:c0:4a:96:b7:de:5e:ab: 47:e5:2d:af:60:94:35:48:18:c6:f4:be:82:b4:92:81: 50:c4:71:8a:11:e5:b6:a5:c4:7f:d8:ac:bf:00:dc:15: 21:cc:ba:5f:f4:8b:83:d1:14:c4:a0:8d:2b:3e:0a:ad: 55:e7:38:8d:1d:f9:6e:6b:ea:f4:8a:cd:79:3c:45:5b Fingerprint (SHA-256): D5:80:E3:A1:9B:83:49:53:F1:C1:9D:4E:37:EC:DA:5F:08:3C:BB:0D:B0:5D:9D:46:C1:16:D7:57:2B:53:22:39 Fingerprint (SHA1): F5:4F:7C:AD:32:0C:A0:B3:3D:0D:1F:D6:EC:B2:77:52:26:F3:F0:36 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1460: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1461: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1462: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145087 (0x3cafa93f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:51:24 2023 Not After : Wed Oct 18 14:51:24 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:9a:de:e5:b5:f8:dc:fc:96:3d:b4:50:20:45:0d:8e: 55:21:f6:31:13:07:f5:dc:54:23:cb:3e:12:3a:a4:ac: 87:59:66:3f:c3:a3:6d:cb:e7:7e:16:c5:78:bc:1d:a4: d5:56:bb:29:41:1e:95:c9:ac:3c:43:67:1f:58:e2:48: 3d:b8:69:32:9e:20:8c:4e:7d:23:30:3f:17:82:45:47: 94:07:6f:0f:e5:90:a3:ce:d9:4e:db:e0:75:aa:b3:00: 6f:4c:7a:d5:3f:16:88:e6:0a:e2:08:28:01:6c:39:38: a2:84:39:6a:f7:c1:7d:c2:41:7a:35:40:d1:50:b8:58: 3b:e0:7b:65:c8:38:a6:42:30:43:97:11:af:9a:44:5b: 69:23:39:4b:c1:ba:cc:84:58:37:87:38:12:d4:e6:47: 85:fc:db:1c:bc:3b:8a:98:f7:68:cd:ac:2e:d0:43:18: 8a:ab:db:e9:6f:88:1a:c5:66:e8:71:76:e2:d6:82:21: b0:2c:0d:d6:f7:3b:ca:d2:c6:40:82:78:eb:07:d7:55: 18:c9:14:bc:10:c4:4b:b0:af:59:cc:a2:f2:ac:83:dc: 60:a3:27:d1:b9:a9:56:d6:69:01:c9:b1:e2:0e:a1:0b: 49:e0:ef:f7:f3:eb:59:f3:55:bd:0a:1f:9b:6f:6c:73 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:e0:ba:3b:c5:b7:a9:52:0f:08:72:cd:52:70:d0:f1: 3a:c7:1f:0c:fe:78:58:44:05:66:c8:da:f8:53:59:af: bb:be:dc:04:48:1f:63:a3:be:07:d2:65:3e:9e:5f:10: f8:16:4d:21:20:c5:ad:8c:d5:2e:31:5f:d0:03:3e:b4: 19:68:07:4b:37:5e:1e:7e:de:e5:30:41:b5:10:2a:e0: c4:0e:ab:d0:3a:de:db:9a:30:35:da:0a:0a:a9:c0:87: 5d:3c:38:57:c9:da:5d:46:1c:d4:21:f1:07:d0:db:c8: b8:7e:59:bd:1e:6a:48:93:9a:64:da:41:89:94:86:64: 2f:b2:29:e9:f4:74:ee:4e:2f:22:3a:f7:a5:b9:36:35: ca:6b:6a:2f:e0:e1:b4:2b:47:e5:43:79:a6:1b:05:88: 4c:ed:69:16:55:bd:f7:bb:0f:58:20:d4:0b:6d:df:05: 92:37:27:5b:b5:14:7e:98:c3:5f:fe:21:7f:38:8f:dc: 9d:1e:bc:33:db:90:67:c9:76:ec:84:80:9e:68:bd:7e: 31:8e:0d:21:8e:fc:10:1d:26:c8:2c:ec:2f:65:7a:db: 77:45:b1:7f:1f:9d:71:25:df:f2:88:0b:a9:d1:b3:43: 2e:af:43:9c:84:37:cb:3b:dc:39:c4:e8:31:cc:d0:c2 Fingerprint (SHA-256): C6:A1:16:B1:60:18:98:62:D6:8E:EC:4D:B3:D8:F3:A5:2C:EE:59:DC:12:51:7F:2F:5E:99:9B:4C:A8:D8:74:9D Fingerprint (SHA1): 32:04:C2:C3:E6:85:14:7E:53:83:77:5A:2C:18:CB:68:3D:52:30:76 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1463: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1464: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145088 (0x3cafa940) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:51:24 2023 Not After : Wed Oct 18 14:51:24 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:cc:d9:e7:ea:1b:c4:54:5e:6f:0f:23:5c:b0:78:06: 76:a8:c0:1e:08:b3:1e:c7:c2:65:6b:93:5e:a3:e1:b0: 48:e3:9b:23:cd:3c:95:b5:7e:84:cf:84:32:d5:ff:0a: 21:23:c0:0b:0c:f6:73:5b:9e:0b:92:22:f2:29:7b:8d: e2:f4:c3:23:3c:3f:d5:51:e1:8d:15:14:33:99:c1:87: 04:87:80:a3:e2:4b:99:10:c4:95:90:bf:7d:aa:0b:41: b0:ab:ea:cf:c1:ce:ca:dc:d3:3d:e9:79:f0:a8:b1:aa: e3:ef:fb:20:35:fb:d2:d7:4b:4a:7c:cc:55:15:77:23: 2a:4d:ea:44:73:ba:57:75:c3:71:a6:4f:3c:72:cc:5f: 2a:16:45:08:b5:9b:42:97:fb:ba:99:78:35:75:9d:e9: 12:65:1d:78:93:b2:7b:c8:90:d2:45:e4:14:58:00:86: 89:36:29:64:a5:f2:fc:3c:d0:69:b5:2c:b2:e4:8c:5a: 15:f8:38:f3:69:af:30:39:3e:5d:9f:81:82:70:5d:65: f9:5d:4a:23:c7:94:a7:c7:ec:d3:51:bd:96:b7:17:44: 54:dc:86:62:8b:12:9b:dc:af:52:0c:29:e5:5c:c5:c2: 47:a0:03:c0:38:06:17:85:06:fd:2d:01:06:be:e5:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4d:8a:8d:98:73:0a:58:ab:19:d8:17:63:cd:3d:ac:fe: 25:e1:c9:62:8d:a0:e9:6b:7c:33:3f:ff:6c:c8:2f:20: 35:55:da:49:e3:e1:8b:a3:3d:06:20:28:85:92:bb:e7: be:cf:d7:33:cc:eb:3b:1d:2c:c7:37:59:93:06:9b:82: 24:a8:e4:85:b6:7a:84:9b:8e:6c:e1:b9:fd:4b:df:c5: e1:ac:94:65:b9:76:f3:4c:e9:53:ec:cb:7b:58:a3:1f: 96:b5:ad:4a:e1:14:d1:13:8a:81:9d:8d:3f:a8:85:25: 47:29:19:32:b6:73:f6:8b:ed:eb:02:f8:42:bb:22:67: 8d:43:9a:eb:12:04:47:f6:67:4b:7a:95:86:fe:c4:e5: c9:b1:03:1e:de:97:7c:9a:a6:75:a4:d4:15:f9:9e:ba: 9f:10:8a:a5:1a:2b:d3:bd:12:44:76:3c:42:9f:ca:7f: 17:47:e3:fc:6f:c6:65:3b:da:a9:3b:fd:13:c2:36:1b: b9:0b:8a:41:33:92:d7:3c:93:4c:13:81:d7:ef:45:0a: cf:e5:2a:ce:f6:58:26:61:f8:5a:62:d7:02:2d:a1:3f: db:25:34:a1:4b:4b:84:e9:76:2b:a0:e9:f3:56:a2:b4: 0c:b4:46:08:e4:be:ae:c2:8f:23:61:12:46:ed:cc:71 Fingerprint (SHA-256): 6E:B7:04:C6:DC:EB:33:67:1B:2F:46:97:CC:19:80:87:59:15:A5:C1:CA:EC:21:B4:69:95:06:D9:2D:F7:5D:97 Fingerprint (SHA1): C7:A8:4D:3E:C0:08:DE:33:EF:81:3B:C1:70:C8:87:79:C5:64:54:28 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1465: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1466: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145090 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1467: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1468: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1469: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1470: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018145091 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1471: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1472: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1473: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1474: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018145092 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1475: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1476: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1477: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1478: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1018145093 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1479: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1480: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1481: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1482: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1018145094 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1483: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1484: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1485: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1486: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1487: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1488: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #1489: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145090 (0x3cafa942) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:51:25 2023 Not After : Wed Oct 18 14:51:25 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:45:67:fc:96:56:4c:e8:fa:50:f3:4f:db:58:52:4e: 72:63:d8:97:3d:09:b3:3f:ce:87:b9:a2:9b:5d:1f:07: 49:43:b5:80:89:02:04:82:43:a3:be:ed:e4:45:19:27: 6d:67:76:a1:b8:90:51:a8:fa:74:68:e2:e4:ff:3e:de: a4:78:cd:49:6f:2c:ad:1b:e5:4a:d6:6f:37:04:53:6e: 98:60:88:6d:43:b1:f1:dc:fb:0c:a9:59:23:f2:e6:e9: 9f:14:5d:5a:b9:e5:81:79:57:ec:54:19:3d:1e:a0:a6: 07:72:96:9c:fa:04:60:19:48:af:b7:6e:0f:19:f1:19: d5:22:61:c2:61:f8:fc:8f:c3:9b:4e:8b:fe:0c:ed:fe: 22:ec:d3:ba:73:71:50:57:c7:b6:4b:76:45:cc:66:e0: 86:36:8f:fc:78:e1:ec:c7:b3:93:11:93:47:05:7c:93: 63:6c:5a:15:6c:5a:f4:53:df:d8:0d:70:24:5a:4e:a9: 9c:00:29:b1:da:2f:6a:bb:d9:a4:04:f7:e5:59:6f:c7: ef:2b:6c:98:a8:09:c3:8f:05:14:65:6c:39:6b:09:f7: 1c:e1:12:c9:78:9d:d7:e1:3c:23:77:48:74:a3:28:9a: d3:0a:ec:70:89:02:e4:6e:35:4e:f4:f7:80:e8:a5:f3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:9d:e7:e5:c7:f8:5d:15:b4:c4:11:52:dc:2f:4c:1f: a6:b5:f0:2a:d8:34:81:56:03:15:cf:c1:a8:4a:f1:c3: d2:90:ce:e0:90:37:61:a8:cc:99:ad:d8:b8:b1:53:cd: 23:01:69:cb:bc:21:c1:10:9d:9a:b4:91:38:a8:67:4e: 49:bb:52:c5:bf:1a:79:9a:9c:73:8a:97:fa:97:bd:37: f9:75:1f:4d:33:cf:54:38:6f:30:44:3c:e3:40:af:97: 74:6e:98:35:4b:e9:85:d9:2b:a0:3b:76:09:9a:23:e6: 89:9f:36:14:10:94:e3:5b:51:75:97:0c:05:55:60:50: a8:fd:da:57:0a:16:d4:62:af:c4:bd:ff:b7:3c:7e:67: fa:7e:b3:a2:96:01:3c:38:85:d5:44:be:76:7a:cb:cd: 3d:53:7e:08:89:8d:ef:2a:f3:ce:f7:da:d1:84:1b:7c: fa:40:7d:36:4f:ed:02:ed:62:85:76:2b:b0:01:9e:f6: 40:36:80:57:b7:6f:9c:36:53:d3:39:49:e3:f6:c7:ce: 5f:1c:f3:fd:7b:02:d9:6b:15:db:61:4a:48:5e:20:e1: 10:e6:ff:75:03:59:3a:a1:3a:8e:a0:c9:79:9e:5b:0e: ca:4e:a3:e0:19:c5:86:1c:0c:52:32:1d:33:ff:6e:2f Fingerprint (SHA-256): 61:2D:45:A4:40:99:59:0A:CD:70:61:AC:1C:19:3A:88:7B:86:BA:1F:91:0F:54:53:AF:CC:9A:42:CA:9F:BA:10 Fingerprint (SHA1): BE:37:6C:8F:C8:65:F3:6A:C8:60:FE:3C:37:91:78:90:76:F8:19:BA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1490: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1491: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145091 (0x3cafa943) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:51:26 2023 Not After : Wed Oct 18 14:51:26 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:c6:4f:03:dd:29:05:5b:41:8c:b4:a1:7e:2d:cf:07: e1:c0:ab:e1:e1:04:b9:f6:e7:d3:44:0e:f5:49:45:64: fc:8b:40:ac:cc:a1:99:71:5b:72:10:f7:7f:dd:44:6a: cd:0e:77:97:64:ff:ea:da:ed:7c:3f:34:59:35:af:64: 55:15:43:3c:a0:19:97:08:bd:43:e6:83:7d:a3:73:f2: cf:1b:75:e8:25:ae:a0:d3:19:87:48:74:a4:b2:14:2d: bc:ff:62:ac:e2:9f:80:f3:88:01:cc:ff:86:40:71:d8: 46:02:98:81:fe:95:31:23:93:f8:cc:ac:a1:1f:7c:32: f0:90:de:74:39:33:e2:34:cf:7b:bf:62:75:7a:5c:22: e5:6e:53:d8:ce:5a:92:87:40:dd:f2:f7:b5:db:28:76: d6:4d:94:09:91:0f:1c:6b:df:30:3b:23:47:37:d4:ba: 2d:f0:cf:32:bc:96:a6:ac:ba:31:22:1f:48:f6:24:55: 94:ec:80:86:a8:87:67:c3:3b:9d:77:83:06:a3:e6:85: d0:21:fc:49:b4:de:90:72:a3:8d:c0:18:6d:2f:9b:5c: bb:fe:ab:f2:aa:e7:6f:ad:01:9a:64:02:09:59:03:71: 17:2b:75:0c:97:ad:43:b3:32:95:5c:91:9a:bb:47:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8f:16:ca:fc:16:31:b6:c3:26:6b:ce:84:cb:2f:a3:5e: 0b:13:47:87:4f:36:69:be:25:19:5b:8f:a8:ee:33:72: 15:f3:c4:e7:f1:b1:26:d4:7b:fe:92:35:5b:61:cd:2e: ae:2c:26:63:c0:77:c6:93:be:f7:c3:df:a0:93:90:11: 0c:e5:f3:72:cf:bf:a5:58:99:ca:5a:1c:2a:a9:53:bd: cd:77:6c:1c:43:22:f9:49:d8:c1:db:fc:ed:6b:13:f8: 86:85:3a:dd:ef:3a:22:42:5b:62:7c:f1:df:e4:d9:40: 4c:d8:34:1e:3b:2f:0c:b4:ed:41:a1:0c:e7:3a:0a:47: aa:bd:55:a7:c0:af:6d:90:8e:88:92:25:2a:d9:c8:85: 2b:49:2d:47:e3:d9:bd:9d:2f:da:74:af:0e:a8:f8:57: ee:4b:5a:e9:ed:76:a2:1b:ec:98:03:63:e7:46:70:e8: e5:d3:a7:5f:75:6c:57:7d:98:96:a3:8a:3c:a6:1b:90: a4:2a:53:c4:02:c4:ae:f0:36:0f:ed:d0:b4:2a:b3:a4: fb:22:59:fc:de:24:1e:25:d5:02:28:21:60:18:6d:6e: 42:1c:d1:81:f1:aa:d2:2f:c9:19:d4:f0:41:12:72:96: b7:e3:65:84:02:ba:66:80:fa:9a:d2:5a:f1:7d:36:1d Fingerprint (SHA-256): BC:44:1E:03:12:40:C4:69:EF:C9:F3:B6:AA:54:BC:70:7B:C3:0C:E8:67:CA:37:08:27:8A:2A:C8:AB:1E:E0:4A Fingerprint (SHA1): 9B:BD:78:D6:06:BC:FD:F5:71:D9:1D:F7:74:F4:0B:95:7D:88:BE:7A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1492: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1493: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1494: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145092 (0x3cafa944) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:51:26 2023 Not After : Wed Oct 18 14:51:26 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:eb:da:84:e2:21:93:26:17:dd:ad:27:ca:57:aa:5e: e3:9f:8d:e5:aa:bb:59:ed:35:c3:19:d5:37:99:13:93: dd:31:1f:f3:dc:44:48:2e:7d:bf:dd:12:58:3f:86:c7: 9d:68:d3:bf:9b:85:10:a6:82:96:b2:ec:a6:91:38:54: 5b:84:37:ac:be:3b:5f:3f:e2:52:41:38:3c:7d:2f:66: 23:96:c7:3a:71:d9:14:61:88:6f:c7:ed:9b:6d:d2:79: 5c:fb:ce:42:09:83:3c:aa:66:6a:ea:7e:13:2b:d7:cc: c4:1e:97:2a:da:b7:fd:c8:da:f1:db:84:a7:ca:a1:e4: 48:da:9b:d5:b7:1c:3e:f0:4a:81:c9:d3:8b:cb:6f:4d: 71:28:d7:8b:ba:ff:ee:e9:f4:9a:3b:59:98:5e:e5:72: db:cc:0f:1f:a5:30:15:de:58:11:cb:c2:f3:54:a7:0a: e5:92:55:80:e7:a7:93:10:95:b9:28:53:0d:1d:cc:84: 8f:e0:77:0f:58:5d:a8:e6:b9:94:66:7b:4c:4a:cf:73: 9d:1d:8e:a9:92:52:86:a4:d8:24:d5:a8:bf:01:90:39: ff:74:44:fb:4c:0b:18:f5:17:3f:e9:57:b0:13:8f:88: ae:5c:ff:76:6d:9b:50:1e:a3:1e:bb:e3:96:ab:84:d3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:69:b2:7f:18:95:6b:ca:ca:43:e0:e4:29:af:f2:0f: de:27:ea:79:d9:7d:97:d7:78:88:a3:e6:a2:9c:c3:a3: 1a:30:fa:35:19:51:45:d0:e2:7d:ea:1b:57:8a:05:8c: 5a:2c:3d:cf:e1:48:43:f4:5a:b2:61:a1:dd:dc:fd:f1: 3a:70:26:f5:bd:f2:20:b6:47:dd:59:5f:21:e5:19:ec: be:77:b9:8d:30:a1:a0:ad:e8:f6:9c:bf:41:21:1f:b8: 7e:e6:cb:bc:b3:15:2d:4f:d6:e8:5b:8d:ad:b1:52:f9: f8:1f:77:1d:7b:ce:7a:73:8a:eb:b2:d7:6a:ad:4c:7d: 78:7a:9d:78:86:5b:c8:de:00:43:64:65:df:05:36:93: f9:aa:07:85:54:76:64:ed:52:3f:72:06:ca:6f:81:dd: 1b:b8:f1:79:13:0a:bb:78:59:6b:3c:6b:86:db:9a:cd: 71:22:b7:a9:26:d4:0b:1f:23:f6:94:3e:1e:85:e8:f7: a9:29:30:f6:69:08:07:c7:37:95:11:1e:15:b3:33:0a: a7:21:68:1d:33:24:41:14:05:5b:f3:71:5c:1f:31:f3: e6:6a:73:80:41:6f:b2:15:f8:26:c5:a5:2c:e4:73:78: db:a1:e7:fc:b5:8a:90:0b:43:6f:48:30:80:f8:2b:61 Fingerprint (SHA-256): C5:39:DA:B0:B9:31:2E:4B:75:9F:82:D8:E4:C7:0F:95:F4:F2:B3:A4:12:2F:45:43:B2:B2:C7:BE:05:15:DA:F9 Fingerprint (SHA1): 5F:38:6A:05:73:64:68:24:E4:BC:A2:0F:D9:1A:A1:B1:F0:A7:BF:B4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1495: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1496: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145095 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1497: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1498: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1499: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1500: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018145096 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1501: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1502: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1503: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1504: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018145097 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA1Root-1018144858.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1505: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1506: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1507: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1508: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018145098 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1509: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1510: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #1511: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145095 (0x3cafa947) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:51:28 2023 Not After : Wed Oct 18 14:51:28 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:5c:36:58:fd:1c:a2:80:8a:f8:ae:a1:12:ec:59:77: dd:f5:4b:82:9c:36:91:9f:ac:24:04:21:f4:3e:ac:44: e3:42:da:d7:8f:0f:5f:6a:4b:36:53:ec:50:82:cb:b6: d8:eb:d5:17:4c:bf:66:e6:0c:65:8a:a7:3f:ac:ea:65: 18:55:ca:79:47:2c:99:26:c9:f8:ba:db:49:26:59:8b: 75:7f:7b:dd:49:fc:03:1f:14:88:b1:be:61:7b:bd:a4: 8a:4b:d2:3c:e2:3c:9d:66:c0:52:22:69:a9:00:f8:b2: d5:ce:20:90:49:a2:7d:27:93:7f:02:9d:cf:39:dd:73: e9:4e:bd:92:5f:3a:1e:7c:ee:c2:8a:2a:9d:37:79:cb: 1b:04:c0:ff:5e:5d:2b:79:96:2a:6d:4d:cc:b0:fd:5f: cd:18:f9:d3:7e:e1:a8:31:c4:25:a1:5a:08:bd:f7:27: cb:8c:87:86:7c:2d:c7:47:f4:75:6f:8e:80:6b:ba:8d: 8d:99:18:96:c0:e4:d8:38:e4:fb:c0:26:92:b2:03:05: 40:b1:ac:78:33:59:0f:ef:07:34:7e:ef:f9:05:48:63: 66:2c:3a:52:50:b4:06:3a:42:a6:93:95:9a:38:4d:99: 72:ff:be:57:b6:0d:1d:c8:87:50:1c:58:a5:e5:d3:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:6d:6f:36:74:99:b3:e5:20:fe:78:49:08:70:07:74: 15:a5:26:4c:f5:41:7c:be:ef:26:6f:35:45:42:cf:7b: 68:39:b2:3a:32:c6:ed:8a:5e:08:bd:f7:7f:54:88:1d: 2f:55:cf:1f:3a:f5:bc:94:e7:9e:b4:e8:7b:d8:5a:34: 79:f9:aa:d8:b7:00:8f:3a:1b:af:c7:cb:5d:91:a5:92: 66:e9:a6:b8:02:a6:71:e6:95:cc:48:9b:af:2e:4a:fe: aa:b8:8e:ef:97:51:9f:9a:e0:58:98:ec:33:3a:f5:b1: 6e:e2:4c:89:4e:b0:8f:8c:e8:a3:84:3b:f5:b3:72:a2: a9:e4:0c:44:06:59:c2:3e:9c:ec:7b:ee:c6:40:d4:79: 6e:a0:3b:bc:22:ed:3f:ac:2e:cc:de:d0:86:8c:69:96: c2:38:26:8c:a9:6f:cd:cc:00:cb:1e:74:2f:ac:ee:d8: 82:06:c9:4a:c5:75:cc:37:c3:f8:54:5e:f3:62:62:ce: f8:db:33:49:8d:2b:c9:08:9a:4f:ea:b5:5b:ff:e2:64: f9:cf:41:c4:19:d5:46:eb:0f:aa:5e:12:7e:1b:d6:85: fb:06:5c:8d:a6:d5:dd:78:46:08:05:0e:44:21:34:83: 4e:9a:91:c0:24:df:e1:e5:f4:6a:df:ca:26:89:7b:f1 Fingerprint (SHA-256): AC:D2:75:63:9F:8F:8B:81:9A:47:75:92:A4:AE:27:C4:60:D5:40:FE:8F:D5:C1:03:AD:5E:4B:92:0C:E0:A0:BD Fingerprint (SHA1): 76:AC:35:09:C9:D0:86:D3:F4:66:9A:BA:53:F4:0F:39:CC:F8:74:AF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1512: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1513: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145099 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1514: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1515: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1516: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145100 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1517: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1518: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1519: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1520: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018145101 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1521: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1522: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018145102 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1523: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1524: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1525: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1526: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1527: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018145103 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-Bridge-1018144859.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1528: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1529: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1530: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1531: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018145104 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1532: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1533: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1534: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1535: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145100 (0x3cafa94c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:51:30 2023 Not After : Wed Oct 18 14:51:30 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:3a:fe:b8:f5:fa:6a:fa:1c:c0:50:87:fd:9f:f5:4e: c7:ec:7d:a9:7e:f0:30:98:83:a9:2b:87:58:33:5a:ac: 5f:da:84:3c:b6:d7:a8:d3:c5:2d:f8:da:2e:30:cc:7e: 9b:db:56:0d:b5:31:70:eb:2e:5f:65:90:68:08:a8:c6: e7:8c:9f:d6:9f:7e:6c:f5:f6:27:e9:96:47:c4:c6:fe: f5:c1:ba:5e:0a:88:ed:09:0d:10:2a:86:50:12:5c:b2: c0:98:a9:e1:77:00:b7:68:e9:5a:f5:3b:94:4a:90:3e: 7b:fa:bd:7f:3e:95:e7:f4:b3:90:cc:45:8a:5b:64:ec: d6:01:53:d4:92:fb:fb:ff:9c:95:9c:95:5e:19:4e:06: 1b:e7:5d:04:c1:76:1f:cb:c8:a5:66:47:0b:f6:69:b7: e6:03:97:dd:ee:b8:2e:4d:5a:13:2e:51:9d:82:66:3d: 86:97:5c:54:70:70:25:5f:57:7b:33:10:8e:57:75:8d: c9:24:35:0c:4c:eb:d0:54:cd:04:30:d3:4b:e7:81:2d: 40:30:33:66:bc:ad:0a:3f:26:73:48:e9:85:ec:53:32: 56:07:35:39:00:8b:3b:80:79:55:96:85:c9:b4:db:27: 3c:3d:eb:c5:a7:f3:d9:f8:d4:6e:5c:fc:45:d4:75:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:9b:fe:52:cd:a0:a3:0c:3b:f6:41:8d:f7:c7:db:a8: 44:bd:77:2c:3f:ce:23:57:3b:ea:bc:72:1c:a3:10:b4: c6:c2:9b:bd:3b:bb:25:fb:13:94:9c:fa:fd:cb:4d:48: 12:4d:87:de:82:bc:3d:4d:fe:f3:47:90:61:1b:8b:cc: d7:c5:81:1a:c8:48:cd:71:3d:2c:17:e2:a5:33:fb:1c: 66:a4:66:98:7c:dc:a2:cb:f8:22:17:3b:6a:79:b0:fe: 68:59:93:9b:6f:ba:65:ab:39:5d:35:da:11:e7:d7:55: 9a:6d:a9:42:6a:5d:ac:ff:8e:30:c2:6b:59:f1:45:eb: 50:66:79:53:a1:b9:d3:16:d4:d9:30:cf:52:f4:bb:ad: d4:2d:dc:61:fe:d1:d7:a6:39:a4:8a:ad:62:ab:20:cc: 81:3e:14:5a:e0:b8:57:78:8c:b5:43:0c:b3:36:a1:f2: 98:0c:03:72:c7:f5:18:a0:e0:c7:fc:cd:af:81:eb:37: f8:ad:93:30:db:51:05:33:c3:b7:50:3f:ab:11:1e:7d: b4:b0:5b:65:43:03:f3:48:1b:da:b4:6f:a6:1f:88:00: 53:74:8b:9a:bd:cb:eb:d6:5b:b4:fc:29:ef:ca:e9:89: e5:54:b9:7c:83:65:18:bb:cc:77:27:d6:dc:51:53:c7 Fingerprint (SHA-256): C2:7D:82:90:6E:48:37:3F:B7:42:08:50:F4:FA:CF:3E:55:BE:C3:E9:31:46:70:84:9E:F0:6F:01:20:CE:56:70 Fingerprint (SHA1): A0:66:95:CA:A6:CB:EF:6E:0A:BF:C0:2F:26:D3:68:3D:F8:92:9D:61 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1536: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145100 (0x3cafa94c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:51:30 2023 Not After : Wed Oct 18 14:51:30 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:3a:fe:b8:f5:fa:6a:fa:1c:c0:50:87:fd:9f:f5:4e: c7:ec:7d:a9:7e:f0:30:98:83:a9:2b:87:58:33:5a:ac: 5f:da:84:3c:b6:d7:a8:d3:c5:2d:f8:da:2e:30:cc:7e: 9b:db:56:0d:b5:31:70:eb:2e:5f:65:90:68:08:a8:c6: e7:8c:9f:d6:9f:7e:6c:f5:f6:27:e9:96:47:c4:c6:fe: f5:c1:ba:5e:0a:88:ed:09:0d:10:2a:86:50:12:5c:b2: c0:98:a9:e1:77:00:b7:68:e9:5a:f5:3b:94:4a:90:3e: 7b:fa:bd:7f:3e:95:e7:f4:b3:90:cc:45:8a:5b:64:ec: d6:01:53:d4:92:fb:fb:ff:9c:95:9c:95:5e:19:4e:06: 1b:e7:5d:04:c1:76:1f:cb:c8:a5:66:47:0b:f6:69:b7: e6:03:97:dd:ee:b8:2e:4d:5a:13:2e:51:9d:82:66:3d: 86:97:5c:54:70:70:25:5f:57:7b:33:10:8e:57:75:8d: c9:24:35:0c:4c:eb:d0:54:cd:04:30:d3:4b:e7:81:2d: 40:30:33:66:bc:ad:0a:3f:26:73:48:e9:85:ec:53:32: 56:07:35:39:00:8b:3b:80:79:55:96:85:c9:b4:db:27: 3c:3d:eb:c5:a7:f3:d9:f8:d4:6e:5c:fc:45:d4:75:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:9b:fe:52:cd:a0:a3:0c:3b:f6:41:8d:f7:c7:db:a8: 44:bd:77:2c:3f:ce:23:57:3b:ea:bc:72:1c:a3:10:b4: c6:c2:9b:bd:3b:bb:25:fb:13:94:9c:fa:fd:cb:4d:48: 12:4d:87:de:82:bc:3d:4d:fe:f3:47:90:61:1b:8b:cc: d7:c5:81:1a:c8:48:cd:71:3d:2c:17:e2:a5:33:fb:1c: 66:a4:66:98:7c:dc:a2:cb:f8:22:17:3b:6a:79:b0:fe: 68:59:93:9b:6f:ba:65:ab:39:5d:35:da:11:e7:d7:55: 9a:6d:a9:42:6a:5d:ac:ff:8e:30:c2:6b:59:f1:45:eb: 50:66:79:53:a1:b9:d3:16:d4:d9:30:cf:52:f4:bb:ad: d4:2d:dc:61:fe:d1:d7:a6:39:a4:8a:ad:62:ab:20:cc: 81:3e:14:5a:e0:b8:57:78:8c:b5:43:0c:b3:36:a1:f2: 98:0c:03:72:c7:f5:18:a0:e0:c7:fc:cd:af:81:eb:37: f8:ad:93:30:db:51:05:33:c3:b7:50:3f:ab:11:1e:7d: b4:b0:5b:65:43:03:f3:48:1b:da:b4:6f:a6:1f:88:00: 53:74:8b:9a:bd:cb:eb:d6:5b:b4:fc:29:ef:ca:e9:89: e5:54:b9:7c:83:65:18:bb:cc:77:27:d6:dc:51:53:c7 Fingerprint (SHA-256): C2:7D:82:90:6E:48:37:3F:B7:42:08:50:F4:FA:CF:3E:55:BE:C3:E9:31:46:70:84:9E:F0:6F:01:20:CE:56:70 Fingerprint (SHA1): A0:66:95:CA:A6:CB:EF:6E:0A:BF:C0:2F:26:D3:68:3D:F8:92:9D:61 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1537: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1538: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145105 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1539: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1540: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1541: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145106 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1542: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1543: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1544: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1545: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018145107 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1546: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1547: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018145108 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1548: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1549: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1550: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1551: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1552: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018145109 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-Bridge-1018144860.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1553: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1554: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1555: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1556: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018145110 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1557: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1558: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1559: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1560: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018145111 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-BridgeNavy-1018144861.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1561: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1562: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1563: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1564: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018145112 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1565: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1566: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1567: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1568: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145106 (0x3cafa952) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:51:33 2023 Not After : Wed Oct 18 14:51:33 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:45:c5:40:1b:97:05:33:76:3f:48:47:4b:33:5b:f4: 1f:c6:29:d3:af:76:d2:f4:05:5c:1c:37:40:36:f0:43: e5:78:d0:30:e3:76:94:7d:98:91:65:55:66:1e:80:92: 41:83:14:db:8a:d1:c5:c7:2d:9e:a8:39:35:ed:0b:18: 80:2a:80:6e:71:f1:35:51:f2:ec:ef:79:5c:ec:c1:57: 98:b8:2a:bd:02:15:46:99:68:e3:2e:b3:a9:89:fb:9c: 2a:20:74:94:61:1e:e8:c6:6f:05:b7:08:bd:cb:95:e3: 78:23:c1:fa:78:a9:4c:0a:52:c8:a6:fc:0d:5e:23:61: f4:a9:4c:68:80:9d:77:76:bc:d2:d9:2a:9a:78:a2:b6: cb:9f:72:b1:4c:37:91:be:9a:a2:14:3f:2f:28:47:62: 95:78:f2:f6:54:ca:ee:ee:36:e3:55:ee:2f:dc:8b:bb: 7e:47:34:5f:3a:b2:6d:7f:9a:74:7d:a4:fe:43:55:d5: b3:54:b6:35:19:cb:0e:f9:fe:73:1b:d7:98:da:18:91: a3:e3:8f:e2:74:a0:dc:89:55:82:c7:4d:93:e4:2f:9f: 09:16:ed:93:90:eb:4a:95:57:20:74:8f:0b:47:11:03: a5:84:7a:0c:24:4d:19:8b:fb:74:cc:ee:4f:0e:4a:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:5d:6b:e1:21:75:63:88:ea:16:79:4c:c5:e4:c0:f9: 15:28:0e:ac:d7:bb:19:b2:5b:f4:69:6e:13:a8:f7:7d: 9e:97:f4:d0:72:3b:86:13:28:01:0b:49:44:f2:df:8d: e6:ba:51:18:86:f4:84:db:3e:d0:9e:65:95:f2:3a:4a: f7:ed:1c:6c:59:8c:5c:9c:d2:40:2d:08:84:ea:19:26: 3b:17:1c:8f:58:e3:20:09:91:75:ef:2d:3b:6d:eb:3c: a5:df:0e:c1:d5:32:34:2f:59:1a:82:65:b4:92:54:3d: 25:f0:a1:59:df:04:e6:32:fe:a4:5a:c3:f9:c3:1d:bc: 2f:29:79:d5:22:a8:6d:28:ec:c5:53:7f:0e:d4:b8:04: 80:53:7d:72:ad:1e:3e:c6:d5:7a:20:2e:2e:1c:2e:5b: 11:fd:e6:47:25:56:c4:70:49:aa:d0:c3:a6:f5:b3:8a: 16:f0:c0:b8:49:9c:7d:15:3b:0a:95:24:81:34:e2:a3: fb:fa:c1:24:cc:d9:af:7e:bf:85:bd:e4:40:f0:0b:35: e9:90:76:94:1b:93:97:32:3f:c7:5e:28:99:e1:5d:ee: e0:11:a0:f2:d4:a1:55:03:ef:f0:4b:9d:32:1c:17:97: ff:f4:1f:5a:22:2e:d1:cf:fc:ea:4a:a4:5c:ca:fb:d9 Fingerprint (SHA-256): DD:29:77:DA:DD:D8:31:46:F7:6B:A8:66:6C:A3:44:CC:D5:0A:6D:45:0F:74:2A:EC:10:5B:39:C8:1D:3A:6F:51 Fingerprint (SHA1): 75:C9:66:3B:22:E5:57:E9:5C:72:A0:4E:00:EA:6A:79:B7:1E:BA:21 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1569: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145106 (0x3cafa952) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:51:33 2023 Not After : Wed Oct 18 14:51:33 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:45:c5:40:1b:97:05:33:76:3f:48:47:4b:33:5b:f4: 1f:c6:29:d3:af:76:d2:f4:05:5c:1c:37:40:36:f0:43: e5:78:d0:30:e3:76:94:7d:98:91:65:55:66:1e:80:92: 41:83:14:db:8a:d1:c5:c7:2d:9e:a8:39:35:ed:0b:18: 80:2a:80:6e:71:f1:35:51:f2:ec:ef:79:5c:ec:c1:57: 98:b8:2a:bd:02:15:46:99:68:e3:2e:b3:a9:89:fb:9c: 2a:20:74:94:61:1e:e8:c6:6f:05:b7:08:bd:cb:95:e3: 78:23:c1:fa:78:a9:4c:0a:52:c8:a6:fc:0d:5e:23:61: f4:a9:4c:68:80:9d:77:76:bc:d2:d9:2a:9a:78:a2:b6: cb:9f:72:b1:4c:37:91:be:9a:a2:14:3f:2f:28:47:62: 95:78:f2:f6:54:ca:ee:ee:36:e3:55:ee:2f:dc:8b:bb: 7e:47:34:5f:3a:b2:6d:7f:9a:74:7d:a4:fe:43:55:d5: b3:54:b6:35:19:cb:0e:f9:fe:73:1b:d7:98:da:18:91: a3:e3:8f:e2:74:a0:dc:89:55:82:c7:4d:93:e4:2f:9f: 09:16:ed:93:90:eb:4a:95:57:20:74:8f:0b:47:11:03: a5:84:7a:0c:24:4d:19:8b:fb:74:cc:ee:4f:0e:4a:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:5d:6b:e1:21:75:63:88:ea:16:79:4c:c5:e4:c0:f9: 15:28:0e:ac:d7:bb:19:b2:5b:f4:69:6e:13:a8:f7:7d: 9e:97:f4:d0:72:3b:86:13:28:01:0b:49:44:f2:df:8d: e6:ba:51:18:86:f4:84:db:3e:d0:9e:65:95:f2:3a:4a: f7:ed:1c:6c:59:8c:5c:9c:d2:40:2d:08:84:ea:19:26: 3b:17:1c:8f:58:e3:20:09:91:75:ef:2d:3b:6d:eb:3c: a5:df:0e:c1:d5:32:34:2f:59:1a:82:65:b4:92:54:3d: 25:f0:a1:59:df:04:e6:32:fe:a4:5a:c3:f9:c3:1d:bc: 2f:29:79:d5:22:a8:6d:28:ec:c5:53:7f:0e:d4:b8:04: 80:53:7d:72:ad:1e:3e:c6:d5:7a:20:2e:2e:1c:2e:5b: 11:fd:e6:47:25:56:c4:70:49:aa:d0:c3:a6:f5:b3:8a: 16:f0:c0:b8:49:9c:7d:15:3b:0a:95:24:81:34:e2:a3: fb:fa:c1:24:cc:d9:af:7e:bf:85:bd:e4:40:f0:0b:35: e9:90:76:94:1b:93:97:32:3f:c7:5e:28:99:e1:5d:ee: e0:11:a0:f2:d4:a1:55:03:ef:f0:4b:9d:32:1c:17:97: ff:f4:1f:5a:22:2e:d1:cf:fc:ea:4a:a4:5c:ca:fb:d9 Fingerprint (SHA-256): DD:29:77:DA:DD:D8:31:46:F7:6B:A8:66:6C:A3:44:CC:D5:0A:6D:45:0F:74:2A:EC:10:5B:39:C8:1D:3A:6F:51 Fingerprint (SHA1): 75:C9:66:3B:22:E5:57:E9:5C:72:A0:4E:00:EA:6A:79:B7:1E:BA:21 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1570: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #1571: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145105 (0x3cafa951) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:51:33 2023 Not After : Wed Oct 18 14:51:33 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:ac:4f:b7:40:fe:1b:f8:d2:1c:2c:16:d2:c2:85:9a: 6b:01:e9:1d:b5:b9:fa:61:03:ed:70:39:33:27:f0:d4: 60:ee:50:81:b7:6a:86:b3:86:e9:44:b9:a4:19:f7:0c: d9:ca:9b:88:cb:ac:11:a8:97:7d:89:c8:87:5e:3a:c3: a5:d5:8e:f7:d9:4d:74:08:32:0f:0a:98:10:83:fc:ac: 87:3c:52:12:f7:a3:71:6b:fc:b9:f1:bc:74:99:cc:49: e4:4a:c1:58:1c:a4:a1:29:d3:a4:38:89:ae:38:49:ca: 47:34:3f:66:da:6e:12:29:a3:bd:9e:0f:5a:0c:de:17: 17:ce:d9:54:e4:00:d1:7d:d7:e8:0a:7c:7b:68:b6:b0: a0:4b:3b:ce:a6:87:3c:3a:43:cc:c1:d7:b1:01:a8:e7: 60:75:ca:67:ad:e2:e1:ad:31:aa:22:56:bd:62:09:79: 9e:d1:ee:f0:df:b7:8e:ef:5b:a7:b1:1d:c9:45:02:0c: a9:9e:be:78:82:92:93:11:52:bd:4e:d1:f7:ea:ad:d1: f4:96:56:36:1e:1e:6c:0a:95:d8:18:41:fd:c1:6b:ef: 94:1c:50:3a:24:cd:87:6f:f3:5d:5b:99:eb:ee:2e:03: 96:d2:ee:60:53:50:1f:26:fc:33:5e:c2:a9:4a:bd:3d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b2:30:0d:bc:f4:4c:e9:39:1a:41:d4:96:69:50:93:3b: 17:27:47:ae:e5:0d:03:a0:b8:6e:f5:0e:09:b2:16:d4: 62:6f:6f:74:6e:c5:d0:ee:94:49:28:5e:84:14:6c:84: eb:58:77:86:6c:a5:20:b8:c7:6a:23:c1:49:fb:36:e0: 05:14:72:6c:f0:11:01:f5:81:ad:59:46:2c:0d:f1:cc: 07:b1:2f:0a:68:48:df:4a:5d:46:85:33:1f:a0:a2:ce: 8e:f2:ab:47:01:80:13:3f:c1:3b:ec:5b:33:60:93:11: aa:2d:a8:5a:79:75:0d:cb:75:38:be:3b:a7:08:be:6d: 8e:88:96:ca:ac:4d:3a:ea:6f:f2:a5:09:60:96:1c:9e: a4:da:c5:31:5a:59:25:10:37:c4:82:79:30:68:bc:06: 1c:0b:c2:f3:d0:79:8a:0a:c2:6f:85:3c:c6:49:96:61: 00:b1:8e:cf:55:a0:a1:06:b1:12:98:5b:de:1f:59:76: 44:a5:18:df:50:6f:19:db:74:e8:f7:73:9b:d5:51:57: b9:fa:49:b0:57:1d:60:5e:83:c4:1f:d3:36:29:9b:cc: 93:c4:dc:8a:fc:73:a8:89:6a:7b:30:fe:d6:a0:1d:36: 63:4e:32:d7:e0:cb:d4:79:dc:5e:68:55:92:7a:1a:71 Fingerprint (SHA-256): CD:4C:13:3F:3A:97:7A:79:35:AC:F9:66:18:66:D4:1E:0E:3F:A2:9E:56:4B:D7:26:B3:63:FA:EC:4C:AD:5B:EB Fingerprint (SHA1): 2E:D9:78:59:6E:A9:09:18:47:72:1A:35:EB:21:C9:3F:74:D1:07:96 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1572: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145106 (0x3cafa952) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:51:33 2023 Not After : Wed Oct 18 14:51:33 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:45:c5:40:1b:97:05:33:76:3f:48:47:4b:33:5b:f4: 1f:c6:29:d3:af:76:d2:f4:05:5c:1c:37:40:36:f0:43: e5:78:d0:30:e3:76:94:7d:98:91:65:55:66:1e:80:92: 41:83:14:db:8a:d1:c5:c7:2d:9e:a8:39:35:ed:0b:18: 80:2a:80:6e:71:f1:35:51:f2:ec:ef:79:5c:ec:c1:57: 98:b8:2a:bd:02:15:46:99:68:e3:2e:b3:a9:89:fb:9c: 2a:20:74:94:61:1e:e8:c6:6f:05:b7:08:bd:cb:95:e3: 78:23:c1:fa:78:a9:4c:0a:52:c8:a6:fc:0d:5e:23:61: f4:a9:4c:68:80:9d:77:76:bc:d2:d9:2a:9a:78:a2:b6: cb:9f:72:b1:4c:37:91:be:9a:a2:14:3f:2f:28:47:62: 95:78:f2:f6:54:ca:ee:ee:36:e3:55:ee:2f:dc:8b:bb: 7e:47:34:5f:3a:b2:6d:7f:9a:74:7d:a4:fe:43:55:d5: b3:54:b6:35:19:cb:0e:f9:fe:73:1b:d7:98:da:18:91: a3:e3:8f:e2:74:a0:dc:89:55:82:c7:4d:93:e4:2f:9f: 09:16:ed:93:90:eb:4a:95:57:20:74:8f:0b:47:11:03: a5:84:7a:0c:24:4d:19:8b:fb:74:cc:ee:4f:0e:4a:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:5d:6b:e1:21:75:63:88:ea:16:79:4c:c5:e4:c0:f9: 15:28:0e:ac:d7:bb:19:b2:5b:f4:69:6e:13:a8:f7:7d: 9e:97:f4:d0:72:3b:86:13:28:01:0b:49:44:f2:df:8d: e6:ba:51:18:86:f4:84:db:3e:d0:9e:65:95:f2:3a:4a: f7:ed:1c:6c:59:8c:5c:9c:d2:40:2d:08:84:ea:19:26: 3b:17:1c:8f:58:e3:20:09:91:75:ef:2d:3b:6d:eb:3c: a5:df:0e:c1:d5:32:34:2f:59:1a:82:65:b4:92:54:3d: 25:f0:a1:59:df:04:e6:32:fe:a4:5a:c3:f9:c3:1d:bc: 2f:29:79:d5:22:a8:6d:28:ec:c5:53:7f:0e:d4:b8:04: 80:53:7d:72:ad:1e:3e:c6:d5:7a:20:2e:2e:1c:2e:5b: 11:fd:e6:47:25:56:c4:70:49:aa:d0:c3:a6:f5:b3:8a: 16:f0:c0:b8:49:9c:7d:15:3b:0a:95:24:81:34:e2:a3: fb:fa:c1:24:cc:d9:af:7e:bf:85:bd:e4:40:f0:0b:35: e9:90:76:94:1b:93:97:32:3f:c7:5e:28:99:e1:5d:ee: e0:11:a0:f2:d4:a1:55:03:ef:f0:4b:9d:32:1c:17:97: ff:f4:1f:5a:22:2e:d1:cf:fc:ea:4a:a4:5c:ca:fb:d9 Fingerprint (SHA-256): DD:29:77:DA:DD:D8:31:46:F7:6B:A8:66:6C:A3:44:CC:D5:0A:6D:45:0F:74:2A:EC:10:5B:39:C8:1D:3A:6F:51 Fingerprint (SHA1): 75:C9:66:3B:22:E5:57:E9:5C:72:A0:4E:00:EA:6A:79:B7:1E:BA:21 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1573: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145106 (0x3cafa952) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:51:33 2023 Not After : Wed Oct 18 14:51:33 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:45:c5:40:1b:97:05:33:76:3f:48:47:4b:33:5b:f4: 1f:c6:29:d3:af:76:d2:f4:05:5c:1c:37:40:36:f0:43: e5:78:d0:30:e3:76:94:7d:98:91:65:55:66:1e:80:92: 41:83:14:db:8a:d1:c5:c7:2d:9e:a8:39:35:ed:0b:18: 80:2a:80:6e:71:f1:35:51:f2:ec:ef:79:5c:ec:c1:57: 98:b8:2a:bd:02:15:46:99:68:e3:2e:b3:a9:89:fb:9c: 2a:20:74:94:61:1e:e8:c6:6f:05:b7:08:bd:cb:95:e3: 78:23:c1:fa:78:a9:4c:0a:52:c8:a6:fc:0d:5e:23:61: f4:a9:4c:68:80:9d:77:76:bc:d2:d9:2a:9a:78:a2:b6: cb:9f:72:b1:4c:37:91:be:9a:a2:14:3f:2f:28:47:62: 95:78:f2:f6:54:ca:ee:ee:36:e3:55:ee:2f:dc:8b:bb: 7e:47:34:5f:3a:b2:6d:7f:9a:74:7d:a4:fe:43:55:d5: b3:54:b6:35:19:cb:0e:f9:fe:73:1b:d7:98:da:18:91: a3:e3:8f:e2:74:a0:dc:89:55:82:c7:4d:93:e4:2f:9f: 09:16:ed:93:90:eb:4a:95:57:20:74:8f:0b:47:11:03: a5:84:7a:0c:24:4d:19:8b:fb:74:cc:ee:4f:0e:4a:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:5d:6b:e1:21:75:63:88:ea:16:79:4c:c5:e4:c0:f9: 15:28:0e:ac:d7:bb:19:b2:5b:f4:69:6e:13:a8:f7:7d: 9e:97:f4:d0:72:3b:86:13:28:01:0b:49:44:f2:df:8d: e6:ba:51:18:86:f4:84:db:3e:d0:9e:65:95:f2:3a:4a: f7:ed:1c:6c:59:8c:5c:9c:d2:40:2d:08:84:ea:19:26: 3b:17:1c:8f:58:e3:20:09:91:75:ef:2d:3b:6d:eb:3c: a5:df:0e:c1:d5:32:34:2f:59:1a:82:65:b4:92:54:3d: 25:f0:a1:59:df:04:e6:32:fe:a4:5a:c3:f9:c3:1d:bc: 2f:29:79:d5:22:a8:6d:28:ec:c5:53:7f:0e:d4:b8:04: 80:53:7d:72:ad:1e:3e:c6:d5:7a:20:2e:2e:1c:2e:5b: 11:fd:e6:47:25:56:c4:70:49:aa:d0:c3:a6:f5:b3:8a: 16:f0:c0:b8:49:9c:7d:15:3b:0a:95:24:81:34:e2:a3: fb:fa:c1:24:cc:d9:af:7e:bf:85:bd:e4:40:f0:0b:35: e9:90:76:94:1b:93:97:32:3f:c7:5e:28:99:e1:5d:ee: e0:11:a0:f2:d4:a1:55:03:ef:f0:4b:9d:32:1c:17:97: ff:f4:1f:5a:22:2e:d1:cf:fc:ea:4a:a4:5c:ca:fb:d9 Fingerprint (SHA-256): DD:29:77:DA:DD:D8:31:46:F7:6B:A8:66:6C:A3:44:CC:D5:0A:6D:45:0F:74:2A:EC:10:5B:39:C8:1D:3A:6F:51 Fingerprint (SHA1): 75:C9:66:3B:22:E5:57:E9:5C:72:A0:4E:00:EA:6A:79:B7:1E:BA:21 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1574: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1575: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145113 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1576: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1577: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1578: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145114 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1579: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1580: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #1581: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1582: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1018145115 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1583: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1584: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #1585: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1586: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1018145116 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1587: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1588: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1589: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1590: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1018145117 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1591: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1592: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1018145118 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1593: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1594: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #1595: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1596: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1597: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018145119 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1598: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1599: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1600: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1601: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018145120 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1602: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1603: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1604: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1605: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018145121 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1606: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1607: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1608: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1609: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018145122 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1610: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1611: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1612: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145113 (0x3cafa959) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 14:51:36 2023 Not After : Wed Oct 18 14:51:36 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ae:2e:ea:99:b4:7e:4f:91:d4:62:e1:3b:ad:3e:3d:d9: bf:8a:ae:6e:04:34:09:6e:f2:c1:6d:db:6e:c6:b3:1e: f7:9f:f2:62:51:bb:ea:5e:37:a6:15:b8:20:61:6d:1d: d7:22:97:f0:91:00:67:8f:f6:b7:74:78:4c:c4:06:2c: 2e:d0:d6:a5:47:db:a2:fc:c0:9a:d1:71:30:f7:f8:7f: e1:a0:8d:af:67:44:ad:ca:c3:21:a9:1d:13:12:45:e7: 82:32:5f:89:d4:a4:40:88:ff:86:66:a2:95:b7:85:82: 7d:86:75:1f:dd:2c:e8:6a:76:75:94:ed:ec:8f:1e:3f: 01:98:cc:2e:26:35:38:c9:d2:59:34:fb:b9:49:52:ed: c7:17:b4:31:0b:06:af:10:7d:2c:8e:f5:57:61:80:21: 35:af:23:98:4f:7b:df:8c:52:3d:d0:74:28:dd:59:79: 3a:95:75:0f:9a:f9:17:e8:78:eb:72:90:be:b1:19:f5: 86:c3:be:19:7c:0d:ce:6e:49:d5:14:e6:4f:69:d5:65: 18:f5:ac:10:29:be:35:8b:ae:2f:bd:6c:04:1d:15:94: 5b:8a:79:9d:03:92:24:17:2c:a9:18:58:92:b1:5e:51: 73:25:4f:40:5d:5f:ca:f7:7c:d5:02:72:fb:a8:1e:d9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5d:d8:ec:6c:28:9c:bf:e3:c1:72:d9:0f:e5:22:70:a6: cc:06:98:8c:74:46:0c:44:52:99:00:b9:d5:ac:0b:c3: b4:04:ba:e9:53:f6:f9:fd:71:26:ef:92:4b:a8:b6:bb: 2b:e0:81:69:0e:64:9c:08:d4:0e:bb:a7:51:29:23:9e: fb:b1:1a:b7:33:8d:70:a2:f4:87:4c:ae:ca:98:49:74: d4:dc:df:1a:f9:4a:9c:7a:cc:b2:de:80:28:61:ec:16: fd:d6:7b:d1:6d:07:a2:94:f3:33:6c:e8:e0:f0:62:02: 91:7c:87:9c:75:79:a0:19:e0:90:f1:fc:1c:a6:8e:b8: b1:c2:5d:c4:62:f2:26:2f:b1:b4:c4:59:22:92:d6:bf: 72:b0:91:8d:8a:8a:c6:86:fc:55:08:2a:97:c1:88:bc: 64:16:9d:a1:1b:40:3b:21:9f:f8:37:01:29:e8:1c:1e: d6:e4:63:0e:80:59:52:58:04:55:bc:ad:8a:32:bf:8e: f8:a6:35:55:c2:d3:de:89:35:fb:aa:eb:e4:80:02:57: eb:3a:fa:48:29:fc:26:48:b3:bb:bb:42:42:da:29:23: e0:58:cc:f6:22:bf:4e:74:16:4d:99:d7:a1:34:28:a0: f5:45:87:f7:71:7f:30:a4:9a:46:1c:18:9d:ca:e5:f0 Fingerprint (SHA-256): E0:CD:57:73:E5:5F:93:E5:6E:F7:0B:7B:97:C5:F6:B0:CB:7F:29:B7:67:8C:B9:42:DD:E8:80:90:DF:85:21:36 Fingerprint (SHA1): 43:93:95:D5:99:E4:F0:71:A9:EF:37:EA:93:06:54:E9:B3:12:D3:59 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #1613: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1614: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1615: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1616: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1617: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1618: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1619: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1620: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1621: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145114 (0x3cafa95a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 14:51:36 2023 Not After : Wed Oct 18 14:51:36 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:9d:51:f4:a3:d7:cc:ee:5d:13:a5:78:bc:89:2d:a7: 89:22:98:9c:f8:f8:13:52:05:93:35:2d:c4:f9:76:4a: c3:36:1f:86:1e:a0:07:d4:6a:c6:c1:49:74:1d:57:f8: e5:c3:70:32:07:0a:cd:c2:ea:56:40:61:a7:bd:22:c0: cd:63:f3:eb:2c:d5:77:1b:a0:20:d8:0e:a7:74:70:2e: 5d:f3:21:08:8b:34:92:3f:f5:d4:95:86:d6:c4:94:6d: 22:3e:f0:1c:fe:c6:1b:22:fb:07:a2:34:27:62:70:c4: 74:b4:51:59:0d:25:41:41:85:0d:79:fb:24:db:af:d9: 8c:f9:da:02:35:2f:26:2b:9e:9d:c5:e6:72:af:55:27: 94:d9:11:44:6a:e3:97:2c:8c:4c:ef:9a:d4:46:1d:9a: 1b:34:ff:40:8d:17:36:7d:22:c5:eb:2c:d8:e8:a3:2b: 48:42:7f:93:dd:d1:a8:1b:41:81:48:09:39:e3:b6:cb: 2a:0d:80:72:5b:ce:27:2e:84:bd:25:5f:e0:fa:db:8e: a0:f2:e5:1d:1a:1a:21:7a:6b:b3:03:62:5a:92:fe:fb: d9:c4:37:17:9f:6f:94:2b:3e:31:bf:1a:41:57:73:66: 4e:39:ed:e7:27:2f:a9:ae:3b:81:45:2f:2d:a5:6c:b3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 97:b3:fb:b7:5f:e6:1b:da:38:3f:61:67:82:a4:1e:c5: 45:81:f7:6a:dc:b2:0b:b5:e8:0c:32:51:e6:e1:b7:48: 2e:f0:22:af:35:17:06:f0:3b:e9:24:27:b1:26:34:92: 1b:cf:9e:65:bd:c1:e7:8d:32:5b:89:51:bd:6a:23:0c: 0a:c1:6e:5e:97:3a:03:0e:f7:b6:ec:08:74:cf:52:fd: fb:d7:93:4f:84:95:ca:a6:af:08:b7:09:92:82:b9:aa: 05:b7:71:af:6d:54:b7:7d:8b:7e:b7:07:05:17:40:18: a2:87:34:b0:93:90:dd:ec:ae:9d:97:cf:55:10:2e:52: 05:3d:e1:01:75:7f:fb:27:ca:12:9d:ff:42:9e:c3:b8: cc:93:49:ee:e5:58:73:6e:bb:64:dc:02:ac:c2:c9:07: 67:3e:f2:ba:f6:e3:63:77:8f:8c:86:f8:c9:da:0f:df: ca:bd:39:e1:0a:98:41:fa:31:5f:04:f0:0c:13:b7:dd: b5:83:7e:34:63:8c:05:62:70:b3:bb:13:d0:ef:e7:d3: d7:de:53:46:7d:c1:27:92:a9:90:9e:da:a0:ce:b1:21: bc:7f:28:83:f2:bd:62:86:9f:dd:1b:c2:81:8f:30:be: 70:09:13:7c:2b:1f:9f:82:fd:2b:ce:e1:3c:d5:68:3a Fingerprint (SHA-256): AF:85:65:98:2B:B1:F1:41:BB:8E:FA:6A:7B:DC:38:D7:2D:F2:9A:DC:E5:BB:E8:2C:CD:2F:15:95:DC:A3:3C:B5 Fingerprint (SHA1): 76:A6:4E:F8:66:F9:BA:0D:56:DF:D9:30:87:FB:12:0E:CF:6F:1D:22 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #1622: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1623: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1624: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1625: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1626: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1627: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1628: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #1629: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #1630: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #1631: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #1632: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #1633: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #1634: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #1635: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1636: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1637: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #1638: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1639: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1640: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145123 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1641: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1642: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1643: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1644: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018145124 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1645: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1646: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1647: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1648: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018145125 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1649: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1650: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1651: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1652: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1018145126 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1653: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1654: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1655: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1656: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018145127 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1657: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1658: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1659: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1660: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1018145128 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1661: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1662: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1663: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1664: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1018145129 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1665: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1666: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #1667: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1668: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1018145130 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1669: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1670: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1671: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1672: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1018145131 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1673: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1674: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1675: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145123 (0x3cafa963) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:51:41 2023 Not After : Wed Oct 18 14:51:41 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 44:9c:02:38:7d:b4:aa:e3:1b:04:7e:a0:4c:d1:a3:dd: 8f:1e:ae:a5:4e:20:40:cf:4e:7e:d5:b9:57:8d:ae:18: 11:0b:9b:a2:ec:59:c8:47:0f:c1:c2:98:63:3c:cc:30: b1:3a:3d:14:69:90:bf:4c:40:e7:d8:f0:88:f9:dc:57: 9f:11:9a:aa:26:92:b9:ba:85:5c:78:38:87:7b:a9:23: f9:b9:50:4c:c2:60:74:a1:83:b2:3e:10:35:e6:59:73: 31:04:1c:2c:d8:d8:30:ab:3d:85:be:9f:b9:95:8d:97: 3d:de:6f:ac:a1:ac:93:09:1d:df:65:95:b3:7e:ca:fd: dc:f6:68:94:e7:f8:76:4b:d1:9c:78:bb:ab:70:c4:12: e2:c4:df:7a:d9:2c:8e:12:0f:0a:e9:f9:d6:ad:3c:60: 00:2a:89:b4:08:8a:c9:3b:4f:ee:4a:d6:b1:03:52:28: 41:51:ad:59:1c:06:77:9f:d2:06:68:70:ca:20:f7:66: 86:46:67:86:04:33:02:f9:a5:6a:65:c6:ef:b9:b1:fd: 2f:e2:e1:82:55:85:10:34:5e:89:f7:e8:3d:37:de:32: 69:00:2c:e2:49:16:80:fc:b7:34:ee:27:65:cf:92:01: 75:ce:68:0e:e7:7c:99:d7:5b:11:e9:74:b5:54:55:0f Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:45:e4:95:16:2a:74:b9:45:86:c2:6b:6a: 19:23:8e:29:9b:3a:25:95:0d:30:bf:66:5f:c5:94:3c: 02:1c:00:9c:dd:45:bb:87:d6:fe:be:55:1b:15:8f:84: 8b:73:9e:60:b3:5f:b1:63:00:d7:eb:b3:91:98 Fingerprint (SHA-256): 50:C5:56:55:74:D9:94:72:C9:3E:48:ED:98:DA:26:84:93:BF:EF:24:FB:A8:B4:30:FE:14:AF:FC:C2:5B:6A:A5 Fingerprint (SHA1): 09:75:B5:F0:9D:C4:C8:94:E8:58:AF:FF:DC:05:9F:64:77:10:2F:F1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1676: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145123 (0x3cafa963) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:51:41 2023 Not After : Wed Oct 18 14:51:41 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 44:9c:02:38:7d:b4:aa:e3:1b:04:7e:a0:4c:d1:a3:dd: 8f:1e:ae:a5:4e:20:40:cf:4e:7e:d5:b9:57:8d:ae:18: 11:0b:9b:a2:ec:59:c8:47:0f:c1:c2:98:63:3c:cc:30: b1:3a:3d:14:69:90:bf:4c:40:e7:d8:f0:88:f9:dc:57: 9f:11:9a:aa:26:92:b9:ba:85:5c:78:38:87:7b:a9:23: f9:b9:50:4c:c2:60:74:a1:83:b2:3e:10:35:e6:59:73: 31:04:1c:2c:d8:d8:30:ab:3d:85:be:9f:b9:95:8d:97: 3d:de:6f:ac:a1:ac:93:09:1d:df:65:95:b3:7e:ca:fd: dc:f6:68:94:e7:f8:76:4b:d1:9c:78:bb:ab:70:c4:12: e2:c4:df:7a:d9:2c:8e:12:0f:0a:e9:f9:d6:ad:3c:60: 00:2a:89:b4:08:8a:c9:3b:4f:ee:4a:d6:b1:03:52:28: 41:51:ad:59:1c:06:77:9f:d2:06:68:70:ca:20:f7:66: 86:46:67:86:04:33:02:f9:a5:6a:65:c6:ef:b9:b1:fd: 2f:e2:e1:82:55:85:10:34:5e:89:f7:e8:3d:37:de:32: 69:00:2c:e2:49:16:80:fc:b7:34:ee:27:65:cf:92:01: 75:ce:68:0e:e7:7c:99:d7:5b:11:e9:74:b5:54:55:0f Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:45:e4:95:16:2a:74:b9:45:86:c2:6b:6a: 19:23:8e:29:9b:3a:25:95:0d:30:bf:66:5f:c5:94:3c: 02:1c:00:9c:dd:45:bb:87:d6:fe:be:55:1b:15:8f:84: 8b:73:9e:60:b3:5f:b1:63:00:d7:eb:b3:91:98 Fingerprint (SHA-256): 50:C5:56:55:74:D9:94:72:C9:3E:48:ED:98:DA:26:84:93:BF:EF:24:FB:A8:B4:30:FE:14:AF:FC:C2:5B:6A:A5 Fingerprint (SHA1): 09:75:B5:F0:9D:C4:C8:94:E8:58:AF:FF:DC:05:9F:64:77:10:2F:F1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1677: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145123 (0x3cafa963) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:51:41 2023 Not After : Wed Oct 18 14:51:41 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 44:9c:02:38:7d:b4:aa:e3:1b:04:7e:a0:4c:d1:a3:dd: 8f:1e:ae:a5:4e:20:40:cf:4e:7e:d5:b9:57:8d:ae:18: 11:0b:9b:a2:ec:59:c8:47:0f:c1:c2:98:63:3c:cc:30: b1:3a:3d:14:69:90:bf:4c:40:e7:d8:f0:88:f9:dc:57: 9f:11:9a:aa:26:92:b9:ba:85:5c:78:38:87:7b:a9:23: f9:b9:50:4c:c2:60:74:a1:83:b2:3e:10:35:e6:59:73: 31:04:1c:2c:d8:d8:30:ab:3d:85:be:9f:b9:95:8d:97: 3d:de:6f:ac:a1:ac:93:09:1d:df:65:95:b3:7e:ca:fd: dc:f6:68:94:e7:f8:76:4b:d1:9c:78:bb:ab:70:c4:12: e2:c4:df:7a:d9:2c:8e:12:0f:0a:e9:f9:d6:ad:3c:60: 00:2a:89:b4:08:8a:c9:3b:4f:ee:4a:d6:b1:03:52:28: 41:51:ad:59:1c:06:77:9f:d2:06:68:70:ca:20:f7:66: 86:46:67:86:04:33:02:f9:a5:6a:65:c6:ef:b9:b1:fd: 2f:e2:e1:82:55:85:10:34:5e:89:f7:e8:3d:37:de:32: 69:00:2c:e2:49:16:80:fc:b7:34:ee:27:65:cf:92:01: 75:ce:68:0e:e7:7c:99:d7:5b:11:e9:74:b5:54:55:0f Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:45:e4:95:16:2a:74:b9:45:86:c2:6b:6a: 19:23:8e:29:9b:3a:25:95:0d:30:bf:66:5f:c5:94:3c: 02:1c:00:9c:dd:45:bb:87:d6:fe:be:55:1b:15:8f:84: 8b:73:9e:60:b3:5f:b1:63:00:d7:eb:b3:91:98 Fingerprint (SHA-256): 50:C5:56:55:74:D9:94:72:C9:3E:48:ED:98:DA:26:84:93:BF:EF:24:FB:A8:B4:30:FE:14:AF:FC:C2:5B:6A:A5 Fingerprint (SHA1): 09:75:B5:F0:9D:C4:C8:94:E8:58:AF:FF:DC:05:9F:64:77:10:2F:F1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1678: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145123 (0x3cafa963) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:51:41 2023 Not After : Wed Oct 18 14:51:41 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 44:9c:02:38:7d:b4:aa:e3:1b:04:7e:a0:4c:d1:a3:dd: 8f:1e:ae:a5:4e:20:40:cf:4e:7e:d5:b9:57:8d:ae:18: 11:0b:9b:a2:ec:59:c8:47:0f:c1:c2:98:63:3c:cc:30: b1:3a:3d:14:69:90:bf:4c:40:e7:d8:f0:88:f9:dc:57: 9f:11:9a:aa:26:92:b9:ba:85:5c:78:38:87:7b:a9:23: f9:b9:50:4c:c2:60:74:a1:83:b2:3e:10:35:e6:59:73: 31:04:1c:2c:d8:d8:30:ab:3d:85:be:9f:b9:95:8d:97: 3d:de:6f:ac:a1:ac:93:09:1d:df:65:95:b3:7e:ca:fd: dc:f6:68:94:e7:f8:76:4b:d1:9c:78:bb:ab:70:c4:12: e2:c4:df:7a:d9:2c:8e:12:0f:0a:e9:f9:d6:ad:3c:60: 00:2a:89:b4:08:8a:c9:3b:4f:ee:4a:d6:b1:03:52:28: 41:51:ad:59:1c:06:77:9f:d2:06:68:70:ca:20:f7:66: 86:46:67:86:04:33:02:f9:a5:6a:65:c6:ef:b9:b1:fd: 2f:e2:e1:82:55:85:10:34:5e:89:f7:e8:3d:37:de:32: 69:00:2c:e2:49:16:80:fc:b7:34:ee:27:65:cf:92:01: 75:ce:68:0e:e7:7c:99:d7:5b:11:e9:74:b5:54:55:0f Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3c:02:1c:45:e4:95:16:2a:74:b9:45:86:c2:6b:6a: 19:23:8e:29:9b:3a:25:95:0d:30:bf:66:5f:c5:94:3c: 02:1c:00:9c:dd:45:bb:87:d6:fe:be:55:1b:15:8f:84: 8b:73:9e:60:b3:5f:b1:63:00:d7:eb:b3:91:98 Fingerprint (SHA-256): 50:C5:56:55:74:D9:94:72:C9:3E:48:ED:98:DA:26:84:93:BF:EF:24:FB:A8:B4:30:FE:14:AF:FC:C2:5B:6A:A5 Fingerprint (SHA1): 09:75:B5:F0:9D:C4:C8:94:E8:58:AF:FF:DC:05:9F:64:77:10:2F:F1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #1679: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1680: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 10 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1681: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1682: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1683: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1684: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1685: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1686: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1687: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1688: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1689: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1690: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1691: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1692: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1693: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1694: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #1695: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1696: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1697: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1698: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1699: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1700: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1701: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1702: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1703: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1704: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1705: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1706: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018145146Z nextupdate=20241018145146Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 14:51:46 2023 Next Update: Fri Oct 18 14:51:46 2024 CRL Extensions: chains.sh: #1707: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018145146Z nextupdate=20241018145146Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:51:46 2023 Next Update: Fri Oct 18 14:51:46 2024 CRL Extensions: chains.sh: #1708: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018145146Z nextupdate=20241018145146Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 14:51:46 2023 Next Update: Fri Oct 18 14:51:46 2024 CRL Extensions: chains.sh: #1709: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018145146Z nextupdate=20241018145146Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 14:51:46 2023 Next Update: Fri Oct 18 14:51:46 2024 CRL Extensions: chains.sh: #1710: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018145147Z addcert 14 20231018145147Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 14:51:47 2023 Next Update: Fri Oct 18 14:51:46 2024 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Wed Oct 18 14:51:47 2023 CRL Extensions: chains.sh: #1711: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018145148Z addcert 15 20231018145148Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:51:48 2023 Next Update: Fri Oct 18 14:51:46 2024 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Wed Oct 18 14:51:48 2023 CRL Extensions: chains.sh: #1712: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1713: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1714: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1715: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #1716: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #1717: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #1718: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #1719: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #1720: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #1721: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:51:43 2023 Not After : Wed Oct 18 14:51:43 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:35:81:bb:3e:5b:88:ed:f3:2a:0a:9e:3a:72:0f:4f: 58:0f:b2:f4:63:8a:df:57:90:a5:77:84:12:41:c3:b9: db:f6:3d:4e:95:4e:25:c5:4b:49:40:d0:de:5b:b3:49: 0c:0b:47:05:78:63:cf:22:ca:85:b2:d0:8d:98:8a:c9: 63:3a:1a:6e:89:1b:d2:b4:63:d5:d5:c7:b8:49:29:7b: af:61:e6:45:77:20:2b:1b:8d:72:b8:75:c0:20:d5:c2: 1f:09:54:e0:78:de:72:14:c7:9b:41:e7:d8:f7:11:84: 44:2c:b5:39:57:a3:3c:c4:ba:2c:b4:7b:ac:56:c8:7f: 76:d3:0b:68:53:d4:b7:2b:99:7b:06:e7:14:2f:68:ce: ae:56:58:fb:53:54:64:3a:32:ac:7d:31:a3:c4:50:37: 43:e5:09:93:14:c2:d2:fb:ee:63:dc:0a:e6:f9:56:d9: a3:d2:35:ab:8d:db:4f:e2:8b:d3:f2:a8:cb:3c:38:48: 71:4f:be:c1:ec:25:d6:99:39:f3:b4:ae:a4:f6:26:84: 14:f2:69:1e:63:42:c3:89:1f:a3:dd:d6:8c:3c:b7:76: bc:40:e4:81:8c:85:5c:97:43:66:38:d3:f7:a2:42:66: 0b:ea:66:37:3c:6f:a7:5a:38:40:5a:54:51:af:35:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:89:d2:f0:60:17:87:87:71:a7:ed:98:b3:b0:85:1a: 4f:5e:3a:d2:79:fa:57:71:e4:77:65:61:2e:3a:0d:94: 87:d9:33:29:f3:fa:cf:ce:80:2e:68:81:6a:ff:cf:7f: 3c:c1:10:02:ac:e3:86:ff:22:2f:83:2a:10:09:f6:be: 79:bf:70:b3:8d:50:c0:e2:56:63:8f:4f:70:8e:36:3c: 94:2d:ac:b3:d7:11:36:c7:90:31:f8:6d:bc:de:ef:dc: 6d:80:ee:d8:4d:a0:b6:c7:d6:d3:85:60:f3:de:75:86: 53:f1:49:e7:5b:0d:fe:77:3b:a0:6d:41:e2:ef:8e:85: 26:d3:ec:47:ee:5a:f1:57:54:75:61:d9:a4:6f:a8:65: c4:dc:b5:38:1d:e4:ad:06:59:57:22:ca:4e:d1:89:3c: 73:e2:ba:e1:55:01:1e:21:4d:d0:ae:a8:f9:7b:ca:6c: c4:79:6d:d6:01:83:17:28:4d:59:78:03:f7:3c:24:1b: d8:84:de:0e:0d:ff:4a:20:45:c9:74:8a:0b:46:da:3d: 0f:9d:6c:bb:a4:d4:1f:15:26:2d:6a:b7:7a:f9:f3:ab: a2:4a:45:5d:b4:d7:bf:19:8e:1d:8d:f0:c9:c5:cc:23: 13:30:e3:8d:65:bb:fc:bf:9e:7e:9d:b8:4c:43:60:36 Fingerprint (SHA-256): 01:85:5F:AA:D0:A5:E0:9F:F6:2D:6C:D5:AB:E1:F3:3D:20:83:21:82:EC:76:1C:73:95:4C:E8:AB:8C:9B:85:F8 Fingerprint (SHA1): 0C:97:9A:20:FD:0F:42:B5:8A:70:16:3C:2A:E9:85:BC:33:BD:45:A0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1722: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1723: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:51:43 2023 Not After : Wed Oct 18 14:51:43 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:35:81:bb:3e:5b:88:ed:f3:2a:0a:9e:3a:72:0f:4f: 58:0f:b2:f4:63:8a:df:57:90:a5:77:84:12:41:c3:b9: db:f6:3d:4e:95:4e:25:c5:4b:49:40:d0:de:5b:b3:49: 0c:0b:47:05:78:63:cf:22:ca:85:b2:d0:8d:98:8a:c9: 63:3a:1a:6e:89:1b:d2:b4:63:d5:d5:c7:b8:49:29:7b: af:61:e6:45:77:20:2b:1b:8d:72:b8:75:c0:20:d5:c2: 1f:09:54:e0:78:de:72:14:c7:9b:41:e7:d8:f7:11:84: 44:2c:b5:39:57:a3:3c:c4:ba:2c:b4:7b:ac:56:c8:7f: 76:d3:0b:68:53:d4:b7:2b:99:7b:06:e7:14:2f:68:ce: ae:56:58:fb:53:54:64:3a:32:ac:7d:31:a3:c4:50:37: 43:e5:09:93:14:c2:d2:fb:ee:63:dc:0a:e6:f9:56:d9: a3:d2:35:ab:8d:db:4f:e2:8b:d3:f2:a8:cb:3c:38:48: 71:4f:be:c1:ec:25:d6:99:39:f3:b4:ae:a4:f6:26:84: 14:f2:69:1e:63:42:c3:89:1f:a3:dd:d6:8c:3c:b7:76: bc:40:e4:81:8c:85:5c:97:43:66:38:d3:f7:a2:42:66: 0b:ea:66:37:3c:6f:a7:5a:38:40:5a:54:51:af:35:eb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:89:d2:f0:60:17:87:87:71:a7:ed:98:b3:b0:85:1a: 4f:5e:3a:d2:79:fa:57:71:e4:77:65:61:2e:3a:0d:94: 87:d9:33:29:f3:fa:cf:ce:80:2e:68:81:6a:ff:cf:7f: 3c:c1:10:02:ac:e3:86:ff:22:2f:83:2a:10:09:f6:be: 79:bf:70:b3:8d:50:c0:e2:56:63:8f:4f:70:8e:36:3c: 94:2d:ac:b3:d7:11:36:c7:90:31:f8:6d:bc:de:ef:dc: 6d:80:ee:d8:4d:a0:b6:c7:d6:d3:85:60:f3:de:75:86: 53:f1:49:e7:5b:0d:fe:77:3b:a0:6d:41:e2:ef:8e:85: 26:d3:ec:47:ee:5a:f1:57:54:75:61:d9:a4:6f:a8:65: c4:dc:b5:38:1d:e4:ad:06:59:57:22:ca:4e:d1:89:3c: 73:e2:ba:e1:55:01:1e:21:4d:d0:ae:a8:f9:7b:ca:6c: c4:79:6d:d6:01:83:17:28:4d:59:78:03:f7:3c:24:1b: d8:84:de:0e:0d:ff:4a:20:45:c9:74:8a:0b:46:da:3d: 0f:9d:6c:bb:a4:d4:1f:15:26:2d:6a:b7:7a:f9:f3:ab: a2:4a:45:5d:b4:d7:bf:19:8e:1d:8d:f0:c9:c5:cc:23: 13:30:e3:8d:65:bb:fc:bf:9e:7e:9d:b8:4c:43:60:36 Fingerprint (SHA-256): 01:85:5F:AA:D0:A5:E0:9F:F6:2D:6C:D5:AB:E1:F3:3D:20:83:21:82:EC:76:1C:73:95:4C:E8:AB:8C:9B:85:F8 Fingerprint (SHA1): 0C:97:9A:20:FD:0F:42:B5:8A:70:16:3C:2A:E9:85:BC:33:BD:45:A0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1724: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1725: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1726: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145132 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1727: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1728: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1729: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1730: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1018145133 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1731: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1732: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1733: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018144889.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1734: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018144862.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1735: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1736: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1737: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018144889.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1738: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1018145134 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1739: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1740: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1741: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018144889.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1742: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018144863.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1743: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1744: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1745: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1746: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1018145135 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1747: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1748: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1749: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018144889.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1750: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018144864.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1751: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1752: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1753: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018144889.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1754: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018144865.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1755: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1756: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018145151Z nextupdate=20241018145151Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 14:51:51 2023 Next Update: Fri Oct 18 14:51:51 2024 CRL Extensions: chains.sh: #1757: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018145151Z nextupdate=20241018145151Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:51:51 2023 Next Update: Fri Oct 18 14:51:51 2024 CRL Extensions: chains.sh: #1758: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018145151Z nextupdate=20241018145151Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 14:51:51 2023 Next Update: Fri Oct 18 14:51:51 2024 CRL Extensions: chains.sh: #1759: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018145151Z nextupdate=20241018145151Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 14:51:51 2023 Next Update: Fri Oct 18 14:51:51 2024 CRL Extensions: chains.sh: #1760: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018145152Z addcert 20 20231018145152Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:51:52 2023 Next Update: Fri Oct 18 14:51:51 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 14:51:52 2023 CRL Extensions: chains.sh: #1761: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018145153Z addcert 40 20231018145153Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 14:51:53 2023 Next Update: Fri Oct 18 14:51:51 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 14:51:52 2023 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Wed Oct 18 14:51:53 2023 CRL Extensions: chains.sh: #1762: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1763: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1764: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1765: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145132 (0x3cafa96c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:51:48 2023 Not After : Wed Oct 18 14:51:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:4a:49:7b:20:71:f4:ae:89:dd:45:2f:70:e0:54:4a: cb:dc:dd:33:5f:66:97:6f:0c:49:ca:d1:ec:da:b6:a9: b8:b8:3d:90:ff:ae:56:2e:58:60:2e:2f:54:73:db:56: 5c:3c:14:76:b6:a7:24:d9:5c:54:5a:47:f1:39:f0:c3: f7:06:c8:97:19:ae:e8:53:81:6f:61:44:07:3b:62:36: 2c:32:ea:97:a2:b1:17:22:9a:6f:02:61:fb:fb:47:7a: dc:5e:36:40:27:42:f7:06:3e:d1:c2:3f:8c:da:f8:d1: 47:d9:98:ab:43:3f:fd:14:3a:cc:32:b0:4b:92:b0:51: 0b:0f:a7:35:60:d3:c9:66:0d:7e:51:03:63:90:c8:d9: d5:aa:66:38:64:c7:8d:78:23:14:ce:c7:57:cc:61:55: e2:ef:2a:2e:e5:48:fc:31:b5:4d:31:7e:80:52:38:b2: ed:f7:39:2c:44:d5:30:5c:5e:df:73:ad:2d:da:58:28: ea:79:79:00:f5:81:cd:65:c1:ac:0f:bd:90:b4:39:3c: 85:0b:54:d7:ca:3d:6e:19:f4:c4:72:7f:9c:ff:5d:ca: 16:61:b9:3c:23:25:50:9d:c2:45:23:d1:f2:22:b1:48: 09:f4:c9:e9:e7:65:82:e5:99:f9:1b:5c:00:01:42:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:1f:cd:ce:88:a3:da:59:9d:5a:4b:a9:cd:79:3f:d9: 9e:b2:9b:55:fb:12:dc:9b:0e:f9:a3:b8:bc:79:95:17: 9b:53:c9:ef:d0:70:3f:28:82:70:a8:0b:8d:9a:10:dc: bf:40:97:be:e2:a6:be:3b:c0:4c:7b:81:43:dd:7c:15: d2:b8:04:05:dd:ba:53:3c:37:b2:46:a3:d6:ef:0d:fc: e0:01:2c:45:5d:69:73:d3:93:18:d3:e7:c3:ff:34:c7: f3:41:3d:fa:91:e9:df:72:ac:6c:64:52:89:6f:43:0d: 4f:ef:06:a8:fe:f2:b4:fc:ec:43:85:64:e5:1c:7a:4a: 58:6f:71:bb:3b:0e:a2:b3:64:b0:66:76:1f:2b:b1:44: 24:ab:fc:89:59:38:4d:4b:80:5c:42:f3:62:72:78:76: b9:9f:1d:de:23:aa:db:e4:75:2e:55:5d:16:73:a2:9d: 47:f3:15:0d:a0:ee:60:4b:58:c2:15:88:d3:85:8e:d6: 09:72:d4:5d:00:27:af:96:56:99:e8:23:df:b5:2c:f6: 76:e5:0b:6d:3d:1a:9f:53:63:e6:41:ab:3a:ac:be:67: c7:20:2c:f9:fb:c0:a9:c2:5e:e6:b8:c6:18:fb:01:7d: 77:2e:f1:b1:eb:76:d9:85:26:40:44:ef:de:c9:80:14 Fingerprint (SHA-256): 2D:5E:2D:A4:DA:F2:50:F3:C6:2F:CC:9E:04:88:A4:BA:CC:FD:B8:85:F1:D2:53:49:88:F8:92:11:0A:18:13:EC Fingerprint (SHA1): 08:57:49:BF:CA:E4:97:23:64:59:B8:FA:98:6D:89:45:89:9A:7B:2F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1766: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1767: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145132 (0x3cafa96c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 14:51:48 2023 Not After : Wed Oct 18 14:51:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:4a:49:7b:20:71:f4:ae:89:dd:45:2f:70:e0:54:4a: cb:dc:dd:33:5f:66:97:6f:0c:49:ca:d1:ec:da:b6:a9: b8:b8:3d:90:ff:ae:56:2e:58:60:2e:2f:54:73:db:56: 5c:3c:14:76:b6:a7:24:d9:5c:54:5a:47:f1:39:f0:c3: f7:06:c8:97:19:ae:e8:53:81:6f:61:44:07:3b:62:36: 2c:32:ea:97:a2:b1:17:22:9a:6f:02:61:fb:fb:47:7a: dc:5e:36:40:27:42:f7:06:3e:d1:c2:3f:8c:da:f8:d1: 47:d9:98:ab:43:3f:fd:14:3a:cc:32:b0:4b:92:b0:51: 0b:0f:a7:35:60:d3:c9:66:0d:7e:51:03:63:90:c8:d9: d5:aa:66:38:64:c7:8d:78:23:14:ce:c7:57:cc:61:55: e2:ef:2a:2e:e5:48:fc:31:b5:4d:31:7e:80:52:38:b2: ed:f7:39:2c:44:d5:30:5c:5e:df:73:ad:2d:da:58:28: ea:79:79:00:f5:81:cd:65:c1:ac:0f:bd:90:b4:39:3c: 85:0b:54:d7:ca:3d:6e:19:f4:c4:72:7f:9c:ff:5d:ca: 16:61:b9:3c:23:25:50:9d:c2:45:23:d1:f2:22:b1:48: 09:f4:c9:e9:e7:65:82:e5:99:f9:1b:5c:00:01:42:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:1f:cd:ce:88:a3:da:59:9d:5a:4b:a9:cd:79:3f:d9: 9e:b2:9b:55:fb:12:dc:9b:0e:f9:a3:b8:bc:79:95:17: 9b:53:c9:ef:d0:70:3f:28:82:70:a8:0b:8d:9a:10:dc: bf:40:97:be:e2:a6:be:3b:c0:4c:7b:81:43:dd:7c:15: d2:b8:04:05:dd:ba:53:3c:37:b2:46:a3:d6:ef:0d:fc: e0:01:2c:45:5d:69:73:d3:93:18:d3:e7:c3:ff:34:c7: f3:41:3d:fa:91:e9:df:72:ac:6c:64:52:89:6f:43:0d: 4f:ef:06:a8:fe:f2:b4:fc:ec:43:85:64:e5:1c:7a:4a: 58:6f:71:bb:3b:0e:a2:b3:64:b0:66:76:1f:2b:b1:44: 24:ab:fc:89:59:38:4d:4b:80:5c:42:f3:62:72:78:76: b9:9f:1d:de:23:aa:db:e4:75:2e:55:5d:16:73:a2:9d: 47:f3:15:0d:a0:ee:60:4b:58:c2:15:88:d3:85:8e:d6: 09:72:d4:5d:00:27:af:96:56:99:e8:23:df:b5:2c:f6: 76:e5:0b:6d:3d:1a:9f:53:63:e6:41:ab:3a:ac:be:67: c7:20:2c:f9:fb:c0:a9:c2:5e:e6:b8:c6:18:fb:01:7d: 77:2e:f1:b1:eb:76:d9:85:26:40:44:ef:de:c9:80:14 Fingerprint (SHA-256): 2D:5E:2D:A4:DA:F2:50:F3:C6:2F:CC:9E:04:88:A4:BA:CC:FD:B8:85:F1:D2:53:49:88:F8:92:11:0A:18:13:EC Fingerprint (SHA1): 08:57:49:BF:CA:E4:97:23:64:59:B8:FA:98:6D:89:45:89:9A:7B:2F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1768: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1769: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1770: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145136 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1771: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1772: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1773: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1774: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018145137 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1775: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1776: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1777: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1778: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018145138 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1779: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1780: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1781: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1782: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1018145139 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1783: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1784: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #1785: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -m 1018145140 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1786: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #1787: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #1788: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1789: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1018145141 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1790: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1791: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1792: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1793: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1018145142 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/pkix/cu_data === Certutil input data === === chains.sh: #1794: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1795: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #1796: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #1797: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #1798: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145136 (0x3cafa970) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:51:54 2023 Not After : Wed Oct 18 14:51:54 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:d4:79:d8:54:d5:aa:41:e4:e8:69:a5:55:d8:9d:d3: ba:10:29:26:a2:3d:c1:06:82:36:2d:31:79:a7:61:93: d3:db:ea:04:1c:a1:ad:60:a5:26:18:d8:b9:48:da:5a: ec:51:16:55:92:35:75:45:db:d4:ab:4c:ef:00:6e:53: 77:30:c2:37:ba:2b:71:9e:a2:38:cf:a8:fb:dc:1a:6f: 22:50:da:cd:8c:e7:31:3f:e2:38:2e:10:5f:5c:26:39: 74:62:c4:06:ab:28:e7:e1:57:d3:5c:71:ed:27:d8:e6: 6e:53:26:88:88:92:97:47:05:d8:5b:3b:7d:cb:1f:6e: b8:c5:0d:2f:fa:86:c5:11:a6:aa:54:93:9c:7d:30:19: 2e:f5:12:e4:0c:a0:d1:c8:56:d1:bf:28:3e:b7:62:6d: f7:3b:31:18:cc:a8:c0:70:f7:3f:5a:c2:d8:f1:c9:99: 89:24:ac:77:4a:a7:b0:5d:5a:d6:f2:3b:b9:e1:ba:7e: 00:08:ef:04:83:4a:c5:f9:05:67:66:46:39:57:af:e5: 8c:b6:40:66:93:95:38:33:73:91:8d:3b:71:1e:60:80: 81:25:09:1f:c9:83:c9:f4:69:f5:69:0e:88:40:8e:98: 4b:97:c1:53:e5:92:c6:24:c3:13:d9:d9:33:34:f4:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:47:2f:fb:cc:ea:2e:67:a8:65:91:39:03:d8:c8:50: 8c:c6:65:e6:2d:58:8e:23:2d:e0:96:1f:de:7a:3e:36: 9a:ab:7a:8f:f8:65:51:8e:8a:6f:c8:be:48:cd:71:48: 4f:27:8d:1e:90:2d:ff:d2:fe:44:58:be:06:80:0a:13: 72:b6:c5:53:e0:86:ae:5c:84:9b:ab:3b:b2:ca:2d:5c: 61:20:98:5f:fa:5e:fb:a5:35:6f:ed:a5:74:38:34:2e: 8c:91:9d:07:b8:9b:b6:5f:dc:9a:7a:89:26:cc:12:f2: 43:6c:3e:7f:b4:38:ec:fa:ef:d0:f0:2d:8d:c2:70:ef: 73:e8:ed:bb:87:4c:eb:5c:75:cd:8d:92:22:15:a0:66: 3f:cb:3c:a2:ae:fb:a7:86:c5:71:46:aa:8e:2f:72:13: 78:db:65:e1:99:9d:24:94:56:11:4a:6f:ce:b0:49:93: c4:89:e8:32:81:83:cf:0d:5d:8c:8a:0a:98:4c:f5:c4: 78:1d:66:51:6c:35:f5:af:62:1f:15:37:45:57:a1:57: 2d:2b:e3:17:4d:91:a4:9f:26:5c:8d:9e:b1:b4:a6:58: 29:67:e9:e4:75:eb:22:61:89:e0:02:62:a1:55:6a:b9: 23:45:e8:7a:dc:50:ba:6c:f3:48:a4:03:f6:e7:d1:7d Fingerprint (SHA-256): 1D:6D:F0:F1:6F:F8:03:46:F9:E8:20:DE:ED:37:01:93:07:86:75:81:E8:42:67:E2:54:08:7E:C5:A5:A9:34:2C Fingerprint (SHA1): 36:C3:EF:42:A7:9E:D8:26:DA:2F:E5:32:1C:1A:E7:1B:23:F8:85:B4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1799: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145138 (0x3cafa972) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:51:55 2023 Not After : Wed Oct 18 14:51:55 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:d2:4f:1f:7f:3c:b8:43:b4:6b:ea:fe:ab:83:eb:fb: 97:9a:42:1f:b0:d3:6c:15:22:32:d0:e4:af:40:84:d0: 29:cc:ae:9f:29:ab:ad:07:06:26:0a:41:31:a9:49:08: 18:9d:7d:07:82:c7:a2:c8:5a:fb:1d:48:08:9d:0b:04: a4:c7:44:65:ef:98:41:06:d5:c6:35:c5:0e:10:41:1f: fd:02:e4:b1:98:10:50:2a:8f:b1:0c:98:75:21:bc:ab: f9:91:e6:c9:54:5f:61:cf:ce:c2:c1:ef:bd:aa:df:fc: 77:9c:ea:08:a3:35:61:e2:05:69:a3:7b:97:f6:1a:70: 58:a3:19:50:2f:4e:13:da:57:c6:e7:f1:e4:a1:04:51: 63:42:a8:c3:56:5e:9b:38:a5:26:f1:9d:ba:bf:9a:70: 05:ec:02:6d:8b:ae:49:e9:48:82:6d:6b:99:b2:ea:3f: 36:92:48:cd:d5:a8:e7:d4:d8:7a:f6:be:af:0b:b3:09: 8a:35:7a:cd:15:2b:a4:d7:a5:90:27:cb:84:dc:a8:62: bc:4c:ca:c2:cf:ce:e6:ce:bd:47:8d:b4:59:be:a3:a0: 52:de:c6:3a:c2:d2:d0:e8:83:f3:b3:72:7e:0b:4a:b6: 89:1a:8c:3b:9c:f2:b6:8f:2e:82:0f:a5:e8:10:4f:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:ad:27:fe:a2:cf:a8:c1:58:ea:d2:bc:80:31:6e:9e: 68:59:68:8a:1d:f1:d3:f7:8d:72:04:35:61:b6:3c:8c: bd:3a:62:0f:d5:10:65:8a:51:af:53:14:6f:24:5d:cc: 08:66:e6:3f:57:75:3d:87:01:e9:34:fe:e5:f2:36:bb: c3:51:30:7c:63:00:6b:25:ed:90:c1:2e:86:ce:e7:07: 17:30:50:88:1a:9d:89:4b:77:f1:79:2f:ec:9a:6a:02: 61:4b:1d:e7:39:92:0a:c1:b1:31:cc:f2:5b:cf:18:f5: ef:e1:63:8d:72:75:b4:2d:9b:c4:a6:72:39:9f:fb:2c: a4:ef:32:96:18:b6:1e:0a:98:6e:42:e0:5a:45:ee:0d: 6a:bc:30:54:60:6b:2b:62:34:83:a6:5b:11:4f:ab:41: 4b:65:03:d3:f3:84:e1:96:b0:1f:35:58:89:17:8b:06: d3:0a:1f:3c:83:64:98:c1:93:e6:ef:b5:81:66:2c:56: d0:70:fe:f8:9a:4b:f6:97:3d:13:92:bf:7b:f9:38:ac: 3f:af:91:5c:27:ea:b9:35:df:44:e2:f7:9e:e1:0a:3e: 9c:26:96:f6:df:ca:76:9e:61:64:54:b9:37:50:6a:64: 94:37:78:b0:8f:56:16:8f:1a:1d:25:a7:4d:43:63:6e Fingerprint (SHA-256): FD:2C:88:20:99:63:9D:C9:80:40:0C:73:FE:A2:7D:75:08:06:A0:60:B6:05:82:90:E6:BB:43:66:B7:D1:5E:DC Fingerprint (SHA1): 10:9E:C4:84:EB:95:E3:10:4E:D0:02:26:A2:94:F5:CA:27:DC:80:DB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1800: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145136 (0x3cafa970) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:51:54 2023 Not After : Wed Oct 18 14:51:54 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:d4:79:d8:54:d5:aa:41:e4:e8:69:a5:55:d8:9d:d3: ba:10:29:26:a2:3d:c1:06:82:36:2d:31:79:a7:61:93: d3:db:ea:04:1c:a1:ad:60:a5:26:18:d8:b9:48:da:5a: ec:51:16:55:92:35:75:45:db:d4:ab:4c:ef:00:6e:53: 77:30:c2:37:ba:2b:71:9e:a2:38:cf:a8:fb:dc:1a:6f: 22:50:da:cd:8c:e7:31:3f:e2:38:2e:10:5f:5c:26:39: 74:62:c4:06:ab:28:e7:e1:57:d3:5c:71:ed:27:d8:e6: 6e:53:26:88:88:92:97:47:05:d8:5b:3b:7d:cb:1f:6e: b8:c5:0d:2f:fa:86:c5:11:a6:aa:54:93:9c:7d:30:19: 2e:f5:12:e4:0c:a0:d1:c8:56:d1:bf:28:3e:b7:62:6d: f7:3b:31:18:cc:a8:c0:70:f7:3f:5a:c2:d8:f1:c9:99: 89:24:ac:77:4a:a7:b0:5d:5a:d6:f2:3b:b9:e1:ba:7e: 00:08:ef:04:83:4a:c5:f9:05:67:66:46:39:57:af:e5: 8c:b6:40:66:93:95:38:33:73:91:8d:3b:71:1e:60:80: 81:25:09:1f:c9:83:c9:f4:69:f5:69:0e:88:40:8e:98: 4b:97:c1:53:e5:92:c6:24:c3:13:d9:d9:33:34:f4:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:47:2f:fb:cc:ea:2e:67:a8:65:91:39:03:d8:c8:50: 8c:c6:65:e6:2d:58:8e:23:2d:e0:96:1f:de:7a:3e:36: 9a:ab:7a:8f:f8:65:51:8e:8a:6f:c8:be:48:cd:71:48: 4f:27:8d:1e:90:2d:ff:d2:fe:44:58:be:06:80:0a:13: 72:b6:c5:53:e0:86:ae:5c:84:9b:ab:3b:b2:ca:2d:5c: 61:20:98:5f:fa:5e:fb:a5:35:6f:ed:a5:74:38:34:2e: 8c:91:9d:07:b8:9b:b6:5f:dc:9a:7a:89:26:cc:12:f2: 43:6c:3e:7f:b4:38:ec:fa:ef:d0:f0:2d:8d:c2:70:ef: 73:e8:ed:bb:87:4c:eb:5c:75:cd:8d:92:22:15:a0:66: 3f:cb:3c:a2:ae:fb:a7:86:c5:71:46:aa:8e:2f:72:13: 78:db:65:e1:99:9d:24:94:56:11:4a:6f:ce:b0:49:93: c4:89:e8:32:81:83:cf:0d:5d:8c:8a:0a:98:4c:f5:c4: 78:1d:66:51:6c:35:f5:af:62:1f:15:37:45:57:a1:57: 2d:2b:e3:17:4d:91:a4:9f:26:5c:8d:9e:b1:b4:a6:58: 29:67:e9:e4:75:eb:22:61:89:e0:02:62:a1:55:6a:b9: 23:45:e8:7a:dc:50:ba:6c:f3:48:a4:03:f6:e7:d1:7d Fingerprint (SHA-256): 1D:6D:F0:F1:6F:F8:03:46:F9:E8:20:DE:ED:37:01:93:07:86:75:81:E8:42:67:E2:54:08:7E:C5:A5:A9:34:2C Fingerprint (SHA1): 36:C3:EF:42:A7:9E:D8:26:DA:2F:E5:32:1C:1A:E7:1B:23:F8:85:B4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1801: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #1802: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145136 (0x3cafa970) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:51:54 2023 Not After : Wed Oct 18 14:51:54 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:d4:79:d8:54:d5:aa:41:e4:e8:69:a5:55:d8:9d:d3: ba:10:29:26:a2:3d:c1:06:82:36:2d:31:79:a7:61:93: d3:db:ea:04:1c:a1:ad:60:a5:26:18:d8:b9:48:da:5a: ec:51:16:55:92:35:75:45:db:d4:ab:4c:ef:00:6e:53: 77:30:c2:37:ba:2b:71:9e:a2:38:cf:a8:fb:dc:1a:6f: 22:50:da:cd:8c:e7:31:3f:e2:38:2e:10:5f:5c:26:39: 74:62:c4:06:ab:28:e7:e1:57:d3:5c:71:ed:27:d8:e6: 6e:53:26:88:88:92:97:47:05:d8:5b:3b:7d:cb:1f:6e: b8:c5:0d:2f:fa:86:c5:11:a6:aa:54:93:9c:7d:30:19: 2e:f5:12:e4:0c:a0:d1:c8:56:d1:bf:28:3e:b7:62:6d: f7:3b:31:18:cc:a8:c0:70:f7:3f:5a:c2:d8:f1:c9:99: 89:24:ac:77:4a:a7:b0:5d:5a:d6:f2:3b:b9:e1:ba:7e: 00:08:ef:04:83:4a:c5:f9:05:67:66:46:39:57:af:e5: 8c:b6:40:66:93:95:38:33:73:91:8d:3b:71:1e:60:80: 81:25:09:1f:c9:83:c9:f4:69:f5:69:0e:88:40:8e:98: 4b:97:c1:53:e5:92:c6:24:c3:13:d9:d9:33:34:f4:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:47:2f:fb:cc:ea:2e:67:a8:65:91:39:03:d8:c8:50: 8c:c6:65:e6:2d:58:8e:23:2d:e0:96:1f:de:7a:3e:36: 9a:ab:7a:8f:f8:65:51:8e:8a:6f:c8:be:48:cd:71:48: 4f:27:8d:1e:90:2d:ff:d2:fe:44:58:be:06:80:0a:13: 72:b6:c5:53:e0:86:ae:5c:84:9b:ab:3b:b2:ca:2d:5c: 61:20:98:5f:fa:5e:fb:a5:35:6f:ed:a5:74:38:34:2e: 8c:91:9d:07:b8:9b:b6:5f:dc:9a:7a:89:26:cc:12:f2: 43:6c:3e:7f:b4:38:ec:fa:ef:d0:f0:2d:8d:c2:70:ef: 73:e8:ed:bb:87:4c:eb:5c:75:cd:8d:92:22:15:a0:66: 3f:cb:3c:a2:ae:fb:a7:86:c5:71:46:aa:8e:2f:72:13: 78:db:65:e1:99:9d:24:94:56:11:4a:6f:ce:b0:49:93: c4:89:e8:32:81:83:cf:0d:5d:8c:8a:0a:98:4c:f5:c4: 78:1d:66:51:6c:35:f5:af:62:1f:15:37:45:57:a1:57: 2d:2b:e3:17:4d:91:a4:9f:26:5c:8d:9e:b1:b4:a6:58: 29:67:e9:e4:75:eb:22:61:89:e0:02:62:a1:55:6a:b9: 23:45:e8:7a:dc:50:ba:6c:f3:48:a4:03:f6:e7:d1:7d Fingerprint (SHA-256): 1D:6D:F0:F1:6F:F8:03:46:F9:E8:20:DE:ED:37:01:93:07:86:75:81:E8:42:67:E2:54:08:7E:C5:A5:A9:34:2C Fingerprint (SHA1): 36:C3:EF:42:A7:9E:D8:26:DA:2F:E5:32:1C:1A:E7:1B:23:F8:85:B4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1803: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145138 (0x3cafa972) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 14:51:55 2023 Not After : Wed Oct 18 14:51:55 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:d2:4f:1f:7f:3c:b8:43:b4:6b:ea:fe:ab:83:eb:fb: 97:9a:42:1f:b0:d3:6c:15:22:32:d0:e4:af:40:84:d0: 29:cc:ae:9f:29:ab:ad:07:06:26:0a:41:31:a9:49:08: 18:9d:7d:07:82:c7:a2:c8:5a:fb:1d:48:08:9d:0b:04: a4:c7:44:65:ef:98:41:06:d5:c6:35:c5:0e:10:41:1f: fd:02:e4:b1:98:10:50:2a:8f:b1:0c:98:75:21:bc:ab: f9:91:e6:c9:54:5f:61:cf:ce:c2:c1:ef:bd:aa:df:fc: 77:9c:ea:08:a3:35:61:e2:05:69:a3:7b:97:f6:1a:70: 58:a3:19:50:2f:4e:13:da:57:c6:e7:f1:e4:a1:04:51: 63:42:a8:c3:56:5e:9b:38:a5:26:f1:9d:ba:bf:9a:70: 05:ec:02:6d:8b:ae:49:e9:48:82:6d:6b:99:b2:ea:3f: 36:92:48:cd:d5:a8:e7:d4:d8:7a:f6:be:af:0b:b3:09: 8a:35:7a:cd:15:2b:a4:d7:a5:90:27:cb:84:dc:a8:62: bc:4c:ca:c2:cf:ce:e6:ce:bd:47:8d:b4:59:be:a3:a0: 52:de:c6:3a:c2:d2:d0:e8:83:f3:b3:72:7e:0b:4a:b6: 89:1a:8c:3b:9c:f2:b6:8f:2e:82:0f:a5:e8:10:4f:b5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:ad:27:fe:a2:cf:a8:c1:58:ea:d2:bc:80:31:6e:9e: 68:59:68:8a:1d:f1:d3:f7:8d:72:04:35:61:b6:3c:8c: bd:3a:62:0f:d5:10:65:8a:51:af:53:14:6f:24:5d:cc: 08:66:e6:3f:57:75:3d:87:01:e9:34:fe:e5:f2:36:bb: c3:51:30:7c:63:00:6b:25:ed:90:c1:2e:86:ce:e7:07: 17:30:50:88:1a:9d:89:4b:77:f1:79:2f:ec:9a:6a:02: 61:4b:1d:e7:39:92:0a:c1:b1:31:cc:f2:5b:cf:18:f5: ef:e1:63:8d:72:75:b4:2d:9b:c4:a6:72:39:9f:fb:2c: a4:ef:32:96:18:b6:1e:0a:98:6e:42:e0:5a:45:ee:0d: 6a:bc:30:54:60:6b:2b:62:34:83:a6:5b:11:4f:ab:41: 4b:65:03:d3:f3:84:e1:96:b0:1f:35:58:89:17:8b:06: d3:0a:1f:3c:83:64:98:c1:93:e6:ef:b5:81:66:2c:56: d0:70:fe:f8:9a:4b:f6:97:3d:13:92:bf:7b:f9:38:ac: 3f:af:91:5c:27:ea:b9:35:df:44:e2:f7:9e:e1:0a:3e: 9c:26:96:f6:df:ca:76:9e:61:64:54:b9:37:50:6a:64: 94:37:78:b0:8f:56:16:8f:1a:1d:25:a7:4d:43:63:6e Fingerprint (SHA-256): FD:2C:88:20:99:63:9D:C9:80:40:0C:73:FE:A2:7D:75:08:06:A0:60:B6:05:82:90:E6:BB:43:66:B7:D1:5E:DC Fingerprint (SHA1): 10:9E:C4:84:EB:95:E3:10:4E:D0:02:26:A2:94:F5:CA:27:DC:80:DB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1804: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #1805: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #1806: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #1807: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145136 (0x3cafa970) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:51:54 2023 Not After : Wed Oct 18 14:51:54 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:d4:79:d8:54:d5:aa:41:e4:e8:69:a5:55:d8:9d:d3: ba:10:29:26:a2:3d:c1:06:82:36:2d:31:79:a7:61:93: d3:db:ea:04:1c:a1:ad:60:a5:26:18:d8:b9:48:da:5a: ec:51:16:55:92:35:75:45:db:d4:ab:4c:ef:00:6e:53: 77:30:c2:37:ba:2b:71:9e:a2:38:cf:a8:fb:dc:1a:6f: 22:50:da:cd:8c:e7:31:3f:e2:38:2e:10:5f:5c:26:39: 74:62:c4:06:ab:28:e7:e1:57:d3:5c:71:ed:27:d8:e6: 6e:53:26:88:88:92:97:47:05:d8:5b:3b:7d:cb:1f:6e: b8:c5:0d:2f:fa:86:c5:11:a6:aa:54:93:9c:7d:30:19: 2e:f5:12:e4:0c:a0:d1:c8:56:d1:bf:28:3e:b7:62:6d: f7:3b:31:18:cc:a8:c0:70:f7:3f:5a:c2:d8:f1:c9:99: 89:24:ac:77:4a:a7:b0:5d:5a:d6:f2:3b:b9:e1:ba:7e: 00:08:ef:04:83:4a:c5:f9:05:67:66:46:39:57:af:e5: 8c:b6:40:66:93:95:38:33:73:91:8d:3b:71:1e:60:80: 81:25:09:1f:c9:83:c9:f4:69:f5:69:0e:88:40:8e:98: 4b:97:c1:53:e5:92:c6:24:c3:13:d9:d9:33:34:f4:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:47:2f:fb:cc:ea:2e:67:a8:65:91:39:03:d8:c8:50: 8c:c6:65:e6:2d:58:8e:23:2d:e0:96:1f:de:7a:3e:36: 9a:ab:7a:8f:f8:65:51:8e:8a:6f:c8:be:48:cd:71:48: 4f:27:8d:1e:90:2d:ff:d2:fe:44:58:be:06:80:0a:13: 72:b6:c5:53:e0:86:ae:5c:84:9b:ab:3b:b2:ca:2d:5c: 61:20:98:5f:fa:5e:fb:a5:35:6f:ed:a5:74:38:34:2e: 8c:91:9d:07:b8:9b:b6:5f:dc:9a:7a:89:26:cc:12:f2: 43:6c:3e:7f:b4:38:ec:fa:ef:d0:f0:2d:8d:c2:70:ef: 73:e8:ed:bb:87:4c:eb:5c:75:cd:8d:92:22:15:a0:66: 3f:cb:3c:a2:ae:fb:a7:86:c5:71:46:aa:8e:2f:72:13: 78:db:65:e1:99:9d:24:94:56:11:4a:6f:ce:b0:49:93: c4:89:e8:32:81:83:cf:0d:5d:8c:8a:0a:98:4c:f5:c4: 78:1d:66:51:6c:35:f5:af:62:1f:15:37:45:57:a1:57: 2d:2b:e3:17:4d:91:a4:9f:26:5c:8d:9e:b1:b4:a6:58: 29:67:e9:e4:75:eb:22:61:89:e0:02:62:a1:55:6a:b9: 23:45:e8:7a:dc:50:ba:6c:f3:48:a4:03:f6:e7:d1:7d Fingerprint (SHA-256): 1D:6D:F0:F1:6F:F8:03:46:F9:E8:20:DE:ED:37:01:93:07:86:75:81:E8:42:67:E2:54:08:7E:C5:A5:A9:34:2C Fingerprint (SHA1): 36:C3:EF:42:A7:9E:D8:26:DA:2F:E5:32:1C:1A:E7:1B:23:F8:85:B4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1808: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145140 (0x3cafa974) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 14:51:56 2023 Not After : Wed Oct 18 14:51:56 2073 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: aa:3f:b6:bf:77:c2:eb:3f:06:14:ee:cb:a3:cf:39:c2: af:2c:d3:c3:ea:23:47:49:64:9b:1b:bf:82:b7:8c:c8: 4c:93:b7:eb:38:9c:58:8e:d4:83:4b:7b:c2:fa:d6:cf: 36:be:0d:d2:53:48:34:c3:29:20:02:b6:e7:aa:72:69: d6:e3:ef:10:8e:01:ce:9c:3a:00:81:bf:6e:cf:34:fc: 97:0e:cb:df:12:92:b2:d2:d3:ff:29:de:69:a4:d9:be: 29:63:c8:f4:60:44:e1:11:57:3b:d0:a6:c4:dc:63:02: 2b:66:7b:c6:6b:95:af:30:e4:b5:dd:d7:d3:24:a3:7d: ff:dd:4c:e6:83:57:a4:e7:e8:40:78:e8:29:b8:58:a4: 00:6c:6b:a4:2f:05:4f:cb:f2:72:27:36:9d:13:76:52: 86:a1:ac:70:64:8b:55:0c:28:cc:fc:db:fd:60:d4:e7: 7c:9f:69:bf:b6:cd:9c:40:11:e5:9e:84:64:5f:1c:2e: 60:30:3a:46:fe:27:c2:74:53:00:55:f6:f1:d0:7e:8b: 05:3d:ac:d2:7c:16:fe:84:b4:06:b9:59:51:c0:7b:0d: bc:64:54:25:3d:e7:fb:4b:e7:1e:98:5f:51:1b:49:b5: fb:05:33:62:72:93:c6:29:e3:37:a8:c3:d1:8d:ef:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:eb:17:3f:70:db:b5:1b:02:73:69:5b:2f:7b:2a:6e: 87:7c:6e:55:dc:5e:eb:35:71:6b:fe:8e:87:c4:ef:99: fa:bd:d0:77:0a:42:3f:ea:d7:b9:7c:2e:3f:6e:4c:21: 2d:54:29:fd:ec:91:36:5c:1a:82:d2:65:84:cc:ed:1d: 87:5f:82:54:cb:7d:8b:6d:71:8d:33:3e:56:c5:a9:10: b2:81:0c:8f:f7:5b:9b:06:e8:de:ca:07:59:20:95:34: 2f:13:c3:82:54:c7:65:f3:5f:fc:ef:e8:4a:21:34:f8: d0:6f:73:51:a9:94:4a:33:6b:87:88:ce:ac:fa:f2:d2: c1:e1:91:26:cf:f8:3f:07:22:91:7c:ff:26:0b:6b:f3: cb:e9:be:38:47:c2:58:ea:0a:78:6a:47:f7:61:03:b5: 68:2e:cc:10:d7:ca:29:08:fd:52:13:92:68:9b:07:97: e1:88:4b:3b:8f:fd:49:e6:62:1e:2d:95:38:99:b9:14: d9:06:63:45:b3:50:58:40:61:cc:d6:05:96:24:af:69: 3b:90:4b:83:ba:e2:b1:08:53:cc:c9:d9:c1:c0:75:c1: 30:e6:12:00:ff:0e:27:cd:28:cd:22:4f:6c:45:00:9a: ae:0f:0d:be:b6:fe:0c:9c:e1:ad:46:0f:77:18:b9:70 Fingerprint (SHA-256): AA:69:83:3C:23:37:A2:BD:1D:E8:B6:0E:24:A1:39:7A:19:57:8A:0E:68:89:92:21:21:E8:8F:3A:63:6A:01:FD Fingerprint (SHA1): 4D:59:A6:1A:0C:1D:7C:DC:37:43:EC:54:51:B7:D8:E1:FC:A6:5C:27 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #1809: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145136 (0x3cafa970) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 14:51:54 2023 Not After : Wed Oct 18 14:51:54 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:d4:79:d8:54:d5:aa:41:e4:e8:69:a5:55:d8:9d:d3: ba:10:29:26:a2:3d:c1:06:82:36:2d:31:79:a7:61:93: d3:db:ea:04:1c:a1:ad:60:a5:26:18:d8:b9:48:da:5a: ec:51:16:55:92:35:75:45:db:d4:ab:4c:ef:00:6e:53: 77:30:c2:37:ba:2b:71:9e:a2:38:cf:a8:fb:dc:1a:6f: 22:50:da:cd:8c:e7:31:3f:e2:38:2e:10:5f:5c:26:39: 74:62:c4:06:ab:28:e7:e1:57:d3:5c:71:ed:27:d8:e6: 6e:53:26:88:88:92:97:47:05:d8:5b:3b:7d:cb:1f:6e: b8:c5:0d:2f:fa:86:c5:11:a6:aa:54:93:9c:7d:30:19: 2e:f5:12:e4:0c:a0:d1:c8:56:d1:bf:28:3e:b7:62:6d: f7:3b:31:18:cc:a8:c0:70:f7:3f:5a:c2:d8:f1:c9:99: 89:24:ac:77:4a:a7:b0:5d:5a:d6:f2:3b:b9:e1:ba:7e: 00:08:ef:04:83:4a:c5:f9:05:67:66:46:39:57:af:e5: 8c:b6:40:66:93:95:38:33:73:91:8d:3b:71:1e:60:80: 81:25:09:1f:c9:83:c9:f4:69:f5:69:0e:88:40:8e:98: 4b:97:c1:53:e5:92:c6:24:c3:13:d9:d9:33:34:f4:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7d:47:2f:fb:cc:ea:2e:67:a8:65:91:39:03:d8:c8:50: 8c:c6:65:e6:2d:58:8e:23:2d:e0:96:1f:de:7a:3e:36: 9a:ab:7a:8f:f8:65:51:8e:8a:6f:c8:be:48:cd:71:48: 4f:27:8d:1e:90:2d:ff:d2:fe:44:58:be:06:80:0a:13: 72:b6:c5:53:e0:86:ae:5c:84:9b:ab:3b:b2:ca:2d:5c: 61:20:98:5f:fa:5e:fb:a5:35:6f:ed:a5:74:38:34:2e: 8c:91:9d:07:b8:9b:b6:5f:dc:9a:7a:89:26:cc:12:f2: 43:6c:3e:7f:b4:38:ec:fa:ef:d0:f0:2d:8d:c2:70:ef: 73:e8:ed:bb:87:4c:eb:5c:75:cd:8d:92:22:15:a0:66: 3f:cb:3c:a2:ae:fb:a7:86:c5:71:46:aa:8e:2f:72:13: 78:db:65:e1:99:9d:24:94:56:11:4a:6f:ce:b0:49:93: c4:89:e8:32:81:83:cf:0d:5d:8c:8a:0a:98:4c:f5:c4: 78:1d:66:51:6c:35:f5:af:62:1f:15:37:45:57:a1:57: 2d:2b:e3:17:4d:91:a4:9f:26:5c:8d:9e:b1:b4:a6:58: 29:67:e9:e4:75:eb:22:61:89:e0:02:62:a1:55:6a:b9: 23:45:e8:7a:dc:50:ba:6c:f3:48:a4:03:f6:e7:d1:7d Fingerprint (SHA-256): 1D:6D:F0:F1:6F:F8:03:46:F9:E8:20:DE:ED:37:01:93:07:86:75:81:E8:42:67:E2:54:08:7E:C5:A5:A9:34:2C Fingerprint (SHA1): 36:C3:EF:42:A7:9E:D8:26:DA:2F:E5:32:1C:1A:E7:1B:23:F8:85:B4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1810: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #1811: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1812: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1813: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1814: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1815: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018145141 (0x3cafa975) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 14:51:56 2023 Not After : Wed Oct 18 14:51:56 2028 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:d7:3f:1d:0f:90:f9:82:b5:3e:b4:7b:25:c2:6a:37: ec:d4:ff:13:6e:98:2d:c1:72:c9:da:9c:61:d5:9f:d0: b6:2f:dc:9c:76:c4:95:97:6a:55:c4:b1:5a:04:54:88: aa:23:8f:54:da:71:cf:d5:57:35:d5:8e:e9:57:41:82: 1f:67:e8:39:1a:39:f8:3d:9b:a7:aa:1f:f6:41:41:c9: 52:f8:26:b2:b7:35:c8:bc:20:73:ef:d7:32:6b:40:70: bb:88:96:83:28:25:19:6d:cd:20:66:fe:bb:b8:92:d1: 65:ae:38:32:fb:fb:29:15:51:16:d2:79:44:02:bf:63: cc:b8:40:90:fb:e2:b7:7d:94:0c:57:5d:aa:62:da:96: 14:36:dd:52:45:06:0f:3c:ea:e9:b8:06:0d:9d:fc:39: 9f:07:8a:7f:91:4e:84:70:c9:35:4d:07:2e:c9:48:4f: 9c:26:99:bd:ad:79:c6:9e:56:9e:a2:53:1a:18:74:71: cb:0e:43:8d:d8:5d:bd:58:c3:13:07:7e:45:89:bf:45: bf:c3:5b:43:8a:45:c6:0f:5d:9b:bd:bf:82:b3:e7:7b: 68:1a:1a:50:34:65:d5:13:c8:54:ff:77:ac:b7:3b:15: c7:d8:99:b7:67:21:52:bc:ee:ea:41:1b:03:e6:d6:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7f:9f:21:0c:45:a4:2a:f1:f2:9d:be:3d:86:e8:99:7a: 01:5c:bd:79:c5:a8:36:3b:b2:5d:d9:6f:d3:04:9f:e8: 60:fb:24:03:1a:19:0e:08:c9:03:69:cb:fb:68:78:16: 13:0b:e4:e8:fd:cb:7b:5c:83:d2:b5:fe:72:97:f8:8e: 24:db:b7:c7:97:67:2c:48:8e:76:51:b0:6f:b9:6a:e0: 63:3f:46:23:53:06:42:f8:d6:5b:eb:cd:40:6f:50:3b: d7:f8:3b:09:84:b1:51:1e:d0:f0:fe:2c:9d:74:e2:d0: b8:03:de:60:b0:f3:36:33:6d:c9:38:1c:f2:10:22:2d: b8:76:0a:24:16:88:51:11:83:d0:97:5f:e7:8e:c6:6c: 5c:91:4d:a3:4f:b7:b1:9e:e0:e0:90:14:f6:3e:aa:27: 1d:d2:60:1c:c0:63:d8:8b:89:fe:51:0c:c5:73:8f:94: f3:c2:bf:c4:69:fd:30:8a:46:5e:13:3a:94:a6:dc:90: 2c:f9:14:97:37:07:9b:40:06:6a:95:ae:72:08:3d:f2: 57:ef:90:8a:d8:18:65:f9:8e:12:1b:6b:8c:29:ca:1d: 2c:df:88:6d:ea:10:e8:14:9a:23:6e:64:60:eb:84:57: 02:32:8e:c9:3a:a5:71:4c:b8:d6:3a:0e:83:c5:29:48 Fingerprint (SHA-256): 87:93:1A:A2:5F:C2:75:4B:81:2B:71:13:DE:D4:A8:47:69:5E:67:F1:D6:8D:BC:5C:FF:DC:0B:34:2F:BA:C4:DB Fingerprint (SHA1): 00:8C:BE:B8:5D:58:02:37:87:13:E4:C7:13:44:AB:A9:DE:63:53:C3 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1816: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1817: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1818: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1819: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1820: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1821: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1822: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1823: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1824: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1825: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1826: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1827: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1828: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1829: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1830: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bar.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1831: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=site.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1832: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=Honest Achmed,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1833: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=OtherOrg,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1834: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1835: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=testfoo.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1836: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test3.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1837: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1838: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1839: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1840: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1841: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 12895 at Wed Oct 18 14:51:59 UTC 2023 kill -USR1 12895 httpserv: normal termination httpserv -b -p 10007 2>/dev/null; httpserv with PID 12895 killed at Wed Oct 18 14:51:59 UTC 2023 TIMESTAMP chains END: Wed Oct 18 14:51:59 UTC 2023 Running tests for ec TIMESTAMP ec BEGIN: Wed Oct 18 14:51:59 UTC 2023 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Wed Oct 18 14:51:59 UTC 2023 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Wed Oct 18 14:51:59 UTC 2023 Running ec tests for ectest TIMESTAMP ectest BEGIN: Wed Oct 18 14:51:59 UTC 2023 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #5: pk11 ec tests - PASSED TIMESTAMP ectest END: Wed Oct 18 14:51:59 UTC 2023 TIMESTAMP ec END: Wed Oct 18 14:51:59 UTC 2023 Running tests for %{do_gtests} TIMESTAMP %{do_gtests} BEGIN: Wed Oct 18 14:51:59 UTC 2023 ./all.sh: line 134: ./%{do_gtests}.sh: No such file or directory ./all.sh: line 134: cd: /builddir/build/BUILD/nss-3.90/nss/tests/%{do_gtests}: No such file or directory TIMESTAMP %{do_gtests} END: Wed Oct 18 14:51:59 UTC 2023 Running tests for %{do_ssl_gtests} TIMESTAMP %{do_ssl_gtests} BEGIN: Wed Oct 18 14:51:59 UTC 2023 ./all.sh: line 134: ./%{do_ssl_gtests}.sh: No such file or directory ./all.sh: line 134: cd: /builddir/build/BUILD/nss-3.90/nss/tests/%{do_ssl_gtests}: No such file or directory TIMESTAMP %{do_ssl_gtests} END: Wed Oct 18 14:51:59 UTC 2023 %{do_ssl_gtests}.sh: Testing with upgraded library =============================== cp: cannot stat '/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/cert.done': No such file or directory Running tests for dbupgrade TIMESTAMP dbupgrade BEGIN: Wed Oct 18 14:51:59 UTC 2023 dbupgrade.sh: DB upgrade tests =============================== Reset databases to their initial values: certutil: could not find certificate named "objsigner": SEC_ERROR_BAD_DATABASE: security library: bad database. Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu dbupgrade.sh: Legacy to shared Library update =============================== alicedir upgrading db alicedir Generating key. This may take a few moments... dbupgrade.sh: #1: Upgrading alicedir - PASSED bobdir upgrading db bobdir Generating key. This may take a few moments... dbupgrade.sh: #2: Upgrading bobdir - PASSED CA upgrading db CA Generating key. This may take a few moments... dbupgrade.sh: #3: Upgrading CA - PASSED cert_extensions upgrading db cert_extensions Generating key. This may take a few moments... dbupgrade.sh: #4: Upgrading cert_extensions - PASSED client upgrading db client Generating key. This may take a few moments... dbupgrade.sh: #5: Upgrading client - PASSED clientCA upgrading db clientCA Generating key. This may take a few moments... dbupgrade.sh: #6: Upgrading clientCA - PASSED dave upgrading db dave Generating key. This may take a few moments... dbupgrade.sh: #7: Upgrading dave - PASSED eccurves upgrading db eccurves Generating key. This may take a few moments... dbupgrade.sh: #8: Upgrading eccurves - PASSED eve upgrading db eve Generating key. This may take a few moments... dbupgrade.sh: #9: Upgrading eve - PASSED ext_client upgrading db ext_client Generating key. This may take a few moments... dbupgrade.sh: #10: Upgrading ext_client - PASSED ext_server upgrading db ext_server Generating key. This may take a few moments... dbupgrade.sh: #11: Upgrading ext_server - PASSED SDR upgrading db SDR Generating key. This may take a few moments... dbupgrade.sh: #12: Upgrading SDR - PASSED server upgrading db server Generating key. This may take a few moments... dbupgrade.sh: #13: Upgrading server - PASSED serverCA upgrading db serverCA Generating key. This may take a few moments... dbupgrade.sh: #14: Upgrading serverCA - PASSED ssl_gtests skipping db ssl_gtests dbupgrade.sh: #15: No directory ssl_gtests - PASSED stapling upgrading db stapling Generating key. This may take a few moments... dbupgrade.sh: #16: Upgrading stapling - PASSED tools/copydir skipping db tools/copydir dbupgrade.sh: #17: No directory tools/copydir - PASSED upgrading db fips Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. dbupgrade.sh: #18: Upgrading fips - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu TIMESTAMP dbupgrade END: Wed Oct 18 14:52:59 UTC 2023 Running tests for tools TIMESTAMP tools BEGIN: Wed Oct 18 14:52:59 UTC 2023 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b2:4a:9c:5c:48:19:f3:8e:96:10:07:3e:98:13:cd:a8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 40:8c:a0:13:cb:a6:00:d0:c8:4a:26:04:d5:38:cc:13 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 13:42:34 2023 Not After : Wed Oct 18 13:42:34 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:ee:47:55:75:96:bf:c4:61:a5:e6:6b:24:0c:7f: 7c:e6:c6:b5:37:b0:a7:21:0c:88:f7:4e:a5:7a:cc:bc: f4:65:d6:93:a9:83:1f:7a:8b:5f:d1:0f:a1:2d:42:74: 18:78:f2:91:72:e9:ff:ab:0b:95:bc:69:ce:50:fc:07: 91:1a:b9:00:2e:55:75:63:15:90:f4:0a:9b:ee:8b:f7: 0c:f5:ab:b0:8a:8f:08:55:93:52:84:3f:c7:34:e1:24: 16:5f:02:07:77:3a:88:0f:c4:a4:6c:8c:56:42:48:81: ad:41:2e:de:5e:46:9a:54:fc:ab:24:ef:c2:3c:1b:ff: 9d:94:8d:5b:42 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:57:5c:a1:b2:50:47:46:e0:bb:2c: d2:85:d6:27:36:03:6a:90:4d:26:77:84:68:d4:0f:6e: bb:6c:6c:94:d3:d2:6c:cf:b1:fe:3e:19:3f:a8:22:04: 48:7c:40:52:83:b4:43:82:de:aa:7c:18:c5:23:b1:e2: c5:f2:03:00:31:b0:f3:02:42:01:36:3c:8f:91:7d:d5: fb:fd:03:14:da:67:3c:e9:a3:0a:0c:ae:ca:57:12:a0: 41:a2:da:0a:5a:84:3e:2a:19:ad:c8:c0:1d:4c:22:69: a7:50:87:d1:16:61:5f:cc:29:28:c4:10:85:87:19:8a: a9:49:22:af:b9:94:45:a9:3c:40:88 Fingerprint (SHA-256): F2:FE:51:E6:5F:0D:5D:63:CF:1E:D9:24:FA:6D:76:24:C7:87:E8:79:9F:4D:E3:72:9A:D5:00:D9:DD:8F:E8:EE Fingerprint (SHA1): 7B:29:39:F2:CA:CC:04:97:DB:6F:DB:8E:80:98:8F:D0:0E:B1:DC:A8 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:70:89:da:48:e3:7f:79:a0:0b:69:64:a4:5e:bc:4f: 42:8d:2e:9f:4b:6e:ea:48:24:2c:ce:e6:71:04:d4:79: 2b:14:af:67:c9:97:f2:8d:6e:95:bf:02:bc:7d:0e:67: b4:f3:0e:1d:3a:20:26:2b:92:e1:25:87:8c:fb:91:1d: df:8f:ae:2c:d7:78:69:77:89:ca:ac:10:ce:5a:5d:51: a1:0e:bf:a9:c5:81:2a:31:01:f5:c4:ea:d1:77:4a:78: 88 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:95:6f:6a:d4:45:12:9e:dc:f2:1c: 12:7d:24:94:39:15:f7:3d:bf:81:a0:c5:42:7f:ff:15: d4:b9:ee:88:48:fe:4d:46:fa:97:02:98:ab:3c:26:fe: 22:83:ea:17:70:5c:f0:24:13:54:75:b3:fa:51:21:4d: 29:12:17:69:83:0a:38:02:42:01:3b:97:9c:55:ca:ee: 12:2d:7b:e8:5f:a6:f9:22:58:e9:0b:be:91:07:67:f7: 69:68:41:e2:26:ca:39:ae:6a:42:e0:13:f7:0d:98:1d: b1:29:d8:a9:4c:75:90:9a:86:58:b6:d9:38:ab:be:18: 9d:10:29:fb:9b:29:45:f6:6c:f9:eb Fingerprint (SHA-256): B7:85:BA:51:74:5A:19:0F:B0:3A:D4:61:F2:3E:9B:C3:AD:F7:2E:57:1E:0B:A4:43:E3:07:25:74:31:C5:AE:DC Fingerprint (SHA1): D1:0D:B2:33:29:7C:BF:F1:C0:88:CC:51:C1:ED:1E:4F:0A:4A:A1:3E Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED tools.sh: Exporting Alice's email EC cert & key with long pw------ pk12util -o Alice-ec-long.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.longpw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting Alice's email EC cert & key with long pw (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #10: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key with long pw----- pk12util -i Alice-ec-long.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.longpw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #11: Importing Alice's email EC cert & key with long pw (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file with long pw ------------ pk12util -l Alice-ec-long.p12 -w ../tests.longpw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 38:8e:73:4b:a3:33:a4:03:53:0f:c4:ae:ea:a1:8c:8d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 13:42:34 2023 Not After : Wed Oct 18 13:42:34 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:01:ee:47:55:75:96:bf:c4:61:a5:e6:6b:24:0c:7f: 7c:e6:c6:b5:37:b0:a7:21:0c:88:f7:4e:a5:7a:cc:bc: f4:65:d6:93:a9:83:1f:7a:8b:5f:d1:0f:a1:2d:42:74: 18:78:f2:91:72:e9:ff:ab:0b:95:bc:69:ce:50:fc:07: 91:1a:b9:00:2e:55:75:63:15:90:f4:0a:9b:ee:8b:f7: 0c:f5:ab:b0:8a:8f:08:55:93:52:84:3f:c7:34:e1:24: 16:5f:02:07:77:3a:88:0f:c4:a4:6c:8c:56:42:48:81: ad:41:2e:de:5e:46:9a:54:fc:ab:24:ef:c2:3c:1b:ff: 9d:94:8d:5b:42 Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:57:5c:a1:b2:50:47:46:e0:bb:2c: d2:85:d6:27:36:03:6a:90:4d:26:77:84:68:d4:0f:6e: bb:6c:6c:94:d3:d2:6c:cf:b1:fe:3e:19:3f:a8:22:04: 48:7c:40:52:83:b4:43:82:de:aa:7c:18:c5:23:b1:e2: c5:f2:03:00:31:b0:f3:02:42:01:36:3c:8f:91:7d:d5: fb:fd:03:14:da:67:3c:e9:a3:0a:0c:ae:ca:57:12:a0: 41:a2:da:0a:5a:84:3e:2a:19:ad:c8:c0:1d:4c:22:69: a7:50:87:d1:16:61:5f:cc:29:28:c4:10:85:87:19:8a: a9:49:22:af:b9:94:45:a9:3c:40:88 Fingerprint (SHA-256): F2:FE:51:E6:5F:0D:5D:63:CF:1E:D9:24:FA:6D:76:24:C7:87:E8:79:9F:4D:E3:72:9A:D5:00:D9:DD:8F:E8:EE Fingerprint (SHA1): 7B:29:39:F2:CA:CC:04:97:DB:6F:DB:8E:80:98:8F:D0:0E:B1:DC:A8 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:70:89:da:48:e3:7f:79:a0:0b:69:64:a4:5e:bc:4f: 42:8d:2e:9f:4b:6e:ea:48:24:2c:ce:e6:71:04:d4:79: 2b:14:af:67:c9:97:f2:8d:6e:95:bf:02:bc:7d:0e:67: b4:f3:0e:1d:3a:20:26:2b:92:e1:25:87:8c:fb:91:1d: df:8f:ae:2c:d7:78:69:77:89:ca:ac:10:ce:5a:5d:51: a1:0e:bf:a9:c5:81:2a:31:01:f5:c4:ea:d1:77:4a:78: 88 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:00:95:6f:6a:d4:45:12:9e:dc:f2:1c: 12:7d:24:94:39:15:f7:3d:bf:81:a0:c5:42:7f:ff:15: d4:b9:ee:88:48:fe:4d:46:fa:97:02:98:ab:3c:26:fe: 22:83:ea:17:70:5c:f0:24:13:54:75:b3:fa:51:21:4d: 29:12:17:69:83:0a:38:02:42:01:3b:97:9c:55:ca:ee: 12:2d:7b:e8:5f:a6:f9:22:58:e9:0b:be:91:07:67:f7: 69:68:41:e2:26:ca:39:ae:6a:42:e0:13:f7:0d:98:1d: b1:29:d8:a9:4c:75:90:9a:86:58:b6:d9:38:ab:be:18: 9d:10:29:fb:9b:29:45:f6:6c:f9:eb Fingerprint (SHA-256): B7:85:BA:51:74:5A:19:0F:B0:3A:D4:61:F2:3E:9B:C3:AD:F7:2E:57:1E:0B:A4:43:E3:07:25:74:31:C5:AE:DC Fingerprint (SHA1): D1:0D:B2:33:29:7C:BF:F1:C0:88:CC:51:C1:ED:1E:4F:0A:4A:A1:3E Friendly Name: Alice-ec tools.sh: #12: Listing Alice's pk12 EC file with long pw (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 7f:f8:5b:cc:42:13:e8:ae:f4:ba:fc:46:b6:b2:ab:44 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #17: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 88:cc:33:8c:23:95:9a:a2:1b:de:6a:aa:ee:ed:c1:7a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #21: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 35:bb:33:1a:58:2e:da:10:aa:ad:ec:ff:17:92:7c:51 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #25: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #26: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: fc:06:37:76:92:eb:97:42:c9:b2:25:87:5e:47:88:ab Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #29: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #30: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6f:d7:55:85:a7:7e:86:8a:54:8d:ec:55:55:50:b4:72 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:6b:9b:8d:9b:72:4a:2f:aa:77:d9:b7:80:c1:6f: 7d:fe Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #33: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #34: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 01:bb:d8:ec:59:f9:84:12:69:d3:fd:2b:2e:ef:b6:60 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #37: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #38: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 4d:32:9f:d6:6a:1f:86:7b:6a:0f:9d:c9:f7:61:4d:c2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 87:b1:1f:c4:51:9e:7d:2e:c0:70:20:f5:04:f8:a3:0f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: a4:ea:5c:57:f9:7f:09:7f:99:1d:b2:be:f3:9f:c5:97 Iteration Count: 600000 (0x927c0) tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: b3:9d:b7:0d:80:b7:e8:13:03:2b:fd:97:95:c7:33:1f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3b:19:5c:a5:f0:09:ee:69:ba:07:85:81:b5:23:2f:f3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #57: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 29:f9:e7:3c:19:8b:e8:80:61:f5:88:03:8a:85:da:99 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #61: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 46:b3:71:12:77:48:d5:29:07:17:7e:4d:fd:50:e6:a5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #65: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #66: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: a3:d1:21:46:28:ac:e2:af:b4:16:08:65:d5:75:a0:13 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #69: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #70: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 49:41:0f:60:f2:ec:22:6e:53:c4:29:c8:bf:4d:d0:f6 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:48:96:d9:34:1a:6d:a3:bc:a7:9b:88:b9:6e:c6: b7:1d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #73: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #74: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 87:d8:9c:a6:c5:8a:50:ab:4e:f1:2a:4d:2b:90:f9:09 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #77: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #78: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 04:4d:c9:d1:ed:7b:7c:8d:b9:c0:5c:e1:85:14:d6:58 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: ab:59:21:ee:ab:66:2b:4e:5a:a2:98:14:e4:8e:0f:b8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: ea:95:ae:c2:9d:a4:18:b4:92:3c:d6:fb:49:de:ce:b4 Iteration Count: 600000 (0x927c0) tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #89: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 8f:2d:7d:93:e4:89:ff:69:c7:22:40:1e:6d:f5:4a:3f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #93: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 20:17:f9:52:45:7d:a6:27:7f:fe:63:a2:46:83:33:dd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #97: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #98: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ea:82:39:ca:79:dd:ff:16:6d:46:51:3b:37:53:98:76 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #101: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #102: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 64:83:a9:6f:94:7b:bf:a8:ea:1c:80:2e:79:a6:1a:cf Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:c7:f6:97:62:7d:04:f5:d4:de:25:ec:a6:2c:de: 7f:96 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #105: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #106: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: db:61:b5:19:48:4f:ae:de:48:ba:ca:97:70:53:74:cc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #109: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #110: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 24:e8:ab:cf:dc:15:0d:fd:43:c5:5e:1c:91:0d:3c:d1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 1c:57:f4:85:82:14:18:58:03:3c:09:db:7d:67:6d:35 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d1:7b:4b:ce:3e:eb:99:e9:1b:4b:73:af:f0:ae:a5:4b Iteration Count: 600000 (0x927c0) tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 3d:5e:86:81:7d:7d:a6:e9:5a:fd:5e:c8:36:6c:9c:5e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #125: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d0:85:b2:c0:ce:6c:cd:0c:54:32:c0:7d:44:6d:47:0a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: e4:f1:73:08:18:b8:c1:69:6c:a3:96:d2:63:c1:8c:db Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 07:35:c5:91:5a:a9:e5:76:23:d6:67:fc:51:3e:df:d3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #137: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #138: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 80:65:36:14:10:77:b2:3b:2c:b9:a7:00:8b:b3:3a:25 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #141: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #142: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2c:75:ce:28:9b:c2:a3:52:68:ba:5b:16:20:f9:91:0c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:a3:cd:b2:08:07:c6:37:a2:55:74:3b:a3:5c:a8: 8c:a9 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #145: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #146: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 17:a8:9c:9f:8a:1f:fd:81:f9:0b:7e:48:65:7f:cf:a5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #149: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #150: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c8:11:6e:99:12:fa:3b:60:7c:b7:49:af:f6:cd:9c:56 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: c2:00:c8:17:62:20:88:d0:35:be:05:fb:44:a6:a5:48 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 9d:09:aa:cb:2a:bf:d6:69:a7:07:ff:d3:e3:43:86:0e Iteration Count: 600000 (0x927c0) tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #161: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 41:41:b9:ed:48:04:bc:45:e2:29:0e:30:62:bb:fa:f0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #165: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 0c:be:29:d9:f1:e6:11:00:82:42:f2:1e:af:b2:dc:6c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 4b:f3:fb:dc:fb:2a:1a:a3:4f:d8:f7:fe:24:6c:fd:e2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b5:fc:0e:65:ee:56:40:05:ef:e8:bb:c3:24:51:7d:e2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #177: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #178: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 56:2d:4c:0c:4e:dc:ef:60:27:1d:3a:b1:e2:c8:f2:29 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #181: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #182: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3a:b7:aa:c9:5b:66:dc:2b:0e:9f:75:20:71:dd:cf:49 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:f5:89:d5:4d:e8:b9:45:d8:33:2b:e9:8c:49:09: 29:3a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #185: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #186: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 18:c5:a6:b8:51:f4:4c:60:8c:60:0c:ac:12:4a:2b:43 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #189: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #190: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ab:58:94:61:09:96:e2:76:77:b0:33:07:a6:08:aa:4e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: e1:ad:ad:bf:f1:53:aa:a8:e7:90:f2:ec:7e:19:53:67 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: ee:4b:f3:9c:0c:dd:2a:19:a0:e3:2a:bd:ba:b2:79:0a Iteration Count: 600000 (0x927c0) tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #201: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 9a:af:9e:b6:4e:14:f2:08:18:52:79:71:26:ac:52:e8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #205: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 09:2f:b6:6d:9e:33:a5:06:74:0a:a3:d4:2b:ec:11:8d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #209: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #210: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: af:1f:a3:ac:e9:3e:bb:c2:7f:2d:f0:b3:7a:f4:36:4e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #213: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #214: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2b:1f:7c:17:41:7a:3e:c4:1c:2d:2d:f8:94:5a:b5:4c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:07:72:f9:40:ae:45:34:25:6e:72:64:a8:2d:4c: 3b:8d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #217: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #218: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b5:76:13:c0:d5:8f:c1:e8:55:5e:dd:72:32:60:18:7a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #222: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: aa:d5:8e:b9:32:ce:f7:a1:ff:ae:17:ed:21:25:9f:9a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 27:72:e8:c2:a1:0e:cf:72:c2:a4:db:98:6f:99:88:64 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e0:83:25:be:94:33:7a:4b:95:39:50:a6:c1:ff:63:b8 Iteration Count: 600000 (0x927c0) tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e4:1d:b2:56:a6:13:28:42:0a:f6:81:a4:0b:2c:e5:c4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #237: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 9f:33:f5:41:d3:50:ef:65:2c:b1:f4:5d:1b:b2:18:3c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: a9:c4:47:a3:80:e1:8e:6e:78:84:90:a5:46:d2:7f:67 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f8:96:f1:b7:cd:7f:7d:50:50:77:e8:b6:65:f5:ee:e4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #249: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #250: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 35:01:32:f4:3b:bf:41:97:a9:80:fe:57:2d:35:3f:b9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #253: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #254: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 98:45:e0:4c:05:d5:a4:3d:0b:a0:ab:0a:7e:86:51:5d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:8d:d2:c2:2f:53:e7:fc:1c:79:54:30:2c:9b:92: 43:dd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #258: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: f0:a4:35:9c:e2:db:dc:be:dc:4c:08:56:27:54:7a:e1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #261: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #262: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 80:3a:8d:23:71:79:9c:d6:26:09:6b:97:ba:b5:d7:b9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 68:b7:31:94:53:86:f9:1b:44:77:a8:4e:d8:3a:67:e8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: de:23:18:99:4c:a6:21:92:6f:2e:07:e0:99:f6:e0:85 Iteration Count: 600000 (0x927c0) tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #273: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: c1:fb:6d:fc:98:40:53:52:0e:23:88:4e:64:3f:f5:ce Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #277: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 55:f9:97:38:4d:fb:13:dd:c0:b3:c2:a4:e3:a7:eb:04 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: d9:ab:35:78:a4:b4:7e:ba:30:35:83:b1:e0:63:32:5b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f2:b4:e5:a8:44:0b:14:2a:d2:74:66:f7:d1:56:b9:e9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #289: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #290: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 24:a0:83:a2:2c:df:89:cc:2b:ea:ed:ae:f3:bf:1b:70 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #294: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 35:2f:c7:34:06:b1:f4:80:d7:1c:86:99:27:5e:42:61 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:88:78:66:37:be:c0:04:e5:5d:9a:86:5e:1c:22: 25:9f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #297: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #298: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: cf:54:7d:8e:75:ac:93:cb:82:46:ad:c2:32:6f:1d:9d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #301: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #302: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ce:fb:ae:09:70:a1:f0:65:7a:a9:29:48:19:eb:b6:d4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: ce:f0:78:4e:fc:12:76:46:07:c3:e5:99:4a:fb:69:84 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 6c:fe:d2:1f:46:4f:2a:19:dc:91:60:5b:61:5b:c1:2f Iteration Count: 600000 (0x927c0) tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #313: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: d6:76:11:72:be:84:00:38:01:50:d3:3e:89:f6:e8:d0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #318: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d8:29:e2:64:5d:63:23:cc:5c:ee:77:a2:c8:8e:74:a2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #321: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #322: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: c3:a6:13:2d:37:70:82:38:5c:1e:97:a6:61:62:7e:af Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #325: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #326: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 31:7d:89:98:74:7d:e5:5b:64:3d:49:76:34:06:fa:7b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #330: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 1c:e8:7f:b9:82:8d:b1:5e:b6:de:e9:91:dd:63:d9:38 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #333: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #334: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9e:0c:b7:76:8b:a1:b8:06:06:53:12:cf:f0:c1:58:59 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:6f:89:59:e9:3d:d0:b7:e4:d8:d5:c3:dc:02:af: bf:7c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #337: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #338: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 0c:71:e2:8a:3f:b8:f9:70:ff:a5:b6:82:c5:b1:f5:8e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #342: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ad:f2:9c:87:c7:9b:ee:59:86:a8:c2:ba:da:b7:f9:4e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #345: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 71:57:c4:a2:64:67:4b:a2:e9:c8:47:e0:6a:4e:02:ab Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #349: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 60:a5:ba:cf:09:08:48:b0:bb:05:84:68:6a:07:08:b1 Iteration Count: 600000 (0x927c0) tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [RC2-CBC:RC2-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #354: Verifying p12 file generated with [RC2-CBC:RC2-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 54:3d:1c:a2:45:f1:ff:bf:06:4e:6f:3f:eb:38:86:48 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #358: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 7a:57:13:d2:97:96:7e:a6:9f:af:6b:bf:f6:8f:4a:a1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #361: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #362: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e9:c8:c0:b5:8e:c1:2f:66:7e:81:e4:de:50:07:88:8b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #366: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ff:3a:6d:8e:4c:2d:7c:a9:e4:42:ae:16:9e:16:2f:9f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #369: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #370: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ed:a6:89:b9:1f:f7:b8:1e:29:96:87:21:93:d7:bb:37 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #373: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #374: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e1:2e:86:d1:64:89:e5:45:77:23:5d:00:68:c3:7b:86 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:7f:1b:3a:71:58:4e:4e:df:1c:4d:fe:2f:b1:f4: 24:44 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #378: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: cd:29:a8:82:18:83:83:4c:02:a7:e0:5a:64:47:01:38 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #381: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #382: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 41:67:71:be:54:6f:03:fd:ae:20:bf:f2:8c:11:c5:c4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #385: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 5e:6b:73:8c:2b:58:60:67:45:dc:90:01:e3:21:87:24 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #389: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c5:7f:cf:d1:7b:fc:d0:2d:67:21:06:b2:f6:ac:6d:94 Iteration Count: 600000 (0x927c0) tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #393: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #394: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 50:b7:4b:7d:ef:da:5a:fd:37:df:e0:c5:b4:41:e1:24 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #397: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #398: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 28:7b:4c:ee:96:3e:93:c6:ef:6b:e5:ff:69:71:02:2e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #401: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #402: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 77:77:42:2d:3b:f4:91:c6:7e:e2:4e:23:cb:ff:82:46 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:ec:af:e4:75:c3:40:fd:61:21:dc:8a:b2:8b:97: 23:02 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #405: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #406: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bb:f4:23:8f:8e:84:53:68:3b:32:5c:4f:e4:c0:4a:ac Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #409: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 60:bd:61:02:fd:ce:cc:ef:11:14:45:f3:be:50:ba:1a Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:67:50:69:f7:db:af:6f:c9:2e:2d:8e:27:78:04: 49:6a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #413: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 22:f6:9e:c2:6b:47:25:2f:a0:6d:41:66:16:bd:d5:47 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:cf:02:c8:f5:7c:77:57:94:ac:8e:23:00:8d:81: 3a:77 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #417: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #418: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ef:49:3f:a8:30:ff:5e:25:d9:71:b5:1f:97:79:aa:78 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:d6:5f:5b:a2:06:1a:95:2d:67:55:02:eb:d7:6b: 03:e8 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #421: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #422: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c9:83:46:cb:c4:91:20:e1:3a:f1:17:49:74:d5:94:bb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #425: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fe:37:f6:a0:89:d6:3a:8c:ef:8d:00:ef:d5:63:22:07 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:5c:57:80:67:0c:c0:a3:24:c7:7b:85:99:4f:90: b7:ad Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #429: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 18:2f:19:e2:75:8a:9c:a6:93:3e:59:9a:cf:93:c4:e6 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:16:a4:3b:66:43:5f:30:93:01:b1:67:15:44:d0: e4:4f tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #433: Exporting with [AES-128-CBC:AES-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #434: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 86:56:9a:a5:87:c6:76:20:e7:8f:3e:ea:e4:f6:fc:45 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: AES-128-CBC Args: 04:10:f4:2b:b0:41:b3:e7:c8:de:f4:05:59:4e:17:39: d2:1f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #437: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #438: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: be:0d:ce:28:a6:c6:28:3f:5b:d7:0e:07:27:fd:28:ff Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #441: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #442: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fa:1c:33:34:8d:48:da:c5:65:d8:7b:95:35:93:4c:04 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:59:c1:3e:d5:d4:9c:36:49:b5:51:45:7f:3a:a7: 2a:41 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #445: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #446: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 07:ff:f9:ed:2f:82:88:58:63:69:df:11:9a:2a:96:ac Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #449: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e8:82:5f:19:d2:bf:d8:d1:58:bf:64:51:49:e7:85:c5 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:62:d3:25:c6:dd:99:6c:14:e9:fe:8a:f8:b3:f8: 67:04 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #453: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3e:7d:11:54:ae:47:66:3d:41:81:16:e1:6e:d0:bc:7c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:72:50:f8:24:20:5d:0a:d4:af:0d:af:e7:11:91: 6e:7d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #457: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #458: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ec:44:be:4b:a4:b5:ee:28:09:56:c2:f0:94:1b:d3:57 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:7d:5d:03:2b:38:25:7e:d8:7e:b5:39:b8:3b:09: 98:1c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #461: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #462: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a5:83:2a:8c:71:1e:78:18:03:2b:0e:6c:3c:90:b4:a8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #465: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b6:a1:6a:d2:fd:ba:9d:50:41:4a:e5:b8:a3:8b:c3:70 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:6f:42:27:e5:2b:9c:0e:71:cf:4a:3a:51:20:4e: 2f:73 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #469: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b5:46:b6:60:73:b7:bd:f2:b2:10:3a:13:4f:4e:d9:5d Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:da:ec:5d:a1:00:7e:fb:61:8a:17:ed:3c:2a:ca: 72:1f tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #473: Exporting with [AES-192-CBC:AES-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #474: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 10:a3:48:79:26:d8:78:19:14:e8:a5:34:ab:89:74:26 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: AES-192-CBC Args: 04:10:93:e3:9e:71:59:56:2e:a7:45:38:06:f6:70:99: 88:b2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #477: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #478: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 14:85:a9:e2:f3:02:bf:c6:1d:a6:39:b1:90:41:93:ff Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #481: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #482: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 07:9c:44:ab:b7:ca:0f:e8:f3:5c:57:da:69:3e:bd:3f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:6b:26:da:e0:aa:59:7c:07:68:71:88:71:84:d3: e3:f7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #485: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #486: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 54:11:6e:87:64:42:68:40:a0:45:bd:8c:09:e2:33:48 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #489: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #490: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f0:5e:0f:e7:e8:f0:44:b1:58:07:75:d8:be:47:32:b1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:96:c1:2a:c5:b2:27:42:09:92:e7:d6:86:7a:94: 3b:cd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #493: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #494: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 36:99:57:32:b2:be:15:00:df:67:29:59:82:3b:7e:e4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #497: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b6:a4:aa:c1:0d:47:12:19:7f:11:d4:02:52:c7:ec:ea Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:15:43:79:78:e9:93:25:d6:45:17:c5:0b:ee:6c: e6:c7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #501: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e7:75:66:db:0c:0d:35:e5:c8:91:3c:0b:03:7d:b5:80 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:16:90:f3:8b:ac:31:be:ef:43:03:23:fd:18:6c: ff:89 tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #505: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #506: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3d:4f:fb:00:b9:66:64:30:d5:b0:c5:09:1e:78:8e:21 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:54:76:0d:a4:e4:1f:c8:c9:e6:86:75:5b:f6:69: 89:4f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #509: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #510: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 02:7f:f6:6d:1e:f7:a5:5a:91:2e:62:92:64:3d:1f:7b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #513: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #514: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: af:ac:02:c6:ac:83:b1:ed:fa:13:7f:60:bf:aa:fc:e9 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:bf:97:8b:22:9d:d4:71:99:59:f6:e3:f5:a5:b9: f2:01 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #517: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #518: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b8:a0:d4:de:96:2e:bf:85:44:17:71:54:3e:7b:5e:32 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #521: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #522: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4d:78:b6:ba:f7:9b:70:5a:77:96:ae:b5:a9:f8:ee:2c Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:4e:d6:9d:11:ae:3d:a1:31:80:a4:b8:85:36:62: 6b:31 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #525: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #526: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 75:4b:7a:09:22:ca:27:5e:b9:73:a9:32:b4:55:a3:1b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:43:bb:0b:8d:e7:98:25:f2:eb:a6:66:6b:64:28: 33:2f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #529: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #530: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a5:33:3b:7f:95:fc:56:59:e3:5a:75:5b:20:f3:9d:a5 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:42:eb:d7:6d:62:e4:f6:82:87:8b:be:94:97:b9: 92:8e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #533: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #534: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d5:18:0a:6c:63:1e:76:ae:4f:c4:6f:b9:21:40:60:9c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #537: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 7c:41:78:a5:86:44:35:4d:09:e0:07:cb:04:28:c0:eb Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:a7:a9:2d:5e:f4:1f:24:56:21:89:5a:80:ea:00: 3a:99 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #541: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c3:bb:53:c2:6f:c1:40:d9:2d:50:6f:a9:d7:67:8b:97 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:23:1c:12:09:25:94:45:bf:39:17:65:d3:86:96: 76:36 tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #545: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #546: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8f:2e:3f:43:5c:23:f4:8a:93:28:84:f7:02:63:4f:df Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-128-CBC Args: 04:10:97:7a:66:14:17:53:9a:bc:bf:ec:de:67:89:10: 22:0d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #550: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 86:00:0f:c7:76:35:22:ae:97:32:65:56:72:ff:a2:fa Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #553: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #554: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8d:33:44:06:29:9b:5a:d8:f3:93:6f:63:50:84:83:db Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:c0:b1:74:5e:0b:61:d6:db:f2:a7:96:c0:37:fc: 04:81 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #557: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #558: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 80:da:e0:2d:7b:35:85:8f:4e:61:b9:83:fd:1b:18:56 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #561: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #562: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 53:f3:9e:65:87:95:ef:47:cb:91:21:b5:e1:44:db:25 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:6a:7c:f2:8e:59:67:de:f8:5e:6e:40:f8:52:c1: e5:78 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #565: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #566: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 41:a8:d4:d6:13:64:df:c9:97:01:19:b4:b2:6d:b9:30 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:0c:cb:45:be:db:fc:13:25:07:cd:c7:ff:b8:2b: d1:42 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #569: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #570: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a8:bc:30:e7:26:27:d2:b8:36:ce:6c:a5:ad:1b:82:d9 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:70:83:bb:7e:cc:b0:31:5e:21:82:fa:01:f1:d6: a4:9a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #573: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #574: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 07:2d:4f:71:35:8b:54:b9:e0:c8:15:f2:e6:25:0e:04 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #577: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 38:16:d2:bc:59:0b:22:ca:32:ea:41:fe:25:1c:f4:84 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:d7:95:52:28:1a:8b:2f:c2:24:ad:ed:94:91:98: 5a:63 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #581: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4f:52:50:9e:d7:5d:e2:8b:76:63:db:ff:7f:a3:7a:96 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:04:60:88:0d:ea:1f:e1:88:04:cb:7e:39:db:66: 00:99 tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #585: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #586: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 05:68:cc:9e:b8:51:d3:fb:d8:be:a4:18:f6:69:0d:cf Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-192-CBC Args: 04:10:6c:bf:52:54:fc:78:6c:7c:51:49:e5:b1:7c:80: 5d:b3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #590: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: ea:d1:06:fd:60:f1:6c:d6:ce:68:7e:ac:02:e4:5d:94 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #593: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #594: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d1:c8:c3:e1:c0:ee:2f:ad:11:55:2c:c7:d0:e2:b4:8d Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:01:f5:c0:0a:a4:ac:6c:2e:49:74:07:b6:52:63: d5:72 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #597: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #598: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 82:a2:00:4d:2b:24:d0:9b:e5:40:73:3f:97:11:a7:2c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #602: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: fa:fe:c7:ff:7d:fb:0d:18:9f:1b:99:ca:cf:9f:ea:94 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:a0:69:d6:78:50:84:8a:75:01:20:de:e9:4f:f8: a5:38 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #605: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #606: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 63:3d:c9:08:a6:30:13:64:f4:51:82:f5:aa:9d:81:ae Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:4a:47:00:c8:95:40:bc:bc:de:ee:7c:07:ab:de: d2:cd Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #609: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #610: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ef:7f:dd:f4:55:c8:e1:a1:09:99:e6:ee:f3:ab:21:c4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:c0:93:d1:3c:e1:5a:dd:27:fb:7b:4f:68:a0:e5: 4c:7e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #614: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f9:fb:68:60:86:53:77:59:b6:c3:d9:c1:ae:e7:95:88 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #617: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: d0:9a:98:b7:7e:9d:06:b8:48:5b:c9:a8:27:6c:a0:a4 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:71:15:73:b7:53:37:84:b7:69:3d:2e:0b:b8:b3: 4f:80 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #621: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c2:17:27:a3:93:27:96:de:c3:9c:fd:bf:d8:0c:cd:99 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:2f:d7:05:b8:a4:89:a1:fd:40:79:10:c0:5a:4e: 23:c4 tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #626: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4e:c9:86:85:72:07:61:39:f3:07:fe:62:7f:a1:c2:dc Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-256-CBC Args: 04:10:68:92:e0:42:17:50:a4:68:f7:aa:50:ab:0c:a7: 81:52 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 01:2b:8f:0b:ae:6b:ac:c9:6c:af:db:1b:98:4b:18:c4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 92:e5:b8:e2:b5:93:45:ff:5a:11:01:c3:7c:b6:0f:31 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 53:7b:58:71:32:31:cf:5b:f9:2d:c7:b6:27:8f:41:8e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d8:d1:bf:e7:27:2d:f2:c9:4f:89:b5:35:fc:73:3b:b3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 5f:db:87:92:f4:c4:73:96:04:e9:1d:dc:d6:13:c8:4d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: c9:b2:55:3f:46:6e:2b:ba:e4:d1:e4:ab:97:95:59:df Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9f:fb:ac:fa:8e:59:58:e8:19:44:71:b6:13:74:d2:67 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 30:ca:e4:93:52:33:f6:ca:36:c4:b9:81:60:09:6a:3c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c0:bf:dd:04:09:b7:57:79:cf:7b:e7:ff:f3:8a:43:b0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 99:e1:39:56:b6:7c:b0:c5:64:d5:3e:7f:80:2c:89:e8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #669: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #670: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 51:b4:85:f6:84:bc:98:56:8f:c3:dd:8c:8d:8d:59:99 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #674: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 41:0e:d4:cb:e0:0d:d5:b5:f1:01:a0:b5:89:e1:86:c6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 40:ed:6c:a1:f0:8a:81:6c:a8:0b:8c:50:55:cd:4e:61 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:14:46:63:91:ed:a7:68:2d:24:51:f9:d5:da:a6: 54:b1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f7:39:de:5d:c5:17:6a:8a:2b:c1:37:f2:ec:9c:32:ed Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:15:73:21:0c:ee:a2:7f:2f:b9:b6:74:95:75:0d: 45:f1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f6:98:bc:9e:83:8b:a3:83:dd:2d:50:eb:41:4b:9c:ee Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:e6:b2:4d:fc:40:34:ca:c8:22:67:a6:43:42:e3: ea:4c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #689: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #690: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 94:49:73:e8:b4:44:92:2e:6c:ec:cd:4a:74:89:24:1b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:ad:b3:fb:07:49:b4:f7:eb:e8:24:0e:54:84:88: 82:6a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #693: Exporting with [AES-256-CBC:AES-256-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #694: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: df:f9:38:b9:5f:48:0b:7a:ac:75:c5:83:07:1f:a5:4b Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:69:18:e0:06:b9:4e:55:65:0b:7c:d9:f0:be:7d: 5d:f5 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #698: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 80:08:b3:2a:a5:d4:7a:bf:c7:a8:ec:83:1e:5f:f6:e6 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:be:97:c1:c3:bb:34:c2:eb:37:ec:1e:15:63:d1: b9:87 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #701: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2d:fc:0b:45:5f:79:61:95:cd:df:4e:75:89:2c:18:64 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #705: Exporting with [default:default:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f8:3c:ef:a1:e8:96:58:74:10:dc:ab:de:ad:a7:62:34 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #710: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c0:72:c5:4c:0b:35:8c:fe:a7:b9:13:8e:7b:e3:86:57 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #711: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #712: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #713: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #714: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9c:61:91:11:cf:6b:ec:08:a4:d9:d7:79:35:cf:67:89 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #715: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #717: Exporting with [default:default:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #718: Verifying p12 file generated with [default:default:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f4:b7:b1:c9:51:49:88:c6:37:24:72:7c:c0:8f:c7:10 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting with [default:default:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #722: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: bd:03:d2:6b:29:a8:e1:c3:1b:fe:67:c9:7f:29:17:e3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:30 2023 Not After : Wed Oct 18 13:42:30 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:ec:0d:7e:4f:0d:85:7b:26:cc:84:bf:af:aa:28:de: cf:4b:17:f2:8e:7a:64:d7:f4:ac:0b:9e:ba:60:56:f4: 12:23:38:d2:d0:9b:92:b1:44:d9:1d:d8:13:6b:76:dc: 8a:92:9d:14:a9:ba:0d:39:64:e9:33:0e:76:e5:fd:b4: d8:a0:ea:17:d0:45:ea:a4:38:36:0e:14:75:1c:68:bf: 6f:9e:b4:0c:8a:de:63:66:e7:89:be:28:e6:3e:33:18: af:4c:d2:67:9d:cd:90:52:0a:2c:c1:2e:14:78:62:2e: 7b:e1:2a:0a:68:8d:71:b3:5d:0b:02:0a:73:e2:25:8a: f3:33:b5:e2:50:fb:74:7a:e4:ad:14:fb:13:92:80:48: ad:b5:92:7f:8e:fd:c7:56:e5:cb:41:f7:c3:2e:e4:b3: d7:18:4c:1b:27:d0:33:56:d9:de:d5:90:6a:a9:11:47: 8d:64:3f:e8:12:d7:5e:a5:b7:08:44:90:c6:02:97:33: eb:ef:50:e9:28:cd:78:07:53:35:84:b9:1f:1e:42:b0: 02:6d:d4:77:21:fe:54:f1:a7:25:ee:63:1d:09:60:34: e1:57:fc:fe:d5:4b:c2:cc:90:72:f6:6a:b3:39:47:2d: 94:43:5b:6e:5a:d2:4a:09:a9:df:93:e7:c0:83:09:a9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 95:2a:34:38:3d:af:d5:97:ea:d8:4a:1a:5b:3d:83:42: 48:0b:a0:39:0b:a0:14:a2:d7:17:10:54:3b:37:7b:d2: 7d:f5:52:eb:04:17:96:37:f6:40:87:0b:79:92:59:e0: f0:ee:eb:2e:48:4d:f7:b5:5b:82:eb:86:08:03:65:ca: 2f:4a:10:b7:0b:d9:78:2f:38:01:a6:70:ac:e5:8b:f1: 13:c1:35:c8:bf:16:94:b7:47:79:e3:f3:a0:8d:fa:eb: 60:e2:4b:22:eb:52:3f:0a:12:39:32:18:00:0a:a3:6a: 34:93:9d:67:50:39:1f:88:8d:40:63:c7:a2:08:b3:be: e7:c1:28:26:91:ee:71:e3:66:5a:5b:ea:0d:3a:22:f7: dd:55:73:2a:d1:50:31:a0:83:66:8b:98:d7:b8:81:94: c9:f9:c4:05:74:97:9f:bc:10:42:99:e8:0b:18:9c:20: 75:0f:cf:7b:c7:06:25:5d:e3:bd:2c:96:05:4b:a8:49: c7:1c:cc:9b:34:2d:99:40:ab:9d:a0:98:f4:92:ef:5b: 9f:ea:dc:a8:5b:46:61:56:23:9e:f3:12:96:1c:f6:0e: d4:9d:a1:d7:5e:7d:88:dd:d6:e4:1d:6c:94:20:c5:6c: c4:c6:03:81:b3:6a:36:cf:8b:b8:71:54:62:8d:d6:99 Fingerprint (SHA-256): DB:95:D7:AA:11:02:6F:07:10:C7:9E:B9:30:D8:5F:9E:8F:46:9E:CE:DE:24:F9:94:8D:2E:06:4F:E3:53:E0:FC Fingerprint (SHA1): 6C:C5:C5:20:C9:59:CE:1E:B9:4F:E5:22:62:AD:FA:74:1C:75:74:F3 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:42:46 2023 Not After : Wed Oct 18 13:42:46 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:dc:42:55:71:f8:c6:27:05:8b:14:5d:76:66:e1:2e: ff:08:23:db:9b:18:74:50:e8:14:64:a1:52:dc:6a:b9: 5f:e4:25:92:7e:b9:5e:83:fb:e4:82:c3:a0:cc:45:d3: 2e:ec:40:3a:86:f0:b7:51:73:2c:92:23:af:78:24:ab: ec:b3:18:8a:cf:fd:61:18:34:b9:8d:70:52:a5:1e:13: e6:ef:b8:3f:d1:42:1f:ae:47:4f:9b:6e:06:bc:bd:98: d7:33:d5:2e:89:51:a5:1c:44:19:0d:98:bf:04:4a:99: 5e:60:ce:fc:02:06:19:33:e3:a7:32:94:51:e8:31:6c: 59:21:de:8e:f9:3e:59:83:3d:e2:0f:08:6a:69:d9:cb: d7:0c:27:ac:2c:35:65:b6:95:3d:5a:a1:10:14:e3:c2: d2:90:98:99:46:15:35:50:47:da:b5:14:5f:6e:36:60: b6:17:0b:1c:56:83:f8:10:6b:b9:a0:ea:b6:05:1e:1c: 66:18:50:99:08:9e:eb:a9:9e:1f:0f:47:f7:0a:74:05: ec:01:89:d8:33:f1:c5:59:bd:45:58:f4:d7:fe:c8:8b: 21:fb:66:24:59:63:86:38:76:c7:2e:9c:fc:ee:7d:7e: 48:78:3c:32:7f:98:59:df:75:4a:80:65:f2:26:70:9f Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:af:62:be:35:91:84:7b:67:54:0b:43:c9:2d:ed:4e: fa:08:cb:cb:18:0a:69:bc:eb:e0:46:42:45:24:ee:9d: ef:4c:53:06:a9:cd:08:40:f4:00:3c:1e:65:c2:0e:12: 70:d4:ae:aa:9c:e2:b6:0b:92:4a:b1:9a:8c:7a:b9:19: cf:20:d1:6a:ce:75:ba:21:dc:6e:db:65:30:38:99:2d: ea:25:81:b8:64:bf:bb:72:b3:10:ff:67:d7:e6:0f:c1: da:7d:9a:46:a8:30:bb:0d:fe:8e:7a:5f:f7:1b:6f:97: da:2c:e3:08:70:d8:56:39:f4:4a:40:31:e0:30:7e:00: 07:07:81:f2:bb:c8:1d:ac:f4:d8:a3:cb:23:22:f2:08: d4:59:8f:a4:25:4d:6a:1b:db:b2:89:7f:cc:b5:19:4e: 89:8b:15:1c:35:53:dd:0c:21:e8:92:76:31:19:37:d4: 3c:35:2b:68:a0:23:72:15:4b:15:1a:d8:cd:9b:e3:36: 9d:76:e5:7d:8f:af:8a:b9:80:0a:50:d1:51:64:96:c5: 3a:5e:71:ad:51:0d:48:ee:d7:27:2d:07:62:c0:c7:ce: fb:2f:10:61:69:ec:6a:90:1f:45:71:da:1d:8e:6b:fa: bf:bb:94:c1:c5:5a:93:52:2a:74:78:3b:af:19:90:c4 Fingerprint (SHA-256): 24:57:F4:F9:2A:45:0E:0B:3E:E7:D1:2E:FB:42:71:1C:8B:F5:FE:DC:5C:87:DD:5F:10:E5:4A:72:1B:8B:B5:3A Fingerprint (SHA1): 74:C4:D6:B8:30:E4:0F:BF:20:86:45:95:A7:F9:37:B6:F7:33:3F:74 Friendly Name: Alice tools.sh: #723: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #724: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #725: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #726: Exporting with [default:none:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #727: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #728: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #729: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #730: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #731: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #732: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #733: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #734: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #735: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #736: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #737: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #738: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #739: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Wed Oct 18 15:12:33 UTC 2023 Running tests for fips TIMESTAMP fips BEGIN: Wed Oct 18 15:12:33 UTC 2023 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Internal%20Crypto%20Services;library-version=3.90 slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB uri: pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 2. RootCerts library name: /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Builtin%20Object%20Cryptoki%20Modu;library-version=2.60 slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token uri: pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 ----------------------------------------------------------- FIPS mode enabled. fips.sh: #1: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa a6f2180c24258eadc194ac7b2a4669db0e15e26d FIPS_PUB_140_Test_Certificate fips.sh: #3: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #4: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #7: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #11: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #13: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa a6f2180c24258eadc194ac7b2a4669db0e15e26d FIPS_PUB_140_Test_Certificate fips.sh: #14: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #15: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #16: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #17: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #18: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa a6f2180c24258eadc194ac7b2a4669db0e15e26d FIPS_PUB_140_Test_Certificate fips.sh: #19: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 99. **** **** ALL TESTS PASSED **** fips.sh: #20: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 97. **** **** ALL TESTS PASSED **** fips.sh: #21: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle mkdir: cannot create directory '/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle': File exists cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi-testlib.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle/libsoftokn3.so -o -8 -b 5 Changing byte 0x00074e38 (478776): from 20 (32) to 00 (0) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/fips/mangle dbtest -r -d ../fips fips.sh: #22: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Wed Oct 18 15:13:01 UTC 2023 Running tests for crmf TIMESTAMP crmf BEGIN: Wed Oct 18 15:13:02 UTC 2023 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #1: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #2: CMMF test . - PASSED TIMESTAMP crmf END: Wed Oct 18 15:13:02 UTC 2023 Running tests for smime TIMESTAMP smime BEGIN: Wed Oct 18 15:13:02 UTC 2023 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #1: Create Detached Signature Alice (1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #2: Verifying Alice's Detached Signature (1) . - PASSED smime.sh: Signing Attached Message (1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #3: Create Attached Signature Alice (1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.1 smime.sh: #4: Decode Alice's Attached Signature (1) . - PASSED diff alice.txt alice.data.1 smime.sh: #5: Compare Attached Signed Data and Original (1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #6: Create Detached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #7: Verifying Alice's Detached Signature (ECDSA w/ 1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #8: Create Attached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.1 smime.sh: #9: Decode Alice's Attached Signature (ECDSA w/ 1) . - PASSED diff alice.txt alice-ec.data.1 smime.sh: #10: Compare Attached Signed Data and Original (ECDSA w/ 1) . - PASSED smime.sh: Signing Detached Message {256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #11: Create Detached Signature Alice (256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #12: Verifying Alice's Detached Signature (256) . - PASSED smime.sh: Signing Attached Message (256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #13: Create Attached Signature Alice (256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.256 smime.sh: #14: Decode Alice's Attached Signature (256) . - PASSED diff alice.txt alice.data.256 smime.sh: #15: Compare Attached Signed Data and Original (256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #16: Create Detached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #17: Verifying Alice's Detached Signature (ECDSA w/ 256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #18: Create Attached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.256 smime.sh: #19: Decode Alice's Attached Signature (ECDSA w/ 256) . - PASSED diff alice.txt alice-ec.data.256 smime.sh: #20: Compare Attached Signed Data and Original (ECDSA w/ 256) . - PASSED smime.sh: Signing Detached Message {384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #21: Create Detached Signature Alice (384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #22: Verifying Alice's Detached Signature (384) . - PASSED smime.sh: Signing Attached Message (384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #23: Create Attached Signature Alice (384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.384 smime.sh: #24: Decode Alice's Attached Signature (384) . - PASSED diff alice.txt alice.data.384 smime.sh: #25: Compare Attached Signed Data and Original (384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #26: Create Detached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #27: Verifying Alice's Detached Signature (ECDSA w/ 384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #28: Create Attached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.384 smime.sh: #29: Decode Alice's Attached Signature (ECDSA w/ 384) . - PASSED diff alice.txt alice-ec.data.384 smime.sh: #30: Compare Attached Signed Data and Original (ECDSA w/ 384) . - PASSED smime.sh: Signing Detached Message {512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #31: Create Detached Signature Alice (512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #32: Verifying Alice's Detached Signature (512) . - PASSED smime.sh: Signing Attached Message (512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #33: Create Attached Signature Alice (512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.512 smime.sh: #34: Decode Alice's Attached Signature (512) . - PASSED diff alice.txt alice.data.512 smime.sh: #35: Compare Attached Signed Data and Original (512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #36: Create Detached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #37: Verifying Alice's Detached Signature (ECDSA w/ 512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #38: Create Attached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.512 smime.sh: #39: Decode Alice's Attached Signature (ECDSA w/ 512) . - PASSED diff alice.txt alice-ec.data.512 smime.sh: #40: Compare Attached Signed Data and Original (ECDSA w/ 512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@example.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #41: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #42: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #43: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@example.com,dave@example.com smime.sh: #44: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@example.net smime.sh: #45: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #46: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #47: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #48: Decrypt with a Multiple Email cert . - PASSED smime.sh: #49: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #50: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #51: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@example.com,dave@example.com" \ -d ../alicedir > co.der smime.sh: #52: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #53: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@example.com" > alice.enc smime.sh: #54: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #55: Decode Encrypted-Data . - PASSED smime.sh: #56: Compare Decoded and Original Data . - PASSED pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #57: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice_p7.env -o alice_p7.data smime.sh: #58: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #59: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #60: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #61: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Wed Oct 18 15:13:32 UTC 2023 Running tests for ssl TIMESTAMP ssl BEGIN: Wed Oct 18 15:13:32 UTC 2023 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32239 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32239 found at Wed Oct 18 15:13:32 UTC 2023 selfserv_9997 with PID 32239 started at Wed Oct 18 15:13:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32239 at Wed Oct 18 15:13:33 UTC 2023 kill -USR1 32239 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32239 killed at Wed Oct 18 15:13:33 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32291 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32291 found at Wed Oct 18 15:13:33 UTC 2023 selfserv_9997 with PID 32291 started at Wed Oct 18 15:13:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32291 at Wed Oct 18 15:13:34 UTC 2023 kill -USR1 32291 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32291 killed at Wed Oct 18 15:13:34 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32343 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32343 found at Wed Oct 18 15:13:34 UTC 2023 selfserv_9997 with PID 32343 started at Wed Oct 18 15:13:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32343 at Wed Oct 18 15:13:34 UTC 2023 kill -USR1 32343 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32343 killed at Wed Oct 18 15:13:35 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:13:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32409 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32409 found at Wed Oct 18 15:13:35 UTC 2023 selfserv_9997 with PID 32409 started at Wed Oct 18 15:13:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32409 at Wed Oct 18 15:13:35 UTC 2023 kill -USR1 32409 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32409 killed at Wed Oct 18 15:13:35 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:13:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32462 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32462 found at Wed Oct 18 15:13:35 UTC 2023 selfserv_9997 with PID 32462 started at Wed Oct 18 15:13:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32462 at Wed Oct 18 15:13:36 UTC 2023 kill -USR1 32462 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32462 killed at Wed Oct 18 15:13:36 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:13:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32514 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32514 found at Wed Oct 18 15:13:36 UTC 2023 selfserv_9997 with PID 32514 started at Wed Oct 18 15:13:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32514 at Wed Oct 18 15:13:36 UTC 2023 kill -USR1 32514 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32514 killed at Wed Oct 18 15:13:37 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32580 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32580 found at Wed Oct 18 15:13:37 UTC 2023 selfserv_9997 with PID 32580 started at Wed Oct 18 15:13:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 32580 at Wed Oct 18 15:13:37 UTC 2023 kill -USR1 32580 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32580 killed at Wed Oct 18 15:13:37 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32632 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32632 found at Wed Oct 18 15:13:38 UTC 2023 selfserv_9997 with PID 32632 started at Wed Oct 18 15:13:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32632 at Wed Oct 18 15:13:38 UTC 2023 kill -USR1 32632 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32632 killed at Wed Oct 18 15:13:38 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32684 found at Wed Oct 18 15:13:38 UTC 2023 selfserv_9997 with PID 32684 started at Wed Oct 18 15:13:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 32684 at Wed Oct 18 15:13:39 UTC 2023 kill -USR1 32684 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32684 killed at Wed Oct 18 15:13:39 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32750 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32750 found at Wed Oct 18 15:13:39 UTC 2023 selfserv_9997 with PID 32750 started at Wed Oct 18 15:13:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 32750 at Wed Oct 18 15:13:40 UTC 2023 kill -USR1 32750 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32750 killed at Wed Oct 18 15:13:40 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 334 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 334 found at Wed Oct 18 15:13:40 UTC 2023 selfserv_9997 with PID 334 started at Wed Oct 18 15:13:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 334 at Wed Oct 18 15:13:41 UTC 2023 kill -USR1 334 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 334 killed at Wed Oct 18 15:13:41 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 386 found at Wed Oct 18 15:13:41 UTC 2023 selfserv_9997 with PID 386 started at Wed Oct 18 15:13:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 386 at Wed Oct 18 15:13:41 UTC 2023 kill -USR1 386 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 386 killed at Wed Oct 18 15:13:41 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:13:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 466 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 466 found at Wed Oct 18 15:13:42 UTC 2023 selfserv_9997 with PID 466 started at Wed Oct 18 15:13:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 466 at Wed Oct 18 15:13:42 UTC 2023 kill -USR1 466 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 466 killed at Wed Oct 18 15:13:42 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:13:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 522 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 522 found at Wed Oct 18 15:13:42 UTC 2023 selfserv_9997 with PID 522 started at Wed Oct 18 15:13:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 522 at Wed Oct 18 15:13:43 UTC 2023 kill -USR1 522 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 522 killed at Wed Oct 18 15:13:43 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:13:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 581 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 581 found at Wed Oct 18 15:13:43 UTC 2023 selfserv_9997 with PID 581 started at Wed Oct 18 15:13:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 581 at Wed Oct 18 15:13:43 UTC 2023 kill -USR1 581 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 581 killed at Wed Oct 18 15:13:43 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 652 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 652 found at Wed Oct 18 15:13:44 UTC 2023 selfserv_9997 with PID 652 started at Wed Oct 18 15:13:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 652 at Wed Oct 18 15:13:44 UTC 2023 kill -USR1 652 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 652 killed at Wed Oct 18 15:13:44 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 710 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 710 found at Wed Oct 18 15:13:44 UTC 2023 selfserv_9997 with PID 710 started at Wed Oct 18 15:13:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 710 at Wed Oct 18 15:13:45 UTC 2023 kill -USR1 710 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 710 killed at Wed Oct 18 15:13:45 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 772 found at Wed Oct 18 15:13:45 UTC 2023 selfserv_9997 with PID 772 started at Wed Oct 18 15:13:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 772 at Wed Oct 18 15:13:46 UTC 2023 kill -USR1 772 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 772 killed at Wed Oct 18 15:13:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 856 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 856 found at Wed Oct 18 15:13:46 UTC 2023 selfserv_9997 with PID 856 started at Wed Oct 18 15:13:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 856 at Wed Oct 18 15:13:47 UTC 2023 kill -USR1 856 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 856 killed at Wed Oct 18 15:13:47 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 924 found at Wed Oct 18 15:13:47 UTC 2023 selfserv_9997 with PID 924 started at Wed Oct 18 15:13:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 924 at Wed Oct 18 15:13:48 UTC 2023 kill -USR1 924 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 924 killed at Wed Oct 18 15:13:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 979 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 979 found at Wed Oct 18 15:13:48 UTC 2023 selfserv_9997 with PID 979 started at Wed Oct 18 15:13:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 979 at Wed Oct 18 15:13:48 UTC 2023 kill -USR1 979 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 979 killed at Wed Oct 18 15:13:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:13:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1045 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1045 found at Wed Oct 18 15:13:49 UTC 2023 selfserv_9997 with PID 1045 started at Wed Oct 18 15:13:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1045 at Wed Oct 18 15:13:49 UTC 2023 kill -USR1 1045 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1045 killed at Wed Oct 18 15:13:49 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:13:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1099 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1099 found at Wed Oct 18 15:13:49 UTC 2023 selfserv_9997 with PID 1099 started at Wed Oct 18 15:13:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1099 at Wed Oct 18 15:13:50 UTC 2023 kill -USR1 1099 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1099 killed at Wed Oct 18 15:13:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:13:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1163 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1163 found at Wed Oct 18 15:13:50 UTC 2023 selfserv_9997 with PID 1163 started at Wed Oct 18 15:13:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1163 at Wed Oct 18 15:13:50 UTC 2023 kill -USR1 1163 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1163 killed at Wed Oct 18 15:13:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1240 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1240 found at Wed Oct 18 15:13:51 UTC 2023 selfserv_9997 with PID 1240 started at Wed Oct 18 15:13:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1240 at Wed Oct 18 15:13:51 UTC 2023 kill -USR1 1240 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1240 killed at Wed Oct 18 15:13:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1301 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1301 found at Wed Oct 18 15:13:51 UTC 2023 selfserv_9997 with PID 1301 started at Wed Oct 18 15:13:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1301 at Wed Oct 18 15:13:52 UTC 2023 kill -USR1 1301 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1301 killed at Wed Oct 18 15:13:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1354 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1354 found at Wed Oct 18 15:13:52 UTC 2023 selfserv_9997 with PID 1354 started at Wed Oct 18 15:13:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1354 at Wed Oct 18 15:13:53 UTC 2023 kill -USR1 1354 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1354 killed at Wed Oct 18 15:13:53 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1421 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1421 found at Wed Oct 18 15:13:53 UTC 2023 selfserv_9997 with PID 1421 started at Wed Oct 18 15:13:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1421 at Wed Oct 18 15:13:53 UTC 2023 kill -USR1 1421 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1421 killed at Wed Oct 18 15:13:53 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1473 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1473 found at Wed Oct 18 15:13:54 UTC 2023 selfserv_9997 with PID 1473 started at Wed Oct 18 15:13:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1473 at Wed Oct 18 15:13:54 UTC 2023 kill -USR1 1473 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1473 killed at Wed Oct 18 15:13:54 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1525 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1525 found at Wed Oct 18 15:13:54 UTC 2023 selfserv_9997 with PID 1525 started at Wed Oct 18 15:13:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1525 at Wed Oct 18 15:13:55 UTC 2023 kill -USR1 1525 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1525 killed at Wed Oct 18 15:13:55 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:13:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1591 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1591 found at Wed Oct 18 15:13:55 UTC 2023 selfserv_9997 with PID 1591 started at Wed Oct 18 15:13:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1591 at Wed Oct 18 15:13:56 UTC 2023 kill -USR1 1591 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1591 killed at Wed Oct 18 15:13:56 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:13:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1643 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1643 found at Wed Oct 18 15:13:56 UTC 2023 selfserv_9997 with PID 1643 started at Wed Oct 18 15:13:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1643 at Wed Oct 18 15:13:56 UTC 2023 kill -USR1 1643 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1643 killed at Wed Oct 18 15:13:56 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:13:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1695 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1695 found at Wed Oct 18 15:13:57 UTC 2023 selfserv_9997 with PID 1695 started at Wed Oct 18 15:13:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1695 at Wed Oct 18 15:13:57 UTC 2023 kill -USR1 1695 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1695 killed at Wed Oct 18 15:13:57 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1761 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1761 found at Wed Oct 18 15:13:57 UTC 2023 selfserv_9997 with PID 1761 started at Wed Oct 18 15:13:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1761 at Wed Oct 18 15:13:58 UTC 2023 kill -USR1 1761 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1761 killed at Wed Oct 18 15:13:58 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1813 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1813 found at Wed Oct 18 15:13:58 UTC 2023 selfserv_9997 with PID 1813 started at Wed Oct 18 15:13:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1813 at Wed Oct 18 15:13:58 UTC 2023 kill -USR1 1813 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1813 killed at Wed Oct 18 15:13:58 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1865 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1865 found at Wed Oct 18 15:13:59 UTC 2023 selfserv_9997 with PID 1865 started at Wed Oct 18 15:13:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1865 at Wed Oct 18 15:13:59 UTC 2023 kill -USR1 1865 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1865 killed at Wed Oct 18 15:13:59 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:13:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:13:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1931 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1931 found at Wed Oct 18 15:13:59 UTC 2023 selfserv_9997 with PID 1931 started at Wed Oct 18 15:13:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1931 at Wed Oct 18 15:14:00 UTC 2023 kill -USR1 1931 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1931 killed at Wed Oct 18 15:14:00 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1983 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1983 found at Wed Oct 18 15:14:00 UTC 2023 selfserv_9997 with PID 1983 started at Wed Oct 18 15:14:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1983 at Wed Oct 18 15:14:01 UTC 2023 kill -USR1 1983 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1983 killed at Wed Oct 18 15:14:01 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2036 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2036 found at Wed Oct 18 15:14:01 UTC 2023 selfserv_9997 with PID 2036 started at Wed Oct 18 15:14:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2036 at Wed Oct 18 15:14:02 UTC 2023 kill -USR1 2036 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2036 killed at Wed Oct 18 15:14:02 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2102 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2102 found at Wed Oct 18 15:14:02 UTC 2023 selfserv_9997 with PID 2102 started at Wed Oct 18 15:14:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2102 at Wed Oct 18 15:14:03 UTC 2023 kill -USR1 2102 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2102 killed at Wed Oct 18 15:14:03 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2155 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2155 found at Wed Oct 18 15:14:03 UTC 2023 selfserv_9997 with PID 2155 started at Wed Oct 18 15:14:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2155 at Wed Oct 18 15:14:03 UTC 2023 kill -USR1 2155 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2155 killed at Wed Oct 18 15:14:03 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2207 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2207 found at Wed Oct 18 15:14:04 UTC 2023 selfserv_9997 with PID 2207 started at Wed Oct 18 15:14:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2207 at Wed Oct 18 15:14:04 UTC 2023 kill -USR1 2207 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2207 killed at Wed Oct 18 15:14:04 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2273 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2273 found at Wed Oct 18 15:14:04 UTC 2023 selfserv_9997 with PID 2273 started at Wed Oct 18 15:14:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2273 at Wed Oct 18 15:14:05 UTC 2023 kill -USR1 2273 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2273 killed at Wed Oct 18 15:14:05 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2325 found at Wed Oct 18 15:14:05 UTC 2023 selfserv_9997 with PID 2325 started at Wed Oct 18 15:14:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2325 at Wed Oct 18 15:14:06 UTC 2023 kill -USR1 2325 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2325 killed at Wed Oct 18 15:14:06 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2377 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2377 found at Wed Oct 18 15:14:06 UTC 2023 selfserv_9997 with PID 2377 started at Wed Oct 18 15:14:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2377 at Wed Oct 18 15:14:07 UTC 2023 kill -USR1 2377 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2377 killed at Wed Oct 18 15:14:07 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2443 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2443 found at Wed Oct 18 15:14:07 UTC 2023 selfserv_9997 with PID 2443 started at Wed Oct 18 15:14:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2443 at Wed Oct 18 15:14:08 UTC 2023 kill -USR1 2443 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2443 killed at Wed Oct 18 15:14:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2496 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2496 found at Wed Oct 18 15:14:08 UTC 2023 selfserv_9997 with PID 2496 started at Wed Oct 18 15:14:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2496 at Wed Oct 18 15:14:08 UTC 2023 kill -USR1 2496 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2496 killed at Wed Oct 18 15:14:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2548 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2548 found at Wed Oct 18 15:14:09 UTC 2023 selfserv_9997 with PID 2548 started at Wed Oct 18 15:14:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2548 at Wed Oct 18 15:14:09 UTC 2023 kill -USR1 2548 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2548 killed at Wed Oct 18 15:14:09 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2614 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2614 found at Wed Oct 18 15:14:09 UTC 2023 selfserv_9997 with PID 2614 started at Wed Oct 18 15:14:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2614 at Wed Oct 18 15:14:10 UTC 2023 kill -USR1 2614 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2614 killed at Wed Oct 18 15:14:10 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2667 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2667 found at Wed Oct 18 15:14:10 UTC 2023 selfserv_9997 with PID 2667 started at Wed Oct 18 15:14:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2667 at Wed Oct 18 15:14:11 UTC 2023 kill -USR1 2667 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2667 killed at Wed Oct 18 15:14:11 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2719 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2719 found at Wed Oct 18 15:14:11 UTC 2023 selfserv_9997 with PID 2719 started at Wed Oct 18 15:14:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2719 at Wed Oct 18 15:14:11 UTC 2023 kill -USR1 2719 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2719 killed at Wed Oct 18 15:14:11 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2785 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2785 found at Wed Oct 18 15:14:12 UTC 2023 selfserv_9997 with PID 2785 started at Wed Oct 18 15:14:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2785 at Wed Oct 18 15:14:12 UTC 2023 kill -USR1 2785 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2785 killed at Wed Oct 18 15:14:12 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2837 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2837 found at Wed Oct 18 15:14:13 UTC 2023 selfserv_9997 with PID 2837 started at Wed Oct 18 15:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2837 at Wed Oct 18 15:14:13 UTC 2023 kill -USR1 2837 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2837 killed at Wed Oct 18 15:14:13 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2889 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2889 found at Wed Oct 18 15:14:13 UTC 2023 selfserv_9997 with PID 2889 started at Wed Oct 18 15:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2889 at Wed Oct 18 15:14:14 UTC 2023 kill -USR1 2889 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2889 killed at Wed Oct 18 15:14:14 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2957 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2957 found at Wed Oct 18 15:14:14 UTC 2023 selfserv_9997 with PID 2957 started at Wed Oct 18 15:14:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2957 at Wed Oct 18 15:14:15 UTC 2023 kill -USR1 2957 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2957 killed at Wed Oct 18 15:14:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3009 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3009 found at Wed Oct 18 15:14:15 UTC 2023 selfserv_9997 with PID 3009 started at Wed Oct 18 15:14:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3009 at Wed Oct 18 15:14:16 UTC 2023 kill -USR1 3009 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3009 killed at Wed Oct 18 15:14:16 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3061 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3061 found at Wed Oct 18 15:14:16 UTC 2023 selfserv_9997 with PID 3061 started at Wed Oct 18 15:14:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3061 at Wed Oct 18 15:14:17 UTC 2023 kill -USR1 3061 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3061 killed at Wed Oct 18 15:14:17 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3127 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3127 found at Wed Oct 18 15:14:17 UTC 2023 selfserv_9997 with PID 3127 started at Wed Oct 18 15:14:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3127 at Wed Oct 18 15:14:18 UTC 2023 kill -USR1 3127 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3127 killed at Wed Oct 18 15:14:18 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3179 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3179 found at Wed Oct 18 15:14:18 UTC 2023 selfserv_9997 with PID 3179 started at Wed Oct 18 15:14:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3179 at Wed Oct 18 15:14:18 UTC 2023 kill -USR1 3179 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3179 killed at Wed Oct 18 15:14:18 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3231 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3231 found at Wed Oct 18 15:14:19 UTC 2023 selfserv_9997 with PID 3231 started at Wed Oct 18 15:14:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3231 at Wed Oct 18 15:14:19 UTC 2023 kill -USR1 3231 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3231 killed at Wed Oct 18 15:14:19 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3298 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3298 found at Wed Oct 18 15:14:19 UTC 2023 selfserv_9997 with PID 3298 started at Wed Oct 18 15:14:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3298 at Wed Oct 18 15:14:20 UTC 2023 kill -USR1 3298 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3298 killed at Wed Oct 18 15:14:20 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3350 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3350 found at Wed Oct 18 15:14:20 UTC 2023 selfserv_9997 with PID 3350 started at Wed Oct 18 15:14:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3350 at Wed Oct 18 15:14:21 UTC 2023 kill -USR1 3350 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3350 killed at Wed Oct 18 15:14:21 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3402 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3402 found at Wed Oct 18 15:14:21 UTC 2023 selfserv_9997 with PID 3402 started at Wed Oct 18 15:14:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3402 at Wed Oct 18 15:14:22 UTC 2023 kill -USR1 3402 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3402 killed at Wed Oct 18 15:14:22 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3468 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3468 found at Wed Oct 18 15:14:22 UTC 2023 selfserv_9997 with PID 3468 started at Wed Oct 18 15:14:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3468 at Wed Oct 18 15:14:23 UTC 2023 kill -USR1 3468 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3468 killed at Wed Oct 18 15:14:23 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3520 found at Wed Oct 18 15:14:23 UTC 2023 selfserv_9997 with PID 3520 started at Wed Oct 18 15:14:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3520 at Wed Oct 18 15:14:24 UTC 2023 kill -USR1 3520 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3520 killed at Wed Oct 18 15:14:24 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3572 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3572 found at Wed Oct 18 15:14:24 UTC 2023 selfserv_9997 with PID 3572 started at Wed Oct 18 15:14:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3572 at Wed Oct 18 15:14:25 UTC 2023 kill -USR1 3572 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3572 killed at Wed Oct 18 15:14:25 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3638 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3638 found at Wed Oct 18 15:14:25 UTC 2023 selfserv_9997 with PID 3638 started at Wed Oct 18 15:14:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3638 at Wed Oct 18 15:14:25 UTC 2023 kill -USR1 3638 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3638 killed at Wed Oct 18 15:14:25 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3690 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3690 found at Wed Oct 18 15:14:26 UTC 2023 selfserv_9997 with PID 3690 started at Wed Oct 18 15:14:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3690 at Wed Oct 18 15:14:26 UTC 2023 kill -USR1 3690 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3690 killed at Wed Oct 18 15:14:26 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3742 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3742 found at Wed Oct 18 15:14:26 UTC 2023 selfserv_9997 with PID 3742 started at Wed Oct 18 15:14:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3742 at Wed Oct 18 15:14:27 UTC 2023 kill -USR1 3742 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3742 killed at Wed Oct 18 15:14:27 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3808 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3808 found at Wed Oct 18 15:14:27 UTC 2023 selfserv_9997 with PID 3808 started at Wed Oct 18 15:14:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3808 at Wed Oct 18 15:14:28 UTC 2023 kill -USR1 3808 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3808 killed at Wed Oct 18 15:14:28 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3861 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3861 found at Wed Oct 18 15:14:28 UTC 2023 selfserv_9997 with PID 3861 started at Wed Oct 18 15:14:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3861 at Wed Oct 18 15:14:29 UTC 2023 kill -USR1 3861 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3861 killed at Wed Oct 18 15:14:29 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3913 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3913 found at Wed Oct 18 15:14:29 UTC 2023 selfserv_9997 with PID 3913 started at Wed Oct 18 15:14:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3913 at Wed Oct 18 15:14:30 UTC 2023 kill -USR1 3913 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3913 killed at Wed Oct 18 15:14:30 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3979 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3979 found at Wed Oct 18 15:14:30 UTC 2023 selfserv_9997 with PID 3979 started at Wed Oct 18 15:14:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3979 at Wed Oct 18 15:14:30 UTC 2023 kill -USR1 3979 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3979 killed at Wed Oct 18 15:14:30 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4031 found at Wed Oct 18 15:14:31 UTC 2023 selfserv_9997 with PID 4031 started at Wed Oct 18 15:14:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4031 at Wed Oct 18 15:14:31 UTC 2023 kill -USR1 4031 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4031 killed at Wed Oct 18 15:14:31 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4083 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4083 found at Wed Oct 18 15:14:32 UTC 2023 selfserv_9997 with PID 4083 started at Wed Oct 18 15:14:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4083 at Wed Oct 18 15:14:32 UTC 2023 kill -USR1 4083 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4083 killed at Wed Oct 18 15:14:32 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4149 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4149 found at Wed Oct 18 15:14:32 UTC 2023 selfserv_9997 with PID 4149 started at Wed Oct 18 15:14:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4149 at Wed Oct 18 15:14:33 UTC 2023 kill -USR1 4149 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4149 killed at Wed Oct 18 15:14:33 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4201 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4201 found at Wed Oct 18 15:14:33 UTC 2023 selfserv_9997 with PID 4201 started at Wed Oct 18 15:14:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4201 at Wed Oct 18 15:14:34 UTC 2023 kill -USR1 4201 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4201 killed at Wed Oct 18 15:14:34 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4253 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4253 found at Wed Oct 18 15:14:34 UTC 2023 selfserv_9997 with PID 4253 started at Wed Oct 18 15:14:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4253 at Wed Oct 18 15:14:34 UTC 2023 kill -USR1 4253 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4253 killed at Wed Oct 18 15:14:34 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4319 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4319 found at Wed Oct 18 15:14:35 UTC 2023 selfserv_9997 with PID 4319 started at Wed Oct 18 15:14:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4319 at Wed Oct 18 15:14:35 UTC 2023 kill -USR1 4319 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4319 killed at Wed Oct 18 15:14:35 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4372 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4372 found at Wed Oct 18 15:14:35 UTC 2023 selfserv_9997 with PID 4372 started at Wed Oct 18 15:14:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4372 at Wed Oct 18 15:14:36 UTC 2023 kill -USR1 4372 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4372 killed at Wed Oct 18 15:14:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4424 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4424 found at Wed Oct 18 15:14:36 UTC 2023 selfserv_9997 with PID 4424 started at Wed Oct 18 15:14:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4424 at Wed Oct 18 15:14:37 UTC 2023 kill -USR1 4424 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4424 killed at Wed Oct 18 15:14:37 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4490 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4490 found at Wed Oct 18 15:14:37 UTC 2023 selfserv_9997 with PID 4490 started at Wed Oct 18 15:14:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4490 at Wed Oct 18 15:14:37 UTC 2023 kill -USR1 4490 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4490 killed at Wed Oct 18 15:14:37 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4542 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4542 found at Wed Oct 18 15:14:38 UTC 2023 selfserv_9997 with PID 4542 started at Wed Oct 18 15:14:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4542 at Wed Oct 18 15:14:38 UTC 2023 kill -USR1 4542 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4542 killed at Wed Oct 18 15:14:38 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4594 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4594 found at Wed Oct 18 15:14:39 UTC 2023 selfserv_9997 with PID 4594 started at Wed Oct 18 15:14:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4594 at Wed Oct 18 15:14:39 UTC 2023 kill -USR1 4594 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4594 killed at Wed Oct 18 15:14:39 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4660 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4660 found at Wed Oct 18 15:14:39 UTC 2023 selfserv_9997 with PID 4660 started at Wed Oct 18 15:14:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4660 at Wed Oct 18 15:14:40 UTC 2023 kill -USR1 4660 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4660 killed at Wed Oct 18 15:14:40 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4712 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4712 found at Wed Oct 18 15:14:40 UTC 2023 selfserv_9997 with PID 4712 started at Wed Oct 18 15:14:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4712 at Wed Oct 18 15:14:41 UTC 2023 kill -USR1 4712 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4712 killed at Wed Oct 18 15:14:41 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4764 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4764 found at Wed Oct 18 15:14:41 UTC 2023 selfserv_9997 with PID 4764 started at Wed Oct 18 15:14:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4764 at Wed Oct 18 15:14:41 UTC 2023 kill -USR1 4764 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4764 killed at Wed Oct 18 15:14:41 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4843 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4843 found at Wed Oct 18 15:14:42 UTC 2023 selfserv_9997 with PID 4843 started at Wed Oct 18 15:14:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4843 at Wed Oct 18 15:14:42 UTC 2023 kill -USR1 4843 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4843 killed at Wed Oct 18 15:14:42 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4895 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4895 found at Wed Oct 18 15:14:42 UTC 2023 selfserv_9997 with PID 4895 started at Wed Oct 18 15:14:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4895 at Wed Oct 18 15:14:43 UTC 2023 kill -USR1 4895 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4895 killed at Wed Oct 18 15:14:43 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4949 found at Wed Oct 18 15:14:43 UTC 2023 selfserv_9997 with PID 4949 started at Wed Oct 18 15:14:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4949 at Wed Oct 18 15:14:44 UTC 2023 kill -USR1 4949 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4949 killed at Wed Oct 18 15:14:44 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5015 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5015 found at Wed Oct 18 15:14:44 UTC 2023 selfserv_9997 with PID 5015 started at Wed Oct 18 15:14:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5015 at Wed Oct 18 15:14:44 UTC 2023 kill -USR1 5015 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5015 killed at Wed Oct 18 15:14:44 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5067 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5067 found at Wed Oct 18 15:14:45 UTC 2023 selfserv_9997 with PID 5067 started at Wed Oct 18 15:14:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5067 at Wed Oct 18 15:14:45 UTC 2023 kill -USR1 5067 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5067 killed at Wed Oct 18 15:14:45 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5119 found at Wed Oct 18 15:14:45 UTC 2023 selfserv_9997 with PID 5119 started at Wed Oct 18 15:14:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5119 at Wed Oct 18 15:14:46 UTC 2023 kill -USR1 5119 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5119 killed at Wed Oct 18 15:14:46 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5185 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5185 found at Wed Oct 18 15:14:46 UTC 2023 selfserv_9997 with PID 5185 started at Wed Oct 18 15:14:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5185 at Wed Oct 18 15:14:46 UTC 2023 kill -USR1 5185 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5185 killed at Wed Oct 18 15:14:46 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5238 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5238 found at Wed Oct 18 15:14:47 UTC 2023 selfserv_9997 with PID 5238 started at Wed Oct 18 15:14:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5238 at Wed Oct 18 15:14:47 UTC 2023 kill -USR1 5238 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5238 killed at Wed Oct 18 15:14:47 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5290 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5290 found at Wed Oct 18 15:14:47 UTC 2023 selfserv_9997 with PID 5290 started at Wed Oct 18 15:14:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5290 at Wed Oct 18 15:14:48 UTC 2023 kill -USR1 5290 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5290 killed at Wed Oct 18 15:14:48 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5356 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5356 found at Wed Oct 18 15:14:48 UTC 2023 selfserv_9997 with PID 5356 started at Wed Oct 18 15:14:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5356 at Wed Oct 18 15:14:49 UTC 2023 kill -USR1 5356 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5356 killed at Wed Oct 18 15:14:49 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5408 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5408 found at Wed Oct 18 15:14:49 UTC 2023 selfserv_9997 with PID 5408 started at Wed Oct 18 15:14:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5408 at Wed Oct 18 15:14:49 UTC 2023 kill -USR1 5408 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5408 killed at Wed Oct 18 15:14:49 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5460 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5460 found at Wed Oct 18 15:14:50 UTC 2023 selfserv_9997 with PID 5460 started at Wed Oct 18 15:14:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5460 at Wed Oct 18 15:14:50 UTC 2023 kill -USR1 5460 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5460 killed at Wed Oct 18 15:14:50 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5526 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5526 found at Wed Oct 18 15:14:50 UTC 2023 selfserv_9997 with PID 5526 started at Wed Oct 18 15:14:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5526 at Wed Oct 18 15:14:51 UTC 2023 kill -USR1 5526 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5526 killed at Wed Oct 18 15:14:51 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5578 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5578 found at Wed Oct 18 15:14:51 UTC 2023 selfserv_9997 with PID 5578 started at Wed Oct 18 15:14:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5578 at Wed Oct 18 15:14:52 UTC 2023 kill -USR1 5578 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5578 killed at Wed Oct 18 15:14:52 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5630 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5630 found at Wed Oct 18 15:14:52 UTC 2023 selfserv_9997 with PID 5630 started at Wed Oct 18 15:14:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5630 at Wed Oct 18 15:14:53 UTC 2023 kill -USR1 5630 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5630 killed at Wed Oct 18 15:14:53 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5696 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5696 found at Wed Oct 18 15:14:53 UTC 2023 selfserv_9997 with PID 5696 started at Wed Oct 18 15:14:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5696 at Wed Oct 18 15:14:53 UTC 2023 kill -USR1 5696 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5696 killed at Wed Oct 18 15:14:53 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5748 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5748 found at Wed Oct 18 15:14:54 UTC 2023 selfserv_9997 with PID 5748 started at Wed Oct 18 15:14:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5748 at Wed Oct 18 15:14:54 UTC 2023 kill -USR1 5748 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5748 killed at Wed Oct 18 15:14:54 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5800 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5800 found at Wed Oct 18 15:14:54 UTC 2023 selfserv_9997 with PID 5800 started at Wed Oct 18 15:14:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5800 at Wed Oct 18 15:14:55 UTC 2023 kill -USR1 5800 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5800 killed at Wed Oct 18 15:14:55 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5866 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5866 found at Wed Oct 18 15:14:55 UTC 2023 selfserv_9997 with PID 5866 started at Wed Oct 18 15:14:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5866 at Wed Oct 18 15:14:56 UTC 2023 kill -USR1 5866 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5866 killed at Wed Oct 18 15:14:56 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5918 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5918 found at Wed Oct 18 15:14:56 UTC 2023 selfserv_9997 with PID 5918 started at Wed Oct 18 15:14:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5918 at Wed Oct 18 15:14:56 UTC 2023 kill -USR1 5918 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5918 killed at Wed Oct 18 15:14:56 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5970 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5970 found at Wed Oct 18 15:14:57 UTC 2023 selfserv_9997 with PID 5970 started at Wed Oct 18 15:14:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5970 at Wed Oct 18 15:14:57 UTC 2023 kill -USR1 5970 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5970 killed at Wed Oct 18 15:14:57 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6036 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6036 found at Wed Oct 18 15:14:58 UTC 2023 selfserv_9997 with PID 6036 started at Wed Oct 18 15:14:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #109: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6036 at Wed Oct 18 15:14:58 UTC 2023 kill -USR1 6036 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6036 killed at Wed Oct 18 15:14:58 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6088 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6088 found at Wed Oct 18 15:14:58 UTC 2023 selfserv_9997 with PID 6088 started at Wed Oct 18 15:14:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6088 at Wed Oct 18 15:14:59 UTC 2023 kill -USR1 6088 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6088 killed at Wed Oct 18 15:14:59 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:14:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6140 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6140 found at Wed Oct 18 15:14:59 UTC 2023 selfserv_9997 with PID 6140 started at Wed Oct 18 15:14:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #111: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6140 at Wed Oct 18 15:14:59 UTC 2023 kill -USR1 6140 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6140 killed at Wed Oct 18 15:14:59 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:14:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:14:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6206 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6206 found at Wed Oct 18 15:15:00 UTC 2023 selfserv_9997 with PID 6206 started at Wed Oct 18 15:15:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #112: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 6206 at Wed Oct 18 15:15:00 UTC 2023 kill -USR1 6206 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6206 killed at Wed Oct 18 15:15:00 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6258 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6258 found at Wed Oct 18 15:15:00 UTC 2023 selfserv_9997 with PID 6258 started at Wed Oct 18 15:15:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #113: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6258 at Wed Oct 18 15:15:01 UTC 2023 kill -USR1 6258 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6258 killed at Wed Oct 18 15:15:01 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6310 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6310 found at Wed Oct 18 15:15:01 UTC 2023 selfserv_9997 with PID 6310 started at Wed Oct 18 15:15:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #114: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 6310 at Wed Oct 18 15:15:01 UTC 2023 kill -USR1 6310 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6310 killed at Wed Oct 18 15:15:01 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6376 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6376 found at Wed Oct 18 15:15:02 UTC 2023 selfserv_9997 with PID 6376 started at Wed Oct 18 15:15:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #115: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 6376 at Wed Oct 18 15:15:02 UTC 2023 kill -USR1 6376 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6376 killed at Wed Oct 18 15:15:02 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6428 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6428 found at Wed Oct 18 15:15:02 UTC 2023 selfserv_9997 with PID 6428 started at Wed Oct 18 15:15:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #116: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 6428 at Wed Oct 18 15:15:03 UTC 2023 kill -USR1 6428 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6428 killed at Wed Oct 18 15:15:03 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6480 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6480 found at Wed Oct 18 15:15:03 UTC 2023 selfserv_9997 with PID 6480 started at Wed Oct 18 15:15:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #117: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 6480 at Wed Oct 18 15:15:03 UTC 2023 kill -USR1 6480 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6480 killed at Wed Oct 18 15:15:03 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6546 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6546 found at Wed Oct 18 15:15:04 UTC 2023 selfserv_9997 with PID 6546 started at Wed Oct 18 15:15:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #118: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 6546 at Wed Oct 18 15:15:04 UTC 2023 kill -USR1 6546 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6546 killed at Wed Oct 18 15:15:04 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6598 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6598 found at Wed Oct 18 15:15:04 UTC 2023 selfserv_9997 with PID 6598 started at Wed Oct 18 15:15:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6598 at Wed Oct 18 15:15:05 UTC 2023 kill -USR1 6598 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6598 killed at Wed Oct 18 15:15:05 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6650 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6650 found at Wed Oct 18 15:15:05 UTC 2023 selfserv_9997 with PID 6650 started at Wed Oct 18 15:15:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #120: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 6650 at Wed Oct 18 15:15:05 UTC 2023 kill -USR1 6650 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6650 killed at Wed Oct 18 15:15:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6716 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6716 found at Wed Oct 18 15:15:05 UTC 2023 selfserv_9997 with PID 6716 started at Wed Oct 18 15:15:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #121: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6716 at Wed Oct 18 15:15:06 UTC 2023 kill -USR1 6716 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6716 killed at Wed Oct 18 15:15:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6768 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6768 found at Wed Oct 18 15:15:06 UTC 2023 selfserv_9997 with PID 6768 started at Wed Oct 18 15:15:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6768 at Wed Oct 18 15:15:07 UTC 2023 kill -USR1 6768 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6768 killed at Wed Oct 18 15:15:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6820 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6820 found at Wed Oct 18 15:15:07 UTC 2023 selfserv_9997 with PID 6820 started at Wed Oct 18 15:15:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #123: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6820 at Wed Oct 18 15:15:07 UTC 2023 kill -USR1 6820 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6820 killed at Wed Oct 18 15:15:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6886 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6886 found at Wed Oct 18 15:15:08 UTC 2023 selfserv_9997 with PID 6886 started at Wed Oct 18 15:15:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #124: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 6886 at Wed Oct 18 15:15:08 UTC 2023 kill -USR1 6886 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6886 killed at Wed Oct 18 15:15:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6938 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6938 found at Wed Oct 18 15:15:08 UTC 2023 selfserv_9997 with PID 6938 started at Wed Oct 18 15:15:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #125: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6938 at Wed Oct 18 15:15:09 UTC 2023 kill -USR1 6938 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6938 killed at Wed Oct 18 15:15:09 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6990 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6990 found at Wed Oct 18 15:15:09 UTC 2023 selfserv_9997 with PID 6990 started at Wed Oct 18 15:15:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #126: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 6990 at Wed Oct 18 15:15:10 UTC 2023 kill -USR1 6990 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6990 killed at Wed Oct 18 15:15:10 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7056 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7056 found at Wed Oct 18 15:15:10 UTC 2023 selfserv_9997 with PID 7056 started at Wed Oct 18 15:15:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #127: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 7056 at Wed Oct 18 15:15:10 UTC 2023 kill -USR1 7056 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7056 killed at Wed Oct 18 15:15:10 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7108 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7108 found at Wed Oct 18 15:15:11 UTC 2023 selfserv_9997 with PID 7108 started at Wed Oct 18 15:15:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #128: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 7108 at Wed Oct 18 15:15:11 UTC 2023 kill -USR1 7108 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7108 killed at Wed Oct 18 15:15:11 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7160 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7160 found at Wed Oct 18 15:15:11 UTC 2023 selfserv_9997 with PID 7160 started at Wed Oct 18 15:15:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #129: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 7160 at Wed Oct 18 15:15:12 UTC 2023 kill -USR1 7160 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7160 killed at Wed Oct 18 15:15:12 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7237 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7237 found at Wed Oct 18 15:15:12 UTC 2023 selfserv_9997 with PID 7237 started at Wed Oct 18 15:15:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #130: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 7237 at Wed Oct 18 15:15:12 UTC 2023 kill -USR1 7237 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7237 killed at Wed Oct 18 15:15:12 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7298 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7298 found at Wed Oct 18 15:15:13 UTC 2023 selfserv_9997 with PID 7298 started at Wed Oct 18 15:15:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7298 at Wed Oct 18 15:15:13 UTC 2023 kill -USR1 7298 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7298 killed at Wed Oct 18 15:15:13 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7350 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7350 found at Wed Oct 18 15:15:13 UTC 2023 selfserv_9997 with PID 7350 started at Wed Oct 18 15:15:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #132: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 7350 at Wed Oct 18 15:15:14 UTC 2023 kill -USR1 7350 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7350 killed at Wed Oct 18 15:15:14 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7416 found at Wed Oct 18 15:15:14 UTC 2023 selfserv_9997 with PID 7416 started at Wed Oct 18 15:15:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7416 at Wed Oct 18 15:15:15 UTC 2023 kill -USR1 7416 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7416 killed at Wed Oct 18 15:15:15 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7468 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7468 found at Wed Oct 18 15:15:15 UTC 2023 selfserv_9997 with PID 7468 started at Wed Oct 18 15:15:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7468 at Wed Oct 18 15:15:15 UTC 2023 kill -USR1 7468 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7468 killed at Wed Oct 18 15:15:15 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7520 found at Wed Oct 18 15:15:16 UTC 2023 selfserv_9997 with PID 7520 started at Wed Oct 18 15:15:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7520 at Wed Oct 18 15:15:16 UTC 2023 kill -USR1 7520 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7520 killed at Wed Oct 18 15:15:16 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7586 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7586 found at Wed Oct 18 15:15:16 UTC 2023 selfserv_9997 with PID 7586 started at Wed Oct 18 15:15:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #136: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7586 at Wed Oct 18 15:15:17 UTC 2023 kill -USR1 7586 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7586 killed at Wed Oct 18 15:15:17 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7638 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7638 found at Wed Oct 18 15:15:17 UTC 2023 selfserv_9997 with PID 7638 started at Wed Oct 18 15:15:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #137: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7638 at Wed Oct 18 15:15:17 UTC 2023 kill -USR1 7638 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7638 killed at Wed Oct 18 15:15:17 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7690 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7690 found at Wed Oct 18 15:15:18 UTC 2023 selfserv_9997 with PID 7690 started at Wed Oct 18 15:15:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #138: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7690 at Wed Oct 18 15:15:18 UTC 2023 kill -USR1 7690 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7690 killed at Wed Oct 18 15:15:18 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7817 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7817 found at Wed Oct 18 15:15:18 UTC 2023 selfserv_9997 with PID 7817 started at Wed Oct 18 15:15:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7817 at Wed Oct 18 15:15:19 UTC 2023 kill -USR1 7817 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7817 killed at Wed Oct 18 15:15:19 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7882 found at Wed Oct 18 15:15:19 UTC 2023 selfserv_9997 with PID 7882 started at Wed Oct 18 15:15:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7882 at Wed Oct 18 15:15:20 UTC 2023 kill -USR1 7882 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7882 killed at Wed Oct 18 15:15:20 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7934 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7934 found at Wed Oct 18 15:15:20 UTC 2023 selfserv_9997 with PID 7934 started at Wed Oct 18 15:15:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7934 at Wed Oct 18 15:15:20 UTC 2023 kill -USR1 7934 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7934 killed at Wed Oct 18 15:15:20 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8001 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8001 found at Wed Oct 18 15:15:21 UTC 2023 selfserv_9997 with PID 8001 started at Wed Oct 18 15:15:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #142: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8001 at Wed Oct 18 15:15:21 UTC 2023 kill -USR1 8001 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8001 killed at Wed Oct 18 15:15:21 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8053 found at Wed Oct 18 15:15:21 UTC 2023 selfserv_9997 with PID 8053 started at Wed Oct 18 15:15:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8053 at Wed Oct 18 15:15:22 UTC 2023 kill -USR1 8053 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8053 killed at Wed Oct 18 15:15:22 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8105 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8105 found at Wed Oct 18 15:15:22 UTC 2023 selfserv_9997 with PID 8105 started at Wed Oct 18 15:15:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #144: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8105 at Wed Oct 18 15:15:22 UTC 2023 kill -USR1 8105 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8105 killed at Wed Oct 18 15:15:22 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8171 found at Wed Oct 18 15:15:23 UTC 2023 selfserv_9997 with PID 8171 started at Wed Oct 18 15:15:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8171 at Wed Oct 18 15:15:23 UTC 2023 kill -USR1 8171 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8171 killed at Wed Oct 18 15:15:23 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8223 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8223 found at Wed Oct 18 15:15:23 UTC 2023 selfserv_9997 with PID 8223 started at Wed Oct 18 15:15:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8223 at Wed Oct 18 15:15:24 UTC 2023 kill -USR1 8223 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8223 killed at Wed Oct 18 15:15:24 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8275 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8275 found at Wed Oct 18 15:15:24 UTC 2023 selfserv_9997 with PID 8275 started at Wed Oct 18 15:15:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8275 at Wed Oct 18 15:15:25 UTC 2023 kill -USR1 8275 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8275 killed at Wed Oct 18 15:15:25 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8341 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8341 found at Wed Oct 18 15:15:25 UTC 2023 selfserv_9997 with PID 8341 started at Wed Oct 18 15:15:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8341 at Wed Oct 18 15:15:25 UTC 2023 kill -USR1 8341 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8341 killed at Wed Oct 18 15:15:25 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8393 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8393 found at Wed Oct 18 15:15:26 UTC 2023 selfserv_9997 with PID 8393 started at Wed Oct 18 15:15:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8393 at Wed Oct 18 15:15:26 UTC 2023 kill -USR1 8393 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8393 killed at Wed Oct 18 15:15:26 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8445 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8445 found at Wed Oct 18 15:15:26 UTC 2023 selfserv_9997 with PID 8445 started at Wed Oct 18 15:15:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8445 at Wed Oct 18 15:15:27 UTC 2023 kill -USR1 8445 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8445 killed at Wed Oct 18 15:15:27 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8511 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8511 found at Wed Oct 18 15:15:27 UTC 2023 selfserv_9997 with PID 8511 started at Wed Oct 18 15:15:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8511 at Wed Oct 18 15:15:28 UTC 2023 kill -USR1 8511 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8511 killed at Wed Oct 18 15:15:28 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8563 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8563 found at Wed Oct 18 15:15:28 UTC 2023 selfserv_9997 with PID 8563 started at Wed Oct 18 15:15:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8563 at Wed Oct 18 15:15:28 UTC 2023 kill -USR1 8563 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8563 killed at Wed Oct 18 15:15:28 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8615 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8615 found at Wed Oct 18 15:15:29 UTC 2023 selfserv_9997 with PID 8615 started at Wed Oct 18 15:15:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8615 at Wed Oct 18 15:15:29 UTC 2023 kill -USR1 8615 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8615 killed at Wed Oct 18 15:15:29 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8681 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8681 found at Wed Oct 18 15:15:29 UTC 2023 selfserv_9997 with PID 8681 started at Wed Oct 18 15:15:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #154: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8681 at Wed Oct 18 15:15:30 UTC 2023 kill -USR1 8681 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8681 killed at Wed Oct 18 15:15:30 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8734 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8734 found at Wed Oct 18 15:15:30 UTC 2023 selfserv_9997 with PID 8734 started at Wed Oct 18 15:15:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8734 at Wed Oct 18 15:15:31 UTC 2023 kill -USR1 8734 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8734 killed at Wed Oct 18 15:15:31 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8786 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8786 found at Wed Oct 18 15:15:31 UTC 2023 selfserv_9997 with PID 8786 started at Wed Oct 18 15:15:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8786 at Wed Oct 18 15:15:31 UTC 2023 kill -USR1 8786 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8786 killed at Wed Oct 18 15:15:31 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8853 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8853 found at Wed Oct 18 15:15:32 UTC 2023 selfserv_9997 with PID 8853 started at Wed Oct 18 15:15:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8853 at Wed Oct 18 15:15:32 UTC 2023 kill -USR1 8853 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8853 killed at Wed Oct 18 15:15:32 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8906 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8906 found at Wed Oct 18 15:15:32 UTC 2023 selfserv_9997 with PID 8906 started at Wed Oct 18 15:15:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8906 at Wed Oct 18 15:15:33 UTC 2023 kill -USR1 8906 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8906 killed at Wed Oct 18 15:15:33 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8958 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8958 found at Wed Oct 18 15:15:33 UTC 2023 selfserv_9997 with PID 8958 started at Wed Oct 18 15:15:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8958 at Wed Oct 18 15:15:34 UTC 2023 kill -USR1 8958 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8958 killed at Wed Oct 18 15:15:34 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9024 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9024 found at Wed Oct 18 15:15:34 UTC 2023 selfserv_9997 with PID 9024 started at Wed Oct 18 15:15:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9024 at Wed Oct 18 15:15:34 UTC 2023 kill -USR1 9024 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9024 killed at Wed Oct 18 15:15:34 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9076 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9076 found at Wed Oct 18 15:15:35 UTC 2023 selfserv_9997 with PID 9076 started at Wed Oct 18 15:15:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9076 at Wed Oct 18 15:15:35 UTC 2023 kill -USR1 9076 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9076 killed at Wed Oct 18 15:15:35 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9128 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9128 found at Wed Oct 18 15:15:35 UTC 2023 selfserv_9997 with PID 9128 started at Wed Oct 18 15:15:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9128 at Wed Oct 18 15:15:36 UTC 2023 kill -USR1 9128 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9128 killed at Wed Oct 18 15:15:36 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9194 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9194 found at Wed Oct 18 15:15:36 UTC 2023 selfserv_9997 with PID 9194 started at Wed Oct 18 15:15:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9194 at Wed Oct 18 15:15:37 UTC 2023 kill -USR1 9194 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9194 killed at Wed Oct 18 15:15:37 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9247 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9247 found at Wed Oct 18 15:15:37 UTC 2023 selfserv_9997 with PID 9247 started at Wed Oct 18 15:15:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9247 at Wed Oct 18 15:15:37 UTC 2023 kill -USR1 9247 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9247 killed at Wed Oct 18 15:15:37 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:15:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9299 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9299 found at Wed Oct 18 15:15:38 UTC 2023 selfserv_9997 with PID 9299 started at Wed Oct 18 15:15:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9299 at Wed Oct 18 15:15:38 UTC 2023 kill -USR1 9299 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9299 killed at Wed Oct 18 15:15:38 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9365 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9365 found at Wed Oct 18 15:15:38 UTC 2023 selfserv_9997 with PID 9365 started at Wed Oct 18 15:15:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #166: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9365 at Wed Oct 18 15:15:39 UTC 2023 kill -USR1 9365 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9365 killed at Wed Oct 18 15:15:39 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9418 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9418 found at Wed Oct 18 15:15:39 UTC 2023 selfserv_9997 with PID 9418 started at Wed Oct 18 15:15:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #167: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9418 at Wed Oct 18 15:15:40 UTC 2023 kill -USR1 9418 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9418 killed at Wed Oct 18 15:15:40 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9470 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9470 found at Wed Oct 18 15:15:40 UTC 2023 selfserv_9997 with PID 9470 started at Wed Oct 18 15:15:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #168: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9470 at Wed Oct 18 15:15:41 UTC 2023 kill -USR1 9470 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9470 killed at Wed Oct 18 15:15:41 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9536 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9536 found at Wed Oct 18 15:15:41 UTC 2023 selfserv_9997 with PID 9536 started at Wed Oct 18 15:15:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #169: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9536 at Wed Oct 18 15:15:42 UTC 2023 kill -USR1 9536 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9536 killed at Wed Oct 18 15:15:42 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9601 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9601 found at Wed Oct 18 15:15:42 UTC 2023 selfserv_9997 with PID 9601 started at Wed Oct 18 15:15:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #170: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9601 at Wed Oct 18 15:15:43 UTC 2023 kill -USR1 9601 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9601 killed at Wed Oct 18 15:15:43 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9656 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9656 found at Wed Oct 18 15:15:43 UTC 2023 selfserv_9997 with PID 9656 started at Wed Oct 18 15:15:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #171: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9656 at Wed Oct 18 15:15:44 UTC 2023 kill -USR1 9656 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9656 killed at Wed Oct 18 15:15:44 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9722 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9722 found at Wed Oct 18 15:15:44 UTC 2023 selfserv_9997 with PID 9722 started at Wed Oct 18 15:15:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #172: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9722 at Wed Oct 18 15:15:45 UTC 2023 kill -USR1 9722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9722 killed at Wed Oct 18 15:15:45 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9774 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9774 found at Wed Oct 18 15:15:45 UTC 2023 selfserv_9997 with PID 9774 started at Wed Oct 18 15:15:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #173: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9774 at Wed Oct 18 15:15:45 UTC 2023 kill -USR1 9774 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9774 killed at Wed Oct 18 15:15:45 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:15:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9826 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9826 found at Wed Oct 18 15:15:46 UTC 2023 selfserv_9997 with PID 9826 started at Wed Oct 18 15:15:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #174: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9826 at Wed Oct 18 15:15:46 UTC 2023 kill -USR1 9826 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9826 killed at Wed Oct 18 15:15:46 UTC 2023 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/authin.tl.tmp 0 selfserv_9997 starting at Wed Oct 18 15:15:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:15:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:47 UTC 2023 selfserv_9997 with PID 9897 started at Wed Oct 18 15:15:47 UTC 2023 Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:47 UTC 2023 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:47 UTC 2023 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:48 UTC 2023 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:48 UTC 2023 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:49 UTC 2023 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:49 UTC 2023 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:49 UTC 2023 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:50 UTC 2023 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:50 UTC 2023 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:50 UTC 2023 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:51 UTC 2023 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:51 UTC 2023 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:52 UTC 2023 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:52 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:52 UTC 2023 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:53 UTC 2023 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:53 UTC 2023 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:53 UTC 2023 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:54 UTC 2023 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:54 UTC 2023 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:54 UTC 2023 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:55 UTC 2023 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:55 UTC 2023 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:56 UTC 2023 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:56 UTC 2023 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:56 UTC 2023 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:57 UTC 2023 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:57 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:57 UTC 2023 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:58 UTC 2023 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:58 UTC 2023 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:59 UTC 2023 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:59 UTC 2023 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:15:59 UTC 2023 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:16:00 UTC 2023 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:16:00 UTC 2023 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:16:00 UTC 2023 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:16:01 UTC 2023 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:16:01 UTC 2023 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:16:02 UTC 2023 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 9897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9897 found at Wed Oct 18 15:16:02 UTC 2023 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 9897 at Wed Oct 18 15:16:02 UTC 2023 kill -USR1 9897 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9897 killed at Wed Oct 18 15:16:02 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:16:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:16:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:02 UTC 2023 selfserv_9997 with PID 11156 started at Wed Oct 18 15:16:02 UTC 2023 Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:03 UTC 2023 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:03 UTC 2023 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:03 UTC 2023 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:03 UTC 2023 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:04 UTC 2023 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:04 UTC 2023 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:04 UTC 2023 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:05 UTC 2023 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:05 UTC 2023 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:05 UTC 2023 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:05 UTC 2023 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:06 UTC 2023 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:06 UTC 2023 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:06 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:07 UTC 2023 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:07 UTC 2023 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:07 UTC 2023 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:07 UTC 2023 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:08 UTC 2023 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:08 UTC 2023 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:08 UTC 2023 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:08 UTC 2023 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:09 UTC 2023 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:09 UTC 2023 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:09 UTC 2023 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:09 UTC 2023 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:10 UTC 2023 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:10 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:10 UTC 2023 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:11 UTC 2023 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:11 UTC 2023 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:11 UTC 2023 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:11 UTC 2023 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:12 UTC 2023 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:12 UTC 2023 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:12 UTC 2023 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:12 UTC 2023 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:13 UTC 2023 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:13 UTC 2023 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:13 UTC 2023 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 11156 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11156 found at Wed Oct 18 15:16:13 UTC 2023 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 11156 at Wed Oct 18 15:16:13 UTC 2023 kill -USR1 11156 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11156 killed at Wed Oct 18 15:16:13 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:16:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:16:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:14 UTC 2023 selfserv_9997 with PID 12416 started at Wed Oct 18 15:16:14 UTC 2023 Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:14 UTC 2023 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:14 UTC 2023 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:14 UTC 2023 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:15 UTC 2023 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:15 UTC 2023 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:15 UTC 2023 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:15 UTC 2023 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:15 UTC 2023 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:16 UTC 2023 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:16 UTC 2023 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:16 UTC 2023 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:16 UTC 2023 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:17 UTC 2023 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:17 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:17 UTC 2023 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:17 UTC 2023 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:17 UTC 2023 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:18 UTC 2023 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:18 UTC 2023 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:18 UTC 2023 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:18 UTC 2023 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:19 UTC 2023 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:19 UTC 2023 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:19 UTC 2023 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:19 UTC 2023 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:20 UTC 2023 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:20 UTC 2023 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:20 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:20 UTC 2023 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:20 UTC 2023 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:21 UTC 2023 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:21 UTC 2023 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:21 UTC 2023 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:21 UTC 2023 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:21 UTC 2023 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:22 UTC 2023 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:22 UTC 2023 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:22 UTC 2023 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:22 UTC 2023 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:22 UTC 2023 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 15:16:23 UTC 2023 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 12416 at Wed Oct 18 15:16:23 UTC 2023 kill -USR1 12416 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12416 killed at Wed Oct 18 15:16:23 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:16:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:16:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:23 UTC 2023 selfserv_9997 with PID 13674 started at Wed Oct 18 15:16:23 UTC 2023 Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:23 UTC 2023 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:24 UTC 2023 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:24 UTC 2023 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:24 UTC 2023 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:25 UTC 2023 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:25 UTC 2023 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:25 UTC 2023 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:26 UTC 2023 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:26 UTC 2023 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:26 UTC 2023 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:27 UTC 2023 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:27 UTC 2023 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:28 UTC 2023 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:28 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:28 UTC 2023 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:28 UTC 2023 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:29 UTC 2023 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:29 UTC 2023 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:29 UTC 2023 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:30 UTC 2023 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:30 UTC 2023 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:30 UTC 2023 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:31 UTC 2023 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:31 UTC 2023 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:31 UTC 2023 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:32 UTC 2023 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:32 UTC 2023 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:32 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:33 UTC 2023 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:33 UTC 2023 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:33 UTC 2023 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:33 UTC 2023 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:34 UTC 2023 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:34 UTC 2023 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:34 UTC 2023 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:35 UTC 2023 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:35 UTC 2023 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:35 UTC 2023 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:36 UTC 2023 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:36 UTC 2023 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 13674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13674 found at Wed Oct 18 15:16:36 UTC 2023 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 13674 at Wed Oct 18 15:16:36 UTC 2023 kill -USR1 13674 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13674 killed at Wed Oct 18 15:16:36 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:16:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:16:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14935 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14935 found at Wed Oct 18 15:16:37 UTC 2023 selfserv_9997 with PID 14935 started at Wed Oct 18 15:16:37 UTC 2023 trying to kill selfserv_9997 with PID 14935 at Wed Oct 18 15:16:37 UTC 2023 kill -USR1 14935 ./ssl.sh: line 228: 14935 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9997 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14935 killed at Wed Oct 18 15:16:37 UTC 2023 selfserv_9997 starting at Wed Oct 18 15:16:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:16:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:37 UTC 2023 selfserv_9997 with PID 14978 started at Wed Oct 18 15:16:37 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:37 UTC 2023 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:38 UTC 2023 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:38 UTC 2023 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:39 UTC 2023 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:39 UTC 2023 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:40 UTC 2023 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:40 UTC 2023 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:40 UTC 2023 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:41 UTC 2023 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:41 UTC 2023 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:42 UTC 2023 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:42 UTC 2023 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:43 UTC 2023 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:43 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:43 UTC 2023 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:44 UTC 2023 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:44 UTC 2023 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:45 UTC 2023 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:45 UTC 2023 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:46 UTC 2023 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:46 UTC 2023 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:46 UTC 2023 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:47 UTC 2023 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:47 UTC 2023 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:48 UTC 2023 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:48 UTC 2023 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:49 UTC 2023 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:49 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:49 UTC 2023 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:50 UTC 2023 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:50 UTC 2023 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:51 UTC 2023 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:51 UTC 2023 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:51 UTC 2023 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:52 UTC 2023 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:52 UTC 2023 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:53 UTC 2023 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:53 UTC 2023 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:54 UTC 2023 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:54 UTC 2023 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 14978 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14978 found at Wed Oct 18 15:16:54 UTC 2023 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14978 at Wed Oct 18 15:16:54 UTC 2023 kill -USR1 14978 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14978 killed at Wed Oct 18 15:16:54 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:16:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:16:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:16:55 UTC 2023 selfserv_9997 with PID 16254 started at Wed Oct 18 15:16:55 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:16:55 UTC 2023 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:16:56 UTC 2023 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:16:56 UTC 2023 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:16:57 UTC 2023 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:16:57 UTC 2023 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:16:58 UTC 2023 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:16:58 UTC 2023 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:16:59 UTC 2023 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:16:59 UTC 2023 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:16:59 UTC 2023 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:00 UTC 2023 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:00 UTC 2023 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:01 UTC 2023 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:01 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:02 UTC 2023 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:02 UTC 2023 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:03 UTC 2023 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:03 UTC 2023 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:04 UTC 2023 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:04 UTC 2023 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:04 UTC 2023 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:05 UTC 2023 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:05 UTC 2023 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:06 UTC 2023 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:06 UTC 2023 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:07 UTC 2023 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:07 UTC 2023 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:08 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:08 UTC 2023 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:09 UTC 2023 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:09 UTC 2023 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:10 UTC 2023 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:10 UTC 2023 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:10 UTC 2023 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:11 UTC 2023 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:11 UTC 2023 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:12 UTC 2023 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:12 UTC 2023 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:13 UTC 2023 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:13 UTC 2023 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 16254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16254 found at Wed Oct 18 15:17:14 UTC 2023 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16254 at Wed Oct 18 15:17:14 UTC 2023 kill -USR1 16254 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16254 killed at Wed Oct 18 15:17:14 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:17:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:17:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:14 UTC 2023 selfserv_9997 with PID 17513 started at Wed Oct 18 15:17:14 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:14 UTC 2023 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:15 UTC 2023 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:15 UTC 2023 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:15 UTC 2023 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:16 UTC 2023 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:16 UTC 2023 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:16 UTC 2023 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:17 UTC 2023 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:17 UTC 2023 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:17 UTC 2023 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:17 UTC 2023 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:18 UTC 2023 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:18 UTC 2023 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:19 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:19 UTC 2023 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:19 UTC 2023 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:19 UTC 2023 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:20 UTC 2023 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:20 UTC 2023 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:20 UTC 2023 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:21 UTC 2023 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:21 UTC 2023 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:21 UTC 2023 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:22 UTC 2023 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:22 UTC 2023 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:22 UTC 2023 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:23 UTC 2023 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:23 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:23 UTC 2023 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:24 UTC 2023 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:24 UTC 2023 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:24 UTC 2023 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:25 UTC 2023 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:25 UTC 2023 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:25 UTC 2023 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:25 UTC 2023 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:26 UTC 2023 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:26 UTC 2023 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:26 UTC 2023 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:27 UTC 2023 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 17513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17513 found at Wed Oct 18 15:17:27 UTC 2023 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17513 at Wed Oct 18 15:17:27 UTC 2023 kill -USR1 17513 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17513 killed at Wed Oct 18 15:17:27 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:17:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:17:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:27 UTC 2023 selfserv_9997 with PID 18778 started at Wed Oct 18 15:17:27 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:28 UTC 2023 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:28 UTC 2023 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:28 UTC 2023 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:29 UTC 2023 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:29 UTC 2023 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:29 UTC 2023 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:29 UTC 2023 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:30 UTC 2023 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:30 UTC 2023 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:30 UTC 2023 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:30 UTC 2023 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:31 UTC 2023 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:31 UTC 2023 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:31 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:32 UTC 2023 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:32 UTC 2023 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:32 UTC 2023 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:32 UTC 2023 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:33 UTC 2023 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:33 UTC 2023 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:33 UTC 2023 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:33 UTC 2023 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:34 UTC 2023 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:34 UTC 2023 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:34 UTC 2023 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:35 UTC 2023 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:35 UTC 2023 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:35 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:35 UTC 2023 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:36 UTC 2023 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:36 UTC 2023 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:36 UTC 2023 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:36 UTC 2023 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:37 UTC 2023 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:37 UTC 2023 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:37 UTC 2023 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:37 UTC 2023 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:38 UTC 2023 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:38 UTC 2023 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:38 UTC 2023 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 18778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18778 found at Wed Oct 18 15:17:38 UTC 2023 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18778 at Wed Oct 18 15:17:38 UTC 2023 kill -USR1 18778 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18778 killed at Wed Oct 18 15:17:38 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:17:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:17:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:39 UTC 2023 selfserv_9997 with PID 20038 started at Wed Oct 18 15:17:39 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:39 UTC 2023 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:39 UTC 2023 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:40 UTC 2023 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:40 UTC 2023 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:40 UTC 2023 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:41 UTC 2023 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:41 UTC 2023 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:41 UTC 2023 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:42 UTC 2023 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:42 UTC 2023 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:42 UTC 2023 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:43 UTC 2023 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:43 UTC 2023 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:43 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:43 UTC 2023 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:44 UTC 2023 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:44 UTC 2023 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:44 UTC 2023 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:45 UTC 2023 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:45 UTC 2023 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:45 UTC 2023 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:45 UTC 2023 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:46 UTC 2023 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:46 UTC 2023 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:46 UTC 2023 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:47 UTC 2023 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:47 UTC 2023 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:47 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:48 UTC 2023 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:48 UTC 2023 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:48 UTC 2023 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:48 UTC 2023 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:49 UTC 2023 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:49 UTC 2023 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:49 UTC 2023 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:50 UTC 2023 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:50 UTC 2023 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:50 UTC 2023 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:51 UTC 2023 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:51 UTC 2023 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20038 found at Wed Oct 18 15:17:51 UTC 2023 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20038 at Wed Oct 18 15:17:51 UTC 2023 kill -USR1 20038 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20038 killed at Wed Oct 18 15:17:51 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:17:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:17:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:51 UTC 2023 selfserv_9997 with PID 21314 started at Wed Oct 18 15:17:51 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:52 UTC 2023 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:52 UTC 2023 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:53 UTC 2023 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:53 UTC 2023 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:54 UTC 2023 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:54 UTC 2023 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:54 UTC 2023 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:55 UTC 2023 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:55 UTC 2023 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:55 UTC 2023 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:56 UTC 2023 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:56 UTC 2023 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:57 UTC 2023 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:57 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:57 UTC 2023 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:58 UTC 2023 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:58 UTC 2023 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:58 UTC 2023 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:59 UTC 2023 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:59 UTC 2023 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:17:59 UTC 2023 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:18:00 UTC 2023 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:18:00 UTC 2023 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:18:01 UTC 2023 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:18:01 UTC 2023 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:18:01 UTC 2023 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:18:02 UTC 2023 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:18:02 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:18:02 UTC 2023 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:18:03 UTC 2023 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:18:03 UTC 2023 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:18:03 UTC 2023 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:18:04 UTC 2023 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:18:04 UTC 2023 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:18:05 UTC 2023 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:18:05 UTC 2023 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:18:05 UTC 2023 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:18:06 UTC 2023 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:18:06 UTC 2023 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:18:06 UTC 2023 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21314 found at Wed Oct 18 15:18:07 UTC 2023 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 21314 at Wed Oct 18 15:18:07 UTC 2023 kill -USR1 21314 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21314 killed at Wed Oct 18 15:18:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:18:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:18:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22576 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22576 found at Wed Oct 18 15:18:07 UTC 2023 selfserv_9997 with PID 22576 started at Wed Oct 18 15:18:07 UTC 2023 trying to kill selfserv_9997 with PID 22576 at Wed Oct 18 15:18:07 UTC 2023 kill -USR1 22576 ./ssl.sh: line 228: 22576 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9997 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22576 killed at Wed Oct 18 15:18:07 UTC 2023 selfserv_9997 starting at Wed Oct 18 15:18:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:18:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:07 UTC 2023 selfserv_9997 with PID 22618 started at Wed Oct 18 15:18:07 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:08 UTC 2023 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:08 UTC 2023 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:09 UTC 2023 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:09 UTC 2023 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:10 UTC 2023 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:10 UTC 2023 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:10 UTC 2023 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:11 UTC 2023 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:11 UTC 2023 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:12 UTC 2023 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:12 UTC 2023 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:13 UTC 2023 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:13 UTC 2023 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:13 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:14 UTC 2023 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:14 UTC 2023 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:15 UTC 2023 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:15 UTC 2023 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:16 UTC 2023 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:16 UTC 2023 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:16 UTC 2023 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:17 UTC 2023 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:17 UTC 2023 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:18 UTC 2023 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:18 UTC 2023 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:18 UTC 2023 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:19 UTC 2023 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:19 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:20 UTC 2023 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:20 UTC 2023 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:21 UTC 2023 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:21 UTC 2023 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:21 UTC 2023 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:22 UTC 2023 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:22 UTC 2023 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:23 UTC 2023 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:23 UTC 2023 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:24 UTC 2023 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:24 UTC 2023 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:24 UTC 2023 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22618 found at Wed Oct 18 15:18:25 UTC 2023 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22618 at Wed Oct 18 15:18:25 UTC 2023 kill -USR1 22618 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22618 killed at Wed Oct 18 15:18:25 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:18:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:18:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:25 UTC 2023 selfserv_9997 with PID 23882 started at Wed Oct 18 15:18:25 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:26 UTC 2023 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:26 UTC 2023 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:27 UTC 2023 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:27 UTC 2023 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:28 UTC 2023 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:28 UTC 2023 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:28 UTC 2023 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:29 UTC 2023 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:29 UTC 2023 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:30 UTC 2023 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:30 UTC 2023 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:31 UTC 2023 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:31 UTC 2023 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:32 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:32 UTC 2023 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:33 UTC 2023 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:33 UTC 2023 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:33 UTC 2023 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:34 UTC 2023 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:34 UTC 2023 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:35 UTC 2023 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:35 UTC 2023 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:36 UTC 2023 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:36 UTC 2023 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:37 UTC 2023 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:37 UTC 2023 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:38 UTC 2023 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:38 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:38 UTC 2023 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:39 UTC 2023 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:39 UTC 2023 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:40 UTC 2023 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:40 UTC 2023 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:41 UTC 2023 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:41 UTC 2023 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:42 UTC 2023 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:42 UTC 2023 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:43 UTC 2023 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:43 UTC 2023 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:43 UTC 2023 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23882 found at Wed Oct 18 15:18:44 UTC 2023 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23882 at Wed Oct 18 15:18:44 UTC 2023 kill -USR1 23882 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23882 killed at Wed Oct 18 15:18:44 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:18:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:18:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:44 UTC 2023 selfserv_9997 with PID 25161 started at Wed Oct 18 15:18:44 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:45 UTC 2023 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:45 UTC 2023 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:45 UTC 2023 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:46 UTC 2023 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:46 UTC 2023 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:46 UTC 2023 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:47 UTC 2023 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:47 UTC 2023 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:47 UTC 2023 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:47 UTC 2023 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:48 UTC 2023 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:48 UTC 2023 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:48 UTC 2023 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:49 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:49 UTC 2023 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:49 UTC 2023 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:50 UTC 2023 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:50 UTC 2023 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:50 UTC 2023 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:51 UTC 2023 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:51 UTC 2023 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:51 UTC 2023 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:52 UTC 2023 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:52 UTC 2023 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:52 UTC 2023 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:53 UTC 2023 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:53 UTC 2023 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:53 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:54 UTC 2023 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:54 UTC 2023 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:54 UTC 2023 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:54 UTC 2023 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:55 UTC 2023 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:55 UTC 2023 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:55 UTC 2023 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:56 UTC 2023 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:56 UTC 2023 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:56 UTC 2023 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:57 UTC 2023 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:57 UTC 2023 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25161 found at Wed Oct 18 15:18:57 UTC 2023 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25161 at Wed Oct 18 15:18:57 UTC 2023 kill -USR1 25161 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25161 killed at Wed Oct 18 15:18:57 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:18:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:18:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:18:57 UTC 2023 selfserv_9997 with PID 26423 started at Wed Oct 18 15:18:57 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:18:58 UTC 2023 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:18:58 UTC 2023 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:18:58 UTC 2023 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:18:59 UTC 2023 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:18:59 UTC 2023 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:18:59 UTC 2023 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:00 UTC 2023 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:00 UTC 2023 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:00 UTC 2023 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:00 UTC 2023 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:01 UTC 2023 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:01 UTC 2023 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:01 UTC 2023 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:02 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:02 UTC 2023 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:02 UTC 2023 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:02 UTC 2023 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:03 UTC 2023 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:03 UTC 2023 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:03 UTC 2023 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:03 UTC 2023 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:04 UTC 2023 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:04 UTC 2023 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:04 UTC 2023 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:04 UTC 2023 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:05 UTC 2023 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:05 UTC 2023 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:05 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:06 UTC 2023 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:06 UTC 2023 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:06 UTC 2023 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:06 UTC 2023 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:07 UTC 2023 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:07 UTC 2023 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:07 UTC 2023 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:07 UTC 2023 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:08 UTC 2023 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:08 UTC 2023 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:08 UTC 2023 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:08 UTC 2023 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26423 found at Wed Oct 18 15:19:09 UTC 2023 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 26423 at Wed Oct 18 15:19:09 UTC 2023 kill -USR1 26423 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26423 killed at Wed Oct 18 15:19:09 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:19:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:19:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:09 UTC 2023 selfserv_9997 with PID 27684 started at Wed Oct 18 15:19:09 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:09 UTC 2023 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:10 UTC 2023 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:10 UTC 2023 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:10 UTC 2023 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:11 UTC 2023 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:11 UTC 2023 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:11 UTC 2023 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:12 UTC 2023 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:12 UTC 2023 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:12 UTC 2023 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:12 UTC 2023 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:13 UTC 2023 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:13 UTC 2023 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:13 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:14 UTC 2023 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:14 UTC 2023 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:14 UTC 2023 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:15 UTC 2023 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:15 UTC 2023 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:15 UTC 2023 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:15 UTC 2023 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:16 UTC 2023 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:16 UTC 2023 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:16 UTC 2023 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:17 UTC 2023 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:17 UTC 2023 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:17 UTC 2023 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:18 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:18 UTC 2023 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:18 UTC 2023 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:18 UTC 2023 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:19 UTC 2023 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:19 UTC 2023 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:19 UTC 2023 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:20 UTC 2023 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:20 UTC 2023 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:20 UTC 2023 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:20 UTC 2023 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:21 UTC 2023 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:21 UTC 2023 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27684 found at Wed Oct 18 15:19:21 UTC 2023 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27684 at Wed Oct 18 15:19:21 UTC 2023 kill -USR1 27684 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27684 killed at Wed Oct 18 15:19:21 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:19:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:19:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:22 UTC 2023 selfserv_9997 with PID 28949 started at Wed Oct 18 15:19:22 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:22 UTC 2023 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:23 UTC 2023 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:23 UTC 2023 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:23 UTC 2023 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:24 UTC 2023 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:24 UTC 2023 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:24 UTC 2023 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:25 UTC 2023 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:25 UTC 2023 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:26 UTC 2023 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:26 UTC 2023 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:26 UTC 2023 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:27 UTC 2023 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:27 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:27 UTC 2023 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:28 UTC 2023 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:28 UTC 2023 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:28 UTC 2023 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:29 UTC 2023 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:29 UTC 2023 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:30 UTC 2023 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:30 UTC 2023 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:30 UTC 2023 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:31 UTC 2023 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:31 UTC 2023 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:31 UTC 2023 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:32 UTC 2023 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:32 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:32 UTC 2023 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:33 UTC 2023 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:33 UTC 2023 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:34 UTC 2023 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:34 UTC 2023 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:34 UTC 2023 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:35 UTC 2023 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:35 UTC 2023 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:35 UTC 2023 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:36 UTC 2023 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:36 UTC 2023 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:37 UTC 2023 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28949 found at Wed Oct 18 15:19:37 UTC 2023 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28949 at Wed Oct 18 15:19:37 UTC 2023 kill -USR1 28949 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28949 killed at Wed Oct 18 15:19:37 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:19:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:19:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30212 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30212 found at Wed Oct 18 15:19:37 UTC 2023 selfserv_9997 with PID 30212 started at Wed Oct 18 15:19:37 UTC 2023 trying to kill selfserv_9997 with PID 30212 at Wed Oct 18 15:19:37 UTC 2023 kill -USR1 30212 ./ssl.sh: line 228: 30212 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9997 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30212 killed at Wed Oct 18 15:19:37 UTC 2023 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9997 starting at Wed Oct 18 15:19:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:19:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 30257 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30257 found at Wed Oct 18 15:19:37 UTC 2023 selfserv_9997 with PID 30257 started at Wed Oct 18 15:19:37 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #657: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #658: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #659: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #660: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #661: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #662: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #663: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 30257 at Wed Oct 18 15:19:46 UTC 2023 kill -USR1 30257 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30257 killed at Wed Oct 18 15:19:46 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 15:19:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:19:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 30823 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30823 found at Wed Oct 18 15:19:46 UTC 2023 selfserv_9997 with PID 30823 started at Wed Oct 18 15:19:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30823 at Wed Oct 18 15:19:59 UTC 2023 kill -USR1 30823 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30823 killed at Wed Oct 18 15:19:59 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9997 starting at Wed Oct 18 15:19:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:19:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31622 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31622 found at Wed Oct 18 15:19:59 UTC 2023 selfserv_9997 with PID 31622 started at Wed Oct 18 15:19:59 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31622 at Wed Oct 18 15:20:00 UTC 2023 kill -USR1 31622 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31622 killed at Wed Oct 18 15:20:00 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31688 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31688 found at Wed Oct 18 15:20:00 UTC 2023 selfserv_9997 with PID 31688 started at Wed Oct 18 15:20:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #784: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31688 at Wed Oct 18 15:20:00 UTC 2023 kill -USR1 31688 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31688 killed at Wed Oct 18 15:20:00 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:20:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31740 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31740 found at Wed Oct 18 15:20:01 UTC 2023 selfserv_9997 with PID 31740 started at Wed Oct 18 15:20:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #785: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31740 at Wed Oct 18 15:20:01 UTC 2023 kill -USR1 31740 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31740 killed at Wed Oct 18 15:20:01 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31792 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31792 found at Wed Oct 18 15:20:01 UTC 2023 selfserv_9997 with PID 31792 started at Wed Oct 18 15:20:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #786: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31792 at Wed Oct 18 15:20:02 UTC 2023 kill -USR1 31792 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31792 killed at Wed Oct 18 15:20:02 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31844 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31844 found at Wed Oct 18 15:20:02 UTC 2023 selfserv_9997 with PID 31844 started at Wed Oct 18 15:20:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #787: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 31844 at Wed Oct 18 15:20:03 UTC 2023 kill -USR1 31844 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31844 killed at Wed Oct 18 15:20:03 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:20:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31897 found at Wed Oct 18 15:20:03 UTC 2023 selfserv_9997 with PID 31897 started at Wed Oct 18 15:20:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #788: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 31897 at Wed Oct 18 15:20:03 UTC 2023 kill -USR1 31897 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31897 killed at Wed Oct 18 15:20:03 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31949 found at Wed Oct 18 15:20:04 UTC 2023 selfserv_9997 with PID 31949 started at Wed Oct 18 15:20:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #789: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31949 at Wed Oct 18 15:20:04 UTC 2023 kill -USR1 31949 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31949 killed at Wed Oct 18 15:20:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32001 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32001 found at Wed Oct 18 15:20:04 UTC 2023 selfserv_9997 with PID 32001 started at Wed Oct 18 15:20:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32001 at Wed Oct 18 15:20:05 UTC 2023 kill -USR1 32001 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32001 killed at Wed Oct 18 15:20:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:20:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32054 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32054 found at Wed Oct 18 15:20:05 UTC 2023 selfserv_9997 with PID 32054 started at Wed Oct 18 15:20:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32054 at Wed Oct 18 15:20:06 UTC 2023 kill -USR1 32054 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32054 killed at Wed Oct 18 15:20:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32106 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32106 found at Wed Oct 18 15:20:06 UTC 2023 selfserv_9997 with PID 32106 started at Wed Oct 18 15:20:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32106 at Wed Oct 18 15:20:06 UTC 2023 kill -USR1 32106 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32106 killed at Wed Oct 18 15:20:07 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32158 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32158 found at Wed Oct 18 15:20:07 UTC 2023 selfserv_9997 with PID 32158 started at Wed Oct 18 15:20:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #793: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 32158 at Wed Oct 18 15:20:07 UTC 2023 kill -USR1 32158 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32158 killed at Wed Oct 18 15:20:07 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:20:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32211 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32211 found at Wed Oct 18 15:20:08 UTC 2023 selfserv_9997 with PID 32211 started at Wed Oct 18 15:20:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 32211 at Wed Oct 18 15:20:08 UTC 2023 kill -USR1 32211 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32211 killed at Wed Oct 18 15:20:08 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32263 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32263 found at Wed Oct 18 15:20:08 UTC 2023 selfserv_9997 with PID 32263 started at Wed Oct 18 15:20:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32263 at Wed Oct 18 15:20:09 UTC 2023 kill -USR1 32263 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32263 killed at Wed Oct 18 15:20:09 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32315 found at Wed Oct 18 15:20:09 UTC 2023 selfserv_9997 with PID 32315 started at Wed Oct 18 15:20:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32315 at Wed Oct 18 15:20:10 UTC 2023 kill -USR1 32315 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32315 killed at Wed Oct 18 15:20:10 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:20:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32367 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32367 found at Wed Oct 18 15:20:10 UTC 2023 selfserv_9997 with PID 32367 started at Wed Oct 18 15:20:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32367 at Wed Oct 18 15:20:10 UTC 2023 kill -USR1 32367 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32367 killed at Wed Oct 18 15:20:10 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32419 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32419 found at Wed Oct 18 15:20:11 UTC 2023 selfserv_9997 with PID 32419 started at Wed Oct 18 15:20:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32419 at Wed Oct 18 15:20:11 UTC 2023 kill -USR1 32419 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32419 killed at Wed Oct 18 15:20:11 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32472 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32472 found at Wed Oct 18 15:20:11 UTC 2023 selfserv_9997 with PID 32472 started at Wed Oct 18 15:20:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 32472 at Wed Oct 18 15:20:12 UTC 2023 kill -USR1 32472 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32472 killed at Wed Oct 18 15:20:12 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:20:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32524 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32524 found at Wed Oct 18 15:20:12 UTC 2023 selfserv_9997 with PID 32524 started at Wed Oct 18 15:20:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 32524 at Wed Oct 18 15:20:13 UTC 2023 kill -USR1 32524 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32524 killed at Wed Oct 18 15:20:13 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32576 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32576 found at Wed Oct 18 15:20:13 UTC 2023 selfserv_9997 with PID 32576 started at Wed Oct 18 15:20:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32576 at Wed Oct 18 15:20:14 UTC 2023 kill -USR1 32576 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32576 killed at Wed Oct 18 15:20:14 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32628 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32628 found at Wed Oct 18 15:20:14 UTC 2023 selfserv_9997 with PID 32628 started at Wed Oct 18 15:20:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32628 at Wed Oct 18 15:20:15 UTC 2023 kill -USR1 32628 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32628 killed at Wed Oct 18 15:20:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:20:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32680 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32680 found at Wed Oct 18 15:20:15 UTC 2023 selfserv_9997 with PID 32680 started at Wed Oct 18 15:20:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32680 at Wed Oct 18 15:20:15 UTC 2023 kill -USR1 32680 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32680 killed at Wed Oct 18 15:20:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32732 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32732 found at Wed Oct 18 15:20:16 UTC 2023 selfserv_9997 with PID 32732 started at Wed Oct 18 15:20:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32732 at Wed Oct 18 15:20:16 UTC 2023 kill -USR1 32732 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32732 killed at Wed Oct 18 15:20:16 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 316 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 316 found at Wed Oct 18 15:20:17 UTC 2023 selfserv_9997 with PID 316 started at Wed Oct 18 15:20:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 316 at Wed Oct 18 15:20:17 UTC 2023 kill -USR1 316 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 316 killed at Wed Oct 18 15:20:17 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:20:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 368 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 368 found at Wed Oct 18 15:20:17 UTC 2023 selfserv_9997 with PID 368 started at Wed Oct 18 15:20:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 368 at Wed Oct 18 15:20:18 UTC 2023 kill -USR1 368 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 368 killed at Wed Oct 18 15:20:18 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 420 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 420 found at Wed Oct 18 15:20:18 UTC 2023 selfserv_9997 with PID 420 started at Wed Oct 18 15:20:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 420 at Wed Oct 18 15:20:19 UTC 2023 kill -USR1 420 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 420 killed at Wed Oct 18 15:20:19 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 473 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 473 found at Wed Oct 18 15:20:19 UTC 2023 selfserv_9997 with PID 473 started at Wed Oct 18 15:20:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 473 at Wed Oct 18 15:20:20 UTC 2023 kill -USR1 473 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 473 killed at Wed Oct 18 15:20:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:20:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 529 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 529 found at Wed Oct 18 15:20:20 UTC 2023 selfserv_9997 with PID 529 started at Wed Oct 18 15:20:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 529 at Wed Oct 18 15:20:20 UTC 2023 kill -USR1 529 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 529 killed at Wed Oct 18 15:20:20 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 586 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 586 found at Wed Oct 18 15:20:21 UTC 2023 selfserv_9997 with PID 586 started at Wed Oct 18 15:20:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 586 at Wed Oct 18 15:20:21 UTC 2023 kill -USR1 586 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 586 killed at Wed Oct 18 15:20:21 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 641 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 641 found at Wed Oct 18 15:20:21 UTC 2023 selfserv_9997 with PID 641 started at Wed Oct 18 15:20:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #811: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 641 at Wed Oct 18 15:20:22 UTC 2023 kill -USR1 641 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 641 killed at Wed Oct 18 15:20:22 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:20:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 700 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 700 found at Wed Oct 18 15:20:22 UTC 2023 selfserv_9997 with PID 700 started at Wed Oct 18 15:20:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 700 at Wed Oct 18 15:20:23 UTC 2023 kill -USR1 700 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 700 killed at Wed Oct 18 15:20:23 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 761 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 761 found at Wed Oct 18 15:20:23 UTC 2023 selfserv_9997 with PID 761 started at Wed Oct 18 15:20:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 761 at Wed Oct 18 15:20:24 UTC 2023 kill -USR1 761 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 761 killed at Wed Oct 18 15:20:24 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 831 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 831 found at Wed Oct 18 15:20:24 UTC 2023 selfserv_9997 with PID 831 started at Wed Oct 18 15:20:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 831 at Wed Oct 18 15:20:24 UTC 2023 kill -USR1 831 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 831 killed at Wed Oct 18 15:20:24 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 901 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 901 found at Wed Oct 18 15:20:24 UTC 2023 selfserv_9997 with PID 901 started at Wed Oct 18 15:20:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 901 at Wed Oct 18 15:20:25 UTC 2023 kill -USR1 901 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 901 killed at Wed Oct 18 15:20:25 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 956 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 956 found at Wed Oct 18 15:20:25 UTC 2023 selfserv_9997 with PID 956 started at Wed Oct 18 15:20:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 956 at Wed Oct 18 15:20:26 UTC 2023 kill -USR1 956 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 956 killed at Wed Oct 18 15:20:26 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1008 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1008 found at Wed Oct 18 15:20:26 UTC 2023 selfserv_9997 with PID 1008 started at Wed Oct 18 15:20:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #817: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1008 at Wed Oct 18 15:20:27 UTC 2023 kill -USR1 1008 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1008 killed at Wed Oct 18 15:20:27 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1061 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1061 found at Wed Oct 18 15:20:27 UTC 2023 selfserv_9997 with PID 1061 started at Wed Oct 18 15:20:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #818: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1061 at Wed Oct 18 15:20:27 UTC 2023 kill -USR1 1061 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1061 killed at Wed Oct 18 15:20:27 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1114 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1114 found at Wed Oct 18 15:20:27 UTC 2023 selfserv_9997 with PID 1114 started at Wed Oct 18 15:20:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1114 at Wed Oct 18 15:20:28 UTC 2023 kill -USR1 1114 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1114 killed at Wed Oct 18 15:20:28 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:20:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1187 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1187 found at Wed Oct 18 15:20:28 UTC 2023 selfserv_9997 with PID 1187 started at Wed Oct 18 15:20:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1187 at Wed Oct 18 15:20:29 UTC 2023 kill -USR1 1187 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1187 killed at Wed Oct 18 15:20:29 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1241 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1241 found at Wed Oct 18 15:20:29 UTC 2023 selfserv_9997 with PID 1241 started at Wed Oct 18 15:20:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #821: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1241 at Wed Oct 18 15:20:29 UTC 2023 kill -USR1 1241 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1241 killed at Wed Oct 18 15:20:29 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:20:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1302 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1302 found at Wed Oct 18 15:20:30 UTC 2023 selfserv_9997 with PID 1302 started at Wed Oct 18 15:20:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #822: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1302 at Wed Oct 18 15:20:30 UTC 2023 kill -USR1 1302 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1302 killed at Wed Oct 18 15:20:30 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1355 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1355 found at Wed Oct 18 15:20:30 UTC 2023 selfserv_9997 with PID 1355 started at Wed Oct 18 15:20:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #823: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1355 at Wed Oct 18 15:20:31 UTC 2023 kill -USR1 1355 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1355 killed at Wed Oct 18 15:20:31 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:20:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1408 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1408 found at Wed Oct 18 15:20:31 UTC 2023 selfserv_9997 with PID 1408 started at Wed Oct 18 15:20:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1408 at Wed Oct 18 15:20:31 UTC 2023 kill -USR1 1408 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1408 killed at Wed Oct 18 15:20:31 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1460 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1460 found at Wed Oct 18 15:20:32 UTC 2023 selfserv_9997 with PID 1460 started at Wed Oct 18 15:20:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1460 at Wed Oct 18 15:20:32 UTC 2023 kill -USR1 1460 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1460 killed at Wed Oct 18 15:20:32 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:20:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1512 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1512 found at Wed Oct 18 15:20:33 UTC 2023 selfserv_9997 with PID 1512 started at Wed Oct 18 15:20:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #826: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1512 at Wed Oct 18 15:20:33 UTC 2023 kill -USR1 1512 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1512 killed at Wed Oct 18 15:20:33 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1564 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1564 found at Wed Oct 18 15:20:33 UTC 2023 selfserv_9997 with PID 1564 started at Wed Oct 18 15:20:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1564 at Wed Oct 18 15:20:34 UTC 2023 kill -USR1 1564 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1564 killed at Wed Oct 18 15:20:34 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:20:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1616 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1616 found at Wed Oct 18 15:20:34 UTC 2023 selfserv_9997 with PID 1616 started at Wed Oct 18 15:20:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #828: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1616 at Wed Oct 18 15:20:34 UTC 2023 kill -USR1 1616 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1616 killed at Wed Oct 18 15:20:34 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1668 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1668 found at Wed Oct 18 15:20:35 UTC 2023 selfserv_9997 with PID 1668 started at Wed Oct 18 15:20:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1668 at Wed Oct 18 15:20:35 UTC 2023 kill -USR1 1668 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1668 killed at Wed Oct 18 15:20:35 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:20:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1720 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1720 found at Wed Oct 18 15:20:35 UTC 2023 selfserv_9997 with PID 1720 started at Wed Oct 18 15:20:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #830: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1720 at Wed Oct 18 15:20:36 UTC 2023 kill -USR1 1720 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1720 killed at Wed Oct 18 15:20:36 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 15:20:36 UTC 2023 selfserv_9997 with PID 1772 started at Wed Oct 18 15:20:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1772 at Wed Oct 18 15:20:37 UTC 2023 kill -USR1 1772 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1772 killed at Wed Oct 18 15:20:37 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:20:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1824 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1824 found at Wed Oct 18 15:20:37 UTC 2023 selfserv_9997 with PID 1824 started at Wed Oct 18 15:20:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #832: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1824 at Wed Oct 18 15:20:37 UTC 2023 kill -USR1 1824 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1824 killed at Wed Oct 18 15:20:37 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1876 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1876 found at Wed Oct 18 15:20:38 UTC 2023 selfserv_9997 with PID 1876 started at Wed Oct 18 15:20:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #833: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1876 at Wed Oct 18 15:20:38 UTC 2023 kill -USR1 1876 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1876 killed at Wed Oct 18 15:20:38 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:20:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1928 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1928 found at Wed Oct 18 15:20:38 UTC 2023 selfserv_9997 with PID 1928 started at Wed Oct 18 15:20:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #834: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1928 at Wed Oct 18 15:20:39 UTC 2023 kill -USR1 1928 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1928 killed at Wed Oct 18 15:20:39 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1980 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1980 found at Wed Oct 18 15:20:39 UTC 2023 selfserv_9997 with PID 1980 started at Wed Oct 18 15:20:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1980 at Wed Oct 18 15:20:40 UTC 2023 kill -USR1 1980 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1980 killed at Wed Oct 18 15:20:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:20:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2032 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2032 found at Wed Oct 18 15:20:40 UTC 2023 selfserv_9997 with PID 2032 started at Wed Oct 18 15:20:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #836: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2032 at Wed Oct 18 15:20:40 UTC 2023 kill -USR1 2032 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2032 killed at Wed Oct 18 15:20:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2085 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2085 found at Wed Oct 18 15:20:41 UTC 2023 selfserv_9997 with PID 2085 started at Wed Oct 18 15:20:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2085 at Wed Oct 18 15:20:41 UTC 2023 kill -USR1 2085 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2085 killed at Wed Oct 18 15:20:41 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:20:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2151 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2151 found at Wed Oct 18 15:20:41 UTC 2023 selfserv_9997 with PID 2151 started at Wed Oct 18 15:20:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #838: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2151 at Wed Oct 18 15:20:42 UTC 2023 kill -USR1 2151 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2151 killed at Wed Oct 18 15:20:42 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2203 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2203 found at Wed Oct 18 15:20:42 UTC 2023 selfserv_9997 with PID 2203 started at Wed Oct 18 15:20:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2203 at Wed Oct 18 15:20:43 UTC 2023 kill -USR1 2203 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2203 killed at Wed Oct 18 15:20:43 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2257 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2257 found at Wed Oct 18 15:20:43 UTC 2023 selfserv_9997 with PID 2257 started at Wed Oct 18 15:20:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #840: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2257 at Wed Oct 18 15:20:44 UTC 2023 kill -USR1 2257 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2257 killed at Wed Oct 18 15:20:44 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:20:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2309 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2309 found at Wed Oct 18 15:20:44 UTC 2023 selfserv_9997 with PID 2309 started at Wed Oct 18 15:20:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2309 at Wed Oct 18 15:20:45 UTC 2023 kill -USR1 2309 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2309 killed at Wed Oct 18 15:20:45 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 15:20:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2367 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2367 found at Wed Oct 18 15:20:45 UTC 2023 selfserv_9997 with PID 2367 started at Wed Oct 18 15:20:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2367 at Wed Oct 18 15:20:45 UTC 2023 kill -USR1 2367 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2367 killed at Wed Oct 18 15:20:45 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 15:20:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2425 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2425 found at Wed Oct 18 15:20:45 UTC 2023 selfserv_9997 with PID 2425 started at Wed Oct 18 15:20:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2425 at Wed Oct 18 15:20:46 UTC 2023 kill -USR1 2425 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2425 killed at Wed Oct 18 15:20:46 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 15:20:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2484 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2484 found at Wed Oct 18 15:20:46 UTC 2023 selfserv_9997 with PID 2484 started at Wed Oct 18 15:20:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #844: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2484 at Wed Oct 18 15:20:47 UTC 2023 kill -USR1 2484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2484 killed at Wed Oct 18 15:20:47 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 15:20:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2542 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2542 found at Wed Oct 18 15:20:47 UTC 2023 selfserv_9997 with PID 2542 started at Wed Oct 18 15:20:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #845: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2542 at Wed Oct 18 15:20:47 UTC 2023 kill -USR1 2542 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2542 killed at Wed Oct 18 15:20:47 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9997 starting at Wed Oct 18 15:20:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2600 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2600 found at Wed Oct 18 15:20:47 UTC 2023 selfserv_9997 with PID 2600 started at Wed Oct 18 15:20:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #846: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2600 at Wed Oct 18 15:20:48 UTC 2023 kill -USR1 2600 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2600 killed at Wed Oct 18 15:20:48 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 15:20:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2659 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2659 found at Wed Oct 18 15:20:48 UTC 2023 selfserv_9997 with PID 2659 started at Wed Oct 18 15:20:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2659 at Wed Oct 18 15:20:49 UTC 2023 kill -USR1 2659 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2659 killed at Wed Oct 18 15:20:49 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 15:20:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2717 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2717 found at Wed Oct 18 15:20:49 UTC 2023 selfserv_9997 with PID 2717 started at Wed Oct 18 15:20:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #848: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2717 at Wed Oct 18 15:20:49 UTC 2023 kill -USR1 2717 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2717 killed at Wed Oct 18 15:20:49 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9997 starting at Wed Oct 18 15:20:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2775 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2775 found at Wed Oct 18 15:20:50 UTC 2023 selfserv_9997 with PID 2775 started at Wed Oct 18 15:20:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #849: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2775 at Wed Oct 18 15:20:50 UTC 2023 kill -USR1 2775 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2775 killed at Wed Oct 18 15:20:50 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9997 starting at Wed Oct 18 15:20:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2833 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2833 found at Wed Oct 18 15:20:50 UTC 2023 selfserv_9997 with PID 2833 started at Wed Oct 18 15:20:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #850: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2833 at Wed Oct 18 15:20:51 UTC 2023 kill -USR1 2833 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2833 killed at Wed Oct 18 15:20:51 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 15:20:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2891 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2891 found at Wed Oct 18 15:20:51 UTC 2023 selfserv_9997 with PID 2891 started at Wed Oct 18 15:20:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #851: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2891 at Wed Oct 18 15:20:51 UTC 2023 kill -USR1 2891 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2891 killed at Wed Oct 18 15:20:51 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9997 starting at Wed Oct 18 15:20:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2935 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2935 found at Wed Oct 18 15:20:51 UTC 2023 selfserv_9997 with PID 2935 started at Wed Oct 18 15:20:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #784: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2935 at Wed Oct 18 15:20:52 UTC 2023 kill -USR1 2935 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2935 killed at Wed Oct 18 15:20:52 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9997 starting at Wed Oct 18 15:20:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2977 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2977 found at Wed Oct 18 15:20:52 UTC 2023 selfserv_9997 with PID 2977 started at Wed Oct 18 15:20:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #785: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9997 with PID 2977 at Wed Oct 18 15:20:52 UTC 2023 kill -USR1 2977 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2977 killed at Wed Oct 18 15:20:52 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9997 starting at Wed Oct 18 15:20:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3019 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3019 found at Wed Oct 18 15:20:53 UTC 2023 selfserv_9997 with PID 3019 started at Wed Oct 18 15:20:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #786: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 3019 at Wed Oct 18 15:20:53 UTC 2023 kill -USR1 3019 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3019 killed at Wed Oct 18 15:20:53 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9997 starting at Wed Oct 18 15:20:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3061 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3061 found at Wed Oct 18 15:20:53 UTC 2023 selfserv_9997 with PID 3061 started at Wed Oct 18 15:20:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #787: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 3061 at Wed Oct 18 15:20:54 UTC 2023 kill -USR1 3061 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3061 killed at Wed Oct 18 15:20:54 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9997 starting at Wed Oct 18 15:20:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3103 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3103 found at Wed Oct 18 15:20:54 UTC 2023 selfserv_9997 with PID 3103 started at Wed Oct 18 15:20:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #788: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 3103 at Wed Oct 18 15:20:54 UTC 2023 kill -USR1 3103 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3103 killed at Wed Oct 18 15:20:54 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9997 starting at Wed Oct 18 15:20:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3145 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3145 found at Wed Oct 18 15:20:54 UTC 2023 selfserv_9997 with PID 3145 started at Wed Oct 18 15:20:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #789: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 3145 at Wed Oct 18 15:20:55 UTC 2023 kill -USR1 3145 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3145 killed at Wed Oct 18 15:20:55 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9997 starting at Wed Oct 18 15:20:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3187 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3187 found at Wed Oct 18 15:20:55 UTC 2023 selfserv_9997 with PID 3187 started at Wed Oct 18 15:20:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #790: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 3187 at Wed Oct 18 15:20:55 UTC 2023 kill -USR1 3187 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3187 killed at Wed Oct 18 15:20:55 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9997 starting at Wed Oct 18 15:20:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:20:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3229 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3229 found at Wed Oct 18 15:20:56 UTC 2023 selfserv_9997 with PID 3229 started at Wed Oct 18 15:20:56 UTC 2023 strsclnt -q -p 9997 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 15:20:56 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 15:21:11 UTC 2023 ssl.sh: #791: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9997 with PID 3229 at Wed Oct 18 15:21:11 UTC 2023 kill -USR1 3229 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3229 killed at Wed Oct 18 15:21:11 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 15:21:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3280 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3280 found at Wed Oct 18 15:21:11 UTC 2023 selfserv_9997 with PID 3280 started at Wed Oct 18 15:21:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3280 at Wed Oct 18 15:21:12 UTC 2023 kill -USR1 3280 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3280 killed at Wed Oct 18 15:21:12 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:21:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3323 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3323 found at Wed Oct 18 15:21:12 UTC 2023 selfserv_9997 with PID 3323 started at Wed Oct 18 15:21:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #793: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3323 at Wed Oct 18 15:21:12 UTC 2023 kill -USR1 3323 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3323 killed at Wed Oct 18 15:21:12 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:21:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3362 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3362 found at Wed Oct 18 15:21:12 UTC 2023 selfserv_9997 with PID 3362 started at Wed Oct 18 15:21:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #794: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 3362 at Wed Oct 18 15:21:13 UTC 2023 kill -USR1 3362 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3362 killed at Wed Oct 18 15:21:13 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:21:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3401 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3401 found at Wed Oct 18 15:21:13 UTC 2023 selfserv_9997 with PID 3401 started at Wed Oct 18 15:21:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3401 at Wed Oct 18 15:21:13 UTC 2023 kill -USR1 3401 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3401 killed at Wed Oct 18 15:21:13 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:21:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3440 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3440 found at Wed Oct 18 15:21:13 UTC 2023 selfserv_9997 with PID 3440 started at Wed Oct 18 15:21:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #796: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 3440 at Wed Oct 18 15:21:13 UTC 2023 kill -USR1 3440 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3440 killed at Wed Oct 18 15:21:13 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:21:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3479 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3479 found at Wed Oct 18 15:21:14 UTC 2023 selfserv_9997 with PID 3479 started at Wed Oct 18 15:21:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3479 at Wed Oct 18 15:21:14 UTC 2023 kill -USR1 3479 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3479 killed at Wed Oct 18 15:21:14 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:21:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3518 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3518 found at Wed Oct 18 15:21:14 UTC 2023 selfserv_9997 with PID 3518 started at Wed Oct 18 15:21:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3518 at Wed Oct 18 15:21:14 UTC 2023 kill -USR1 3518 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3518 killed at Wed Oct 18 15:21:14 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:21:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3557 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3557 found at Wed Oct 18 15:21:15 UTC 2023 selfserv_9997 with PID 3557 started at Wed Oct 18 15:21:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3557 at Wed Oct 18 15:21:15 UTC 2023 kill -USR1 3557 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3557 killed at Wed Oct 18 15:21:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:21:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3596 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3596 found at Wed Oct 18 15:21:15 UTC 2023 selfserv_9997 with PID 3596 started at Wed Oct 18 15:21:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3596 at Wed Oct 18 15:21:15 UTC 2023 kill -USR1 3596 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3596 killed at Wed Oct 18 15:21:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:21:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3635 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3635 found at Wed Oct 18 15:21:15 UTC 2023 selfserv_9997 with PID 3635 started at Wed Oct 18 15:21:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3635 at Wed Oct 18 15:21:16 UTC 2023 kill -USR1 3635 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3635 killed at Wed Oct 18 15:21:16 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:21:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3674 found at Wed Oct 18 15:21:16 UTC 2023 selfserv_9997 with PID 3674 started at Wed Oct 18 15:21:16 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #802: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3674 at Wed Oct 18 15:21:16 UTC 2023 kill -USR1 3674 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3674 killed at Wed Oct 18 15:21:16 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:21:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3714 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3714 found at Wed Oct 18 15:21:16 UTC 2023 selfserv_9997 with PID 3714 started at Wed Oct 18 15:21:16 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #803: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3714 at Wed Oct 18 15:21:17 UTC 2023 kill -USR1 3714 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3714 killed at Wed Oct 18 15:21:17 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:21:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3754 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3754 found at Wed Oct 18 15:21:17 UTC 2023 selfserv_9997 with PID 3754 started at Wed Oct 18 15:21:17 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #804: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3754 at Wed Oct 18 15:21:17 UTC 2023 kill -USR1 3754 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3754 killed at Wed Oct 18 15:21:17 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:21:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3794 found at Wed Oct 18 15:21:17 UTC 2023 selfserv_9997 with PID 3794 started at Wed Oct 18 15:21:17 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #805: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3794 at Wed Oct 18 15:21:17 UTC 2023 kill -USR1 3794 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3794 killed at Wed Oct 18 15:21:17 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:21:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3834 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3834 found at Wed Oct 18 15:21:18 UTC 2023 selfserv_9997 with PID 3834 started at Wed Oct 18 15:21:18 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #806: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3834 at Wed Oct 18 15:21:18 UTC 2023 kill -USR1 3834 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3834 killed at Wed Oct 18 15:21:18 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:21:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3875 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3875 found at Wed Oct 18 15:21:18 UTC 2023 selfserv_9997 with PID 3875 started at Wed Oct 18 15:21:18 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #807: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3875 at Wed Oct 18 15:21:18 UTC 2023 kill -USR1 3875 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3875 killed at Wed Oct 18 15:21:18 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:21:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3915 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3915 found at Wed Oct 18 15:21:18 UTC 2023 selfserv_9997 with PID 3915 started at Wed Oct 18 15:21:18 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3915 at Wed Oct 18 15:21:19 UTC 2023 kill -USR1 3915 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3915 killed at Wed Oct 18 15:21:19 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:21:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3955 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3955 found at Wed Oct 18 15:21:19 UTC 2023 selfserv_9997 with PID 3955 started at Wed Oct 18 15:21:19 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3955 at Wed Oct 18 15:21:19 UTC 2023 kill -USR1 3955 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3955 killed at Wed Oct 18 15:21:19 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:21:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3995 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3995 found at Wed Oct 18 15:21:19 UTC 2023 selfserv_9997 with PID 3995 started at Wed Oct 18 15:21:19 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3995 at Wed Oct 18 15:21:20 UTC 2023 kill -USR1 3995 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3995 killed at Wed Oct 18 15:21:20 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9997 starting at Wed Oct 18 15:21:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 4035 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4035 found at Wed Oct 18 15:21:20 UTC 2023 selfserv_9997 with PID 4035 started at Wed Oct 18 15:21:20 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #811: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #812: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #813: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #814: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #815: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #816: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 4035 at Wed Oct 18 15:21:28 UTC 2023 kill -USR1 4035 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4035 killed at Wed Oct 18 15:21:28 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 15:21:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 4585 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4585 found at Wed Oct 18 15:21:29 UTC 2023 selfserv_9997 with PID 4585 started at Wed Oct 18 15:21:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4585 at Wed Oct 18 15:21:41 UTC 2023 kill -USR1 4585 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4585 killed at Wed Oct 18 15:21:41 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:21:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5409 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5409 found at Wed Oct 18 15:21:42 UTC 2023 selfserv_9997 with PID 5409 started at Wed Oct 18 15:21:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5409 at Wed Oct 18 15:21:43 UTC 2023 kill -USR1 5409 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5409 killed at Wed Oct 18 15:21:43 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:21:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5463 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5463 found at Wed Oct 18 15:21:43 UTC 2023 selfserv_9997 with PID 5463 started at Wed Oct 18 15:21:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5463 at Wed Oct 18 15:21:44 UTC 2023 kill -USR1 5463 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5463 killed at Wed Oct 18 15:21:44 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:21:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5515 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5515 found at Wed Oct 18 15:21:45 UTC 2023 selfserv_9997 with PID 5515 started at Wed Oct 18 15:21:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #940: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5515 at Wed Oct 18 15:21:46 UTC 2023 kill -USR1 5515 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5515 killed at Wed Oct 18 15:21:46 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:21:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5567 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5567 found at Wed Oct 18 15:21:46 UTC 2023 selfserv_9997 with PID 5567 started at Wed Oct 18 15:21:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #941: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5567 at Wed Oct 18 15:21:48 UTC 2023 kill -USR1 5567 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5567 killed at Wed Oct 18 15:21:48 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:21:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5619 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5619 found at Wed Oct 18 15:21:48 UTC 2023 selfserv_9997 with PID 5619 started at Wed Oct 18 15:21:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #942: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5619 at Wed Oct 18 15:21:49 UTC 2023 kill -USR1 5619 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5619 killed at Wed Oct 18 15:21:49 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:21:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5671 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5671 found at Wed Oct 18 15:21:49 UTC 2023 selfserv_9997 with PID 5671 started at Wed Oct 18 15:21:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5671 at Wed Oct 18 15:21:51 UTC 2023 kill -USR1 5671 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5671 killed at Wed Oct 18 15:21:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:21:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5723 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5723 found at Wed Oct 18 15:21:51 UTC 2023 selfserv_9997 with PID 5723 started at Wed Oct 18 15:21:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5723 at Wed Oct 18 15:21:52 UTC 2023 kill -USR1 5723 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5723 killed at Wed Oct 18 15:21:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:21:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5775 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5775 found at Wed Oct 18 15:21:53 UTC 2023 selfserv_9997 with PID 5775 started at Wed Oct 18 15:21:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5775 at Wed Oct 18 15:21:54 UTC 2023 kill -USR1 5775 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5775 killed at Wed Oct 18 15:21:54 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:21:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5827 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5827 found at Wed Oct 18 15:21:54 UTC 2023 selfserv_9997 with PID 5827 started at Wed Oct 18 15:21:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5827 at Wed Oct 18 15:21:56 UTC 2023 kill -USR1 5827 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5827 killed at Wed Oct 18 15:21:56 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:21:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5879 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5879 found at Wed Oct 18 15:21:56 UTC 2023 selfserv_9997 with PID 5879 started at Wed Oct 18 15:21:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #947: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5879 at Wed Oct 18 15:21:57 UTC 2023 kill -USR1 5879 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5879 killed at Wed Oct 18 15:21:57 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:21:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5931 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5931 found at Wed Oct 18 15:21:57 UTC 2023 selfserv_9997 with PID 5931 started at Wed Oct 18 15:21:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5931 at Wed Oct 18 15:21:58 UTC 2023 kill -USR1 5931 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5931 killed at Wed Oct 18 15:21:58 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:21:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:21:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5983 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5983 found at Wed Oct 18 15:21:59 UTC 2023 selfserv_9997 with PID 5983 started at Wed Oct 18 15:21:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5983 at Wed Oct 18 15:22:00 UTC 2023 kill -USR1 5983 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5983 killed at Wed Oct 18 15:22:00 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6035 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6035 found at Wed Oct 18 15:22:01 UTC 2023 selfserv_9997 with PID 6035 started at Wed Oct 18 15:22:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6035 at Wed Oct 18 15:22:02 UTC 2023 kill -USR1 6035 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6035 killed at Wed Oct 18 15:22:02 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:22:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6087 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6087 found at Wed Oct 18 15:22:02 UTC 2023 selfserv_9997 with PID 6087 started at Wed Oct 18 15:22:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6087 at Wed Oct 18 15:22:03 UTC 2023 kill -USR1 6087 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6087 killed at Wed Oct 18 15:22:03 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6139 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6139 found at Wed Oct 18 15:22:03 UTC 2023 selfserv_9997 with PID 6139 started at Wed Oct 18 15:22:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6139 at Wed Oct 18 15:22:05 UTC 2023 kill -USR1 6139 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6139 killed at Wed Oct 18 15:22:05 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6191 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6191 found at Wed Oct 18 15:22:05 UTC 2023 selfserv_9997 with PID 6191 started at Wed Oct 18 15:22:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #953: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6191 at Wed Oct 18 15:22:07 UTC 2023 kill -USR1 6191 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6191 killed at Wed Oct 18 15:22:07 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:22:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6243 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6243 found at Wed Oct 18 15:22:07 UTC 2023 selfserv_9997 with PID 6243 started at Wed Oct 18 15:22:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6243 at Wed Oct 18 15:22:08 UTC 2023 kill -USR1 6243 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6243 killed at Wed Oct 18 15:22:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6295 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6295 found at Wed Oct 18 15:22:08 UTC 2023 selfserv_9997 with PID 6295 started at Wed Oct 18 15:22:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #955: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6295 at Wed Oct 18 15:22:10 UTC 2023 kill -USR1 6295 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6295 killed at Wed Oct 18 15:22:10 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6347 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6347 found at Wed Oct 18 15:22:10 UTC 2023 selfserv_9997 with PID 6347 started at Wed Oct 18 15:22:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6347 at Wed Oct 18 15:22:11 UTC 2023 kill -USR1 6347 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6347 killed at Wed Oct 18 15:22:11 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:22:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6399 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6399 found at Wed Oct 18 15:22:12 UTC 2023 selfserv_9997 with PID 6399 started at Wed Oct 18 15:22:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6399 at Wed Oct 18 15:22:13 UTC 2023 kill -USR1 6399 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6399 killed at Wed Oct 18 15:22:13 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6451 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6451 found at Wed Oct 18 15:22:13 UTC 2023 selfserv_9997 with PID 6451 started at Wed Oct 18 15:22:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6451 at Wed Oct 18 15:22:15 UTC 2023 kill -USR1 6451 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6451 killed at Wed Oct 18 15:22:15 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6503 found at Wed Oct 18 15:22:15 UTC 2023 selfserv_9997 with PID 6503 started at Wed Oct 18 15:22:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #959: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6503 at Wed Oct 18 15:22:16 UTC 2023 kill -USR1 6503 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6503 killed at Wed Oct 18 15:22:16 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:22:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6555 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6555 found at Wed Oct 18 15:22:16 UTC 2023 selfserv_9997 with PID 6555 started at Wed Oct 18 15:22:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6555 at Wed Oct 18 15:22:18 UTC 2023 kill -USR1 6555 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6555 killed at Wed Oct 18 15:22:18 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6607 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6607 found at Wed Oct 18 15:22:18 UTC 2023 selfserv_9997 with PID 6607 started at Wed Oct 18 15:22:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #961: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6607 at Wed Oct 18 15:22:19 UTC 2023 kill -USR1 6607 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6607 killed at Wed Oct 18 15:22:19 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6659 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6659 found at Wed Oct 18 15:22:20 UTC 2023 selfserv_9997 with PID 6659 started at Wed Oct 18 15:22:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6659 at Wed Oct 18 15:22:21 UTC 2023 kill -USR1 6659 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6659 killed at Wed Oct 18 15:22:21 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:22:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6711 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6711 found at Wed Oct 18 15:22:21 UTC 2023 selfserv_9997 with PID 6711 started at Wed Oct 18 15:22:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6711 at Wed Oct 18 15:22:22 UTC 2023 kill -USR1 6711 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6711 killed at Wed Oct 18 15:22:22 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6763 found at Wed Oct 18 15:22:23 UTC 2023 selfserv_9997 with PID 6763 started at Wed Oct 18 15:22:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6763 at Wed Oct 18 15:22:24 UTC 2023 kill -USR1 6763 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6763 killed at Wed Oct 18 15:22:24 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6815 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6815 found at Wed Oct 18 15:22:25 UTC 2023 selfserv_9997 with PID 6815 started at Wed Oct 18 15:22:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #965: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6815 at Wed Oct 18 15:22:26 UTC 2023 kill -USR1 6815 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6815 killed at Wed Oct 18 15:22:26 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:22:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6867 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6867 found at Wed Oct 18 15:22:26 UTC 2023 selfserv_9997 with PID 6867 started at Wed Oct 18 15:22:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6867 at Wed Oct 18 15:22:27 UTC 2023 kill -USR1 6867 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6867 killed at Wed Oct 18 15:22:27 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6919 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6919 found at Wed Oct 18 15:22:28 UTC 2023 selfserv_9997 with PID 6919 started at Wed Oct 18 15:22:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #967: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6919 at Wed Oct 18 15:22:29 UTC 2023 kill -USR1 6919 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6919 killed at Wed Oct 18 15:22:29 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6971 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6971 found at Wed Oct 18 15:22:29 UTC 2023 selfserv_9997 with PID 6971 started at Wed Oct 18 15:22:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6971 at Wed Oct 18 15:22:31 UTC 2023 kill -USR1 6971 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6971 killed at Wed Oct 18 15:22:31 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7023 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7023 found at Wed Oct 18 15:22:31 UTC 2023 selfserv_9997 with PID 7023 started at Wed Oct 18 15:22:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7023 at Wed Oct 18 15:22:33 UTC 2023 kill -USR1 7023 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7023 killed at Wed Oct 18 15:22:33 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7075 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7075 found at Wed Oct 18 15:22:33 UTC 2023 selfserv_9997 with PID 7075 started at Wed Oct 18 15:22:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7075 at Wed Oct 18 15:22:34 UTC 2023 kill -USR1 7075 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7075 killed at Wed Oct 18 15:22:34 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7127 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7127 found at Wed Oct 18 15:22:34 UTC 2023 selfserv_9997 with PID 7127 started at Wed Oct 18 15:22:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #971: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7127 at Wed Oct 18 15:22:36 UTC 2023 kill -USR1 7127 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7127 killed at Wed Oct 18 15:22:36 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7179 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7179 found at Wed Oct 18 15:22:36 UTC 2023 selfserv_9997 with PID 7179 started at Wed Oct 18 15:22:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #972: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7179 at Wed Oct 18 15:22:37 UTC 2023 kill -USR1 7179 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7179 killed at Wed Oct 18 15:22:37 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7231 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7231 found at Wed Oct 18 15:22:38 UTC 2023 selfserv_9997 with PID 7231 started at Wed Oct 18 15:22:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #973: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7231 at Wed Oct 18 15:22:39 UTC 2023 kill -USR1 7231 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7231 killed at Wed Oct 18 15:22:39 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:22:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7283 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7283 found at Wed Oct 18 15:22:40 UTC 2023 selfserv_9997 with PID 7283 started at Wed Oct 18 15:22:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7283 at Wed Oct 18 15:22:41 UTC 2023 kill -USR1 7283 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7283 killed at Wed Oct 18 15:22:41 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7335 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7335 found at Wed Oct 18 15:22:41 UTC 2023 selfserv_9997 with PID 7335 started at Wed Oct 18 15:22:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #975: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7335 at Wed Oct 18 15:22:42 UTC 2023 kill -USR1 7335 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7335 killed at Wed Oct 18 15:22:42 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:22:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7402 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7402 found at Wed Oct 18 15:22:43 UTC 2023 selfserv_9997 with PID 7402 started at Wed Oct 18 15:22:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #976: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7402 at Wed Oct 18 15:22:44 UTC 2023 kill -USR1 7402 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7402 killed at Wed Oct 18 15:22:44 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7454 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7454 found at Wed Oct 18 15:22:44 UTC 2023 selfserv_9997 with PID 7454 started at Wed Oct 18 15:22:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #977: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7454 at Wed Oct 18 15:22:46 UTC 2023 kill -USR1 7454 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7454 killed at Wed Oct 18 15:22:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:22:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7506 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7506 found at Wed Oct 18 15:22:46 UTC 2023 selfserv_9997 with PID 7506 started at Wed Oct 18 15:22:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #978: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7506 at Wed Oct 18 15:22:47 UTC 2023 kill -USR1 7506 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7506 killed at Wed Oct 18 15:22:47 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7558 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7558 found at Wed Oct 18 15:22:47 UTC 2023 selfserv_9997 with PID 7558 started at Wed Oct 18 15:22:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #979: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7558 at Wed Oct 18 15:22:49 UTC 2023 kill -USR1 7558 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7558 killed at Wed Oct 18 15:22:49 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:22:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7610 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7610 found at Wed Oct 18 15:22:49 UTC 2023 selfserv_9997 with PID 7610 started at Wed Oct 18 15:22:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #980: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7610 at Wed Oct 18 15:22:50 UTC 2023 kill -USR1 7610 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7610 killed at Wed Oct 18 15:22:50 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7662 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7662 found at Wed Oct 18 15:22:50 UTC 2023 selfserv_9997 with PID 7662 started at Wed Oct 18 15:22:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7662 at Wed Oct 18 15:22:52 UTC 2023 kill -USR1 7662 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7662 killed at Wed Oct 18 15:22:52 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:22:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7714 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7714 found at Wed Oct 18 15:22:52 UTC 2023 selfserv_9997 with PID 7714 started at Wed Oct 18 15:22:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #982: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7714 at Wed Oct 18 15:22:53 UTC 2023 kill -USR1 7714 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7714 killed at Wed Oct 18 15:22:53 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7766 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7766 found at Wed Oct 18 15:22:54 UTC 2023 selfserv_9997 with PID 7766 started at Wed Oct 18 15:22:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #983: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7766 at Wed Oct 18 15:22:55 UTC 2023 kill -USR1 7766 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7766 killed at Wed Oct 18 15:22:55 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:22:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7818 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7818 found at Wed Oct 18 15:22:55 UTC 2023 selfserv_9997 with PID 7818 started at Wed Oct 18 15:22:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #984: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7818 at Wed Oct 18 15:22:57 UTC 2023 kill -USR1 7818 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7818 killed at Wed Oct 18 15:22:57 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:22:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7871 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7871 found at Wed Oct 18 15:22:57 UTC 2023 selfserv_9997 with PID 7871 started at Wed Oct 18 15:22:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7871 at Wed Oct 18 15:22:58 UTC 2023 kill -USR1 7871 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7871 killed at Wed Oct 18 15:22:58 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:22:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:22:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7923 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7923 found at Wed Oct 18 15:22:59 UTC 2023 selfserv_9997 with PID 7923 started at Wed Oct 18 15:22:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #986: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7923 at Wed Oct 18 15:23:00 UTC 2023 kill -USR1 7923 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7923 killed at Wed Oct 18 15:23:00 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:23:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7976 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7976 found at Wed Oct 18 15:23:00 UTC 2023 selfserv_9997 with PID 7976 started at Wed Oct 18 15:23:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #987: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7976 at Wed Oct 18 15:23:02 UTC 2023 kill -USR1 7976 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7976 killed at Wed Oct 18 15:23:02 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:23:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8028 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8028 found at Wed Oct 18 15:23:02 UTC 2023 selfserv_9997 with PID 8028 started at Wed Oct 18 15:23:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #988: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8028 at Wed Oct 18 15:23:03 UTC 2023 kill -USR1 8028 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8028 killed at Wed Oct 18 15:23:03 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:23:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8080 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8080 found at Wed Oct 18 15:23:03 UTC 2023 selfserv_9997 with PID 8080 started at Wed Oct 18 15:23:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8080 at Wed Oct 18 15:23:05 UTC 2023 kill -USR1 8080 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8080 killed at Wed Oct 18 15:23:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:23:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8132 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8132 found at Wed Oct 18 15:23:05 UTC 2023 selfserv_9997 with PID 8132 started at Wed Oct 18 15:23:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8132 at Wed Oct 18 15:23:06 UTC 2023 kill -USR1 8132 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8132 killed at Wed Oct 18 15:23:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:23:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8184 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8184 found at Wed Oct 18 15:23:07 UTC 2023 selfserv_9997 with PID 8184 started at Wed Oct 18 15:23:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8184 at Wed Oct 18 15:23:08 UTC 2023 kill -USR1 8184 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8184 killed at Wed Oct 18 15:23:08 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:23:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8236 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8236 found at Wed Oct 18 15:23:08 UTC 2023 selfserv_9997 with PID 8236 started at Wed Oct 18 15:23:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #992: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8236 at Wed Oct 18 15:23:10 UTC 2023 kill -USR1 8236 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8236 killed at Wed Oct 18 15:23:10 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:23:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8288 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8288 found at Wed Oct 18 15:23:10 UTC 2023 selfserv_9997 with PID 8288 started at Wed Oct 18 15:23:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #993: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8288 at Wed Oct 18 15:23:12 UTC 2023 kill -USR1 8288 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8288 killed at Wed Oct 18 15:23:12 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:23:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8340 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8340 found at Wed Oct 18 15:23:12 UTC 2023 selfserv_9997 with PID 8340 started at Wed Oct 18 15:23:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #994: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8340 at Wed Oct 18 15:23:13 UTC 2023 kill -USR1 8340 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8340 killed at Wed Oct 18 15:23:13 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:23:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8392 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8392 found at Wed Oct 18 15:23:14 UTC 2023 selfserv_9997 with PID 8392 started at Wed Oct 18 15:23:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #995: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8392 at Wed Oct 18 15:23:15 UTC 2023 kill -USR1 8392 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8392 killed at Wed Oct 18 15:23:15 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 15:23:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8474 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8474 found at Wed Oct 18 15:23:15 UTC 2023 selfserv_9997 with PID 8474 started at Wed Oct 18 15:23:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #938: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8474 at Wed Oct 18 15:23:16 UTC 2023 kill -USR1 8474 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8474 killed at Wed Oct 18 15:23:16 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:23:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8516 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8516 found at Wed Oct 18 15:23:16 UTC 2023 selfserv_9997 with PID 8516 started at Wed Oct 18 15:23:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #939: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8516 at Wed Oct 18 15:23:17 UTC 2023 kill -USR1 8516 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8516 killed at Wed Oct 18 15:23:17 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:23:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8555 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8555 found at Wed Oct 18 15:23:17 UTC 2023 selfserv_9997 with PID 8555 started at Wed Oct 18 15:23:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #940: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 8555 at Wed Oct 18 15:23:18 UTC 2023 kill -USR1 8555 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8555 killed at Wed Oct 18 15:23:18 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:23:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8594 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8594 found at Wed Oct 18 15:23:18 UTC 2023 selfserv_9997 with PID 8594 started at Wed Oct 18 15:23:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #941: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8594 at Wed Oct 18 15:23:18 UTC 2023 kill -USR1 8594 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8594 killed at Wed Oct 18 15:23:18 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:23:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8633 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8633 found at Wed Oct 18 15:23:19 UTC 2023 selfserv_9997 with PID 8633 started at Wed Oct 18 15:23:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #942: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 8633 at Wed Oct 18 15:23:19 UTC 2023 kill -USR1 8633 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8633 killed at Wed Oct 18 15:23:19 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:23:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8672 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8672 found at Wed Oct 18 15:23:19 UTC 2023 selfserv_9997 with PID 8672 started at Wed Oct 18 15:23:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #943: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8672 at Wed Oct 18 15:23:20 UTC 2023 kill -USR1 8672 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8672 killed at Wed Oct 18 15:23:20 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:23:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8711 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8711 found at Wed Oct 18 15:23:20 UTC 2023 selfserv_9997 with PID 8711 started at Wed Oct 18 15:23:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8711 at Wed Oct 18 15:23:21 UTC 2023 kill -USR1 8711 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8711 killed at Wed Oct 18 15:23:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:23:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8751 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8751 found at Wed Oct 18 15:23:21 UTC 2023 selfserv_9997 with PID 8751 started at Wed Oct 18 15:23:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8751 at Wed Oct 18 15:23:21 UTC 2023 kill -USR1 8751 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8751 killed at Wed Oct 18 15:23:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:23:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8790 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8790 found at Wed Oct 18 15:23:22 UTC 2023 selfserv_9997 with PID 8790 started at Wed Oct 18 15:23:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8790 at Wed Oct 18 15:23:22 UTC 2023 kill -USR1 8790 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8790 killed at Wed Oct 18 15:23:22 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:23:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8830 found at Wed Oct 18 15:23:22 UTC 2023 selfserv_9997 with PID 8830 started at Wed Oct 18 15:23:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8830 at Wed Oct 18 15:23:23 UTC 2023 kill -USR1 8830 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8830 killed at Wed Oct 18 15:23:23 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:23:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8870 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8870 found at Wed Oct 18 15:23:23 UTC 2023 selfserv_9997 with PID 8870 started at Wed Oct 18 15:23:23 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #948: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8870 at Wed Oct 18 15:23:24 UTC 2023 kill -USR1 8870 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8870 killed at Wed Oct 18 15:23:24 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:23:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8910 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8910 found at Wed Oct 18 15:23:24 UTC 2023 selfserv_9997 with PID 8910 started at Wed Oct 18 15:23:24 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #949: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8910 at Wed Oct 18 15:23:24 UTC 2023 kill -USR1 8910 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8910 killed at Wed Oct 18 15:23:24 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:23:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8950 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8950 found at Wed Oct 18 15:23:25 UTC 2023 selfserv_9997 with PID 8950 started at Wed Oct 18 15:23:25 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #950: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8950 at Wed Oct 18 15:23:25 UTC 2023 kill -USR1 8950 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8950 killed at Wed Oct 18 15:23:25 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:23:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8990 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8990 found at Wed Oct 18 15:23:25 UTC 2023 selfserv_9997 with PID 8990 started at Wed Oct 18 15:23:25 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #951: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8990 at Wed Oct 18 15:23:26 UTC 2023 kill -USR1 8990 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8990 killed at Wed Oct 18 15:23:26 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:23:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9030 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9030 found at Wed Oct 18 15:23:26 UTC 2023 selfserv_9997 with PID 9030 started at Wed Oct 18 15:23:26 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #952: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9030 at Wed Oct 18 15:23:27 UTC 2023 kill -USR1 9030 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9030 killed at Wed Oct 18 15:23:27 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:23:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9070 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9070 found at Wed Oct 18 15:23:27 UTC 2023 selfserv_9997 with PID 9070 started at Wed Oct 18 15:23:27 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #953: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9070 at Wed Oct 18 15:23:27 UTC 2023 kill -USR1 9070 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9070 killed at Wed Oct 18 15:23:27 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:23:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9110 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9110 found at Wed Oct 18 15:23:28 UTC 2023 selfserv_9997 with PID 9110 started at Wed Oct 18 15:23:28 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9110 at Wed Oct 18 15:23:28 UTC 2023 kill -USR1 9110 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9110 killed at Wed Oct 18 15:23:28 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:23:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9150 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9150 found at Wed Oct 18 15:23:28 UTC 2023 selfserv_9997 with PID 9150 started at Wed Oct 18 15:23:28 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9150 at Wed Oct 18 15:23:29 UTC 2023 kill -USR1 9150 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9150 killed at Wed Oct 18 15:23:29 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:23:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9190 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9190 found at Wed Oct 18 15:23:29 UTC 2023 selfserv_9997 with PID 9190 started at Wed Oct 18 15:23:29 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9190 at Wed Oct 18 15:23:30 UTC 2023 kill -USR1 9190 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9190 killed at Wed Oct 18 15:23:30 UTC 2023 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server -fips true -force FIPS mode enabled. ssl.sh: #957: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server -list ssl.sh: #958: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #959: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/ext_server -fips true -force FIPS mode enabled. ssl.sh: #960: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/ext_server -list ssl.sh: #961: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #962: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9997 starting at Wed Oct 18 15:23:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 9275 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9275 found at Wed Oct 18 15:23:31 UTC 2023 selfserv_9997 with PID 9275 started at Wed Oct 18 15:23:31 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #963: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #964: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #965: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #966: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #967: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #968: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #974: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #975: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #980: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #981: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #986: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #987: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #992: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #993: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #997: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #999: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1002: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1003: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1004: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1005: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1006: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1007: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1008: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1009: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1010: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1011: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1012: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1013: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 9275 at Wed Oct 18 15:23:40 UTC 2023 kill -USR1 9275 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9275 killed at Wed Oct 18 15:23:40 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 15:23:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 9826 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9826 found at Wed Oct 18 15:23:40 UTC 2023 selfserv_9997 with PID 9826 started at Wed Oct 18 15:23:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1014: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1015: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1016: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1017: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1018: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1019: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1020: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1021: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1022: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1023: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1055: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1056: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1061: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1062: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1067: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1068: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1073: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1074: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1076: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1077: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1078: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1079: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1080: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1081: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1082: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1083: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1084: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1085: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1086: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1087: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1088: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1089: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9826 at Wed Oct 18 15:23:53 UTC 2023 kill -USR1 9826 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9826 killed at Wed Oct 18 15:23:53 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9997 starting at Wed Oct 18 15:23:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10638 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10638 found at Wed Oct 18 15:23:53 UTC 2023 selfserv_9997 with PID 10638 started at Wed Oct 18 15:23:53 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10638 at Wed Oct 18 15:23:54 UTC 2023 kill -USR1 10638 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10638 killed at Wed Oct 18 15:23:54 UTC 2023 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:23:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10704 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10704 found at Wed Oct 18 15:23:54 UTC 2023 selfserv_9997 with PID 10704 started at Wed Oct 18 15:23:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1090: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10704 at Wed Oct 18 15:23:55 UTC 2023 kill -USR1 10704 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10704 killed at Wed Oct 18 15:23:55 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:23:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10756 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10756 found at Wed Oct 18 15:23:55 UTC 2023 selfserv_9997 with PID 10756 started at Wed Oct 18 15:23:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1091: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10756 at Wed Oct 18 15:23:55 UTC 2023 kill -USR1 10756 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10756 killed at Wed Oct 18 15:23:55 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:23:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10808 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10808 found at Wed Oct 18 15:23:56 UTC 2023 selfserv_9997 with PID 10808 started at Wed Oct 18 15:23:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1092: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10808 at Wed Oct 18 15:23:56 UTC 2023 kill -USR1 10808 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10808 killed at Wed Oct 18 15:23:56 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:23:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10860 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10860 found at Wed Oct 18 15:23:56 UTC 2023 selfserv_9997 with PID 10860 started at Wed Oct 18 15:23:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1093: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10860 at Wed Oct 18 15:23:57 UTC 2023 kill -USR1 10860 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10860 killed at Wed Oct 18 15:23:57 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:23:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10912 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10912 found at Wed Oct 18 15:23:57 UTC 2023 selfserv_9997 with PID 10912 started at Wed Oct 18 15:23:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1094: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10912 at Wed Oct 18 15:23:58 UTC 2023 kill -USR1 10912 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10912 killed at Wed Oct 18 15:23:58 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:23:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10964 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10964 found at Wed Oct 18 15:23:58 UTC 2023 selfserv_9997 with PID 10964 started at Wed Oct 18 15:23:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1095: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10964 at Wed Oct 18 15:23:59 UTC 2023 kill -USR1 10964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10964 killed at Wed Oct 18 15:23:59 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:23:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:23:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11016 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11016 found at Wed Oct 18 15:23:59 UTC 2023 selfserv_9997 with PID 11016 started at Wed Oct 18 15:23:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11016 at Wed Oct 18 15:24:00 UTC 2023 kill -USR1 11016 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11016 killed at Wed Oct 18 15:24:00 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:24:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11069 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11069 found at Wed Oct 18 15:24:00 UTC 2023 selfserv_9997 with PID 11069 started at Wed Oct 18 15:24:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11069 at Wed Oct 18 15:24:00 UTC 2023 kill -USR1 11069 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11069 killed at Wed Oct 18 15:24:00 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11121 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11121 found at Wed Oct 18 15:24:01 UTC 2023 selfserv_9997 with PID 11121 started at Wed Oct 18 15:24:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11121 at Wed Oct 18 15:24:01 UTC 2023 kill -USR1 11121 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11121 killed at Wed Oct 18 15:24:01 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11173 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11173 found at Wed Oct 18 15:24:02 UTC 2023 selfserv_9997 with PID 11173 started at Wed Oct 18 15:24:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1099: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11173 at Wed Oct 18 15:24:02 UTC 2023 kill -USR1 11173 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11173 killed at Wed Oct 18 15:24:02 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:24:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11225 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11225 found at Wed Oct 18 15:24:02 UTC 2023 selfserv_9997 with PID 11225 started at Wed Oct 18 15:24:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1100: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11225 at Wed Oct 18 15:24:03 UTC 2023 kill -USR1 11225 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11225 killed at Wed Oct 18 15:24:03 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11278 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11278 found at Wed Oct 18 15:24:03 UTC 2023 selfserv_9997 with PID 11278 started at Wed Oct 18 15:24:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11278 at Wed Oct 18 15:24:04 UTC 2023 kill -USR1 11278 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11278 killed at Wed Oct 18 15:24:04 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11330 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11330 found at Wed Oct 18 15:24:04 UTC 2023 selfserv_9997 with PID 11330 started at Wed Oct 18 15:24:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1102: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11330 at Wed Oct 18 15:24:05 UTC 2023 kill -USR1 11330 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11330 killed at Wed Oct 18 15:24:05 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:24:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11382 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11382 found at Wed Oct 18 15:24:05 UTC 2023 selfserv_9997 with PID 11382 started at Wed Oct 18 15:24:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11382 at Wed Oct 18 15:24:05 UTC 2023 kill -USR1 11382 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11382 killed at Wed Oct 18 15:24:05 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11435 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11435 found at Wed Oct 18 15:24:06 UTC 2023 selfserv_9997 with PID 11435 started at Wed Oct 18 15:24:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11435 at Wed Oct 18 15:24:06 UTC 2023 kill -USR1 11435 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11435 killed at Wed Oct 18 15:24:06 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11487 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11487 found at Wed Oct 18 15:24:07 UTC 2023 selfserv_9997 with PID 11487 started at Wed Oct 18 15:24:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1105: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11487 at Wed Oct 18 15:24:07 UTC 2023 kill -USR1 11487 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11487 killed at Wed Oct 18 15:24:07 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:24:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11539 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11539 found at Wed Oct 18 15:24:08 UTC 2023 selfserv_9997 with PID 11539 started at Wed Oct 18 15:24:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1106: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11539 at Wed Oct 18 15:24:08 UTC 2023 kill -USR1 11539 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11539 killed at Wed Oct 18 15:24:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11591 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11591 found at Wed Oct 18 15:24:08 UTC 2023 selfserv_9997 with PID 11591 started at Wed Oct 18 15:24:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11591 at Wed Oct 18 15:24:09 UTC 2023 kill -USR1 11591 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11591 killed at Wed Oct 18 15:24:09 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11643 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11643 found at Wed Oct 18 15:24:09 UTC 2023 selfserv_9997 with PID 11643 started at Wed Oct 18 15:24:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11643 at Wed Oct 18 15:24:10 UTC 2023 kill -USR1 11643 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11643 killed at Wed Oct 18 15:24:10 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:24:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11695 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11695 found at Wed Oct 18 15:24:10 UTC 2023 selfserv_9997 with PID 11695 started at Wed Oct 18 15:24:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11695 at Wed Oct 18 15:24:11 UTC 2023 kill -USR1 11695 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11695 killed at Wed Oct 18 15:24:11 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11747 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11747 found at Wed Oct 18 15:24:11 UTC 2023 selfserv_9997 with PID 11747 started at Wed Oct 18 15:24:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11747 at Wed Oct 18 15:24:12 UTC 2023 kill -USR1 11747 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11747 killed at Wed Oct 18 15:24:12 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11799 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11799 found at Wed Oct 18 15:24:12 UTC 2023 selfserv_9997 with PID 11799 started at Wed Oct 18 15:24:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1111: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11799 at Wed Oct 18 15:24:13 UTC 2023 kill -USR1 11799 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11799 killed at Wed Oct 18 15:24:13 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:24:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11851 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11851 found at Wed Oct 18 15:24:13 UTC 2023 selfserv_9997 with PID 11851 started at Wed Oct 18 15:24:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1112: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11851 at Wed Oct 18 15:24:14 UTC 2023 kill -USR1 11851 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11851 killed at Wed Oct 18 15:24:14 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11903 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11903 found at Wed Oct 18 15:24:14 UTC 2023 selfserv_9997 with PID 11903 started at Wed Oct 18 15:24:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11903 at Wed Oct 18 15:24:15 UTC 2023 kill -USR1 11903 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11903 killed at Wed Oct 18 15:24:15 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11955 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11955 found at Wed Oct 18 15:24:15 UTC 2023 selfserv_9997 with PID 11955 started at Wed Oct 18 15:24:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11955 at Wed Oct 18 15:24:16 UTC 2023 kill -USR1 11955 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11955 killed at Wed Oct 18 15:24:16 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:24:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12007 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12007 found at Wed Oct 18 15:24:16 UTC 2023 selfserv_9997 with PID 12007 started at Wed Oct 18 15:24:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1115: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12007 at Wed Oct 18 15:24:17 UTC 2023 kill -USR1 12007 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12007 killed at Wed Oct 18 15:24:17 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12059 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12059 found at Wed Oct 18 15:24:17 UTC 2023 selfserv_9997 with PID 12059 started at Wed Oct 18 15:24:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1116: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12059 at Wed Oct 18 15:24:17 UTC 2023 kill -USR1 12059 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12059 killed at Wed Oct 18 15:24:17 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12111 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12111 found at Wed Oct 18 15:24:18 UTC 2023 selfserv_9997 with PID 12111 started at Wed Oct 18 15:24:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1117: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12111 at Wed Oct 18 15:24:18 UTC 2023 kill -USR1 12111 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12111 killed at Wed Oct 18 15:24:18 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:24:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12163 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12163 found at Wed Oct 18 15:24:19 UTC 2023 selfserv_9997 with PID 12163 started at Wed Oct 18 15:24:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1118: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12163 at Wed Oct 18 15:24:19 UTC 2023 kill -USR1 12163 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12163 killed at Wed Oct 18 15:24:19 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12215 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12215 found at Wed Oct 18 15:24:19 UTC 2023 selfserv_9997 with PID 12215 started at Wed Oct 18 15:24:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1119: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12215 at Wed Oct 18 15:24:20 UTC 2023 kill -USR1 12215 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12215 killed at Wed Oct 18 15:24:20 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12267 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12267 found at Wed Oct 18 15:24:20 UTC 2023 selfserv_9997 with PID 12267 started at Wed Oct 18 15:24:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1120: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12267 at Wed Oct 18 15:24:21 UTC 2023 kill -USR1 12267 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12267 killed at Wed Oct 18 15:24:21 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12319 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12319 found at Wed Oct 18 15:24:21 UTC 2023 selfserv_9997 with PID 12319 started at Wed Oct 18 15:24:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1121: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12319 at Wed Oct 18 15:24:22 UTC 2023 kill -USR1 12319 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12319 killed at Wed Oct 18 15:24:22 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12371 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12371 found at Wed Oct 18 15:24:22 UTC 2023 selfserv_9997 with PID 12371 started at Wed Oct 18 15:24:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1122: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12371 at Wed Oct 18 15:24:22 UTC 2023 kill -USR1 12371 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12371 killed at Wed Oct 18 15:24:22 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12423 found at Wed Oct 18 15:24:23 UTC 2023 selfserv_9997 with PID 12423 started at Wed Oct 18 15:24:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1123: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12423 at Wed Oct 18 15:24:23 UTC 2023 kill -USR1 12423 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12423 killed at Wed Oct 18 15:24:23 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12475 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12475 found at Wed Oct 18 15:24:24 UTC 2023 selfserv_9997 with PID 12475 started at Wed Oct 18 15:24:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1124: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12475 at Wed Oct 18 15:24:24 UTC 2023 kill -USR1 12475 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12475 killed at Wed Oct 18 15:24:24 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12527 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12527 found at Wed Oct 18 15:24:24 UTC 2023 selfserv_9997 with PID 12527 started at Wed Oct 18 15:24:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1125: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12527 at Wed Oct 18 15:24:25 UTC 2023 kill -USR1 12527 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12527 killed at Wed Oct 18 15:24:25 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:24:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12579 found at Wed Oct 18 15:24:25 UTC 2023 selfserv_9997 with PID 12579 started at Wed Oct 18 15:24:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1126: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12579 at Wed Oct 18 15:24:26 UTC 2023 kill -USR1 12579 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12579 killed at Wed Oct 18 15:24:26 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12631 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12631 found at Wed Oct 18 15:24:26 UTC 2023 selfserv_9997 with PID 12631 started at Wed Oct 18 15:24:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1127: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12631 at Wed Oct 18 15:24:27 UTC 2023 kill -USR1 12631 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12631 killed at Wed Oct 18 15:24:27 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:24:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12683 found at Wed Oct 18 15:24:27 UTC 2023 selfserv_9997 with PID 12683 started at Wed Oct 18 15:24:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1128: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12683 at Wed Oct 18 15:24:27 UTC 2023 kill -USR1 12683 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12683 killed at Wed Oct 18 15:24:27 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12735 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12735 found at Wed Oct 18 15:24:28 UTC 2023 selfserv_9997 with PID 12735 started at Wed Oct 18 15:24:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1129: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12735 at Wed Oct 18 15:24:28 UTC 2023 kill -USR1 12735 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12735 killed at Wed Oct 18 15:24:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:24:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12787 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12787 found at Wed Oct 18 15:24:28 UTC 2023 selfserv_9997 with PID 12787 started at Wed Oct 18 15:24:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1130: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12787 at Wed Oct 18 15:24:29 UTC 2023 kill -USR1 12787 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12787 killed at Wed Oct 18 15:24:29 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12839 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12839 found at Wed Oct 18 15:24:29 UTC 2023 selfserv_9997 with PID 12839 started at Wed Oct 18 15:24:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1131: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12839 at Wed Oct 18 15:24:30 UTC 2023 kill -USR1 12839 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12839 killed at Wed Oct 18 15:24:30 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:24:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12891 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12891 found at Wed Oct 18 15:24:30 UTC 2023 selfserv_9997 with PID 12891 started at Wed Oct 18 15:24:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1132: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12891 at Wed Oct 18 15:24:30 UTC 2023 kill -USR1 12891 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12891 killed at Wed Oct 18 15:24:30 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12943 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12943 found at Wed Oct 18 15:24:31 UTC 2023 selfserv_9997 with PID 12943 started at Wed Oct 18 15:24:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1133: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12943 at Wed Oct 18 15:24:31 UTC 2023 kill -USR1 12943 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12943 killed at Wed Oct 18 15:24:31 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:24:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12995 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12995 found at Wed Oct 18 15:24:32 UTC 2023 selfserv_9997 with PID 12995 started at Wed Oct 18 15:24:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1134: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12995 at Wed Oct 18 15:24:32 UTC 2023 kill -USR1 12995 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12995 killed at Wed Oct 18 15:24:32 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13047 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13047 found at Wed Oct 18 15:24:32 UTC 2023 selfserv_9997 with PID 13047 started at Wed Oct 18 15:24:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1135: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13047 at Wed Oct 18 15:24:33 UTC 2023 kill -USR1 13047 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13047 killed at Wed Oct 18 15:24:33 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:24:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13099 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13099 found at Wed Oct 18 15:24:33 UTC 2023 selfserv_9997 with PID 13099 started at Wed Oct 18 15:24:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1136: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13099 at Wed Oct 18 15:24:34 UTC 2023 kill -USR1 13099 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13099 killed at Wed Oct 18 15:24:34 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13151 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13151 found at Wed Oct 18 15:24:34 UTC 2023 selfserv_9997 with PID 13151 started at Wed Oct 18 15:24:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1137: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13151 at Wed Oct 18 15:24:34 UTC 2023 kill -USR1 13151 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13151 killed at Wed Oct 18 15:24:34 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:24:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13203 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13203 found at Wed Oct 18 15:24:35 UTC 2023 selfserv_9997 with PID 13203 started at Wed Oct 18 15:24:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1138: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13203 at Wed Oct 18 15:24:35 UTC 2023 kill -USR1 13203 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13203 killed at Wed Oct 18 15:24:35 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13255 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13255 found at Wed Oct 18 15:24:36 UTC 2023 selfserv_9997 with PID 13255 started at Wed Oct 18 15:24:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1139: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13255 at Wed Oct 18 15:24:36 UTC 2023 kill -USR1 13255 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13255 killed at Wed Oct 18 15:24:36 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:24:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13307 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13307 found at Wed Oct 18 15:24:36 UTC 2023 selfserv_9997 with PID 13307 started at Wed Oct 18 15:24:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1140: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13307 at Wed Oct 18 15:24:37 UTC 2023 kill -USR1 13307 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13307 killed at Wed Oct 18 15:24:37 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13359 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13359 found at Wed Oct 18 15:24:37 UTC 2023 selfserv_9997 with PID 13359 started at Wed Oct 18 15:24:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1141: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13359 at Wed Oct 18 15:24:38 UTC 2023 kill -USR1 13359 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13359 killed at Wed Oct 18 15:24:38 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:24:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13411 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13411 found at Wed Oct 18 15:24:38 UTC 2023 selfserv_9997 with PID 13411 started at Wed Oct 18 15:24:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1142: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13411 at Wed Oct 18 15:24:39 UTC 2023 kill -USR1 13411 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13411 killed at Wed Oct 18 15:24:39 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13463 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13463 found at Wed Oct 18 15:24:39 UTC 2023 selfserv_9997 with PID 13463 started at Wed Oct 18 15:24:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1143: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13463 at Wed Oct 18 15:24:39 UTC 2023 kill -USR1 13463 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13463 killed at Wed Oct 18 15:24:39 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:24:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13515 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13515 found at Wed Oct 18 15:24:40 UTC 2023 selfserv_9997 with PID 13515 started at Wed Oct 18 15:24:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1144: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13515 at Wed Oct 18 15:24:40 UTC 2023 kill -USR1 13515 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13515 killed at Wed Oct 18 15:24:40 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13567 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13567 found at Wed Oct 18 15:24:41 UTC 2023 selfserv_9997 with PID 13567 started at Wed Oct 18 15:24:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1145: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13567 at Wed Oct 18 15:24:41 UTC 2023 kill -USR1 13567 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13567 killed at Wed Oct 18 15:24:41 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13619 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13619 found at Wed Oct 18 15:24:41 UTC 2023 selfserv_9997 with PID 13619 started at Wed Oct 18 15:24:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1146: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13619 at Wed Oct 18 15:24:42 UTC 2023 kill -USR1 13619 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13619 killed at Wed Oct 18 15:24:42 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:24:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13684 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13684 found at Wed Oct 18 15:24:43 UTC 2023 selfserv_9997 with PID 13684 started at Wed Oct 18 15:24:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1147: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13684 at Wed Oct 18 15:24:43 UTC 2023 kill -USR1 13684 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13684 killed at Wed Oct 18 15:24:43 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 15:24:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13744 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13744 found at Wed Oct 18 15:24:44 UTC 2023 selfserv_9997 with PID 13744 started at Wed Oct 18 15:24:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1148: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13744 at Wed Oct 18 15:24:44 UTC 2023 kill -USR1 13744 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13744 killed at Wed Oct 18 15:24:44 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 15:24:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13802 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13802 found at Wed Oct 18 15:24:44 UTC 2023 selfserv_9997 with PID 13802 started at Wed Oct 18 15:24:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1149: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13802 at Wed Oct 18 15:24:45 UTC 2023 kill -USR1 13802 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13802 killed at Wed Oct 18 15:24:45 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 15:24:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13860 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13860 found at Wed Oct 18 15:24:45 UTC 2023 selfserv_9997 with PID 13860 started at Wed Oct 18 15:24:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1150: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13860 at Wed Oct 18 15:24:45 UTC 2023 kill -USR1 13860 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13860 killed at Wed Oct 18 15:24:45 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 15:24:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13918 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13918 found at Wed Oct 18 15:24:46 UTC 2023 selfserv_9997 with PID 13918 started at Wed Oct 18 15:24:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1151: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13918 at Wed Oct 18 15:24:46 UTC 2023 kill -USR1 13918 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13918 killed at Wed Oct 18 15:24:46 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9997 starting at Wed Oct 18 15:24:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13976 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13976 found at Wed Oct 18 15:24:47 UTC 2023 selfserv_9997 with PID 13976 started at Wed Oct 18 15:24:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1152: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13976 at Wed Oct 18 15:24:47 UTC 2023 kill -USR1 13976 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13976 killed at Wed Oct 18 15:24:47 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 15:24:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14034 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14034 found at Wed Oct 18 15:24:47 UTC 2023 selfserv_9997 with PID 14034 started at Wed Oct 18 15:24:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1153: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14034 at Wed Oct 18 15:24:48 UTC 2023 kill -USR1 14034 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14034 killed at Wed Oct 18 15:24:48 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 15:24:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14093 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14093 found at Wed Oct 18 15:24:48 UTC 2023 selfserv_9997 with PID 14093 started at Wed Oct 18 15:24:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1154: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14093 at Wed Oct 18 15:24:49 UTC 2023 kill -USR1 14093 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14093 killed at Wed Oct 18 15:24:49 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9997 starting at Wed Oct 18 15:24:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14151 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14151 found at Wed Oct 18 15:24:49 UTC 2023 selfserv_9997 with PID 14151 started at Wed Oct 18 15:24:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1155: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14151 at Wed Oct 18 15:24:49 UTC 2023 kill -USR1 14151 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14151 killed at Wed Oct 18 15:24:49 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9997 starting at Wed Oct 18 15:24:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14209 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14209 found at Wed Oct 18 15:24:49 UTC 2023 selfserv_9997 with PID 14209 started at Wed Oct 18 15:24:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1156: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14209 at Wed Oct 18 15:24:50 UTC 2023 kill -USR1 14209 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14209 killed at Wed Oct 18 15:24:50 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 15:24:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14267 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14267 found at Wed Oct 18 15:24:50 UTC 2023 selfserv_9997 with PID 14267 started at Wed Oct 18 15:24:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1157: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14267 at Wed Oct 18 15:24:51 UTC 2023 kill -USR1 14267 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14267 killed at Wed Oct 18 15:24:51 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9997 starting at Wed Oct 18 15:24:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14310 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14310 found at Wed Oct 18 15:24:51 UTC 2023 selfserv_9997 with PID 14310 started at Wed Oct 18 15:24:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1090: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14310 at Wed Oct 18 15:24:51 UTC 2023 kill -USR1 14310 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14310 killed at Wed Oct 18 15:24:51 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9997 starting at Wed Oct 18 15:24:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14352 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14352 found at Wed Oct 18 15:24:51 UTC 2023 selfserv_9997 with PID 14352 started at Wed Oct 18 15:24:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1091: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9997 with PID 14352 at Wed Oct 18 15:24:52 UTC 2023 kill -USR1 14352 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14352 killed at Wed Oct 18 15:24:52 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9997 starting at Wed Oct 18 15:24:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14394 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14394 found at Wed Oct 18 15:24:52 UTC 2023 selfserv_9997 with PID 14394 started at Wed Oct 18 15:24:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1092: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 14394 at Wed Oct 18 15:24:52 UTC 2023 kill -USR1 14394 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14394 killed at Wed Oct 18 15:24:52 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9997 starting at Wed Oct 18 15:24:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14436 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14436 found at Wed Oct 18 15:24:53 UTC 2023 selfserv_9997 with PID 14436 started at Wed Oct 18 15:24:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1093: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 14436 at Wed Oct 18 15:24:53 UTC 2023 kill -USR1 14436 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14436 killed at Wed Oct 18 15:24:53 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9997 starting at Wed Oct 18 15:24:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14478 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14478 found at Wed Oct 18 15:24:53 UTC 2023 selfserv_9997 with PID 14478 started at Wed Oct 18 15:24:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1094: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 14478 at Wed Oct 18 15:24:54 UTC 2023 kill -USR1 14478 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14478 killed at Wed Oct 18 15:24:54 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9997 starting at Wed Oct 18 15:24:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14520 found at Wed Oct 18 15:24:54 UTC 2023 selfserv_9997 with PID 14520 started at Wed Oct 18 15:24:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1095: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 14520 at Wed Oct 18 15:24:54 UTC 2023 kill -USR1 14520 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14520 killed at Wed Oct 18 15:24:54 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9997 starting at Wed Oct 18 15:24:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14562 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14562 found at Wed Oct 18 15:24:54 UTC 2023 selfserv_9997 with PID 14562 started at Wed Oct 18 15:24:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1096: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 14562 at Wed Oct 18 15:24:55 UTC 2023 kill -USR1 14562 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14562 killed at Wed Oct 18 15:24:55 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9997 starting at Wed Oct 18 15:24:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:24:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14604 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14604 found at Wed Oct 18 15:24:55 UTC 2023 selfserv_9997 with PID 14604 started at Wed Oct 18 15:24:55 UTC 2023 strsclnt -q -p 9997 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 15:24:55 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 15:25:10 UTC 2023 ssl.sh: #1097: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9997 with PID 14604 at Wed Oct 18 15:25:10 UTC 2023 kill -USR1 14604 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14604 killed at Wed Oct 18 15:25:11 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 15:25:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14655 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14655 found at Wed Oct 18 15:25:11 UTC 2023 selfserv_9997 with PID 14655 started at Wed Oct 18 15:25:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14655 at Wed Oct 18 15:25:11 UTC 2023 kill -USR1 14655 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14655 killed at Wed Oct 18 15:25:11 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:25:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14698 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14698 found at Wed Oct 18 15:25:11 UTC 2023 selfserv_9997 with PID 14698 started at Wed Oct 18 15:25:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1099: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14698 at Wed Oct 18 15:25:12 UTC 2023 kill -USR1 14698 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14698 killed at Wed Oct 18 15:25:12 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:25:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14737 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14737 found at Wed Oct 18 15:25:12 UTC 2023 selfserv_9997 with PID 14737 started at Wed Oct 18 15:25:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1100: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 14737 at Wed Oct 18 15:25:12 UTC 2023 kill -USR1 14737 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14737 killed at Wed Oct 18 15:25:12 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:25:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14776 found at Wed Oct 18 15:25:12 UTC 2023 selfserv_9997 with PID 14776 started at Wed Oct 18 15:25:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14776 at Wed Oct 18 15:25:13 UTC 2023 kill -USR1 14776 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14776 killed at Wed Oct 18 15:25:13 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:25:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14815 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14815 found at Wed Oct 18 15:25:13 UTC 2023 selfserv_9997 with PID 14815 started at Wed Oct 18 15:25:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1102: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 14815 at Wed Oct 18 15:25:13 UTC 2023 kill -USR1 14815 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14815 killed at Wed Oct 18 15:25:13 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:25:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14854 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14854 found at Wed Oct 18 15:25:13 UTC 2023 selfserv_9997 with PID 14854 started at Wed Oct 18 15:25:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14854 at Wed Oct 18 15:25:14 UTC 2023 kill -USR1 14854 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14854 killed at Wed Oct 18 15:25:14 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:25:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14893 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14893 found at Wed Oct 18 15:25:14 UTC 2023 selfserv_9997 with PID 14893 started at Wed Oct 18 15:25:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14893 at Wed Oct 18 15:25:14 UTC 2023 kill -USR1 14893 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14893 killed at Wed Oct 18 15:25:14 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:25:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14932 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14932 found at Wed Oct 18 15:25:14 UTC 2023 selfserv_9997 with PID 14932 started at Wed Oct 18 15:25:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14932 at Wed Oct 18 15:25:15 UTC 2023 kill -USR1 14932 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14932 killed at Wed Oct 18 15:25:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:25:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14972 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14972 found at Wed Oct 18 15:25:15 UTC 2023 selfserv_9997 with PID 14972 started at Wed Oct 18 15:25:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1106: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14972 at Wed Oct 18 15:25:15 UTC 2023 kill -USR1 14972 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14972 killed at Wed Oct 18 15:25:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:25:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15011 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15011 found at Wed Oct 18 15:25:15 UTC 2023 selfserv_9997 with PID 15011 started at Wed Oct 18 15:25:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15011 at Wed Oct 18 15:25:16 UTC 2023 kill -USR1 15011 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15011 killed at Wed Oct 18 15:25:16 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:25:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15050 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15050 found at Wed Oct 18 15:25:16 UTC 2023 selfserv_9997 with PID 15050 started at Wed Oct 18 15:25:16 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1108: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15050 at Wed Oct 18 15:25:16 UTC 2023 kill -USR1 15050 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15050 killed at Wed Oct 18 15:25:16 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:25:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15090 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15090 found at Wed Oct 18 15:25:16 UTC 2023 selfserv_9997 with PID 15090 started at Wed Oct 18 15:25:16 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1109: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15090 at Wed Oct 18 15:25:17 UTC 2023 kill -USR1 15090 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15090 killed at Wed Oct 18 15:25:17 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:25:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15131 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15131 found at Wed Oct 18 15:25:17 UTC 2023 selfserv_9997 with PID 15131 started at Wed Oct 18 15:25:17 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1110: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15131 at Wed Oct 18 15:25:17 UTC 2023 kill -USR1 15131 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15131 killed at Wed Oct 18 15:25:17 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:25:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15171 found at Wed Oct 18 15:25:17 UTC 2023 selfserv_9997 with PID 15171 started at Wed Oct 18 15:25:17 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1111: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15171 at Wed Oct 18 15:25:18 UTC 2023 kill -USR1 15171 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15171 killed at Wed Oct 18 15:25:18 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:25:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15212 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15212 found at Wed Oct 18 15:25:18 UTC 2023 selfserv_9997 with PID 15212 started at Wed Oct 18 15:25:18 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1112: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15212 at Wed Oct 18 15:25:18 UTC 2023 kill -USR1 15212 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15212 killed at Wed Oct 18 15:25:18 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:25:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15252 found at Wed Oct 18 15:25:18 UTC 2023 selfserv_9997 with PID 15252 started at Wed Oct 18 15:25:18 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1113: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15252 at Wed Oct 18 15:25:19 UTC 2023 kill -USR1 15252 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15252 killed at Wed Oct 18 15:25:19 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:25:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15292 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15292 found at Wed Oct 18 15:25:19 UTC 2023 selfserv_9997 with PID 15292 started at Wed Oct 18 15:25:19 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1114: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15292 at Wed Oct 18 15:25:19 UTC 2023 kill -USR1 15292 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15292 killed at Wed Oct 18 15:25:19 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:25:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15332 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15332 found at Wed Oct 18 15:25:19 UTC 2023 selfserv_9997 with PID 15332 started at Wed Oct 18 15:25:19 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1115: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15332 at Wed Oct 18 15:25:20 UTC 2023 kill -USR1 15332 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15332 killed at Wed Oct 18 15:25:20 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:25:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15372 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15372 found at Wed Oct 18 15:25:20 UTC 2023 selfserv_9997 with PID 15372 started at Wed Oct 18 15:25:20 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1116: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15372 at Wed Oct 18 15:25:20 UTC 2023 kill -USR1 15372 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15372 killed at Wed Oct 18 15:25:20 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9997 starting at Wed Oct 18 15:25:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 15412 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15412 found at Wed Oct 18 15:25:20 UTC 2023 selfserv_9997 with PID 15412 started at Wed Oct 18 15:25:20 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1117: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1118: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1119: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1120: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1121: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1122: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1123: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1125: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1126: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1131: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1132: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1137: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1138: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1142: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1144: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1147: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1148: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1149: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1150: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1151: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1152: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1153: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1154: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1155: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1156: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1157: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1158: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1159: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1160: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1161: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1162: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1163: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1164: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1165: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1166: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 15412 at Wed Oct 18 15:25:30 UTC 2023 kill -USR1 15412 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15412 killed at Wed Oct 18 15:25:30 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 15:25:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 15961 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15961 found at Wed Oct 18 15:25:30 UTC 2023 selfserv_9997 with PID 15961 started at Wed Oct 18 15:25:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1190: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1191: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1196: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1197: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1202: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1203: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1208: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1209: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1211: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1212: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1213: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1214: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1215: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1216: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1217: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1218: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1219: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1220: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1221: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1222: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1223: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1224: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1225: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1226: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1227: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1228: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1229: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1230: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1231: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1232: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1233: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15961 at Wed Oct 18 15:25:43 UTC 2023 kill -USR1 15961 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15961 killed at Wed Oct 18 15:25:43 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:25:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16788 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16788 found at Wed Oct 18 15:25:43 UTC 2023 selfserv_9997 with PID 16788 started at Wed Oct 18 15:25:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16788 at Wed Oct 18 15:25:44 UTC 2023 kill -USR1 16788 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16788 killed at Wed Oct 18 15:25:44 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:25:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16840 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16840 found at Wed Oct 18 15:25:45 UTC 2023 selfserv_9997 with PID 16840 started at Wed Oct 18 15:25:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16840 at Wed Oct 18 15:25:46 UTC 2023 kill -USR1 16840 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16840 killed at Wed Oct 18 15:25:46 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:25:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16892 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16892 found at Wed Oct 18 15:25:46 UTC 2023 selfserv_9997 with PID 16892 started at Wed Oct 18 15:25:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1246: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16892 at Wed Oct 18 15:25:48 UTC 2023 kill -USR1 16892 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16892 killed at Wed Oct 18 15:25:48 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:25:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16944 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16944 found at Wed Oct 18 15:25:48 UTC 2023 selfserv_9997 with PID 16944 started at Wed Oct 18 15:25:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1247: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16944 at Wed Oct 18 15:25:49 UTC 2023 kill -USR1 16944 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16944 killed at Wed Oct 18 15:25:49 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:25:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16996 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16996 found at Wed Oct 18 15:25:49 UTC 2023 selfserv_9997 with PID 16996 started at Wed Oct 18 15:25:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1248: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16996 at Wed Oct 18 15:25:51 UTC 2023 kill -USR1 16996 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16996 killed at Wed Oct 18 15:25:51 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:25:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17048 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17048 found at Wed Oct 18 15:25:51 UTC 2023 selfserv_9997 with PID 17048 started at Wed Oct 18 15:25:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17048 at Wed Oct 18 15:25:53 UTC 2023 kill -USR1 17048 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17048 killed at Wed Oct 18 15:25:53 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:25:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17100 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17100 found at Wed Oct 18 15:25:53 UTC 2023 selfserv_9997 with PID 17100 started at Wed Oct 18 15:25:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17100 at Wed Oct 18 15:25:54 UTC 2023 kill -USR1 17100 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17100 killed at Wed Oct 18 15:25:54 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:25:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17152 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17152 found at Wed Oct 18 15:25:54 UTC 2023 selfserv_9997 with PID 17152 started at Wed Oct 18 15:25:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17152 at Wed Oct 18 15:25:56 UTC 2023 kill -USR1 17152 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17152 killed at Wed Oct 18 15:25:56 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:25:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17204 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17204 found at Wed Oct 18 15:25:56 UTC 2023 selfserv_9997 with PID 17204 started at Wed Oct 18 15:25:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17204 at Wed Oct 18 15:25:58 UTC 2023 kill -USR1 17204 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17204 killed at Wed Oct 18 15:25:58 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:25:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17256 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17256 found at Wed Oct 18 15:25:58 UTC 2023 selfserv_9997 with PID 17256 started at Wed Oct 18 15:25:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1253: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17256 at Wed Oct 18 15:25:59 UTC 2023 kill -USR1 17256 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17256 killed at Wed Oct 18 15:25:59 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:25:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:25:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17308 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17308 found at Wed Oct 18 15:25:59 UTC 2023 selfserv_9997 with PID 17308 started at Wed Oct 18 15:25:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1254: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17308 at Wed Oct 18 15:26:01 UTC 2023 kill -USR1 17308 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17308 killed at Wed Oct 18 15:26:01 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17360 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17360 found at Wed Oct 18 15:26:01 UTC 2023 selfserv_9997 with PID 17360 started at Wed Oct 18 15:26:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17360 at Wed Oct 18 15:26:03 UTC 2023 kill -USR1 17360 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17360 killed at Wed Oct 18 15:26:03 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17412 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17412 found at Wed Oct 18 15:26:03 UTC 2023 selfserv_9997 with PID 17412 started at Wed Oct 18 15:26:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17412 at Wed Oct 18 15:26:04 UTC 2023 kill -USR1 17412 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17412 killed at Wed Oct 18 15:26:04 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:26:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17464 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17464 found at Wed Oct 18 15:26:05 UTC 2023 selfserv_9997 with PID 17464 started at Wed Oct 18 15:26:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17464 at Wed Oct 18 15:26:06 UTC 2023 kill -USR1 17464 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17464 killed at Wed Oct 18 15:26:06 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17516 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17516 found at Wed Oct 18 15:26:06 UTC 2023 selfserv_9997 with PID 17516 started at Wed Oct 18 15:26:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17516 at Wed Oct 18 15:26:08 UTC 2023 kill -USR1 17516 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17516 killed at Wed Oct 18 15:26:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17568 found at Wed Oct 18 15:26:08 UTC 2023 selfserv_9997 with PID 17568 started at Wed Oct 18 15:26:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1259: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17568 at Wed Oct 18 15:26:09 UTC 2023 kill -USR1 17568 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17568 killed at Wed Oct 18 15:26:09 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:26:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17620 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17620 found at Wed Oct 18 15:26:09 UTC 2023 selfserv_9997 with PID 17620 started at Wed Oct 18 15:26:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1260: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17620 at Wed Oct 18 15:26:11 UTC 2023 kill -USR1 17620 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17620 killed at Wed Oct 18 15:26:11 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17673 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17673 found at Wed Oct 18 15:26:11 UTC 2023 selfserv_9997 with PID 17673 started at Wed Oct 18 15:26:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1261: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17673 at Wed Oct 18 15:26:13 UTC 2023 kill -USR1 17673 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17673 killed at Wed Oct 18 15:26:13 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17727 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17727 found at Wed Oct 18 15:26:13 UTC 2023 selfserv_9997 with PID 17727 started at Wed Oct 18 15:26:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1262: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17727 at Wed Oct 18 15:26:14 UTC 2023 kill -USR1 17727 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17727 killed at Wed Oct 18 15:26:14 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:26:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17779 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17779 found at Wed Oct 18 15:26:14 UTC 2023 selfserv_9997 with PID 17779 started at Wed Oct 18 15:26:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1263: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17779 at Wed Oct 18 15:26:16 UTC 2023 kill -USR1 17779 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17779 killed at Wed Oct 18 15:26:16 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17833 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17833 found at Wed Oct 18 15:26:16 UTC 2023 selfserv_9997 with PID 17833 started at Wed Oct 18 15:26:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1264: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17833 at Wed Oct 18 15:26:18 UTC 2023 kill -USR1 17833 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17833 killed at Wed Oct 18 15:26:18 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17885 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17885 found at Wed Oct 18 15:26:18 UTC 2023 selfserv_9997 with PID 17885 started at Wed Oct 18 15:26:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1265: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17885 at Wed Oct 18 15:26:19 UTC 2023 kill -USR1 17885 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17885 killed at Wed Oct 18 15:26:19 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:26:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17937 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17937 found at Wed Oct 18 15:26:19 UTC 2023 selfserv_9997 with PID 17937 started at Wed Oct 18 15:26:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1266: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17937 at Wed Oct 18 15:26:21 UTC 2023 kill -USR1 17937 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17937 killed at Wed Oct 18 15:26:21 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17989 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17989 found at Wed Oct 18 15:26:21 UTC 2023 selfserv_9997 with PID 17989 started at Wed Oct 18 15:26:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1267: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17989 at Wed Oct 18 15:26:23 UTC 2023 kill -USR1 17989 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17989 killed at Wed Oct 18 15:26:23 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18041 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18041 found at Wed Oct 18 15:26:23 UTC 2023 selfserv_9997 with PID 18041 started at Wed Oct 18 15:26:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1268: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18041 at Wed Oct 18 15:26:24 UTC 2023 kill -USR1 18041 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18041 killed at Wed Oct 18 15:26:24 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:26:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18093 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18093 found at Wed Oct 18 15:26:25 UTC 2023 selfserv_9997 with PID 18093 started at Wed Oct 18 15:26:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1269: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18093 at Wed Oct 18 15:26:26 UTC 2023 kill -USR1 18093 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18093 killed at Wed Oct 18 15:26:26 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18145 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18145 found at Wed Oct 18 15:26:26 UTC 2023 selfserv_9997 with PID 18145 started at Wed Oct 18 15:26:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1270: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18145 at Wed Oct 18 15:26:28 UTC 2023 kill -USR1 18145 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18145 killed at Wed Oct 18 15:26:28 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18197 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18197 found at Wed Oct 18 15:26:28 UTC 2023 selfserv_9997 with PID 18197 started at Wed Oct 18 15:26:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1271: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18197 at Wed Oct 18 15:26:30 UTC 2023 kill -USR1 18197 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18197 killed at Wed Oct 18 15:26:30 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:26:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18249 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18249 found at Wed Oct 18 15:26:30 UTC 2023 selfserv_9997 with PID 18249 started at Wed Oct 18 15:26:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1272: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18249 at Wed Oct 18 15:26:31 UTC 2023 kill -USR1 18249 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18249 killed at Wed Oct 18 15:26:31 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18301 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18301 found at Wed Oct 18 15:26:31 UTC 2023 selfserv_9997 with PID 18301 started at Wed Oct 18 15:26:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1273: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18301 at Wed Oct 18 15:26:33 UTC 2023 kill -USR1 18301 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18301 killed at Wed Oct 18 15:26:33 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18353 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18353 found at Wed Oct 18 15:26:33 UTC 2023 selfserv_9997 with PID 18353 started at Wed Oct 18 15:26:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1274: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18353 at Wed Oct 18 15:26:35 UTC 2023 kill -USR1 18353 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18353 killed at Wed Oct 18 15:26:35 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18405 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18405 found at Wed Oct 18 15:26:35 UTC 2023 selfserv_9997 with PID 18405 started at Wed Oct 18 15:26:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1275: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18405 at Wed Oct 18 15:26:37 UTC 2023 kill -USR1 18405 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18405 killed at Wed Oct 18 15:26:37 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18457 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18457 found at Wed Oct 18 15:26:37 UTC 2023 selfserv_9997 with PID 18457 started at Wed Oct 18 15:26:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1276: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18457 at Wed Oct 18 15:26:38 UTC 2023 kill -USR1 18457 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18457 killed at Wed Oct 18 15:26:38 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18509 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18509 found at Wed Oct 18 15:26:39 UTC 2023 selfserv_9997 with PID 18509 started at Wed Oct 18 15:26:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1277: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18509 at Wed Oct 18 15:26:40 UTC 2023 kill -USR1 18509 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18509 killed at Wed Oct 18 15:26:40 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18561 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18561 found at Wed Oct 18 15:26:40 UTC 2023 selfserv_9997 with PID 18561 started at Wed Oct 18 15:26:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1278: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18561 at Wed Oct 18 15:26:42 UTC 2023 kill -USR1 18561 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18561 killed at Wed Oct 18 15:26:42 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18629 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18629 found at Wed Oct 18 15:26:42 UTC 2023 selfserv_9997 with PID 18629 started at Wed Oct 18 15:26:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1279: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18629 at Wed Oct 18 15:26:44 UTC 2023 kill -USR1 18629 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18629 killed at Wed Oct 18 15:26:44 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:26:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18681 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18681 found at Wed Oct 18 15:26:44 UTC 2023 selfserv_9997 with PID 18681 started at Wed Oct 18 15:26:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1280: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18681 at Wed Oct 18 15:26:45 UTC 2023 kill -USR1 18681 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18681 killed at Wed Oct 18 15:26:45 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18733 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18733 found at Wed Oct 18 15:26:45 UTC 2023 selfserv_9997 with PID 18733 started at Wed Oct 18 15:26:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1281: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18733 at Wed Oct 18 15:26:47 UTC 2023 kill -USR1 18733 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18733 killed at Wed Oct 18 15:26:47 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:26:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18786 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18786 found at Wed Oct 18 15:26:47 UTC 2023 selfserv_9997 with PID 18786 started at Wed Oct 18 15:26:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1282: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18786 at Wed Oct 18 15:26:49 UTC 2023 kill -USR1 18786 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18786 killed at Wed Oct 18 15:26:49 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18838 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18838 found at Wed Oct 18 15:26:49 UTC 2023 selfserv_9997 with PID 18838 started at Wed Oct 18 15:26:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1283: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18838 at Wed Oct 18 15:26:50 UTC 2023 kill -USR1 18838 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18838 killed at Wed Oct 18 15:26:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:26:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18890 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18890 found at Wed Oct 18 15:26:51 UTC 2023 selfserv_9997 with PID 18890 started at Wed Oct 18 15:26:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1284: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18890 at Wed Oct 18 15:26:52 UTC 2023 kill -USR1 18890 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18890 killed at Wed Oct 18 15:26:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18942 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18942 found at Wed Oct 18 15:26:52 UTC 2023 selfserv_9997 with PID 18942 started at Wed Oct 18 15:26:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1285: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18942 at Wed Oct 18 15:26:54 UTC 2023 kill -USR1 18942 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18942 killed at Wed Oct 18 15:26:54 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:26:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18994 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18994 found at Wed Oct 18 15:26:54 UTC 2023 selfserv_9997 with PID 18994 started at Wed Oct 18 15:26:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1286: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18994 at Wed Oct 18 15:26:55 UTC 2023 kill -USR1 18994 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18994 killed at Wed Oct 18 15:26:55 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19046 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19046 found at Wed Oct 18 15:26:56 UTC 2023 selfserv_9997 with PID 19046 started at Wed Oct 18 15:26:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1287: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19046 at Wed Oct 18 15:26:57 UTC 2023 kill -USR1 19046 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19046 killed at Wed Oct 18 15:26:57 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:26:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19098 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19098 found at Wed Oct 18 15:26:57 UTC 2023 selfserv_9997 with PID 19098 started at Wed Oct 18 15:26:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1288: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19098 at Wed Oct 18 15:26:59 UTC 2023 kill -USR1 19098 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19098 killed at Wed Oct 18 15:26:59 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:26:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:26:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19150 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19150 found at Wed Oct 18 15:26:59 UTC 2023 selfserv_9997 with PID 19150 started at Wed Oct 18 15:26:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1289: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19150 at Wed Oct 18 15:27:01 UTC 2023 kill -USR1 19150 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19150 killed at Wed Oct 18 15:27:01 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:27:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19202 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19202 found at Wed Oct 18 15:27:01 UTC 2023 selfserv_9997 with PID 19202 started at Wed Oct 18 15:27:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1290: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19202 at Wed Oct 18 15:27:02 UTC 2023 kill -USR1 19202 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19202 killed at Wed Oct 18 15:27:02 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:27:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19254 found at Wed Oct 18 15:27:02 UTC 2023 selfserv_9997 with PID 19254 started at Wed Oct 18 15:27:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1291: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19254 at Wed Oct 18 15:27:04 UTC 2023 kill -USR1 19254 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19254 killed at Wed Oct 18 15:27:04 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:27:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19306 found at Wed Oct 18 15:27:04 UTC 2023 selfserv_9997 with PID 19306 started at Wed Oct 18 15:27:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1292: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19306 at Wed Oct 18 15:27:05 UTC 2023 kill -USR1 19306 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19306 killed at Wed Oct 18 15:27:05 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:27:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19358 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19358 found at Wed Oct 18 15:27:06 UTC 2023 selfserv_9997 with PID 19358 started at Wed Oct 18 15:27:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1293: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19358 at Wed Oct 18 15:27:07 UTC 2023 kill -USR1 19358 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19358 killed at Wed Oct 18 15:27:07 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:27:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19410 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19410 found at Wed Oct 18 15:27:08 UTC 2023 selfserv_9997 with PID 19410 started at Wed Oct 18 15:27:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1294: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19410 at Wed Oct 18 15:27:09 UTC 2023 kill -USR1 19410 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19410 killed at Wed Oct 18 15:27:09 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:27:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19462 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19462 found at Wed Oct 18 15:27:09 UTC 2023 selfserv_9997 with PID 19462 started at Wed Oct 18 15:27:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1295: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19462 at Wed Oct 18 15:27:11 UTC 2023 kill -USR1 19462 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19462 killed at Wed Oct 18 15:27:11 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:27:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19514 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19514 found at Wed Oct 18 15:27:11 UTC 2023 selfserv_9997 with PID 19514 started at Wed Oct 18 15:27:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1296: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19514 at Wed Oct 18 15:27:12 UTC 2023 kill -USR1 19514 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19514 killed at Wed Oct 18 15:27:12 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:27:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19566 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19566 found at Wed Oct 18 15:27:13 UTC 2023 selfserv_9997 with PID 19566 started at Wed Oct 18 15:27:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1297: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19566 at Wed Oct 18 15:27:14 UTC 2023 kill -USR1 19566 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19566 killed at Wed Oct 18 15:27:14 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:27:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19618 found at Wed Oct 18 15:27:15 UTC 2023 selfserv_9997 with PID 19618 started at Wed Oct 18 15:27:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1298: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19618 at Wed Oct 18 15:27:16 UTC 2023 kill -USR1 19618 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19618 killed at Wed Oct 18 15:27:16 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:27:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19670 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19670 found at Wed Oct 18 15:27:16 UTC 2023 selfserv_9997 with PID 19670 started at Wed Oct 18 15:27:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1299: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19670 at Wed Oct 18 15:27:18 UTC 2023 kill -USR1 19670 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19670 killed at Wed Oct 18 15:27:18 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:27:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19722 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19722 found at Wed Oct 18 15:27:18 UTC 2023 selfserv_9997 with PID 19722 started at Wed Oct 18 15:27:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1300: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19722 at Wed Oct 18 15:27:20 UTC 2023 kill -USR1 19722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19722 killed at Wed Oct 18 15:27:20 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:27:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19774 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19774 found at Wed Oct 18 15:27:20 UTC 2023 selfserv_9997 with PID 19774 started at Wed Oct 18 15:27:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1301: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19774 at Wed Oct 18 15:27:22 UTC 2023 kill -USR1 19774 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19774 killed at Wed Oct 18 15:27:22 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 15:27:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19857 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19857 found at Wed Oct 18 15:27:22 UTC 2023 selfserv_9997 with PID 19857 started at Wed Oct 18 15:27:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1244: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19857 at Wed Oct 18 15:27:23 UTC 2023 kill -USR1 19857 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19857 killed at Wed Oct 18 15:27:23 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:27:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19899 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19899 found at Wed Oct 18 15:27:23 UTC 2023 selfserv_9997 with PID 19899 started at Wed Oct 18 15:27:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1245: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19899 at Wed Oct 18 15:27:24 UTC 2023 kill -USR1 19899 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19899 killed at Wed Oct 18 15:27:24 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:27:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19938 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19938 found at Wed Oct 18 15:27:24 UTC 2023 selfserv_9997 with PID 19938 started at Wed Oct 18 15:27:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1246: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 19938 at Wed Oct 18 15:27:24 UTC 2023 kill -USR1 19938 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19938 killed at Wed Oct 18 15:27:24 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:27:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19977 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19977 found at Wed Oct 18 15:27:25 UTC 2023 selfserv_9997 with PID 19977 started at Wed Oct 18 15:27:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1247: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19977 at Wed Oct 18 15:27:25 UTC 2023 kill -USR1 19977 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19977 killed at Wed Oct 18 15:27:25 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:27:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20017 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20017 found at Wed Oct 18 15:27:25 UTC 2023 selfserv_9997 with PID 20017 started at Wed Oct 18 15:27:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1248: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 20017 at Wed Oct 18 15:27:26 UTC 2023 kill -USR1 20017 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20017 killed at Wed Oct 18 15:27:26 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:27:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20056 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20056 found at Wed Oct 18 15:27:26 UTC 2023 selfserv_9997 with PID 20056 started at Wed Oct 18 15:27:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1249: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20056 at Wed Oct 18 15:27:27 UTC 2023 kill -USR1 20056 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20056 killed at Wed Oct 18 15:27:27 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:27:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20095 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20095 found at Wed Oct 18 15:27:27 UTC 2023 selfserv_9997 with PID 20095 started at Wed Oct 18 15:27:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20095 at Wed Oct 18 15:27:28 UTC 2023 kill -USR1 20095 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20095 killed at Wed Oct 18 15:27:28 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:27:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20134 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20134 found at Wed Oct 18 15:27:28 UTC 2023 selfserv_9997 with PID 20134 started at Wed Oct 18 15:27:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20134 at Wed Oct 18 15:27:28 UTC 2023 kill -USR1 20134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20134 killed at Wed Oct 18 15:27:28 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:27:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20173 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20173 found at Wed Oct 18 15:27:29 UTC 2023 selfserv_9997 with PID 20173 started at Wed Oct 18 15:27:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20173 at Wed Oct 18 15:27:29 UTC 2023 kill -USR1 20173 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20173 killed at Wed Oct 18 15:27:29 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:27:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20213 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20213 found at Wed Oct 18 15:27:29 UTC 2023 selfserv_9997 with PID 20213 started at Wed Oct 18 15:27:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1253: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20213 at Wed Oct 18 15:27:30 UTC 2023 kill -USR1 20213 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20213 killed at Wed Oct 18 15:27:30 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:27:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20252 found at Wed Oct 18 15:27:30 UTC 2023 selfserv_9997 with PID 20252 started at Wed Oct 18 15:27:30 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1254: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20252 at Wed Oct 18 15:27:31 UTC 2023 kill -USR1 20252 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20252 killed at Wed Oct 18 15:27:31 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:27:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20292 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20292 found at Wed Oct 18 15:27:31 UTC 2023 selfserv_9997 with PID 20292 started at Wed Oct 18 15:27:31 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1255: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20292 at Wed Oct 18 15:27:32 UTC 2023 kill -USR1 20292 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20292 killed at Wed Oct 18 15:27:32 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:27:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20333 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20333 found at Wed Oct 18 15:27:32 UTC 2023 selfserv_9997 with PID 20333 started at Wed Oct 18 15:27:32 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1256: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20333 at Wed Oct 18 15:27:32 UTC 2023 kill -USR1 20333 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20333 killed at Wed Oct 18 15:27:32 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:27:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20373 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20373 found at Wed Oct 18 15:27:33 UTC 2023 selfserv_9997 with PID 20373 started at Wed Oct 18 15:27:33 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1257: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20373 at Wed Oct 18 15:27:33 UTC 2023 kill -USR1 20373 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20373 killed at Wed Oct 18 15:27:33 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:27:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20413 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20413 found at Wed Oct 18 15:27:33 UTC 2023 selfserv_9997 with PID 20413 started at Wed Oct 18 15:27:33 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1258: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20413 at Wed Oct 18 15:27:34 UTC 2023 kill -USR1 20413 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20413 killed at Wed Oct 18 15:27:34 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:27:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20453 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20453 found at Wed Oct 18 15:27:34 UTC 2023 selfserv_9997 with PID 20453 started at Wed Oct 18 15:27:34 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1259: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20453 at Wed Oct 18 15:27:35 UTC 2023 kill -USR1 20453 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20453 killed at Wed Oct 18 15:27:35 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:27:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20493 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20493 found at Wed Oct 18 15:27:35 UTC 2023 selfserv_9997 with PID 20493 started at Wed Oct 18 15:27:35 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1260: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20493 at Wed Oct 18 15:27:36 UTC 2023 kill -USR1 20493 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20493 killed at Wed Oct 18 15:27:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:27:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20533 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20533 found at Wed Oct 18 15:27:36 UTC 2023 selfserv_9997 with PID 20533 started at Wed Oct 18 15:27:36 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1261: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20533 at Wed Oct 18 15:27:36 UTC 2023 kill -USR1 20533 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20533 killed at Wed Oct 18 15:27:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:27:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20573 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20573 found at Wed Oct 18 15:27:37 UTC 2023 selfserv_9997 with PID 20573 started at Wed Oct 18 15:27:37 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1262: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20573 at Wed Oct 18 15:27:37 UTC 2023 kill -USR1 20573 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20573 killed at Wed Oct 18 15:27:37 UTC 2023 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server -fips false -force FIPS mode disabled. ssl.sh: #1263: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/server -list ssl.sh: #1264: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1265: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1266: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/ext_server -list ssl.sh: #1267: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1268: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/client -fips true -force FIPS mode enabled. ssl.sh: #1269: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/client -list ssl.sh: #1270: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1271: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1272: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/ext_client -list ssl.sh: #1273: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1274: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9997 starting at Wed Oct 18 15:27:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 20695 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20695 found at Wed Oct 18 15:27:39 UTC 2023 selfserv_9997 with PID 20695 started at Wed Oct 18 15:27:39 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1275: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1276: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1277: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1278: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1279: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1280: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1281: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1282: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1283: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1284: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1305: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1306: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1308: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1309: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1311: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1312: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1314: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1315: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1317: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1318: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1319: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1320: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1321: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1322: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1323: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1324: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1325: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 20695 at Wed Oct 18 15:27:56 UTC 2023 kill -USR1 20695 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20695 killed at Wed Oct 18 15:27:56 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 15:27:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:27:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 21259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21259 found at Wed Oct 18 15:27:56 UTC 2023 selfserv_9997 with PID 21259 started at Wed Oct 18 15:27:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1326: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1327: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1328: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1329: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1330: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1331: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1332: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1333: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1334: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1335: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1336: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1337: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1338: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1339: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1340: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1341: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1342: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1343: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1344: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1345: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1346: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1347: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1348: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1349: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1350: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1351: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1352: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1353: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1354: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1355: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1356: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1357: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1358: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1359: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1360: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1361: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1362: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1363: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1364: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1365: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1366: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1367: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1368: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1369: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1370: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1371: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1372: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21259 at Wed Oct 18 15:28:22 UTC 2023 kill -USR1 21259 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21259 killed at Wed Oct 18 15:28:22 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9997 starting at Wed Oct 18 15:28:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:28:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22058 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22058 found at Wed Oct 18 15:28:22 UTC 2023 selfserv_9997 with PID 22058 started at Wed Oct 18 15:28:22 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1402: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1403: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22058 at Wed Oct 18 15:28:23 UTC 2023 kill -USR1 22058 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22058 killed at Wed Oct 18 15:28:23 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:28:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:28:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22138 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22138 found at Wed Oct 18 15:28:23 UTC 2023 selfserv_9997 with PID 22138 started at Wed Oct 18 15:28:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1402: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22138 at Wed Oct 18 15:28:24 UTC 2023 kill -USR1 22138 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22138 killed at Wed Oct 18 15:28:24 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:28:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:28:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22190 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22190 found at Wed Oct 18 15:28:24 UTC 2023 selfserv_9997 with PID 22190 started at Wed Oct 18 15:28:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1403: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22190 at Wed Oct 18 15:28:49 UTC 2023 kill -USR1 22190 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22190 killed at Wed Oct 18 15:28:49 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:28:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:28:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22257 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22257 found at Wed Oct 18 15:28:49 UTC 2023 selfserv_9997 with PID 22257 started at Wed Oct 18 15:28:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1404: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22257 at Wed Oct 18 15:28:49 UTC 2023 kill -USR1 22257 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22257 killed at Wed Oct 18 15:28:50 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:28:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:28:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22321 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22321 found at Wed Oct 18 15:28:50 UTC 2023 selfserv_9997 with PID 22321 started at Wed Oct 18 15:28:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1405: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22321 at Wed Oct 18 15:28:51 UTC 2023 kill -USR1 22321 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22321 killed at Wed Oct 18 15:28:51 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:28:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:28:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22373 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22373 found at Wed Oct 18 15:28:51 UTC 2023 selfserv_9997 with PID 22373 started at Wed Oct 18 15:28:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1406: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22373 at Wed Oct 18 15:29:14 UTC 2023 kill -USR1 22373 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22373 killed at Wed Oct 18 15:29:14 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:29:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:29:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22426 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22426 found at Wed Oct 18 15:29:15 UTC 2023 selfserv_9997 with PID 22426 started at Wed Oct 18 15:29:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1407: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22426 at Wed Oct 18 15:29:15 UTC 2023 kill -USR1 22426 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22426 killed at Wed Oct 18 15:29:15 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:29:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:29:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22490 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22490 found at Wed Oct 18 15:29:15 UTC 2023 selfserv_9997 with PID 22490 started at Wed Oct 18 15:29:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1408: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22490 at Wed Oct 18 15:29:16 UTC 2023 kill -USR1 22490 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22490 killed at Wed Oct 18 15:29:16 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:29:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:29:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22542 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22542 found at Wed Oct 18 15:29:17 UTC 2023 selfserv_9997 with PID 22542 started at Wed Oct 18 15:29:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1409: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22542 at Wed Oct 18 15:29:41 UTC 2023 kill -USR1 22542 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22542 killed at Wed Oct 18 15:29:41 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:29:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:29:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22607 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22607 found at Wed Oct 18 15:29:41 UTC 2023 selfserv_9997 with PID 22607 started at Wed Oct 18 15:29:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22607 at Wed Oct 18 15:29:42 UTC 2023 kill -USR1 22607 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22607 killed at Wed Oct 18 15:29:42 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:29:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:29:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22673 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22673 found at Wed Oct 18 15:29:42 UTC 2023 selfserv_9997 with PID 22673 started at Wed Oct 18 15:29:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1411: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22673 at Wed Oct 18 15:29:43 UTC 2023 kill -USR1 22673 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22673 killed at Wed Oct 18 15:29:43 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:29:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:29:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22728 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22728 found at Wed Oct 18 15:29:44 UTC 2023 selfserv_9997 with PID 22728 started at Wed Oct 18 15:29:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22728 at Wed Oct 18 15:30:08 UTC 2023 kill -USR1 22728 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22728 killed at Wed Oct 18 15:30:08 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:30:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:30:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22837 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22837 found at Wed Oct 18 15:30:08 UTC 2023 selfserv_9997 with PID 22837 started at Wed Oct 18 15:30:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22837 at Wed Oct 18 15:30:09 UTC 2023 kill -USR1 22837 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22837 killed at Wed Oct 18 15:30:09 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:30:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:30:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22901 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22901 found at Wed Oct 18 15:30:09 UTC 2023 selfserv_9997 with PID 22901 started at Wed Oct 18 15:30:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1414: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22901 at Wed Oct 18 15:30:10 UTC 2023 kill -USR1 22901 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22901 killed at Wed Oct 18 15:30:10 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:30:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:30:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22953 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22953 found at Wed Oct 18 15:30:10 UTC 2023 selfserv_9997 with PID 22953 started at Wed Oct 18 15:30:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1415: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22953 at Wed Oct 18 15:30:34 UTC 2023 kill -USR1 22953 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22953 killed at Wed Oct 18 15:30:34 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:30:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:30:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23005 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23005 found at Wed Oct 18 15:30:34 UTC 2023 selfserv_9997 with PID 23005 started at Wed Oct 18 15:30:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23005 at Wed Oct 18 15:30:35 UTC 2023 kill -USR1 23005 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23005 killed at Wed Oct 18 15:30:35 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:30:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:30:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23061 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23061 found at Wed Oct 18 15:30:35 UTC 2023 selfserv_9997 with PID 23061 started at Wed Oct 18 15:30:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23061 at Wed Oct 18 15:30:35 UTC 2023 kill -USR1 23061 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23061 killed at Wed Oct 18 15:30:35 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:30:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:30:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23117 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23117 found at Wed Oct 18 15:30:36 UTC 2023 selfserv_9997 with PID 23117 started at Wed Oct 18 15:30:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1418: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23117 at Wed Oct 18 15:30:37 UTC 2023 kill -USR1 23117 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23117 killed at Wed Oct 18 15:30:37 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:30:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:30:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23173 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23173 found at Wed Oct 18 15:30:37 UTC 2023 selfserv_9997 with PID 23173 started at Wed Oct 18 15:30:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23173 at Wed Oct 18 15:30:38 UTC 2023 kill -USR1 23173 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23173 killed at Wed Oct 18 15:30:38 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:30:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:30:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23233 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23233 found at Wed Oct 18 15:30:38 UTC 2023 selfserv_9997 with PID 23233 started at Wed Oct 18 15:30:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1420: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23233 at Wed Oct 18 15:31:02 UTC 2023 kill -USR1 23233 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23233 killed at Wed Oct 18 15:31:02 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:31:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:31:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23300 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23300 found at Wed Oct 18 15:31:03 UTC 2023 selfserv_9997 with PID 23300 started at Wed Oct 18 15:31:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1421: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23300 at Wed Oct 18 15:31:03 UTC 2023 kill -USR1 23300 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23300 killed at Wed Oct 18 15:31:03 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:31:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:31:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23360 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23360 found at Wed Oct 18 15:31:03 UTC 2023 selfserv_9997 with PID 23360 started at Wed Oct 18 15:31:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1422: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23360 at Wed Oct 18 15:31:27 UTC 2023 kill -USR1 23360 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23360 killed at Wed Oct 18 15:31:27 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:31:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:31:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23413 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23413 found at Wed Oct 18 15:31:27 UTC 2023 selfserv_9997 with PID 23413 started at Wed Oct 18 15:31:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23413 at Wed Oct 18 15:31:28 UTC 2023 kill -USR1 23413 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23413 killed at Wed Oct 18 15:31:28 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:31:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:31:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23474 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23474 found at Wed Oct 18 15:31:28 UTC 2023 selfserv_9997 with PID 23474 started at Wed Oct 18 15:31:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1424: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23474 at Wed Oct 18 15:31:52 UTC 2023 kill -USR1 23474 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23474 killed at Wed Oct 18 15:31:52 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:31:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:31:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23541 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23541 found at Wed Oct 18 15:31:52 UTC 2023 selfserv_9997 with PID 23541 started at Wed Oct 18 15:31:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23541 at Wed Oct 18 15:31:53 UTC 2023 kill -USR1 23541 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23541 killed at Wed Oct 18 15:31:53 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:31:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:31:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23601 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23601 found at Wed Oct 18 15:31:53 UTC 2023 selfserv_9997 with PID 23601 started at Wed Oct 18 15:31:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1426: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23601 at Wed Oct 18 15:32:17 UTC 2023 kill -USR1 23601 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23601 killed at Wed Oct 18 15:32:17 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:32:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23654 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23654 found at Wed Oct 18 15:32:18 UTC 2023 selfserv_9997 with PID 23654 started at Wed Oct 18 15:32:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1427: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23654 at Wed Oct 18 15:32:18 UTC 2023 kill -USR1 23654 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23654 killed at Wed Oct 18 15:32:18 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:32:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23714 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23714 found at Wed Oct 18 15:32:18 UTC 2023 selfserv_9997 with PID 23714 started at Wed Oct 18 15:32:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1428: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23714 at Wed Oct 18 15:32:42 UTC 2023 kill -USR1 23714 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23714 killed at Wed Oct 18 15:32:42 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:32:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23781 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23781 found at Wed Oct 18 15:32:42 UTC 2023 selfserv_9997 with PID 23781 started at Wed Oct 18 15:32:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1429: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23781 at Wed Oct 18 15:32:43 UTC 2023 kill -USR1 23781 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23781 killed at Wed Oct 18 15:32:43 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:32:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23835 found at Wed Oct 18 15:32:43 UTC 2023 selfserv_9997 with PID 23835 started at Wed Oct 18 15:32:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1430: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23835 at Wed Oct 18 15:32:44 UTC 2023 kill -USR1 23835 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23835 killed at Wed Oct 18 15:32:44 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:32:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23888 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23888 found at Wed Oct 18 15:32:44 UTC 2023 selfserv_9997 with PID 23888 started at Wed Oct 18 15:32:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1431: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23888 at Wed Oct 18 15:32:45 UTC 2023 kill -USR1 23888 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23888 killed at Wed Oct 18 15:32:45 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 15:32:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23946 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23946 found at Wed Oct 18 15:32:46 UTC 2023 selfserv_9997 with PID 23946 started at Wed Oct 18 15:32:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1432: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23946 at Wed Oct 18 15:32:46 UTC 2023 kill -USR1 23946 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23946 killed at Wed Oct 18 15:32:46 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 15:32:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24004 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24004 found at Wed Oct 18 15:32:46 UTC 2023 selfserv_9997 with PID 24004 started at Wed Oct 18 15:32:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1433: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24004 at Wed Oct 18 15:32:47 UTC 2023 kill -USR1 24004 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24004 killed at Wed Oct 18 15:32:47 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 15:32:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24062 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24062 found at Wed Oct 18 15:32:47 UTC 2023 selfserv_9997 with PID 24062 started at Wed Oct 18 15:32:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1434: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24062 at Wed Oct 18 15:32:47 UTC 2023 kill -USR1 24062 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24062 killed at Wed Oct 18 15:32:47 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 15:32:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24120 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24120 found at Wed Oct 18 15:32:48 UTC 2023 selfserv_9997 with PID 24120 started at Wed Oct 18 15:32:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1435: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24120 at Wed Oct 18 15:32:48 UTC 2023 kill -USR1 24120 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24120 killed at Wed Oct 18 15:32:48 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9997 starting at Wed Oct 18 15:32:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24178 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24178 found at Wed Oct 18 15:32:49 UTC 2023 selfserv_9997 with PID 24178 started at Wed Oct 18 15:32:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1436: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24178 at Wed Oct 18 15:32:49 UTC 2023 kill -USR1 24178 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24178 killed at Wed Oct 18 15:32:49 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 15:32:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24236 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24236 found at Wed Oct 18 15:32:49 UTC 2023 selfserv_9997 with PID 24236 started at Wed Oct 18 15:32:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1437: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24236 at Wed Oct 18 15:32:50 UTC 2023 kill -USR1 24236 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24236 killed at Wed Oct 18 15:32:50 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 15:32:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24295 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24295 found at Wed Oct 18 15:32:50 UTC 2023 selfserv_9997 with PID 24295 started at Wed Oct 18 15:32:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1438: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24295 at Wed Oct 18 15:32:51 UTC 2023 kill -USR1 24295 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24295 killed at Wed Oct 18 15:32:51 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9997 starting at Wed Oct 18 15:32:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24353 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24353 found at Wed Oct 18 15:32:51 UTC 2023 selfserv_9997 with PID 24353 started at Wed Oct 18 15:32:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1439: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24353 at Wed Oct 18 15:32:51 UTC 2023 kill -USR1 24353 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24353 killed at Wed Oct 18 15:32:51 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9997 starting at Wed Oct 18 15:32:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24411 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24411 found at Wed Oct 18 15:32:52 UTC 2023 selfserv_9997 with PID 24411 started at Wed Oct 18 15:32:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1440: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24411 at Wed Oct 18 15:32:52 UTC 2023 kill -USR1 24411 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24411 killed at Wed Oct 18 15:32:52 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 15:32:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24470 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24470 found at Wed Oct 18 15:32:52 UTC 2023 selfserv_9997 with PID 24470 started at Wed Oct 18 15:32:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1441: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24470 at Wed Oct 18 15:32:53 UTC 2023 kill -USR1 24470 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24470 killed at Wed Oct 18 15:32:53 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9997 starting at Wed Oct 18 15:32:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24512 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24512 found at Wed Oct 18 15:32:53 UTC 2023 selfserv_9997 with PID 24512 started at Wed Oct 18 15:32:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1402: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24512 at Wed Oct 18 15:32:53 UTC 2023 kill -USR1 24512 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24512 killed at Wed Oct 18 15:32:53 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9997 starting at Wed Oct 18 15:32:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24556 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24556 found at Wed Oct 18 15:32:54 UTC 2023 selfserv_9997 with PID 24556 started at Wed Oct 18 15:32:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1403: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9997 with PID 24556 at Wed Oct 18 15:32:54 UTC 2023 kill -USR1 24556 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24556 killed at Wed Oct 18 15:32:54 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9997 starting at Wed Oct 18 15:32:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24598 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24598 found at Wed Oct 18 15:32:55 UTC 2023 selfserv_9997 with PID 24598 started at Wed Oct 18 15:32:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1404: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 24598 at Wed Oct 18 15:32:55 UTC 2023 kill -USR1 24598 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24598 killed at Wed Oct 18 15:32:55 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9997 starting at Wed Oct 18 15:32:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24640 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24640 found at Wed Oct 18 15:32:55 UTC 2023 selfserv_9997 with PID 24640 started at Wed Oct 18 15:32:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1405: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 24640 at Wed Oct 18 15:32:56 UTC 2023 kill -USR1 24640 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24640 killed at Wed Oct 18 15:32:56 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9997 starting at Wed Oct 18 15:32:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24682 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24682 found at Wed Oct 18 15:32:56 UTC 2023 selfserv_9997 with PID 24682 started at Wed Oct 18 15:32:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1406: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 24682 at Wed Oct 18 15:32:56 UTC 2023 kill -USR1 24682 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24682 killed at Wed Oct 18 15:32:56 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9997 starting at Wed Oct 18 15:32:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24724 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24724 found at Wed Oct 18 15:32:57 UTC 2023 selfserv_9997 with PID 24724 started at Wed Oct 18 15:32:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1407: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 24724 at Wed Oct 18 15:32:57 UTC 2023 kill -USR1 24724 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24724 killed at Wed Oct 18 15:32:57 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9997 starting at Wed Oct 18 15:32:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24766 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24766 found at Wed Oct 18 15:32:57 UTC 2023 selfserv_9997 with PID 24766 started at Wed Oct 18 15:32:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1408: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 24766 at Wed Oct 18 15:32:58 UTC 2023 kill -USR1 24766 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24766 killed at Wed Oct 18 15:32:58 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9997 starting at Wed Oct 18 15:32:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:32:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24808 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24808 found at Wed Oct 18 15:32:58 UTC 2023 selfserv_9997 with PID 24808 started at Wed Oct 18 15:32:58 UTC 2023 strsclnt -q -p 9997 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 15:32:58 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 15:33:14 UTC 2023 ssl.sh: #1409: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9997 with PID 24808 at Wed Oct 18 15:33:14 UTC 2023 kill -USR1 24808 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24808 killed at Wed Oct 18 15:33:14 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 15:33:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24860 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24860 found at Wed Oct 18 15:33:14 UTC 2023 selfserv_9997 with PID 24860 started at Wed Oct 18 15:33:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24860 at Wed Oct 18 15:33:15 UTC 2023 kill -USR1 24860 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24860 killed at Wed Oct 18 15:33:15 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:33:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24902 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24902 found at Wed Oct 18 15:33:15 UTC 2023 selfserv_9997 with PID 24902 started at Wed Oct 18 15:33:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1411: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24902 at Wed Oct 18 15:33:15 UTC 2023 kill -USR1 24902 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24902 killed at Wed Oct 18 15:33:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:33:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24941 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24941 found at Wed Oct 18 15:33:15 UTC 2023 selfserv_9997 with PID 24941 started at Wed Oct 18 15:33:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1412: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 24941 at Wed Oct 18 15:33:16 UTC 2023 kill -USR1 24941 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24941 killed at Wed Oct 18 15:33:16 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:33:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24980 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24980 found at Wed Oct 18 15:33:16 UTC 2023 selfserv_9997 with PID 24980 started at Wed Oct 18 15:33:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24980 at Wed Oct 18 15:33:16 UTC 2023 kill -USR1 24980 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24980 killed at Wed Oct 18 15:33:16 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:33:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25019 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25019 found at Wed Oct 18 15:33:16 UTC 2023 selfserv_9997 with PID 25019 started at Wed Oct 18 15:33:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1414: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 25019 at Wed Oct 18 15:33:17 UTC 2023 kill -USR1 25019 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25019 killed at Wed Oct 18 15:33:17 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:33:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25059 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25059 found at Wed Oct 18 15:33:17 UTC 2023 selfserv_9997 with PID 25059 started at Wed Oct 18 15:33:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1415: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25059 at Wed Oct 18 15:33:17 UTC 2023 kill -USR1 25059 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25059 killed at Wed Oct 18 15:33:17 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:33:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25098 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25098 found at Wed Oct 18 15:33:17 UTC 2023 selfserv_9997 with PID 25098 started at Wed Oct 18 15:33:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25098 at Wed Oct 18 15:33:18 UTC 2023 kill -USR1 25098 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25098 killed at Wed Oct 18 15:33:18 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:33:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25137 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25137 found at Wed Oct 18 15:33:18 UTC 2023 selfserv_9997 with PID 25137 started at Wed Oct 18 15:33:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25137 at Wed Oct 18 15:33:18 UTC 2023 kill -USR1 25137 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25137 killed at Wed Oct 18 15:33:18 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:33:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25177 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25177 found at Wed Oct 18 15:33:19 UTC 2023 selfserv_9997 with PID 25177 started at Wed Oct 18 15:33:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1418: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25177 at Wed Oct 18 15:33:19 UTC 2023 kill -USR1 25177 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25177 killed at Wed Oct 18 15:33:19 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:33:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25216 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25216 found at Wed Oct 18 15:33:19 UTC 2023 selfserv_9997 with PID 25216 started at Wed Oct 18 15:33:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25216 at Wed Oct 18 15:33:19 UTC 2023 kill -USR1 25216 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25216 killed at Wed Oct 18 15:33:19 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:33:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25255 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25255 found at Wed Oct 18 15:33:20 UTC 2023 selfserv_9997 with PID 25255 started at Wed Oct 18 15:33:20 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1420: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25255 at Wed Oct 18 15:33:20 UTC 2023 kill -USR1 25255 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25255 killed at Wed Oct 18 15:33:20 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:33:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25295 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25295 found at Wed Oct 18 15:33:20 UTC 2023 selfserv_9997 with PID 25295 started at Wed Oct 18 15:33:20 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1421: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25295 at Wed Oct 18 15:33:20 UTC 2023 kill -USR1 25295 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25295 killed at Wed Oct 18 15:33:20 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:33:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25335 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25335 found at Wed Oct 18 15:33:21 UTC 2023 selfserv_9997 with PID 25335 started at Wed Oct 18 15:33:21 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1422: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25335 at Wed Oct 18 15:33:21 UTC 2023 kill -USR1 25335 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25335 killed at Wed Oct 18 15:33:21 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:33:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25376 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25376 found at Wed Oct 18 15:33:21 UTC 2023 selfserv_9997 with PID 25376 started at Wed Oct 18 15:33:21 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1423: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25376 at Wed Oct 18 15:33:21 UTC 2023 kill -USR1 25376 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25376 killed at Wed Oct 18 15:33:21 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:33:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25416 found at Wed Oct 18 15:33:22 UTC 2023 selfserv_9997 with PID 25416 started at Wed Oct 18 15:33:22 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1424: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25416 at Wed Oct 18 15:33:22 UTC 2023 kill -USR1 25416 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25416 killed at Wed Oct 18 15:33:22 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:33:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25456 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25456 found at Wed Oct 18 15:33:22 UTC 2023 selfserv_9997 with PID 25456 started at Wed Oct 18 15:33:22 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1425: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25456 at Wed Oct 18 15:33:23 UTC 2023 kill -USR1 25456 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25456 killed at Wed Oct 18 15:33:23 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:33:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25496 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25496 found at Wed Oct 18 15:33:23 UTC 2023 selfserv_9997 with PID 25496 started at Wed Oct 18 15:33:23 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1426: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25496 at Wed Oct 18 15:33:23 UTC 2023 kill -USR1 25496 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25496 killed at Wed Oct 18 15:33:23 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:33:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25536 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25536 found at Wed Oct 18 15:33:23 UTC 2023 selfserv_9997 with PID 25536 started at Wed Oct 18 15:33:23 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1427: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25536 at Wed Oct 18 15:33:24 UTC 2023 kill -USR1 25536 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25536 killed at Wed Oct 18 15:33:24 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:33:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25576 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25576 found at Wed Oct 18 15:33:24 UTC 2023 selfserv_9997 with PID 25576 started at Wed Oct 18 15:33:24 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1428: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25576 at Wed Oct 18 15:33:24 UTC 2023 kill -USR1 25576 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25576 killed at Wed Oct 18 15:33:24 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9997 starting at Wed Oct 18 15:33:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 25616 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25616 found at Wed Oct 18 15:33:24 UTC 2023 selfserv_9997 with PID 25616 started at Wed Oct 18 15:33:24 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1429: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1430: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1431: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1432: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1433: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1434: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 25616 at Wed Oct 18 15:33:40 UTC 2023 kill -USR1 25616 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25616 killed at Wed Oct 18 15:33:40 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 15:33:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:33:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 26168 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26168 found at Wed Oct 18 15:33:41 UTC 2023 selfserv_9997 with PID 26168 started at Wed Oct 18 15:33:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1502: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1503: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1504: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1505: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1506: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1507: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1508: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1509: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1510: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1511: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1512: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1513: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1514: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1515: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1516: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1517: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1518: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1519: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1520: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1521: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1522: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1523: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1524: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1525: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1526: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26168 at Wed Oct 18 15:34:05 UTC 2023 kill -USR1 26168 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26168 killed at Wed Oct 18 15:34:05 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:34:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:34:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27005 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27005 found at Wed Oct 18 15:34:05 UTC 2023 selfserv_9997 with PID 27005 started at Wed Oct 18 15:34:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1556: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27005 at Wed Oct 18 15:34:07 UTC 2023 kill -USR1 27005 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27005 killed at Wed Oct 18 15:34:07 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:34:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:34:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27057 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27057 found at Wed Oct 18 15:34:08 UTC 2023 selfserv_9997 with PID 27057 started at Wed Oct 18 15:34:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1557: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27057 at Wed Oct 18 15:34:33 UTC 2023 kill -USR1 27057 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27057 killed at Wed Oct 18 15:34:33 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:34:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:34:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27110 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27110 found at Wed Oct 18 15:34:33 UTC 2023 selfserv_9997 with PID 27110 started at Wed Oct 18 15:34:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1558: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27110 at Wed Oct 18 15:34:35 UTC 2023 kill -USR1 27110 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27110 killed at Wed Oct 18 15:34:35 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:34:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:34:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27174 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27174 found at Wed Oct 18 15:34:35 UTC 2023 selfserv_9997 with PID 27174 started at Wed Oct 18 15:34:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1559: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27174 at Wed Oct 18 15:34:38 UTC 2023 kill -USR1 27174 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27174 killed at Wed Oct 18 15:34:38 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:34:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:34:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27226 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27226 found at Wed Oct 18 15:34:38 UTC 2023 selfserv_9997 with PID 27226 started at Wed Oct 18 15:34:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1560: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27226 at Wed Oct 18 15:35:02 UTC 2023 kill -USR1 27226 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27226 killed at Wed Oct 18 15:35:02 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:35:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:35:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27293 found at Wed Oct 18 15:35:02 UTC 2023 selfserv_9997 with PID 27293 started at Wed Oct 18 15:35:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27293 at Wed Oct 18 15:35:03 UTC 2023 kill -USR1 27293 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27293 killed at Wed Oct 18 15:35:03 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:35:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:35:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27357 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27357 found at Wed Oct 18 15:35:04 UTC 2023 selfserv_9997 with PID 27357 started at Wed Oct 18 15:35:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1562: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27357 at Wed Oct 18 15:35:06 UTC 2023 kill -USR1 27357 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27357 killed at Wed Oct 18 15:35:06 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:35:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:35:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27409 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27409 found at Wed Oct 18 15:35:06 UTC 2023 selfserv_9997 with PID 27409 started at Wed Oct 18 15:35:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1563: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27409 at Wed Oct 18 15:35:32 UTC 2023 kill -USR1 27409 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27409 killed at Wed Oct 18 15:35:32 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:35:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:35:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27461 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27461 found at Wed Oct 18 15:35:32 UTC 2023 selfserv_9997 with PID 27461 started at Wed Oct 18 15:35:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27461 at Wed Oct 18 15:35:33 UTC 2023 kill -USR1 27461 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27461 killed at Wed Oct 18 15:35:33 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:35:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:35:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27525 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27525 found at Wed Oct 18 15:35:34 UTC 2023 selfserv_9997 with PID 27525 started at Wed Oct 18 15:35:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1565: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27525 at Wed Oct 18 15:35:36 UTC 2023 kill -USR1 27525 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27525 killed at Wed Oct 18 15:35:36 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:35:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:35:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27577 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27577 found at Wed Oct 18 15:35:36 UTC 2023 selfserv_9997 with PID 27577 started at Wed Oct 18 15:35:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1566: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27577 at Wed Oct 18 15:36:02 UTC 2023 kill -USR1 27577 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27577 killed at Wed Oct 18 15:36:02 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:36:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:36:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27644 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27644 found at Wed Oct 18 15:36:02 UTC 2023 selfserv_9997 with PID 27644 started at Wed Oct 18 15:36:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27644 at Wed Oct 18 15:36:04 UTC 2023 kill -USR1 27644 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27644 killed at Wed Oct 18 15:36:04 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:36:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:36:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27709 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27709 found at Wed Oct 18 15:36:04 UTC 2023 selfserv_9997 with PID 27709 started at Wed Oct 18 15:36:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1568: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27709 at Wed Oct 18 15:36:06 UTC 2023 kill -USR1 27709 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27709 killed at Wed Oct 18 15:36:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:36:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:36:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27761 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27761 found at Wed Oct 18 15:36:06 UTC 2023 selfserv_9997 with PID 27761 started at Wed Oct 18 15:36:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1569: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27761 at Wed Oct 18 15:36:30 UTC 2023 kill -USR1 27761 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27761 killed at Wed Oct 18 15:36:30 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:36:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:36:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27813 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27813 found at Wed Oct 18 15:36:30 UTC 2023 selfserv_9997 with PID 27813 started at Wed Oct 18 15:36:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27813 at Wed Oct 18 15:36:32 UTC 2023 kill -USR1 27813 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27813 killed at Wed Oct 18 15:36:32 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:36:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:36:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27869 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27869 found at Wed Oct 18 15:36:32 UTC 2023 selfserv_9997 with PID 27869 started at Wed Oct 18 15:36:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27869 at Wed Oct 18 15:36:34 UTC 2023 kill -USR1 27869 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27869 killed at Wed Oct 18 15:36:34 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 15:36:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:36:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27927 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27927 found at Wed Oct 18 15:36:34 UTC 2023 selfserv_9997 with PID 27927 started at Wed Oct 18 15:36:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1572: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27927 at Wed Oct 18 15:36:36 UTC 2023 kill -USR1 27927 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27927 killed at Wed Oct 18 15:36:36 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:36:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:36:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27983 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27983 found at Wed Oct 18 15:36:36 UTC 2023 selfserv_9997 with PID 27983 started at Wed Oct 18 15:36:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1573: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27983 at Wed Oct 18 15:36:39 UTC 2023 kill -USR1 27983 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27983 killed at Wed Oct 18 15:36:39 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:36:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:36:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28043 found at Wed Oct 18 15:36:39 UTC 2023 selfserv_9997 with PID 28043 started at Wed Oct 18 15:36:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1574: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28043 at Wed Oct 18 15:37:05 UTC 2023 kill -USR1 28043 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28043 killed at Wed Oct 18 15:37:05 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:37:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:37:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28110 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28110 found at Wed Oct 18 15:37:05 UTC 2023 selfserv_9997 with PID 28110 started at Wed Oct 18 15:37:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1575: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28110 at Wed Oct 18 15:37:07 UTC 2023 kill -USR1 28110 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28110 killed at Wed Oct 18 15:37:07 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:37:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:37:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28170 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28170 found at Wed Oct 18 15:37:07 UTC 2023 selfserv_9997 with PID 28170 started at Wed Oct 18 15:37:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1576: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28170 at Wed Oct 18 15:37:30 UTC 2023 kill -USR1 28170 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28170 killed at Wed Oct 18 15:37:30 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:37:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:37:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28222 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28222 found at Wed Oct 18 15:37:31 UTC 2023 selfserv_9997 with PID 28222 started at Wed Oct 18 15:37:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1577: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28222 at Wed Oct 18 15:37:32 UTC 2023 kill -USR1 28222 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28222 killed at Wed Oct 18 15:37:32 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:37:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:37:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28285 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28285 found at Wed Oct 18 15:37:33 UTC 2023 selfserv_9997 with PID 28285 started at Wed Oct 18 15:37:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1578: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28285 at Wed Oct 18 15:37:58 UTC 2023 kill -USR1 28285 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28285 killed at Wed Oct 18 15:37:58 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:37:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:37:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28352 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28352 found at Wed Oct 18 15:37:58 UTC 2023 selfserv_9997 with PID 28352 started at Wed Oct 18 15:37:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1579: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28352 at Wed Oct 18 15:38:00 UTC 2023 kill -USR1 28352 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28352 killed at Wed Oct 18 15:38:00 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:38:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:38:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28412 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28412 found at Wed Oct 18 15:38:00 UTC 2023 selfserv_9997 with PID 28412 started at Wed Oct 18 15:38:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1580: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28412 at Wed Oct 18 15:38:25 UTC 2023 kill -USR1 28412 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28412 killed at Wed Oct 18 15:38:25 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:38:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:38:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28464 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28464 found at Wed Oct 18 15:38:25 UTC 2023 selfserv_9997 with PID 28464 started at Wed Oct 18 15:38:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28464 at Wed Oct 18 15:38:27 UTC 2023 kill -USR1 28464 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28464 killed at Wed Oct 18 15:38:27 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 15:38:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:38:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28524 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28524 found at Wed Oct 18 15:38:27 UTC 2023 selfserv_9997 with PID 28524 started at Wed Oct 18 15:38:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1582: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28524 at Wed Oct 18 15:38:50 UTC 2023 kill -USR1 28524 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28524 killed at Wed Oct 18 15:38:50 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:38:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:38:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28591 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28591 found at Wed Oct 18 15:38:51 UTC 2023 selfserv_9997 with PID 28591 started at Wed Oct 18 15:38:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1583: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28591 at Wed Oct 18 15:38:52 UTC 2023 kill -USR1 28591 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28591 killed at Wed Oct 18 15:38:52 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:38:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:38:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28643 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28643 found at Wed Oct 18 15:38:53 UTC 2023 selfserv_9997 with PID 28643 started at Wed Oct 18 15:38:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1584: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28643 at Wed Oct 18 15:38:55 UTC 2023 kill -USR1 28643 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28643 killed at Wed Oct 18 15:38:55 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 15:38:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:38:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28695 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28695 found at Wed Oct 18 15:38:55 UTC 2023 selfserv_9997 with PID 28695 started at Wed Oct 18 15:38:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1585: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28695 at Wed Oct 18 15:38:58 UTC 2023 kill -USR1 28695 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28695 killed at Wed Oct 18 15:38:58 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 15:38:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:38:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28777 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28777 found at Wed Oct 18 15:38:58 UTC 2023 selfserv_9997 with PID 28777 started at Wed Oct 18 15:38:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1556: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28777 at Wed Oct 18 15:38:59 UTC 2023 kill -USR1 28777 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28777 killed at Wed Oct 18 15:38:59 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:38:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:38:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28821 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28821 found at Wed Oct 18 15:38:59 UTC 2023 selfserv_9997 with PID 28821 started at Wed Oct 18 15:38:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1557: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28821 at Wed Oct 18 15:39:00 UTC 2023 kill -USR1 28821 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28821 killed at Wed Oct 18 15:39:00 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:39:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:39:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28860 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28860 found at Wed Oct 18 15:39:00 UTC 2023 selfserv_9997 with PID 28860 started at Wed Oct 18 15:39:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1558: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 28860 at Wed Oct 18 15:39:00 UTC 2023 kill -USR1 28860 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28860 killed at Wed Oct 18 15:39:00 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:39:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:39:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28899 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28899 found at Wed Oct 18 15:39:01 UTC 2023 selfserv_9997 with PID 28899 started at Wed Oct 18 15:39:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1559: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28899 at Wed Oct 18 15:39:01 UTC 2023 kill -USR1 28899 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28899 killed at Wed Oct 18 15:39:01 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:39:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:39:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28938 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28938 found at Wed Oct 18 15:39:01 UTC 2023 selfserv_9997 with PID 28938 started at Wed Oct 18 15:39:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1560: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 28938 at Wed Oct 18 15:39:02 UTC 2023 kill -USR1 28938 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28938 killed at Wed Oct 18 15:39:02 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:39:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:39:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28977 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28977 found at Wed Oct 18 15:39:02 UTC 2023 selfserv_9997 with PID 28977 started at Wed Oct 18 15:39:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28977 at Wed Oct 18 15:39:03 UTC 2023 kill -USR1 28977 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28977 killed at Wed Oct 18 15:39:03 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:39:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:39:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29016 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29016 found at Wed Oct 18 15:39:03 UTC 2023 selfserv_9997 with PID 29016 started at Wed Oct 18 15:39:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1562: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29016 at Wed Oct 18 15:39:04 UTC 2023 kill -USR1 29016 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29016 killed at Wed Oct 18 15:39:04 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:39:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:39:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29055 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29055 found at Wed Oct 18 15:39:04 UTC 2023 selfserv_9997 with PID 29055 started at Wed Oct 18 15:39:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29055 at Wed Oct 18 15:39:04 UTC 2023 kill -USR1 29055 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29055 killed at Wed Oct 18 15:39:05 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:39:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:39:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29094 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29094 found at Wed Oct 18 15:39:05 UTC 2023 selfserv_9997 with PID 29094 started at Wed Oct 18 15:39:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29094 at Wed Oct 18 15:39:05 UTC 2023 kill -USR1 29094 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29094 killed at Wed Oct 18 15:39:05 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:39:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:39:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29134 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29134 found at Wed Oct 18 15:39:06 UTC 2023 selfserv_9997 with PID 29134 started at Wed Oct 18 15:39:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29134 at Wed Oct 18 15:39:06 UTC 2023 kill -USR1 29134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29134 killed at Wed Oct 18 15:39:06 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:39:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:39:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29173 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29173 found at Wed Oct 18 15:39:06 UTC 2023 selfserv_9997 with PID 29173 started at Wed Oct 18 15:39:06 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1566: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29173 at Wed Oct 18 15:39:07 UTC 2023 kill -USR1 29173 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29173 killed at Wed Oct 18 15:39:07 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:39:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:39:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29213 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29213 found at Wed Oct 18 15:39:07 UTC 2023 selfserv_9997 with PID 29213 started at Wed Oct 18 15:39:07 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1567: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 29213 at Wed Oct 18 15:39:08 UTC 2023 kill -USR1 29213 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29213 killed at Wed Oct 18 15:39:08 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:39:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:39:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29253 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29253 found at Wed Oct 18 15:39:08 UTC 2023 selfserv_9997 with PID 29253 started at Wed Oct 18 15:39:08 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1568: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29253 at Wed Oct 18 15:39:09 UTC 2023 kill -USR1 29253 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29253 killed at Wed Oct 18 15:39:09 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:39:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:39:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29293 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29293 found at Wed Oct 18 15:39:09 UTC 2023 selfserv_9997 with PID 29293 started at Wed Oct 18 15:39:09 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1569: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 29293 at Wed Oct 18 15:39:09 UTC 2023 kill -USR1 29293 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29293 killed at Wed Oct 18 15:39:09 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:39:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:39:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29333 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29333 found at Wed Oct 18 15:39:10 UTC 2023 selfserv_9997 with PID 29333 started at Wed Oct 18 15:39:10 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1570: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29333 at Wed Oct 18 15:39:10 UTC 2023 kill -USR1 29333 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29333 killed at Wed Oct 18 15:39:10 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:39:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:39:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29373 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29373 found at Wed Oct 18 15:39:10 UTC 2023 selfserv_9997 with PID 29373 started at Wed Oct 18 15:39:10 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1571: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29373 at Wed Oct 18 15:39:11 UTC 2023 kill -USR1 29373 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29373 killed at Wed Oct 18 15:39:11 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:39:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:39:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29414 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29414 found at Wed Oct 18 15:39:11 UTC 2023 selfserv_9997 with PID 29414 started at Wed Oct 18 15:39:11 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1572: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29414 at Wed Oct 18 15:39:12 UTC 2023 kill -USR1 29414 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29414 killed at Wed Oct 18 15:39:12 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:39:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:39:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29454 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29454 found at Wed Oct 18 15:39:12 UTC 2023 selfserv_9997 with PID 29454 started at Wed Oct 18 15:39:12 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1573: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29454 at Wed Oct 18 15:39:13 UTC 2023 kill -USR1 29454 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29454 killed at Wed Oct 18 15:39:13 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 15:39:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 15:39:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29494 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29494 found at Wed Oct 18 15:39:13 UTC 2023 selfserv_9997 with PID 29494 started at Wed Oct 18 15:39:13 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1574: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29494 at Wed Oct 18 15:39:14 UTC 2023 kill -USR1 29494 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29494 killed at Wed Oct 18 15:39:14 UTC 2023 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/client -fips false -force FIPS mode disabled. ssl.sh: #1575: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/client -list ssl.sh: #1576: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1577: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1578: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/ext_client -list ssl.sh: #1579: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1580: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Wed Oct 18 15:39:14 UTC 2023 Running tests for merge TIMESTAMP merge BEGIN: Wed Oct 18 15:39:14 UTC 2023 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/tests.v3.17687 -t Test2 -f ../tests.pw merge.sh: #1: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id dave --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #2: Merging Dave - PASSED merge.sh: Merging in new user certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id server --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #3: Merging server - PASSED merge.sh: Merging in new chain certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id ext_client --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #4: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict1 --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #5: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id conflict2 --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #6: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:43:11 2023 Not After : Wed Oct 18 13:43:11 2028 Subject: "CN=TestUser45,E=TestUser45@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:99:e1:df:29:33:7a:0f:55:74:7b:72:a7:03:e0:93: 57:74:5e:b7:af:9e:eb:d3:ca:ed:af:27:7d:a4:b2:5e: 13:96:d1:91:f5:71:b3:62:6a:17:c6:7e:19:b6:5a:e9: 07:fb:68:e3:24:71:7a:15:d8:70:b4:44:a4:76:2e:96: 6e:aa:87:cb:fb:68:db:b9:96:61:e7:12:13:46:a7:f5: 03:5b:d9:73:75:a6:3a:20:e2:7a:50:2e:fe:28:53:42: 48:49:c8:b5:f7:71:fb:2d:04:40:c7:57:2d:f6:c2:62: 0d:86:90:30:4e:b9:1b:d4:9f:67:ed:d2:d3:89:5b:8b: 34:19:e7:4d:89:7d:7f:44:ce:af:7a:c8:65:19:d9:d8: 37:08:5a:e3:9a:ec:99:92:d9:ea:a6:d3:ae:56:cc:13: e7:18:ae:c0:a7:f7:61:af:b2:4a:cc:8a:12:b4:1c:65: 64:2d:66:f9:1f:5a:cd:67:f1:68:1a:ac:cd:2f:a8:a4: 63:d6:c3:f6:87:1a:c7:60:f6:6e:7e:cc:93:cf:8d:51: e7:26:ed:2d:14:a4:02:39:46:00:a8:60:3d:9b:f9:3d: 4a:4b:f3:d4:30:7e:81:47:1a:88:3f:3d:d7:c1:06:4b: 1e:a3:a9:8a:1c:7e:4b:42:bf:d9:e6:1d:68:c3:e9:ef Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:38:49:85:e8:78:26:e8:25:87:cb:20:ca:5d:8d:83: c9:19:e4:2f:a7:26:9a:44:fb:f2:1e:e9:a0:e5:49:16: 4a:5f:be:a8:7c:8b:b0:76:6a:7f:14:27:b4:8b:46:d3: 4a:b6:b5:12:84:1e:f2:75:9f:b4:90:25:2d:8a:88:20: 6a:c5:e2:64:99:d6:fe:30:2a:aa:22:fa:c1:05:40:42: 50:e6:09:eb:6a:0d:1a:43:f0:9b:f1:53:ea:4d:e0:8d: d4:ba:90:b3:06:33:68:25:d0:43:41:9d:cb:16:15:35: 4c:4b:24:5a:f0:bb:11:95:36:0b:3f:8e:ae:12:46:b9: ab:41:b8:1b:5c:c7:fe:74:43:13:ea:c7:0f:e7:41:9b: 17:f4:09:07:ea:eb:29:e4:3d:0f:02:2c:6b:17:59:e3: 5d:b4:de:3d:ed:da:f0:ba:fe:b6:f5:a3:a9:34:83:44: 9a:2b:0d:f9:2d:4d:1f:86:a3:a0:2d:6a:61:c5:1e:ea: bc:fe:01:e2:83:ad:c2:54:35:a2:9a:12:fd:bf:6f:04: 36:7b:c4:ab:bf:c5:1b:f8:14:fa:2b:df:a8:95:45:1e: e6:c6:d9:2d:d5:7f:94:ba:dd:89:52:86:e2:54:94:d3: f0:63:15:06:83:d0:bc:18:c3:ba:d7:23:12:ba:d8:bf Fingerprint (SHA-256): DD:81:7F:68:40:15:6E:5F:71:87:7F:81:55:46:3C:8D:06:86:06:0E:43:04:FF:8C:D7:C4:9E:DA:E9:84:1B:04 Fingerprint (SHA1): 96:BD:D9:43:CF:F5:84:0D:1B:F3:85:BA:F8:B9:24:32:1B:06:58:D1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #7: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 13:43:12 2023 Not After : Wed Oct 18 13:43:12 2028 Subject: "CN=TestUser46,E=TestUser46@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:22:64:1f:83:0c:b3:17:63:04:09:cd:9e:bc:9f:92: 0a:2b:f5:c7:0e:c7:27:20:e6:9e:72:c9:e7:e0:5b:36: e1:a0:f1:4b:1c:f4:a6:9c:ce:ff:8b:3a:a3:82:98:e3: fe:0c:26:81:c1:67:ad:fa:06:6d:01:56:67:a0:08:ce: ea:5f:05:47:85:34:53:f9:80:ac:02:ea:52:fe:3c:e8: db:39:63:ef:65:67:2e:7b:b1:51:c0:eb:52:32:b8:05: f1:18:1c:41:fb:34:47:06:25:fc:67:f7:af:06:e4:b5: 1d:db:c4:01:62:52:ff:93:13:a4:16:33:60:80:4e:4f: 30:30:f5:69:ac:7c:16:e7:e4:d5:db:ed:d4:f5:0b:0c: 1d:6e:ab:f6:db:a8:fd:6a:e0:03:c2:31:70:c2:cc:cd: de:f8:d0:42:26:44:fd:df:ed:e4:f4:50:fc:a5:63:ce: f2:98:ec:c9:b4:9f:86:86:6e:1b:3c:90:03:8f:be:c4: ca:f8:45:4d:7e:a6:66:c2:3b:22:12:10:2e:fc:80:5c: 0b:25:cf:01:18:e9:89:74:c5:39:10:c0:af:b1:4b:13: 97:86:8c:71:1c:bc:a4:ef:44:9e:5a:11:7e:03:f4:9d: fe:b1:f7:be:80:3a:bf:32:24:e7:99:e6:32:09:05:5d Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:86:52:51:4d:af:ad:dc:f4:be:07:2e:65:10:fd:38: 37:31:10:f6:27:89:c0:43:fd:93:bc:4a:1d:2d:21:90: 97:b3:e4:a7:78:91:60:04:03:25:94:0e:6d:64:78:60: cc:00:a6:ef:87:3d:b4:a4:f7:15:d6:66:26:1a:5a:4d: ad:30:2e:05:35:42:b4:c4:ca:ac:be:e9:dc:77:6a:a3: 4a:69:fe:3f:d6:32:55:7c:a2:37:90:c8:92:80:7d:2a: 81:82:e7:25:ac:28:b6:ac:76:c6:c6:d2:44:96:32:a9: 94:1a:f3:9f:a8:9c:a5:29:1b:b4:e8:14:af:88:07:01: d7:94:71:81:5e:ef:ba:92:63:18:b3:9d:2b:9e:27:a9: ad:49:ab:3c:72:d9:49:7a:bc:b4:94:9f:f2:a3:2d:65: 25:a9:ed:0f:b3:90:96:25:52:e9:83:a1:0e:36:f9:80: 7f:a7:d4:98:e1:7f:2f:7c:3c:b2:a3:70:38:8b:78:b1: d4:e5:dd:de:24:42:27:47:fc:15:82:05:96:12:41:61: ea:3d:e0:75:43:1b:f4:1c:67:13:6d:44:67:46:38:87: b1:da:32:17:76:55:1a:33:1d:c3:af:52:9f:f0:ea:a4: ff:f4:2d:f8:23:aa:b7:be:c5:ef:e8:12:10:42:7b:72 Fingerprint (SHA-256): 87:10:76:9C:27:D7:22:1C:F5:88:DB:F2:82:A9:E0:60:DA:30:B7:B4:55:A0:F0:2C:F3:41:74:8C:F6:D2:4D:FC Fingerprint (SHA1): EB:21:16:94:F0:F6:B0:97:1B:9C:DA:2F:1C:30:70:3E:1D:D5:4D:2C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #8: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --upgrade-merge --upgrade-token-name OldDB --upgrade-id sdr --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw upgrade complete! merge.sh: #9: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA-dsa CT,C,C Alice u,u,u Alice-dsamixed u,u,u Alice-ec u,u,u bob@example.com ,, Dave u,u,u eve@example.com ,, bob-ec@example.com ,, Dave-ec u,u,u TestCA CT,C,C TestCA-ec CT,C,C Alice-dsa u,u,u Alice-ecmixed u,u,u TestUser-rsa-pss-interop u,u,u Alice-rsa-pss u,u,u Dave-dsamixed u,u,u Dave-dsa u,u,u Dave-ecmixed u,u,u Dave-rsa-pss u,u,u localhost.localdomain u,u,u localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u localhost-sni.localdomain-dsa u,u,u localhost-sni.localdomain-ecmixed u,u,u localhost-sni.localdomain-rsa-pss u,u,u localhost.localdomain-dsa u,u,u localhost.localdomain-ecmixed u,u,u localhost.localdomain-rsa-pss u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-dsamixed u,u,u localhost-sni.localdomain-ec u,u,u ExtendedSSLUser-dsa u,u,u serverCA-dsa C,C,C ExtendedSSLUser-ecmixed u,u,u chain-2-clientCA ,, clientCA-ec T,C,C chain-1-clientCA-dsa ,, chain-2-clientCA-ec ,, clientCA T,C,C ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-dsamixed u,u,u ExtendedSSLUser-ec u,u,u serverCA-ec C,C,C chain-2-clientCA-dsa ,, clientCA-dsa T,C,C chain-1-clientCA ,, chain-1-clientCA-ec ,, Alice #1 ,, Alice #2 ,, Alice #99 ,, Alice #3 ,, Alice #100 ,, Alice #4 ,, CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/tests.v3.17687 -t Test2 -f ../tests.pw merge.sh: #10: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/upgradedb/tests.v1.17687 -t Test1 -f ../tests.pw merge.sh: #11: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #12: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . This is a test message from Alice to Bob. merge.sh: #13: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #14: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Wed Oct 18 13:43:25 2023 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Wed Oct 18 13:42:30 2023 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Wed Oct 18 13:43:21 2023 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #15: Verifying TestCA CRL - PASSED TEST_MODE=UPGRADE_DB NSS_DEFAULT_DB_TYPE=sql TIMESTAMP merge END: Wed Oct 18 15:39:25 UTC 2023 Running tests for ec TIMESTAMP ec BEGIN: Wed Oct 18 15:39:25 UTC 2023 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Wed Oct 18 15:39:25 UTC 2023 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Wed Oct 18 15:39:25 UTC 2023 Running ec tests for ectest TIMESTAMP ectest BEGIN: Wed Oct 18 15:39:25 UTC 2023 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #5: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #6: pk11 ec tests - PASSED TIMESTAMP ectest END: Wed Oct 18 15:39:28 UTC 2023 TIMESTAMP ec END: Wed Oct 18 15:39:28 UTC 2023 Running tests for %{do_gtests} TIMESTAMP %{do_gtests} BEGIN: Wed Oct 18 15:39:28 UTC 2023 ./all.sh: line 134: ./%{do_gtests}.sh: No such file or directory ./all.sh: line 134: cd: /builddir/build/BUILD/nss-3.90/nss/tests/%{do_gtests}: No such file or directory TIMESTAMP %{do_gtests} END: Wed Oct 18 15:39:28 UTC 2023 Running tests for %{do_ssl_gtests} TIMESTAMP %{do_ssl_gtests} BEGIN: Wed Oct 18 15:39:28 UTC 2023 ./all.sh: line 134: ./%{do_ssl_gtests}.sh: No such file or directory ./all.sh: line 134: cd: /builddir/build/BUILD/nss-3.90/nss/tests/%{do_ssl_gtests}: No such file or directory TIMESTAMP %{do_ssl_gtests} END: Wed Oct 18 15:39:28 UTC 2023 %{do_ssl_gtests}.sh: Testing with shared library =============================== Running tests for libpkix TIMESTAMP libpkix BEGIN: Wed Oct 18 15:39:29 UTC 2023 TIMESTAMP libpkix END: Wed Oct 18 15:39:29 UTC 2023 Running tests for cert TIMESTAMP cert BEGIN: Wed Oct 18 15:39:29 UTC 2023 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #79: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #80: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #81: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #82: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/serverCA-dsa.ca.cert cert.sh: #84: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #85: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/serverCA-ec.ca.cert cert.sh: #86: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #108: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #109: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/clientCA-ec.ca.cert cert.sh: #110: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/clientCA-dsa.ca.cert cert.sh: #111: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #113: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #114: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/clientCA.ca.cert cert.sh: #115: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #116: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k a3833797a6f6d941534925a6cf3fd72efeef1d3b -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k ea139caa58902a4cc430bd0f0a1abce43cfa161f -s CN=orphan -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:80:99:47:df:02:1e:25:e6:3d:d5:05:1c:89:b5:3c: 6d:2f:bb:00:8b:8f:05:83:d6:cd:40:db:df:00:f0:93: cf:52:f9:e3:44:05:b8:8d:8f:d4:a0:1b:9a:d1:56:06: 4c:1b:c1:63:a7:ab:e3:0e:59:eb:9f:ee:69:2d:d0:47: d3:9f:5c:ae:f1:59:ac:db:17:1c:7a:f3:1f:15:28:69: a0:a6:8f:e8:80:41:84:74:3d:07:73:1c:b6:8b:a8:60: 8d:64:a3:a7:7f:39:06:c6:50:7d:e2:f0:07:ff:8a:cf: fb:ca:0d:e7:e2:5a:23:08:b9:e4:5f:f3:c3:6f:69:c8: 72:61:8f:5b:74:81:e9:c9:59:29:d8:67:cf:4b:8f:16: 4c:6e:00:8e:c5:ed:22:32:4e:88:ce:3e:4b:ad:40:f6: 7f:67:c7:f2:f3:b7:63:5c:d7:89:96:0b:32:15:38:f1: 60:25:81:f4:af:13:7a:9c:90:00:32:cc:6d:91:7b:e7: 2b:ec:c5:78:ce:d6:99:d0:29:4e:0e:ba:52:e1:21:3a: a1:f3:9b:66:b5:28:43:18:b8:83:30:65:e1:df:11:10: 31:1f:0b:b1:e0:1e:f3:ee:ac:53:a2:ca:ca:f6:2d:cb: cf:6a:15:bc:85:45:8e:0f:50:7a:a1:c3:09:97:07:d1 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1a:06:de:3d:79:a3:54:e0:e7:64:c2:54:d7:77:7c:86: 5b:b0:87:1f:01:29:31:ff:d5:a4:ba:92:e9:be:58:d1: 40:bc:32:cd:86:5a:83:b1:f2:e8:ee:9b:87:54:c4:4e: 9e:9a:fb:4c:92:1c:33:c9:ce:ca:3f:f8:6a:5d:46:d5: 3c:fb:9d:c8:b8:d4:ce:25:86:7d:3f:5b:b1:5b:ab:3a: d0:42:5f:e8:d8:38:4c:63:76:1a:12:2c:84:d1:da:60: e6:4a:23:d6:0b:bf:20:0f:dd:6c:fe:af:98:87:17:7b: 77:e6:a7:f0:5c:fd:92:4c:11:8a:b2:6b:60:8c:db:3a: 39:a8:22:60:a0:08:cf:78:53:ed:71:fb:22:18:79:a5: 2b:98:90:04:56:50:86:1f:0c:1f:93:20:5d:c2:ee:2d: e1:01:5b:f2:95:84:68:c5:8f:5a:27:c1:7b:ee:f1:80: ad:96:53:1c:0f:37:6d:17:5a:0c:e4:69:c9:e3:f6:9b: 7f:93:06:60:de:ac:5a:98:c0:07:96:4f:d7:ca:22:48: 4d:e4:b6:04:19:03:05:6e:d4:ed:28:b1:b3:a2:47:c3: 32:ed:c1:89:e5:6a:81:d9:b5:43:43:e2:62:25:7a:97: fb:48:a3:27:62:4b:c0:4b:1f:b6:0e:60:ba:41:bc:61 Fingerprint (SHA-256): 37:D3:40:24:80:05:2C:A1:67:F6:CD:02:C9:67:E6:4C:35:39:6C:46:1F:5A:8F:A0:D1:5A:E4:40:84:35:A2:16 Fingerprint (SHA1): 8A:40:77:21:39:B8:99:99:7E:89:1C:B1:79:5C:16:79:38:E8:E3:F5 cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw cert.sh: #289: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #290: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #291: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Setting invalid database password in FIPS mode -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw -@ ../tests.fipsbadpw Failed to change password. certutil: Could not set password for the slot: SEC_ERROR_INVALID_PASSWORD: Password entered is invalid. Please pick a different one. cert.sh: #292: Setting invalid database password in FIPS mode - PASSED cert.sh: Attempt to generate a key with exponent of 3 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #293: Attempt to generate a key with exponent of 3 (too small) - PASSED cert.sh: Attempt to generate a key with exponent of 17 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #294: Attempt to generate a key with exponent of 17 (too small) - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@example.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #295: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw cert.sh: #296: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #297: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #298: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw cert.sh: #308: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #309: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #310: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #311: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #312: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #313: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #314: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #315: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #316: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #317: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #318: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #319: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #320: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #321: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #322: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #323: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #324: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #325: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #326: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #327: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #328: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #329: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #330: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:f0:04 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 15:43:29 2023 Not After : Thu Jan 18 15:43:29 2024 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 97:9c:0a:9c:d6:24:b3:ba:1a:ac:d0:ae:c1:64:97:9f: ce:be:df:f9:30:f2:f8:20:86:4f:92:6c:2b:ed:b8:4a: 3c:45:07:b7:ac:ee:67:35:ee:4f:fb:6a:62:0d:e0:9c: ca:d9:d4:91:c7:6e:91:15:16:e9:ec:ae:75:be:ec:bf: 36:3f:80:c9:f9:b3:7b:27:32:e7:2f:2f:4f:71:0c:d7: 44:4f:41:b4:39:79:b5:08:a6:a7:cb:db:37:96:bd:e8: bd:3d:2b:6e:56:08:a8:2a:da:1a:59:d0:c8:67:f7:f2: f1:6f:a2:d9:c0:e2:ae:71:03:f9:e9:ea:3e:87:68:0d: f8:95:e4:cc:88:85:30:cc:f4:d1:f8:69:e8:36:07:af: 1f:34:74:ef:03:eb:a4:42:44:8f:fa:e0:d2:fd:f1:c6: 8f:fd:f3:94:a5:ec:06:28:0e:68:80:13:6f:0c:1e:17: ce:40:f0:74:9d:dd:6f:86:f8:a3:96:b9:ed:98:9a:62: 49:9f:03:e8:7a:9f:ca:7f:68:97:13:ce:6a:dc:93:90: 2b:8a:2d:22:a7:71:f9:bc:f7:2a:a2:d2:20:37:d1:2d: be:6d:92:72:51:5d:44:ee:da:12:9b:c1:17:70:bb:6b: 12:f9:64:11:13:f0:e9:74:8d:77:2d:2a:eb:ea:01:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0d:78:93:ed:c8:2e:f5:99:aa:e4:36:e7:85:6c:23:7b: 51:a4:d7:fb:b8:e8:23:e0:96:a0:4e:8c:63:6b:47:8b: 62:a1:c1:b6:11:43:56:aa:dc:95:56:46:53:23:c0:22: 72:94:8d:93:33:2e:77:60:fb:d8:e8:2c:cf:ce:a2:aa: 2c:4f:be:11:2e:98:e6:dd:91:bf:e3:80:0e:d1:b5:a7: 83:e3:df:35:18:5a:59:63:cf:22:20:d4:f5:bc:b2:8e: 09:aa:16:84:da:1d:29:50:65:8a:0f:cf:74:b8:3e:57: 3d:83:74:9d:d1:40:a1:e9:11:89:78:7e:00:78:1f:72: 12:5c:6a:89:e7:0e:d0:34:66:0a:c1:00:25:fe:28:7a: ff:d1:fa:98:02:f2:51:f2:35:c0:ed:05:ff:93:6c:d3: 40:32:69:c1:ce:81:5c:39:97:35:58:b0:bf:1d:90:dd: ab:78:2e:8c:a1:24:79:2f:cb:eb:d5:95:89:ef:b7:e3: 6e:9a:38:90:a4:39:47:24:e7:84:9c:3f:24:95:39:f1: 72:8a:b4:ca:b5:cb:4d:ee:e6:5a:63:e5:4f:ab:dd:cf: c7:77:b2:42:ed:a8:ae:75:b8:c9:e5:6e:fd:d5:bc:76: e2:c4:95:c7:20:30:9a:fa:81:e0:27:b3:7b:84:10:ad Fingerprint (SHA-256): B8:32:6C:DD:6A:98:D9:5A:64:9F:5F:8D:23:E2:24:DE:84:1C:0E:BE:9A:56:72:9C:2B:D7:FD:58:DF:4D:17:12 Fingerprint (SHA1): BC:36:18:3A:2E:DF:B7:BF:08:CC:1B:95:31:C3:9C:31:5F:D3:7C:D1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:f0:07 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 15:43:31 2023 Not After : Thu Jan 18 15:43:31 2024 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:fc:3e:da:7b:9e:b7:b6:0e:b0:fc:4f:ec:78:81:17: a2:2e:9c:1e:c0:b2:10:7f:0c:21:69:08:f1:ed:43:e3: f3:42:2e:6e:53:95:b5:13:6d:28:5a:82:cf:69:b4:de: 6c:3e:65:70:ec:52:a1:d2:f1:4c:10:ef:4a:7d:77:a1: 0d:85:0d:8d:08:5f:c4:60:3f:17:67:c5:e5:0c:dc:89: 5c:b4:a7:bb:04:45:02:cf:53:ea:13:0f:ac:67:ea:1f: 35:7a:7b:2c:1a:99:c7:a4:6b:f5:53:57:e3:9a:6d:31: a3:25:48:f6:a6:1d:70:47:a5:a4:e3:20:0b:ba:df:b5: f2:a7:46:b5:34:36:9d:08:3b:92:75:d8:1b:f1:87:19: f5:68:f4:25:59:24:dc:6e:c4:9e:bb:99:ca:65:cf:22: 81:d0:9b:2a:1e:26:7d:c2:4f:31:6a:e5:af:4b:32:d9: 8c:e3:79:05:b6:f6:dc:0a:73:6b:84:ac:da:cb:54:7a: 78:63:17:b3:e0:89:d2:70:b6:91:5e:69:c6:82:a5:5d: 76:42:75:c8:54:b8:f3:c8:fb:c2:49:52:f9:b5:ba:6b: 81:55:06:f2:54:be:5c:c3:ae:fe:32:e3:0e:5a:a0:7b: f3:4d:92:d8:f9:46:7c:34:3a:b7:bd:0e:35:d1:ed:09 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 93:ce:0d:9d:61:54:b0:fc:14:24:db:2a:af:94:fd:3e: 05:b2:01:c0:21:fc:74:43:fb:57:f5:b4:7b:96:bb:d2: 02:df:5f:d0:94:23:f3:53:53:0b:26:4f:61:eb:c4:87: 9d:bf:18:21:c7:87:45:15:94:84:5a:e9:09:3f:a8:55: 4e:35:6f:ab:e5:e8:d4:41:15:7d:5d:2c:84:c6:cc:0f: d1:95:ca:c4:2f:95:13:ea:53:b4:55:62:92:5f:18:b6: 90:dc:d5:2b:33:fb:1c:d1:28:a7:83:e8:7e:e5:c3:bf: 09:7f:4d:60:b4:6c:40:b3:cd:c8:f8:4c:83:27:c5:be: a6:99:9c:54:44:26:38:17:20:37:80:7c:7d:5d:5c:38: e3:0f:a1:f1:1a:52:73:f5:5b:03:07:a4:64:de:0a:90: 3b:75:20:8b:4a:12:17:1d:16:db:88:cc:15:e7:29:1b: 9f:6e:30:dc:0c:a9:20:e9:bc:57:7a:25:b3:b6:7b:92: 32:ab:0e:78:d7:2c:79:e5:08:a4:54:2c:66:be:d3:5f: 1e:8c:b7:c8:4b:98:43:b4:e7:55:a3:f9:59:a0:ce:1b: 91:d6:c4:da:e8:b2:28:c9:01:12:8a:3e:89:4b:f5:74: bf:36:2f:93:bd:2d:a1:67:b3:38:1a:05:37:f1:77:b9 Fingerprint (SHA-256): DC:BE:7D:51:3D:FC:E5:BD:BA:04:44:F9:06:A1:BF:2A:03:82:0C:3C:3D:71:86:DA:7D:1D:AB:33:CB:E5:95:FB Fingerprint (SHA1): 9C:04:8D:7C:D2:89:DE:A7:77:C7:4A:35:82:21:16:0E:C2:6D:A4:AC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:f0:0a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 15:43:33 2023 Not After : Thu Jan 18 15:43:33 2024 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:f5:48:da:fa:93:18:c8:18:71:b9:c0:96:75:10:60: 6d:ec:e5:f6:65:80:34:a2:19:1f:2e:2a:12:45:a8:16: 5f:c1:fe:e6:5a:ee:3b:d2:f8:4b:a9:df:38:da:26:f4: 50:3e:ba:6e:73:c4:df:9a:cc:d4:33:8d:fe:44:8d:90: 6f:c3:d5:fe:c2:29:ba:1b:8c:b9:1a:86:6c:e5:6a:3b: 98:b4:2e:67:7d:2d:60:36:5b:77:80:39:96:ee:2a:a6: 12:5d:1b:c0:d3:ad:af:7c:32:89:91:7a:9a:ad:dc:32: d7:3f:d1:2d:4b:3d:00:9a:a1:8a:c1:9f:99:6a:02:cf: 3a:35:14:b8:49:44:cc:dd:e2:33:3b:ec:ea:8d:97:0c: 2a:19:39:d7:ae:9a:cf:cf:78:d0:55:da:1b:67:7c:66: 53:d1:3b:25:0a:69:32:bc:c3:16:95:a0:cb:28:43:89: 63:4e:fc:9d:3a:18:b8:aa:9a:4b:fd:f4:6a:b6:da:79: 56:10:3f:5f:c3:6a:96:46:cb:b9:b9:75:ed:9e:81:cf: 76:0c:2a:84:20:a6:2c:dd:c3:a6:a8:de:ff:89:cd:83: 09:be:fd:ce:de:1e:e9:f0:9f:46:a4:00:60:6a:38:c9: b5:12:3b:04:f4:5a:53:21:64:55:a2:a2:62:c6:4a:3f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b8:a2:c3:a1:75:2f:ee:de:f3:2e:80:e5:48:31:56:bc: c3:d7:23:42:b3:3f:09:56:be:0b:4e:42:3e:2a:55:8e: b8:c1:0a:8b:db:43:e3:1d:57:01:fc:12:3a:67:0c:f3: 51:00:79:ef:8d:bf:8d:ee:1d:ea:5a:0c:a1:8b:48:2f: 1e:7d:82:12:75:5a:50:55:27:b5:f8:7b:8a:04:9a:62: 96:5d:c8:b1:0d:ac:3c:e2:d8:7b:8f:4f:b2:00:0a:ff: 99:e6:c1:06:90:ab:b0:83:43:4e:33:38:1c:52:23:23: eb:62:51:9d:b2:ee:75:56:ff:c5:c7:8c:27:30:9f:91: a2:37:d5:59:8a:b0:ed:9c:04:97:a6:49:b2:48:08:c5: 02:a0:f9:17:e4:d8:d6:bd:ed:3b:8d:02:b6:8e:68:27: f9:30:12:91:35:49:ee:82:4b:43:bc:0e:16:c4:3a:b5: e2:ea:67:bb:75:d0:de:82:c9:62:a4:94:54:20:80:37: e6:91:1b:12:ac:85:a1:cc:b2:79:a5:9f:db:51:bf:cf: f2:e6:43:14:d7:b5:b6:03:6f:f1:22:c0:20:99:0f:d3: 68:9c:e2:cd:26:0b:28:b3:b0:28:8f:70:f2:65:76:06: 95:b5:ea:09:03:a9:57:13:d5:8f:b7:69:a8:24:c4:0c Fingerprint (SHA-256): A3:4D:43:5D:2A:32:AB:71:7E:9D:F3:AA:A3:F7:9D:E0:75:F1:44:5A:9D:90:2F:1A:12:F1:1C:34:FA:43:98:85 Fingerprint (SHA1): 5A:7A:D7:D9:AF:A9:26:5B:6A:BF:3F:B4:AC:47:97:7F:CD:50:62:65 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:f0:0e Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 15:43:35 2023 Not After : Thu Jan 18 15:43:35 2024 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: eb:a0:2d:1c:40:73:26:a8:cc:f6:bf:b4:af:a8:12:f6: af:a2:9f:66:98:a0:91:b1:8c:28:8c:6f:4d:23:c3:71: 67:2e:0b:6e:04:c1:6c:41:86:c6:02:e5:8b:1a:f3:cc: f6:0f:85:8f:86:a5:0d:23:b2:a7:9e:33:fa:c7:ae:d8: d2:35:5b:ee:0f:33:51:48:4d:e6:b2:c2:f8:93:7b:27: 78:22:95:4a:2b:67:6f:e4:7b:bd:85:8c:a6:88:41:7e: 59:1a:e6:dc:85:58:71:4e:9f:2c:98:f4:2a:a2:da:42: d7:9b:2b:3e:26:83:28:ca:14:eb:73:2e:4a:d5:2e:bd: d2:29:ae:25:09:9a:34:3a:f6:fb:0f:c4:45:5e:b8:ea: db:dc:b0:4b:b7:e8:2f:02:0e:2d:79:d1:81:71:1a:b1: bd:b0:65:0b:bd:26:31:06:bc:20:26:3a:19:25:a3:d5: 9d:98:a3:27:e7:a2:26:00:65:66:1a:b1:ea:b6:04:1d: ed:bb:28:ae:01:eb:f3:b0:19:87:80:28:9c:0f:1f:e1: bf:43:2c:82:50:d7:ed:ab:86:25:2b:4b:ad:cd:67:31: 2e:b4:b4:30:b6:d4:fc:45:a7:d4:4e:d9:c8:0f:52:26: d6:bc:04:de:e0:c8:88:ea:e2:b5:f0:6a:76:ef:17:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: c4:a4:d9:b3:5b:d5:1c:28:dd:c3:31:b3:a3:8f:3c:05: 03:3f:ff:b3:ac:af:51:b0:67:e6:10:7d:73:c5:de:c3: 6a:f4:9b:02:eb:08:3d:9a:b0:c8:fd:47:c0:e5:c6:b9: 3b:23:5f:e7:24:5a:66:b1:62:59:07:6d:41:c6:2f:c3: 3f:43:a6:fc:6e:a8:75:97:e4:ca:2c:2e:7b:66:9e:72: 1e:55:b2:9e:c2:c6:cb:11:5c:92:f2:44:ca:60:24:dd: 4a:f1:bc:b7:88:0f:2f:86:93:35:15:2d:64:75:3f:7c: a5:78:99:2c:e9:30:b1:9b:8d:a7:81:5a:81:7e:2f:81: 1e:ac:4f:b7:cc:f6:a7:90:c5:66:8c:d7:e7:49:cf:bc: 2e:a2:f5:93:0f:5c:51:ff:95:49:1e:bb:1e:8d:ad:e9: 70:b8:c5:0d:9f:bd:5c:d2:48:90:80:8a:eb:7f:32:9b: 7b:32:b4:81:ef:73:3c:b1:13:f2:61:86:3b:32:63:e1: 65:40:95:95:0c:c1:13:3b:75:cf:0d:11:37:f8:62:64: 3c:3a:07:a8:c5:49:48:ff:aa:21:a3:78:ca:83:77:63: fe:4e:8e:0b:a3:5a:fd:de:67:6a:8a:c9:f9:fc:e4:c9: 50:3b:cb:27:43:83:c8:20:ac:c9:e8:44:08:60:62:a4 Fingerprint (SHA-256): 67:D9:A1:5F:4C:70:1F:73:FD:ED:53:2A:E3:37:60:2A:27:14:D0:E8:6C:AD:3C:A8:31:BB:7D:24:DD:51:D4:12 Fingerprint (SHA1): 51:5E:54:B1:21:AE:CA:A5:BD:59:48:B8:AC:18:D3:26:41:41:95:30 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:f0:12 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 15:43:37 2023 Not After : Thu Jan 18 15:43:37 2024 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:a9:1a:66:55:c0:e9:e9:a6:40:be:b8:74:82:01:e8: 4b:86:1a:1c:73:ea:94:a6:5e:66:cc:ec:51:14:a2:00: 66:32:cf:b0:f5:b6:45:9e:b1:14:df:4f:c0:33:49:eb: c2:b7:75:f0:3f:b8:ba:65:38:02:ee:98:4c:53:ab:73: 1d:7c:b0:9c:3f:d5:51:6e:f0:62:46:11:c4:f7:98:10: 48:5a:7d:7d:56:ad:f4:a3:d8:2e:51:dc:a5:83:41:cd: 69:a5:95:52:33:23:64:50:d0:22:46:9d:92:be:8c:77: 7d:7d:67:5e:ff:5c:f9:15:23:c8:a5:77:d2:99:cc:73: b2:33:2e:e7:64:e8:8a:c0:8e:bf:fd:ae:8a:66:bb:42: 99:92:6b:94:64:39:81:87:cb:1d:de:8a:45:70:8b:5d: 70:d5:93:1b:29:7c:ba:4d:a9:0e:61:04:43:e9:3c:65: 67:b1:2e:ee:95:88:fd:fa:79:c8:0f:c2:60:08:7f:2a: 70:96:c3:48:bb:af:40:5d:9a:3b:6b:34:e5:8f:3f:b1: b4:fc:70:a1:46:d5:4f:32:c8:f0:8e:45:b9:79:c3:0e: 08:48:89:22:f7:7e:c3:83:a8:d3:7f:e2:fa:b5:6f:20: 9d:f1:8e:ff:c2:c4:d7:ea:e1:1a:f8:f3:f8:cd:ce:a3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 36:f6:83:44:b4:9e:d8:ca:a6:1c:4e:3d:72:cf:7d:79: 71:0c:48:88:ca:f7:09:50:d4:29:87:be:c5:fd:4c:7c: 2b:8c:49:96:73:5f:a5:47:c0:f9:f8:0f:b3:8d:da:55: 0a:a1:99:19:2f:54:8f:ae:10:0e:e6:dc:a8:d5:eb:05: e8:bd:e9:b1:7e:50:e8:e8:45:bd:85:07:f0:9a:ff:2b: d6:a1:7e:79:36:65:07:90:59:ea:8e:92:7b:45:98:de: f0:f4:34:11:7f:e1:38:b9:85:9e:73:bb:f3:19:c9:b0: d0:1f:15:10:13:2f:7c:8f:cc:5a:b2:4c:8d:e7:b6:b0: 1c:06:47:7c:03:81:39:df:85:96:fb:13:ef:21:11:75: 66:9e:14:b4:03:f8:0d:57:e9:47:d9:f4:76:ad:bc:41: ae:7e:7e:4d:20:b3:98:2d:74:ba:4c:bd:4b:d3:7a:26: 12:75:a6:39:92:17:9a:fe:0c:15:e6:6d:ad:df:2c:44: 86:bf:61:4b:a8:e1:70:e0:c4:45:c0:ac:7a:03:97:e4: e6:fc:1c:3d:6e:6a:56:c8:bb:e4:10:c6:19:5b:f3:2e: 96:f8:f6:f8:67:b5:12:fd:01:6d:49:78:c4:72:64:43: d6:e5:d5:57:6c:60:bc:1e:4f:8f:c4:49:56:d6:cd:e6 Fingerprint (SHA-256): 1B:47:DB:DB:C7:63:C6:8D:2E:0B:F4:F9:B1:7D:A1:B6:3A:53:34:3B:F0:A5:47:BD:65:1E:35:4F:7C:D7:A8:6A Fingerprint (SHA1): 75:75:21:C8:B1:79:CB:69:D1:16:35:E9:03:41:E7:06:65:0B:62:3C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:f0:16 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 15:43:39 2023 Not After : Thu Jan 18 15:43:39 2024 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:b8:13:a3:29:04:69:3f:9e:c1:d3:ba:84:23:95:57: 7c:34:ed:60:06:1b:4a:09:82:3e:87:3b:84:ad:2e:4d: eb:dc:d0:a6:dd:7a:f5:b7:07:33:4d:6d:e7:7b:58:8b: 0a:b1:2d:79:37:df:88:99:20:17:06:a5:22:aa:9f:bb: 7d:7e:51:6c:2f:98:db:57:74:a5:42:cb:cb:68:b0:a5: 07:99:88:32:de:e5:06:fa:28:b9:ec:d8:f3:64:a2:e5: 43:fc:30:d7:35:78:97:83:9f:8b:c1:8a:8a:7e:73:79: 04:2c:c5:5a:ec:2c:65:4e:0c:6c:67:ad:0a:25:66:79: c8:84:07:54:fb:13:8e:42:06:89:93:99:43:46:af:9e: 01:df:15:b9:c9:b4:98:a8:8e:c3:23:c9:e4:26:a9:f9: 73:52:e7:94:47:f2:bd:e0:22:da:8a:a4:19:f6:b3:11: bf:4d:46:58:60:3f:c1:63:4a:a5:fd:aa:ff:75:ce:e1: 18:48:97:93:79:42:75:36:82:a9:b6:c5:df:ec:95:58: ce:7c:0b:92:73:32:53:7e:1a:41:25:10:53:0f:9f:d4: 75:d9:e3:f8:a1:72:5f:6d:e8:b4:17:25:33:24:3d:10: b2:52:c3:ae:80:b9:5e:fc:84:13:85:e0:7b:6a:4b:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 45:07:0b:93:4f:7b:b2:29:36:30:be:7b:ed:0a:88:a4: 8e:68:b5:98:5a:2b:68:b9:58:11:57:14:9b:8f:00:96: 4e:56:90:b5:a9:bd:f6:bd:83:cf:28:05:6c:a0:71:d1: f3:df:1d:8c:15:28:30:5e:94:85:85:6e:2d:5d:4d:40: e8:13:69:80:8d:7a:7b:be:89:ac:9e:8d:b4:19:f8:b0: 5f:42:64:fa:73:b9:e4:b8:17:d7:29:1d:2a:5a:8d:58: 66:a1:b9:6f:c9:2b:87:c4:be:20:ed:d7:7e:ff:db:25: 8c:74:e8:6b:37:56:b3:27:30:36:bb:0c:e3:cb:d5:0b: 8d:36:b6:13:0f:1f:27:76:8a:fb:bb:fb:77:f2:37:13: 17:0d:66:64:c6:f5:15:0d:71:b3:60:f9:6d:30:92:85: 61:1b:0c:ec:b3:69:e0:75:71:04:a1:19:9f:2b:d5:af: 8c:45:64:82:ea:d7:e5:9f:95:da:c6:16:c3:f8:71:c5: ca:29:67:3e:bf:14:87:0b:e6:da:fe:97:86:19:97:3b: 99:1e:55:db:22:4f:1e:e4:84:cb:76:16:da:be:dc:6f: 97:f7:e2:a6:0a:c2:c2:7c:68:02:c5:c2:a4:6e:51:c8: f9:75:1e:f9:99:82:e3:9d:82:67:27:ff:27:b7:44:40 Fingerprint (SHA-256): EB:38:C4:1C:73:C7:76:19:26:CA:21:DC:9D:76:4C:41:22:70:F1:38:95:39:04:7D:D4:3A:68:E0:0B:59:D0:74 Fingerprint (SHA1): 5C:3C:55:E4:C5:C6:C3:29:EC:6E:5E:5E:5C:9D:64:72:52:45:88:0E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:f0:1a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 15:43:41 2023 Not After : Thu Jan 18 15:43:41 2024 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:6f:74:be:6b:80:52:1d:97:74:91:a4:bb:f9:10:20: 92:8d:65:00:4c:c2:d0:4e:21:2f:5b:dc:06:eb:5f:0a: 5e:57:d5:d3:18:35:7b:a6:64:2f:f2:af:fb:84:09:09: 50:d0:79:b2:17:01:c7:b4:11:93:29:2c:96:3e:bd:c0: ca:57:b1:42:6b:2a:2c:b3:ca:e2:6e:24:3f:75:1b:d8: 88:ff:dd:79:c9:c0:4e:a3:1b:89:a5:b5:a4:1b:65:be: 4c:a4:3a:b4:79:66:a3:cc:e0:b5:3d:12:b3:45:c3:e8: d4:16:5b:bc:0e:b4:d6:fe:74:5d:77:36:52:d3:09:cb: 04:c5:c3:6c:97:da:b0:94:c0:c5:13:86:a1:14:f8:4a: ff:7c:c9:5f:a2:63:cc:b5:e2:9b:27:ee:34:b8:a1:35: f2:57:3c:6d:af:40:c8:87:b4:39:ba:b6:25:fa:5a:d1: 0f:3c:03:ae:33:b3:38:66:ad:1b:3f:27:e8:ad:a6:a7: 6b:23:d5:5d:71:95:8b:f0:33:0d:c6:6b:07:a0:4f:30: 30:ff:3f:15:a6:39:fe:fa:bd:56:86:5e:bd:28:87:40: 04:b0:d6:d2:3e:49:3e:77:50:de:fd:96:08:a2:58:00: c6:f9:e6:fe:e2:79:60:43:00:fb:c6:4f:2a:ec:32:77 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a6:09:b1:ed:3b:3a:5c:8c:a2:91:f9:ac:46:29:35:ac: 50:a8:e9:a6:96:26:cf:5a:1e:60:c6:5a:bc:c0:e4:37: 0a:54:20:30:a0:4a:6f:05:f6:f4:7c:f2:eb:27:79:c0: 99:a3:75:bf:7f:70:b4:61:6e:2e:43:a9:93:b4:f4:31: 2a:19:31:b0:ea:e3:b8:aa:c5:74:bd:82:f9:1b:11:d9: c6:b5:f1:31:43:51:15:40:5b:34:4d:0f:d3:0f:7d:0b: 8f:b4:b4:a4:49:60:71:e0:00:30:aa:23:9b:7a:bb:ff: ec:f3:44:c6:d5:32:c0:f5:dc:a3:ad:9f:79:d0:b1:ec: a6:3c:ee:a2:a2:29:a3:fb:95:35:26:4d:a7:ac:68:7d: 46:e1:bc:72:7c:d5:18:2c:b9:ba:07:ea:4a:b7:88:52: 7d:f6:20:ba:6d:bc:64:26:6f:ea:04:76:a0:a9:3c:93: 7f:ab:b9:c3:b4:86:fc:4d:4c:4f:b1:67:c3:93:b7:c4: 85:1b:8e:bd:12:f9:09:31:79:45:dc:99:30:f4:d5:2e: 84:b6:33:0a:1b:6a:6c:33:d1:37:2f:cb:41:3a:bf:7b: 6b:d1:48:d8:34:55:92:b3:09:05:62:4e:4f:79:af:65: 2b:69:f3:6f:02:40:45:c5:12:f9:8d:fb:66:26:a4:4d Fingerprint (SHA-256): 8C:F7:3B:4A:66:FE:C8:EF:1B:22:95:7F:24:EF:4E:6A:2B:F1:CF:B1:83:84:AF:BD:A5:BF:FC:FB:78:00:96:33 Fingerprint (SHA1): 6C:B6:63:4B:F0:DE:0C:5D:C8:6D:FE:F1:9C:2C:DE:07:65:28:33:4B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #337: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:f0:1f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 15:43:43 2023 Not After : Thu Jan 18 15:43:43 2024 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:01:87:04:3d:bd:d7:f8:1f:61:15:cc:a1:24:0e:7b: e6:30:cb:58:47:15:50:01:cb:7a:7d:69:5d:e2:de:ac: f7:4e:d2:da:57:7c:af:a3:a4:03:ea:75:25:70:ae:d4: 6b:df:36:64:65:4b:71:5b:0a:42:b3:7b:7a:4e:3b:8d: a4:0e:2d:b4:2d:ed:a9:dc:41:0d:55:42:02:76:23:1f: fa:66:ca:4c:ac:38:34:2b:bb:d4:49:5c:df:03:fe:40: 45:96:07:3e:f6:ac:f3:e7:f0:aa:c6:d8:27:c1:2b:ec: 5b:4f:92:c0:a6:ed:84:10:73:de:c0:62:6d:ef:a2:46: f1:5f:6a:5c:7a:2b:8a:c1:61:4a:a1:df:08:c8:6c:bc: 58:f0:22:81:8b:f8:c3:9e:2d:29:30:da:65:e4:c1:eb: bd:a9:88:8a:92:25:72:c5:b3:b9:e9:68:73:19:27:b4: 84:e1:c3:e4:3b:86:f8:26:f8:0f:5d:a8:aa:0d:9c:81: 62:e5:ee:07:95:47:d4:5e:3b:31:ac:9b:a3:09:92:33: 73:2f:4f:c0:ff:e5:e4:68:41:d0:8f:04:fb:e0:e8:87: ca:35:c5:3f:d0:8d:46:6b:26:89:63:7a:42:c3:5a:b7: ac:e8:54:2a:80:0e:49:3f:11:f1:ec:4c:c4:f4:44:91 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b3:20:19:65:5a:9a:bb:95:db:c1:82:8b:70:2c:cf:b5: a9:ef:cf:d2:ce:d8:19:1e:68:c5:c0:13:21:76:a3:13: cf:12:c0:cd:4a:15:db:f5:1f:cc:f6:94:52:3a:20:90: bf:7e:e9:17:a7:b1:63:cb:42:ff:2c:d7:03:2b:14:78: ce:45:09:fb:34:fb:2c:ad:2d:be:8c:c4:6c:75:a9:0b: d2:4e:c9:31:b6:f8:23:a1:39:97:c5:45:e7:81:b0:a9: 37:1d:86:64:de:fa:29:a9:80:72:12:3b:5d:dd:03:9d: 0a:ae:9f:17:36:ed:13:76:73:01:44:22:e7:d4:12:ba: 1e:8e:2b:db:bd:8f:04:17:a2:cf:15:30:26:00:23:18: c7:3a:e6:0c:00:fa:e6:51:94:8f:7d:5d:e4:9d:77:b4: 61:20:ba:73:b1:2e:f9:6f:11:68:48:16:5b:5f:24:a8: 54:a5:e1:26:69:87:5d:1c:3f:11:bc:8d:48:98:d7:06: b4:71:96:6a:e6:d7:35:2b:7d:7f:cb:ca:e3:ad:3d:7d: 92:ee:25:69:2e:99:b3:86:37:36:f0:58:dd:00:a1:11: 9d:90:2b:12:e8:9f:7c:b8:a5:87:07:58:c8:c9:43:4f: 99:99:ae:43:87:54:26:e2:50:d6:f9:2a:9d:38:b7:bb Fingerprint (SHA-256): 35:61:23:A6:57:B4:F1:AF:00:30:6C:5D:19:A8:B8:96:6B:AF:BB:3B:B4:19:74:A5:C5:63:47:4E:A2:A6:8D:3B Fingerprint (SHA1): BC:16:0F:C1:D0:6F:C0:A3:83:94:B3:B0:B3:4E:74:6F:8F:AC:F0:39 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #338: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:f0:22 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 15:43:45 2023 Not After : Thu Jan 18 15:43:45 2024 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:e8:88:10:fd:b1:9b:d3:bd:11:02:62:22:00:cd:15: 1b:e2:d3:ad:e0:f2:ef:59:cb:93:e7:8a:0f:85:82:2f: 54:44:d3:55:4c:79:34:18:97:c3:fb:6b:e4:ea:8d:21: 0c:07:8c:c9:f0:c5:2d:1a:e9:9a:cb:26:ce:e1:9d:cd: 98:bf:5d:a3:f9:e0:b8:35:3d:8b:84:43:44:a8:ee:0a: b7:ab:7e:8f:55:67:b0:28:43:4f:50:2c:7f:6d:f4:4a: 52:63:da:08:8a:01:45:05:fe:90:93:9b:6f:3b:bb:99: 4e:64:8a:65:66:0c:aa:d9:03:a9:55:f2:b5:75:e2:92: 7b:53:1e:71:db:32:ed:10:2e:43:9f:e5:c8:47:25:d9: ee:35:77:5e:96:f0:65:db:d2:ee:b3:29:75:23:e7:ae: 3b:50:f6:08:cc:c6:37:3d:02:44:22:13:f2:a3:f5:8a: 90:7e:48:75:3b:54:66:a8:6e:aa:6a:38:02:7e:74:fe: 67:ad:99:47:55:7f:9a:0b:b9:74:29:21:7e:73:25:c7: 7e:fe:28:bc:49:23:08:fa:3d:ab:2e:63:16:04:45:0c: 14:82:ec:f8:b8:42:f8:87:7c:c9:f1:9b:9f:fb:72:53: 0a:4f:0d:47:28:2a:b3:5f:6b:b8:b1:90:b5:38:37:f9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 45:6c:d7:d6:6e:cd:c3:94:6a:4d:0d:73:f6:3b:a9:ed: 2b:1a:24:9b:4a:ee:7a:1c:a3:19:29:c2:0f:82:7d:69: 1a:91:a2:88:5b:df:0b:97:18:dc:2d:ca:7d:65:e1:79: c9:ed:dd:67:ac:df:ef:f1:40:4f:e1:7a:09:13:f0:f2: e4:a5:d1:89:d3:08:ad:86:76:ba:92:5b:93:61:ec:c2: 02:9d:47:75:48:33:3f:41:58:55:e1:46:d3:f2:8b:49: 4f:1f:09:df:af:1c:9b:4f:a1:31:7a:60:24:61:f0:71: 62:43:df:06:b5:ab:18:83:f0:e5:31:f8:8f:8b:d0:ce: 7b:0c:83:50:fa:44:ac:f3:b6:16:d8:a7:af:51:87:9f: 99:48:4e:d6:8b:6f:5e:00:3e:97:b8:33:62:a4:c0:20: 03:bb:19:74:4e:32:fc:4f:7b:96:fe:55:4a:25:d8:69: a9:2e:c6:45:b2:ac:53:fe:73:0f:bc:97:6a:10:34:a2: 6f:c0:a7:ad:39:bd:b8:38:99:23:9d:30:6e:f5:dd:01: 9b:95:ed:25:d1:49:1d:06:25:85:d6:e7:68:66:50:f1: 15:05:bb:97:1e:99:ba:2d:61:fd:b9:19:b0:68:b3:e6: 2a:81:d0:83:fc:9a:a5:f7:06:03:21:1b:b9:68:7e:f5 Fingerprint (SHA-256): 59:8E:66:ED:C7:8A:FA:5E:EA:48:AE:13:42:9A:D3:50:CD:B1:26:A0:B4:D9:0A:F8:CE:A9:FD:BF:2F:E0:22:15 Fingerprint (SHA1): EB:6E:ED:2F:DF:36:78:00:53:01:68:E7:F4:DF:1D:25:4E:D3:9B:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #339: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:f0:26 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Wed Oct 18 15:43:47 2023 Not After : Thu Jan 18 15:43:47 2024 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:41:c7:b0:f2:f4:ce:31:fd:ab:b4:28:cf:16:0a:69: 01:47:1b:e9:a2:8e:30:b5:18:50:9e:c1:2e:9e:ee:4f: 65:b4:dc:74:36:ee:0e:eb:e2:32:47:f6:2c:7a:97:4f: 86:a4:b7:32:cf:94:a9:69:a1:58:48:d6:46:cf:82:76: 60:66:fb:e1:45:23:bf:c3:85:10:ec:86:6c:60:bb:84: 76:86:f8:f3:22:a6:0c:c0:c4:93:cd:97:3c:00:0e:93: 31:41:74:f0:79:3f:0b:34:82:24:43:32:8b:a7:4c:f2: c4:42:a1:14:1e:bb:a0:9f:15:e6:d2:1f:a0:e6:2f:18: b0:bb:19:ee:71:1c:d3:a4:be:5f:3d:91:6c:46:fe:1e: 5b:31:d4:1b:3b:bd:8f:2c:1a:bd:60:ab:47:9d:41:78: 64:01:4f:ea:d6:15:79:48:d9:19:72:e2:2a:ce:34:bc: 11:dc:f2:c8:50:d5:5c:b4:0f:c6:af:36:33:ee:54:09: 2c:f7:1b:cd:be:14:53:7f:70:22:b4:32:07:f8:ba:3a: 0a:a0:f6:5b:e2:0c:76:fa:f5:df:4c:0c:7c:b8:ac:46: 8a:48:d8:84:8f:8f:0d:77:81:b7:11:59:88:e2:12:de: 83:56:83:fa:88:5f:94:2b:38:5f:1d:79:63:75:66:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 75:6e:76:99:ae:20:40:73:02:fa:d4:21:6a:aa:59:53: 39:8f:8c:2b:af:05:3c:ac:a9:2c:79:ad:b9:d0:bd:0c: 1e:b9:6a:58:14:61:2f:e4:62:20:60:f5:60:d2:83:f8: 81:f3:1e:0e:40:fb:96:3d:c0:4a:e5:c7:1d:dc:7d:78: 34:f7:4a:d4:11:b9:8b:2c:b3:b9:35:d0:9f:34:02:a4: f4:76:b1:10:4f:fd:19:13:dc:e9:10:e8:6f:07:0d:ca: 71:22:94:99:19:a8:7f:81:bc:04:71:37:13:d9:a4:fe: 95:55:17:ef:77:98:d7:44:92:7a:d8:3a:bc:c4:0b:73: 2d:88:2c:22:05:2b:77:78:92:bf:c0:bb:91:56:f6:e9: 13:56:0b:42:06:01:c3:56:cc:d0:9e:37:d6:e5:ae:19: e1:6c:b5:7e:3b:3c:6a:a7:10:9c:ce:f7:7a:2f:d7:13: 8e:c8:b4:70:56:2e:87:c9:aa:ec:af:c4:c7:de:e0:09: 2e:ac:50:de:a5:77:81:69:f1:4e:38:98:c7:79:27:d5: 5d:11:33:02:aa:35:78:bf:0f:3c:db:9d:aa:a9:f7:43: 1a:16:a2:65:ad:c5:02:b9:a4:ea:89:7d:6f:03:88:56: c2:b0:5c:51:cd:80:87:90:c3:9d:2f:b0:5a:8d:d0:ec Fingerprint (SHA-256): BC:74:39:38:AB:75:B2:8F:45:5E:7F:D2:B6:4F:5C:35:9A:8A:BC:21:7E:D9:0E:22:04:0A:B8:6A:BF:D4:BC:4C Fingerprint (SHA1): 43:98:22:B5:8E:21:20:65:80:64:D4:07:E9:AC:FF:28:EE:2E:43:C0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:f0:29 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Wed Oct 18 15:43:49 2023 Not After : Thu Jan 18 15:43:49 2024 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:7b:a2:f5:33:ff:04:ee:80:3d:a2:4e:bf:c0:2f:51: 77:10:47:9b:69:6d:85:96:40:b4:8e:bd:a0:9a:e6:dd: 8a:6b:a2:02:c2:c7:94:29:9a:99:74:92:ca:01:7d:a0: 4c:cd:54:1b:a7:c6:ba:e2:83:ba:e1:10:a8:98:7b:93: f5:09:31:ef:3d:11:46:ea:47:de:7b:c9:bf:8b:ee:5b: 13:81:ad:10:ad:bb:1a:55:89:38:0e:4b:81:d8:89:c8: 92:7f:5f:52:70:86:d9:30:4d:13:06:82:06:32:b8:aa: 72:3e:7a:46:18:db:4d:20:db:53:71:db:a1:1d:c7:27: 33:55:99:49:4c:5c:78:f9:de:f6:a7:63:70:85:2c:8a: ea:fc:d5:a5:40:bd:3f:b7:7b:af:4d:c6:f3:41:ea:de: 85:59:86:ff:e9:d5:44:8e:e9:53:4d:58:86:81:17:bb: 5a:c9:10:fe:b2:6c:b5:cc:89:d5:a0:a5:c2:5d:dc:d7: 5a:de:35:bc:05:59:b4:5d:1f:ae:c2:a7:3c:28:f6:e1: 0a:c3:0e:80:4f:e8:9b:90:ea:b3:04:db:dc:32:e7:59: 64:0c:b7:f8:04:0e:b6:a3:2a:11:38:48:d3:c1:19:de: 48:54:7f:e8:1a:f4:05:c0:b8:87:33:8a:0c:cf:92:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:86:d4:f9:74:4c:94:72:9b:c2:f4:d3:43:64:dc:c2: 78:5d:de:7b:68:f7:ac:fb:91:bc:ef:50:85:5c:c9:9a: 04:a7:b8:51:bb:a8:7c:5e:b3:dc:96:1d:49:85:f6:4e: db:d7:32:8f:fe:c3:71:6b:4e:6d:b3:91:13:69:dd:40: 12:a8:73:45:cf:ae:2f:66:84:cf:75:f2:de:f2:09:57: 42:18:e2:d5:27:a6:60:b8:43:25:7e:28:ce:6e:5f:39: 04:ac:36:80:75:60:34:ec:d8:7c:4a:12:ef:42:60:09: fd:a0:74:39:1b:2f:76:76:80:13:25:a2:e3:1c:d9:06: 6c:cf:de:74:e0:53:26:97:88:a8:10:32:71:cf:83:5a: 6c:6e:f0:ef:01:28:ee:d3:93:b3:7f:90:5c:ec:40:73: a2:64:e2:70:1f:61:56:ce:cb:a8:bf:81:44:28:a2:77: d9:9f:5e:3b:ca:d5:22:16:f9:af:70:dd:66:cc:ba:55: 58:a2:14:75:6a:90:f0:93:16:39:fa:45:c1:e6:91:ec: a1:7b:4a:3a:fa:29:38:ce:c6:ad:77:91:71:1d:c0:da: e1:82:8b:8f:6b:60:ae:6a:d7:52:1b:50:5e:80:51:1c: 93:3d:56:85:4e:89:33:b1:73:70:0d:3d:56:8e:6a:91 Fingerprint (SHA-256): 10:2A:52:C6:9E:6C:7B:BA:20:02:88:C2:0D:40:04:2D:1E:0D:50:D8:76:5B:51:47:63:42:81:D2:E8:C2:31:A9 Fingerprint (SHA1): A1:AB:8A:D8:28:04:0C:77:B3:5A:92:B7:01:CF:13:D8:49:1F:B2:4D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #341: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #342: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #343: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #344: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:f0:33 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed Oct 18 15:43:53 2023 Not After : Thu Jan 18 15:43:53 2024 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ba:1f:60:f1:73:6b:20:74:c6:43:85:44:97:e4:56:53: 4e:17:42:8e:8e:35:e2:8c:61:c1:d8:c0:18:e4:49:13: 4c:ac:4f:9b:cf:44:59:22:c0:1e:a7:f9:36:52:4d:74: 19:46:97:48:83:30:05:02:75:97:cc:cd:8f:79:12:74: c2:b9:db:9c:c7:b9:ca:2c:90:1c:c7:82:7d:a3:4f:27: f6:02:47:05:2e:6b:f1:72:7f:a4:8d:f5:df:43:5e:dd: 62:58:3d:7c:96:86:d1:03:4a:8b:81:9e:03:f6:c5:e1: 1e:e7:02:ac:77:bc:3b:c2:c5:b9:94:62:89:04:7f:51: d0:1c:d2:38:98:c9:06:f1:1b:4d:96:59:8c:5c:0c:b5: d8:bf:82:3f:2e:11:63:b4:5c:9c:4f:29:ca:59:c6:2f: 47:88:8d:d5:1e:12:16:3d:18:46:69:cd:19:a5:d7:48: 7a:17:ed:33:d6:a8:a5:ed:35:f2:33:e3:4e:ce:50:22: 19:cc:87:b7:3c:03:77:3e:24:14:f2:67:48:95:8d:2f: 9c:46:55:75:f7:7a:77:18:bc:11:cc:80:fc:a1:60:b6: 65:44:34:98:10:dc:78:97:cf:1d:f0:42:a7:2e:af:94: 53:99:77:a2:a6:36:39:03:67:07:ff:f3:f7:40:71:4f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:ab:fd:08:a8:73:40:0e:0c:e3:37:05:d5:93:14:ac: f1:ec:8b:80:b8:a3:c2:a2:45:d5:83:cc:92:ea:ec:35: d3:87:6a:80:fa:3b:36:a8:cf:53:66:5a:8a:3b:59:86: 92:f7:cc:82:67:ef:eb:1d:76:8f:42:f2:70:d6:d3:8b: ea:3c:58:bb:bf:56:cf:3b:26:49:91:29:b0:9c:59:9b: 9c:a1:fd:09:d6:4b:18:1a:ba:b9:fb:07:bb:dc:b2:2b: 6f:10:c5:44:2c:04:2c:4f:87:37:0d:33:af:94:ae:a7: b1:c5:1e:a4:b7:f4:0f:b6:ca:95:45:da:04:f8:23:14: 8f:d6:b3:62:19:4c:26:17:99:c7:f6:32:b1:79:7b:28: 1c:1f:51:e0:c6:f5:72:60:76:81:98:a8:5a:9e:df:5f: 3c:d9:ff:ec:32:8e:bf:58:c7:da:60:71:88:2d:28:00: 91:9b:48:60:18:3f:d6:9e:b9:e1:b0:a2:f2:ca:a4:ef: 5c:93:19:17:0b:a6:8a:de:bc:c3:ad:89:3e:56:5f:c1: a2:e2:93:f3:c3:40:dd:9d:3b:75:74:30:22:55:a0:31: 6f:1e:d5:d8:d7:c7:f4:e7:01:a3:b6:a4:d4:1e:10:42: b5:c3:3f:d5:4e:1f:62:90:b9:09:86:78:06:b2:8b:bd Fingerprint (SHA-256): B4:B6:B8:EC:0F:8E:CE:F7:CC:FF:F6:DD:19:F1:6F:6F:68:8A:8E:6A:83:2A:10:E7:B8:9E:CF:B4:76:72:F4:56 Fingerprint (SHA1): 80:2E:D8:FB:DD:50:BC:D1:BB:28:82:7A:40:56:FE:15:90:03:B9:C4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #345: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der cert.sh: #346: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #347: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #348: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #349: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #350: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der: error 0: Success cert.sh: #351: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #352: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c0:ff:f0:43 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed Oct 18 15:44:02 2023 Not After : Thu Jan 18 15:44:02 2024 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:8e:11:f9:41:5d:01:68:62:4e:88:24:d6:28:c2:fb: ef:6d:36:c2:7f:72:bc:f3:7f:31:65:8b:af:2a:07:04: d6:f8:bd:52:c2:11:26:b7:55:0d:01:d6:80:ac:07:9d: 2d:1d:12:a1:7c:41:1d:87:aa:d5:5d:46:5b:81:5f:6f: 37:d7:8b:c6:d2:f8:ed:79:d4:6f:f1:3b:f1:22:a2:86: 88:2a:28:02:f8:78:4c:a2:74:fb:d2:fa:74:d0:72:9b: bc:64:a0:b0:80:54:93:9b:3e:ef:40:f0:b9:a7:78:f2: e4:e7:f5:80:e3:74:01:cf:0e:28:95:ca:4a:13:8d:99: fa:52:0f:66:bd:59:53:da:6d:0a:3a:86:9f:dc:b4:3d: 2b:29:a4:98:0c:e9:9a:c1:d7:40:be:5f:58:b8:53:ab: 3d:6a:85:8a:e6:1a:26:52:63:98:9b:23:93:1a:3f:6d: 99:f0:e4:d5:ae:d2:1c:6c:fd:1e:c2:ac:63:0b:c4:52: fc:c4:fb:df:47:c2:28:99:3b:34:87:fb:77:f4:f0:c5: cf:5e:b7:f5:58:f3:70:07:98:db:4f:d1:7e:e3:14:72: 98:2c:35:5b:d1:97:a1:00:a0:da:a8:8d:01:22:cb:e8: 2a:43:d8:2c:24:39:87:02:ac:ee:d6:b1:01:e7:7d:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 71:70:75:7c:b2:a5:22:f3:fc:67:15:9d:bb:f8:83:30: fe:f9:60:d3:42:01:e8:fa:48:a5:99:6c:30:be:35:87: dc:60:10:35:61:ff:70:47:7a:eb:50:49:c1:c6:b4:19: a3:83:4e:de:8c:1b:99:48:b3:f1:f0:1d:98:cf:4a:77: ef:56:ea:f6:a6:07:75:c4:33:1a:a4:66:e3:d5:db:9e: 7d:4a:cf:e6:2f:e3:8a:ea:37:ea:77:ce:6d:8b:33:0f: 10:18:29:17:0b:31:85:e7:bb:36:92:a1:37:53:07:e0: 4b:05:98:a8:5a:24:0b:70:ad:da:4d:93:ca:61:21:19: 12:b7:6b:78:6c:39:33:7b:59:af:91:e9:20:17:70:e6: 24:39:59:c4:63:ee:4c:c6:d1:0b:bb:4f:d0:8d:80:2e: 4e:5d:a6:3b:26:3c:f2:06:a9:c7:29:90:46:7e:de:ee: ef:f4:54:23:63:17:a7:12:52:bc:93:2a:a1:d9:64:69: 21:ad:22:a4:bc:ce:78:af:7f:27:87:9a:6a:5e:c9:4a: fd:74:25:f1:00:c4:5d:c8:66:2f:d4:b2:ab:4d:ba:f6: 91:a1:56:87:6f:21:f0:ce:e5:0a:dd:a5:fd:fa:36:e2: ef:63:42:31:9b:21:bc:fb:41:87:77:3a:11:23:6a:7b Fingerprint (SHA-256): B5:D5:CA:8F:2C:BE:F1:E6:6F:C7:11:10:09:85:82:7F:84:53:89:19:B0:2D:01:97:F9:33:B1:DC:AE:6E:26:11 Fingerprint (SHA1): CF:4B:E3:C3:CF:97:E9:21:6A:D4:DB:97:AE:14:B2:E6:22:31:8E:45 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #353: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #354: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #355: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw cert.sh: #356: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #357: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #358: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dbpass -o root.cert cert.sh: #359: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #360: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #361: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #362: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #363: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #364: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA.ca.cert cert.sh: #365: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #366: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #367: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #369: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #372: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #375: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #378: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #381: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #383: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #384: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw cert.sh: #386: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #387: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -o root.cert cert.sh: #388: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #389: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #390: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #391: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #392: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #394: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #395: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #396: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #397: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #400: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #401: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #402: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #403: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #404: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #405: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw cert.sh: #406: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #407: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #408: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #409: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #410: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #411: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #412: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #413: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #414: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #417: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #422: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #427: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #432: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #437: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #441: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #442: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #443: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #444: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #445: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #446: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #449: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #454: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #458: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #459: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #460: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #461: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #462: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #463: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss-policy -------------------------- certutil -s "CN=TestUser-rsa-pss-policy, E=TestUser-rsa-pss-policy@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #464: Generate Cert Request for TestUser-rsa-pss-policy - PASSED cert.sh: Sign TestUser-rsa-pss-policy's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 211 -v 60 -d ../CA -i req -o TestUser-rsa-pss-policy.cert -f ../tests.pw cert.sh: #465: Sign TestUser-rsa-pss-policy's Request - PASSED cert.sh: Import TestUser-rsa-pss-policy's Cert -------------------------- certutil -A -n TestUser-rsa-pss-policy -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw -i TestUser-rsa-pss-policy.cert cert.sh: #466: Import TestUser-rsa-pss-policy's Cert - PASSED cert.sh: Verify TestUser-rsa-pss-policy's Cert -------------------------- certutil -V -n TestUser-rsa-pss-policy -u V -V -e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #467: Verify TestUser-rsa-pss-policy's Cert - PASSED cert.sh: Verify TestUser-rsa-pss-policy's Cert with Policy -------------------------- certutil -V -n TestUser-rsa-pss-policy -u V -V -e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #468: Verify TestUser-rsa-pss-policy's Cert with Policy - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> rsa 5a1f5d39d2347aa7f1eb36fb127dee5dfd14efd3 NSS Certificate DB:localhost.localdomain < 1> dsa 1afc5adace3c8d4d92a0c9df428b152ec4a8bca4 NSS Certificate DB:localhost.localdomain-dsa < 2> dsa 54ba058fe95ca09b5df597d9e53cd4970e8dac31 NSS Certificate DB:localhost.localdomain-dsamixed < 3> ec 0fe96613a4b9e2e4c1fbc92582c0b829ecf938a0 NSS Certificate DB:localhost.localdomain-ec < 4> ec b9778b672d1b5c4682449cf77500bfb52cf323ed NSS Certificate DB:localhost.localdomain-ecmixed < 5> rsaPss ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 6> rsa f4645458ee1f6703014396e3769341b85050ecf7 NSS Certificate DB:localhost-sni.localdomain < 7> dsa 6ef7b6b297c6a3aad04322727d00d85343c4d4d7 NSS Certificate DB:localhost-sni.localdomain-dsa < 8> dsa 246e515204d2c6a673d0a1384945670396d83bc6 NSS Certificate DB:localhost-sni.localdomain-dsamixed < 9> ec f0533eaf5284be7f3b9f85976c0db89f7da45d7a NSS Certificate DB:localhost-sni.localdomain-ec <10> ec 97b8524ee4d469cd87c46dc110c6bbd0f31a628c NSS Certificate DB:localhost-sni.localdomain-ecmixed <11> rsa ea139caa58902a4cc430bd0f0a1abce43cfa161f (orphan) cert.sh: #469: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #470: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #471: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #472: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #473: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #474: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #475: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #476: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #477: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #478: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #479: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #480: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #481: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #482: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #483: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #484: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #485: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #486: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #487: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #488: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #489: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #490: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #491: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #492: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #493: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #494: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #495: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #496: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #497: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #498: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #499: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #500: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #501: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #502: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #503: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #504: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #505: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #506: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #507: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #508: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #509: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #510: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #511: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #512: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #513: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #514: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #515: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #516: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #517: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #518: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #519: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #520: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #521: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #522: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #523: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #524: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #525: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #526: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #527: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #528: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #529: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #530: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #531: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #532: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #533: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #534: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #535: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #536: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #537: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #538: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #539: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #540: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #541: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #542: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #543: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #544: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #545: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #546: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #547: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #548: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #549: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #550: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #551: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #552: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #553: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #554: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #555: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #556: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #557: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #558: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #559: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #560: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #561: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #562: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #563: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #564: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #565: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #566: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #567: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #568: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #569: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #570: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #571: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #572: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #573: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #574: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #575: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #576: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #577: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #578: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #579: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #580: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #581: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #582: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #583: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #584: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #585: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #586: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #587: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #588: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #589: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #590: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #591: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #592: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #593: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #594: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #595: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #596: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #597: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #598: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #599: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #600: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #601: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #602: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #603: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #604: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #605: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #606: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #607: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #608: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #609: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #610: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #611: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #612: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #613: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #614: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #615: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #616: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #617: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #618: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #619: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #620: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #621: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #622: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #623: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #624: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #625: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #626: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #627: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #628: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #629: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #630: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #631: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #632: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #633: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #634: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #635: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #636: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #637: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #638: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #639: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #640: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #641: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #642: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #643: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #644: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #645: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #646: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #647: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #648: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #649: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #650: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #651: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #652: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #653: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #654: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #655: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #656: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #657: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #658: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #659: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #660: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #661: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #662: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #663: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #664: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #665: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #666: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #667: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #668: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #669: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #670: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #671: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #672: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #673: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #674: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #675: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #676: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #677: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #678: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #679: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #680: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #681: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #682: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #683: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #684: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #685: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #686: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #687: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #688: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #689: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #690: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #691: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #692: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #693: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #694: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #695: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #696: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #697: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #698: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #699: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #700: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #701: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #702: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #703: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #704: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #705: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #706: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #707: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #708: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #709: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #710: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #711: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #712: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #713: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #714: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #715: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #716: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #717: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #718: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #719: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #720: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #721: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh: Verify large rsa pss signature -------------- vfychain -a Leaf-bogus-dsa.crt Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=decodeECorDSASignature-testCase/taviso : ERROR -8010: The signature algorithm in the signature field of the certificate does not match the algorithm in its signatureAlgorithm field. cert.sh: #722: Verify large dsa signature - PASSED cert.sh: Verify large rsa pss signature -------------- vfychain -a Leaf-bogus-rsa-pss.crt Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. taviso@google.com : ERROR -8010: The signature algorithm in the signature field of the certificate does not match the algorithm in its signatureAlgorithm field. cert.sh: #723: Verify large rsa pss signature - PASSED cert.sh cert.sh: finished cert.sh TIMESTAMP cert END: Wed Oct 18 15:48:18 UTC 2023 Running tests for dbtests TIMESTAMP dbtests BEGIN: Wed Oct 18 15:48:18 UTC 2023 dbtests.sh: CERT and Key DB Tests =============================== --------------------------------------------------------------- | test opening the database read/write in a nonexisting directory --------------------------------------------------------------- certutil: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #1: Certutil didn't work in a nonexisting dir 255 - PASSED dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #2: Dbtest readonly didn't work in a nonexisting dir 46 - PASSED --------------------------------------------------------------- | test force opening the database in a nonexisting directory --------------------------------------------------------------- dbdir selected is ./non_existent_dir ERROR: Directory "./non_existent_dir" does not exist. dbtests.sh: #3: Dbtest force succeeded in a nonexisting dir 0 - PASSED --------------------------------------------------------------- | test opening the database readonly in an empty directory --------------------------------------------------------------- tstclnt: unable to open cert database: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #4: Tstclnt didn't work in an empty dir 1 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_BAD_DATABASE: security library: bad database. dbtests.sh: #5: Dbtest readonly didn't work in an empty dir 46 - PASSED dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir dbtests.sh: #6: Dbtest logout after empty DB Init has key - PASSED dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir dbtests.sh: #7: Dbtest password DB Init maintains needlogin state - PASSED certutil: could not find certificate named "xxxx": SEC_ERROR_INVALID_ARGS: security library: invalid arguments. dbtests.sh: #8: Certutil didn't work in an empty dir 255 - PASSED --------------------------------------------------------------- | test force opening the database readonly in a empty directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/emptydir/key3.db" does not exist. dbtests.sh: #9: Dbtest force readonly succeeded in an empty dir 0 - PASSED --------------------------------------------------------------- | test opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtest: function failed: SEC_ERROR_READ_ONLY: security library: read-only database. dbtests.sh: #10: Dbtest r/w didn't work in an readonly dir 46 - PASSED certutil: could not find certificate named "TestUser": SEC_ERROR_INVALID_ARGS: security library: invalid arguments. dbtests.sh: #11: Certutil didn't work in an readonly dir 255 - PASSED --------------------------------------------------------------- | test opening the database ronly in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtests.sh: #12: Dbtest readonly succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | test force opening the database r/w in a readonly directory --------------------------------------------------------------- dbdir selected is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir ERROR: Directory "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir" is not writeable. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/secmod.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/cert8.db" does not exist. database checked is /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/key3.db ERROR: File "/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/key3.db" does not exist. dbtests.sh: #13: Dbtest force succeeded in a readonly dir 0 - PASSED --------------------------------------------------------------- | ls -l /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir --------------------------------------------------------------- dr-xr-xr-x. 2 mockbuild mockbuild 4096 Oct 18 15:48 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir -r--r-----. 1 mockbuild mockbuild 1227 Oct 18 15:48 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-dsa.cert -r--r-----. 1 mockbuild mockbuild 1427 Oct 18 15:48 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-dsamixed.cert -r--r-----. 1 mockbuild mockbuild 582 Oct 18 15:48 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-ec.cert -r--r-----. 1 mockbuild mockbuild 707 Oct 18 15:48 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-ecmixed.cert -r--r-----. 1 mockbuild mockbuild 881 Oct 18 15:48 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/TestUser-rsa-pss.cert -r--r-----. 1 mockbuild mockbuild 872 Oct 18 15:48 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/TestUser.cert -r--------. 1 mockbuild mockbuild 245760 Oct 18 15:48 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/cert9.db -r--------. 1 mockbuild mockbuild 152576 Oct 18 15:48 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/key4.db -r--------. 1 mockbuild mockbuild 626 Oct 18 15:48 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/pkcs11.txt -r--r-----. 1 mockbuild mockbuild 728 Oct 18 15:48 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ronlydir/req --------------------------------------------------------------- | test creating a new cert with a conflicting nickname --------------------------------------------------------------- /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/conflictdir certutil: could not add certificate to token or database: SEC_ERROR_ADDING_CERT: Error adding certificate to database. dbtests.sh: #14: Nicknane conflict test, could not import conflict nickname 255 - PASSED --------------------------------------------------------------- | test importing an old cert to a conflicting nickname --------------------------------------------------------------- Certificate: Data: Version: 3 (0x2) Serial Number: 40 (0x28) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:42:16 2023 Not After : Wed Oct 18 15:42:16 2028 Subject: "CN=Bob,E=Bob@example.com,O=BOGUS NSS,L=Mountain View,ST=Cal ifornia,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:04:aa:50:19:7f:11:d2:4b:c1:2d:84:59:b6:14:28: 0b:27:2b:b7:a8:a2:b9:79:8c:5f:e5:a6:c3:03:a0:6b: 69:73:fc:ff:0a:9f:be:8f:10:11:e2:de:d2:66:9b:ad: be:5e:b3:de:73:21:e1:4a:bb:6c:8c:b6:56:fe:d0:6e: 9e:71:73:9c:aa:d3:4a:a6:41:5d:72:62:dc:9a:4e:61: 7b:d0:6e:f2:97:f5:e1:31:a8:11:5a:96:0f:9d:6f:33: 26:5b:57:88:36:4c:3d:87:4a:f5:1c:6d:12:fb:86:5b: 14:98:18:d3:d7:24:dd:96:2d:ee:2e:47:a0:f4:be:02: 8d:ac:f7:29:3a:7d:76:3f:af:ea:3c:c4:8e:5c:86:15: 5f:a3:0f:0a:0c:86:e5:fb:03:4b:c0:06:0b:4e:96:08: ab:2f:fd:2a:90:8c:7b:c0:97:41:36:a5:1b:1b:19:95: 6c:9f:ef:f1:3a:2e:e0:63:9b:bb:91:c3:52:8c:94:f0: 8e:a0:a3:11:3a:49:5e:90:20:d3:d2:cc:de:66:b7:34: 05:60:fd:7a:51:f7:44:46:f6:7e:3a:80:6c:db:55:b9: 6d:23:2b:71:0e:eb:0c:90:a2:95:58:be:b2:64:68:55: 16:1c:7e:c6:c1:94:6a:1a:c3:9f:6a:3c:0f:0c:b1:f3 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:63:b7:55:69:5e:76:24:72:99:1a:53:57:15:cb:9a: 2c:45:c4:c3:57:05:69:64:86:61:97:e1:bd:1d:ad:b4: 74:22:fa:94:87:b3:05:01:33:00:c7:25:8e:f0:92:d0: e8:fe:8f:3d:4f:6d:ee:77:52:d8:65:8a:85:5f:9c:46: f7:2f:5b:c6:1c:24:84:53:e7:b2:a3:4c:33:fb:df:02: f7:ea:86:9c:ab:79:2a:fa:34:d6:02:c0:50:c3:22:bb: 2b:90:cb:56:c4:d3:d4:37:cb:a3:b5:69:fb:23:15:04: d9:0f:aa:b0:d4:1d:f9:94:00:03:2c:9a:86:68:e0:e3: 9b:df:54:ef:b9:42:29:0e:05:04:74:44:14:53:3e:b3: ba:dd:8d:ba:13:11:d7:1e:1e:e1:db:84:07:ae:80:1a: 0b:a2:bd:75:1c:bf:b1:05:1c:0e:73:b4:64:a6:c2:7f: 1f:1a:ad:c9:c1:6a:fc:0c:9d:84:84:10:58:df:ed:df: 69:72:cc:2d:ad:96:30:af:a3:13:bc:28:55:2c:0d:3b: a2:a5:3c:ee:69:72:0e:8e:d2:5f:fb:8a:a7:71:ad:3d: d5:d7:d9:52:dc:71:d1:24:d0:f7:3a:54:f7:36:9a:cc: 01:14:47:b8:33:ba:45:75:e0:ef:f3:11:4e:88:98:16 Fingerprint (SHA-256): 5D:EA:1E:BF:75:97:F2:33:9A:A6:1C:18:31:17:80:05:B5:65:B1:E7:F4:B6:F7:D2:B6:36:6F:98:AC:EC:67:68 Fingerprint (SHA1): 0E:FD:78:73:61:A9:05:FE:7B:24:55:C8:B5:9E:04:90:D0:DF:BD:9C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: dbtests.sh: #15: Nickname conflict test-setting nickname conflict was correctly rejected - PASSED Testing RSA PrivateKeyImport *********************** RSA PrivateKeyImport PASSED *********************** Testing DSA PrivateKeyImport *********************** CKA_ID does not match priv key, checking next key DSA PrivateKeyImport PASSED *********************** Testing ECC PrivateKeyImport *********************** CKA_ID does not match priv key, checking next key CKA_ID does not match priv key, checking next key ECC PrivateKeyImport PASSED *********************** pubValue = [128 bytes] { e8, 6c, 21, dc, bf, a5, f3, d6, 86, 35, 25, 12, ac, aa, 81, 4c 74, c4, fc, 88, 1d, 5c, 35, 4d, d9, 78, d2, 66, cc, fb, 75, 22 a1, b6, ec, 68, 2d, 3f, fc, 71, dd, ba, 2f, 11, e4, 57, e7, 36 0a, db, ea, 91, bc, b5, ae, 8c, ce, 86, 01, d4, cd, 5f, 24, 33 3d, 47, 9b, 91, 05, 79, ef, 88, ad, 4a, 95, 35, 77, 47, bc, b6 00, 28, cf, 02, 3a, 81, b6, 77, 65, 86, ce, d6, e5, e8, 7e, 85 93, 9e, 1e, 3f, e7, 9b, 6e, f2, 6e, 7f, 01, 4c, 61, 23, 62, 78 89, 9b, cd, 7a, a6, 4d, 95, 69, b9, d4, a1, 3f, 1b, 20, eb, 85}; privKey CKA_ID = [20 bytes] { be, a9, 6f, ee, 69, ce, 7c, 74, 9d, df, 18, 38, d3, 16, 87, df 12, 05, d9, 0c}; pubKey CKA_ID = [20 bytes] { be, a9, 6f, ee, 69, ce, 7c, 74, 9d, df, 18, 38, d3, 16, 87, df 12, 05, d9, 0c}; matching public key found pubValue = [128 bytes] { 5a, d2, a0, 05, 11, b7, 72, 5e, 57, eb, 57, 62, ac, 9e, b7, cd 0a, 0e, 6e, 4b, 89, 0e, 66, 07, b3, 98, 45, 05, d7, d5, 73, 20 f1, 9e, 82, e3, 3c, e1, 32, 0f, 41, 6d, 65, 9f, 20, 39, f0, 65 7f, f7, c3, 18, 69, e0, 7e, f7, ab, 2d, a3, 04, 8c, ec, 24, cd 3d, e5, 97, c0, 46, 17, de, ca, 4a, 9d, 75, 68, d3, a5, b0, 2b 9c, 45, fe, e6, d1, ef, 55, 26, 14, 87, 44, 27, 56, 7a, c5, 32 32, 4d, 13, d0, 9d, 9d, 8d, 8c, 8f, 8f, ae, 57, fe, 22, 96, 9b ab, 21, f4, 6e, 08, 79, 60, b1, e1, 3a, 83, a8, 08, f6, ee, be}; privKey CKA_ID = [20 bytes] { e3, 75, ba, 87, 26, aa, 28, 9a, ba, 93, 4f, a1, 31, 61, cb, de 21, 4b, 2b, f7}; pubKey CKA_ID = [20 bytes] { be, a9, 6f, ee, 69, ce, 7c, 74, 9d, df, 18, 38, d3, 16, 87, df 12, 05, d9, 0c}; pubKey CKA_ID = [20 bytes] { e3, 75, ba, 87, 26, aa, 28, 9a, ba, 93, 4f, a1, 31, 61, cb, de 21, 4b, 2b, f7}; matching public key found pubValue = [65 bytes] { 04, fc, 4e, 0f, 60, 37, 5f, be, bc, a8, 50, c3, 2c, de, 17, a0 95, 0d, 0f, b9, 56, 6b, 24, 23, 07, 23, 5e, 0a, d6, 53, 67, e6 27, 87, ef, c1, 0d, 77, c1, 3c, ed, 9e, 17, b0, 37, 02, 22, 8f 1e, 6b, a5, 0b, 3f, 72, 8f, b4, 3c, a3, f6, 17, 9d, 9b, eb, 49 b4}; privKey CKA_ID = [20 bytes] { ea, 25, ad, 52, 5d, 74, ee, 04, 75, b9, ca, c1, fb, c8, 00, 28 70, 7c, 62, b1}; pubKey CKA_ID = [20 bytes] { be, a9, 6f, ee, 69, ce, 7c, 74, 9d, df, 18, 38, d3, 16, 87, df 12, 05, d9, 0c}; pubKey CKA_ID = [20 bytes] { e3, 75, ba, 87, 26, aa, 28, 9a, ba, 93, 4f, a1, 31, 61, cb, de 21, 4b, 2b, f7}; pubKey CKA_ID = [20 bytes] { ea, 25, ad, 52, 5d, 74, ee, 04, 75, b9, ca, c1, fb, c8, 00, 28 70, 7c, 62, b1}; matching public key found dbtests.sh: #16: Importing Token Private Key correctly creates the corrresponding Public Key - PASSED /bin/sqlite3 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> rsa bea96fee69ce7c749ddf1838d31687df1205d90c testKey < 1> dsa e375ba8726aa289aba934fa13161cbde214b2bf7 testKey < 2> ec ea25ad525d74ee0475b9cac1fbc80028707c62b1 testKey --------------------------------------------------------------- | testing if key corruption is detected in attribute 120 --------------------------------------------------------------- amending sig_key_11cf787b_00000120 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504202D12A8F7F7CAB89A9283D516BACF4BE318D02D63A2155A61223D11AD1C19F86402022710020120300A06082A864886F70D0209300A06082A864886F70D02090420B356A57014463C03C1269B0EB3FFA6B32BB64FD09B66FFA657231C2FE8CDE17A to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504202D12A8F7F7CAB89A9283D516BACF4BE318D02D63A2155A61223D11AD1C19F86402022710020120300A06082A864886F70D0209300A06082A864886F70D02090420B356A57014463C03C1269B0EB3FFA6B32BB64FD09B66FFA657231C2FE8CDE17B /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/certutil -R -k bea96fee69ce7c749ddf1838d31687df1205d90c -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: Could not get keys from cert bea96fee69ce7c749ddf1838d31687df1205d90c: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. dbtests.sh: #17: Corrupted key attribute 120 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 122 --------------------------------------------------------------- amending sig_key_11cf787b_00000122 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420FEC5E35065DA1EE3C6FDB5564800A8F698B8403BF742B3372131FDFD8D0A3D1902022710020120300A06082A864886F70D0209300A06082A864886F70D020904207F7F049FFC7C29565C04D70766CB108BA37EF1951C9C233ABBA321AD23F0307C to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420FEC5E35065DA1EE3C6FDB5564800A8F698B8403BF742B3372131FDFD8D0A3D1902022710020120300A06082A864886F70D0209300A06082A864886F70D020904207F7F049FFC7C29565C04D70766CB108BA37EF1951C9C233ABBA321AD23F0307D /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/certutil -R -k bea96fee69ce7c749ddf1838d31687df1205d90c -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: Could not get keys from cert bea96fee69ce7c749ddf1838d31687df1205d90c: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. dbtests.sh: #18: Corrupted key attribute 122 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 123 --------------------------------------------------------------- amending sig_key_11cf787b_00000123 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504208E58CD00A692D2AC2991F83CF6BF8F2BB01E48A9E92E31026D28B9335BE8A2A602022710020120300A06082A864886F70D0209300A06082A864886F70D0209042028F5ED46EDEC814378D6F3ECB7BA42902E75836D85C88CC726EE572B9A50B5BB to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504208E58CD00A692D2AC2991F83CF6BF8F2BB01E48A9E92E31026D28B9335BE8A2A602022710020120300A06082A864886F70D0209300A06082A864886F70D0209042028F5ED46EDEC814378D6F3ECB7BA42902E75836D85C88CC726EE572B9A50B5BC /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/certutil -R -k bea96fee69ce7c749ddf1838d31687df1205d90c -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #19: Corrupted key attribute 123 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 124 --------------------------------------------------------------- amending sig_key_11cf787b_00000124 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420304763004B31D4A176FC18875C332BB6F96307C039F74EAF2BAA3F5BEBB1521902022710020120300A06082A864886F70D0209300A06082A864886F70D020904201701CA1732337FF90CFDFCC4E7C07912087009D0085C35294794D9F95819A1DB to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420304763004B31D4A176FC18875C332BB6F96307C039F74EAF2BAA3F5BEBB1521902022710020120300A06082A864886F70D0209300A06082A864886F70D020904201701CA1732337FF90CFDFCC4E7C07912087009D0085C35294794D9F95819A1DC /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/certutil -R -k bea96fee69ce7c749ddf1838d31687df1205d90c -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #20: Corrupted key attribute 124 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 125 --------------------------------------------------------------- amending sig_key_11cf787b_00000125 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C3035042065A97D9F46D83471C98FE9E4BCD21EC3A474E79E1D09F7803BB8C74EDE00958A02022710020120300A06082A864886F70D0209300A06082A864886F70D02090420132E61F4906577629E18C7CB501CC43A3F9EB209EEF0F3B9406BDC0C25D9C781 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C3035042065A97D9F46D83471C98FE9E4BCD21EC3A474E79E1D09F7803BB8C74EDE00958A02022710020120300A06082A864886F70D0209300A06082A864886F70D02090420132E61F4906577629E18C7CB501CC43A3F9EB209EEF0F3B9406BDC0C25D9C782 /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/certutil -R -k bea96fee69ce7c749ddf1838d31687df1205d90c -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #21: Corrupted key attribute 125 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 126 --------------------------------------------------------------- amending sig_key_11cf787b_00000126 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420BB4A634F419864733BB8EFD8AEB0B5D71CDAA3BCA6EC02B6C9355091FFA576C802022710020120300A06082A864886F70D0209300A06082A864886F70D02090420551FEC1E20FEBF06F697D4403BBFD8C290315CE248E3CCF6434871E3B8347497 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420BB4A634F419864733BB8EFD8AEB0B5D71CDAA3BCA6EC02B6C9355091FFA576C802022710020120300A06082A864886F70D0209300A06082A864886F70D02090420551FEC1E20FEBF06F697D4403BBFD8C290315CE248E3CCF6434871E3B8347498 /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/certutil -R -k bea96fee69ce7c749ddf1838d31687df1205d90c -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #22: Corrupted key attribute 126 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 127 --------------------------------------------------------------- amending sig_key_11cf787b_00000127 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420AA883E039242150741F5E9EE34F4451F06E54131E15A1F2312647FE432F2752D02022710020120300A06082A864886F70D0209300A06082A864886F70D02090420CA32A95360AD70C1514A68B034CD28FEEEBEC545EC12862655676E885B3F1490 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C30350420AA883E039242150741F5E9EE34F4451F06E54131E15A1F2312647FE432F2752D02022710020120300A06082A864886F70D0209300A06082A864886F70D02090420CA32A95360AD70C1514A68B034CD28FEEEBEC545EC12862655676E885B3F1491 /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/certutil -R -k bea96fee69ce7c749ddf1838d31687df1205d90c -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #23: Corrupted key attribute 127 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 128 --------------------------------------------------------------- amending sig_key_11cf787b_00000128 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504201DAA03F22389E2F4372696CD7E19E458F316D8EB6356E4AAE1FDB552F2BC54B402022710020120300A06082A864886F70D0209300A06082A864886F70D0209042089DD21FF15CCF531AB88305CF8EBA263C5A55382C94CF7E47FB5EC89F98F8B49 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504201DAA03F22389E2F4372696CD7E19E458F316D8EB6356E4AAE1FDB552F2BC54B402022710020120300A06082A864886F70D0209300A06082A864886F70D0209042089DD21FF15CCF531AB88305CF8EBA263C5A55382C94CF7E47FB5EC89F98F8B4a /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/certutil -R -k bea96fee69ce7c749ddf1838d31687df1205d90c -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_INVALID_KEY: The key does not support the requested operation. dbtests.sh: #24: Corrupted key attribute 128 correctly disabled key - PASSED --------------------------------------------------------------- | testing if key corruption is detected in attribute 011 --------------------------------------------------------------- amending sig_key_11cf787d_00000011 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504204EF2AC53DAF9D0A458AD8A63009E0BAF1773F39EDB28C23EA093C92BD3357F7602022710020120300A06082A864886F70D0209300A06082A864886F70D02090420C100D31853D43C36685662AD0B4474CA8B30A60FAEAFB5C5AA0847983A7076D5 to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504204EF2AC53DAF9D0A458AD8A63009E0BAF1773F39EDB28C23EA093C92BD3357F7602022710020120300A06082A864886F70D0209300A06082A864886F70D02090420C100D31853D43C36685662AD0B4474CA8B30A60FAEAFB5C5AA0847983A7076D6 amending sig_key_11cf787f_00000011 from 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504209E8035C50ED7CCCCF962A264A6DC7F795AC4693DA212AB9B0C5124D2D4F85C4E02022710020120300A06082A864886F70D0209300A06082A864886F70D02090420C999042C3415356F69539B804D1F8FC6528CEC0382EC2836AB71E8513AD626DC to 308181305D06092A864886F70D01050E3050304206092A864886F70D01050C303504209E8035C50ED7CCCCF962A264A6DC7F795AC4693DA212AB9B0C5124D2D4F85C4E02022710020120300A06082A864886F70D0209300A06082A864886F70D02090420C999042C3415356F69539B804D1F8FC6528CEC0382EC2836AB71E8513AD626DD /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/certutil -R -k ea25ad525d74ee0475b9cac1fbc80028707c62b1 -s 'CN=BadTest, E=bad@mozilla.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US' -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/conflictdir -f ../tests.pw -a certutil: signing of data failed: SEC_ERROR_NO_MEMORY: security library: memory allocation failure. dbtests.sh: #25: Corrupted key attribute 011 correctly disabled key - PASSED --------------------------------------------------------------- | testing for thread starvation while creating keys --------------------------------------------------------------- creating 30 threads - thread 0 starting - thread 1 starting - thread 2 starting - thread 3 starting - thread 4 starting - thread 5 starting - thread 6 starting - thread 9 starting - thread 10 starting - thread 7 starting - thread 11 starting - thread 12 starting - thread 8 starting - thread 13 starting - thread 14 starting - thread 15 starting - thread 16 starting - thread 17 starting - thread 22 starting waiting on 30 threads - thread 19 starting - thread 28 starting - thread 18 starting - thread 20 starting - thread 27 starting - thread 26 starting - thread 25 starting - thread 29 starting - thread 23 starting - thread 24 starting - thread 21 starting * thread 10 ending with 0 failures * thread 25 ending with 0 failures * thread 15 ending with 0 failures * thread 24 ending with 0 failures * thread 26 ending with 0 failures * thread 23 ending with 0 failures * thread 13 ending with 0 failures * thread 8 ending with 0 failures * thread 5 ending with 0 failures * thread 22 ending with 0 failures * thread 1 ending with 0 failures * thread 2 ending with 0 failures * thread 16 ending with 0 failures * thread 11 ending with 0 failures * thread 14 ending with 0 failures * thread 27 ending with 0 failures * thread 29 ending with 0 failures * thread 20 ending with 0 failures * thread 0 ending with 0 failures * thread 18 ending with 0 failures * thread 17 ending with 0 failures * thread 28 ending with 0 failures * thread 12 ending with 0 failures * thread 3 ending with 0 failures * thread 7 ending with 0 failures * thread 9 ending with 0 failures * thread 4 ending with 0 failures * thread 6 ending with 0 failures * thread 21 ending with 0 failures * thread 19 ending with 0 failures 0 failures and 0 errors found dbtests.sh: #26: Successfully completed 7 loops in 30 threads without failure. - PASSED time certutil -K -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/bigdir -f ../tests.pw ------------- time ---------------------- real 2.87 user 2.76 sys 0.11 2 seconds dbtests.sh: #27: certutil dump keys with explicit default trust flags - PASSED TIMESTAMP dbtests END: Wed Oct 18 15:53:41 UTC 2023 Running tests for tools TIMESTAMP tools BEGIN: Wed Oct 18 15:53:41 UTC 2023 tools.sh: Tools Tests =============================== tools.sh: Exporting Alice's email cert & key - default ciphers pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #1: Exporting with [default:default:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #2: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1a:33:02:91:a2:63:b7:f0:6a:ab:fb:30:78:6d:6c:55 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #3: Listing Alice.p12 (pk12util -l) - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #4: Importing Alice.p12 (pk12util -i) - PASSED tools.sh: Exporting Alice's email EC cert & key--------------- pk12util -o Alice-ec.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.pw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #5: Exporting Alice's email EC cert & key (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #6: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key -------------- pk12util -i Alice-ec.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #7: Importing Alice's email EC cert & key (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file ----------------- pk12util -l Alice-ec.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 72:51:17:86:43:67:1a:81:87:c6:80:34:15:3a:d8:93 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 15:40:07 2023 Not After : Wed Oct 18 15:40:07 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:ea:dd:cc:16:6b:cf:f4:c5:fc:9a:84:8a:b3:4d: c6:5e:71:1b:00:7a:ab:c5:cc:ba:d6:59:97:d6:f0:1d: 26:77:d1:a1:d8:6f:04:43:6c:e8:e0:73:d7:09:c3:3c: c3:b5:e1:d0:f7:c5:fc:08:bd:62:cc:11:bb:fc:43:df: fe:8c:6e:00:5d:54:1c:66:bf:81:bd:09:33:42:36:50: 69:74:78:03:82:9c:ab:d3:da:35:62:7c:66:ad:70:49: 9d:7c:50:32:2f:fe:0f:7b:66:08:99:3a:50:09:9a:c0: cc:0c:91:98:b8:2f:5e:e8:30:6f:50:45:35:69:f7:cb: 9e:4a:64:a5:cd Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:42:01:57:d8:c9:93:16:05:e8:10:43:07: 48:ba:96:d2:a5:89:da:36:ac:3a:20:c0:20:35:57:34: 5f:12:62:da:0c:e4:d5:e3:e7:74:bf:a0:5c:64:66:53: d2:4d:1a:af:fc:a9:18:88:5f:59:0b:95:75:f2:22:8e: 34:f4:70:1b:f1:e0:d4:02:41:26:54:a4:09:1b:da:a1: 81:65:be:ab:62:a5:fe:0d:ec:e4:f3:d5:13:87:db:69: 32:25:b7:a6:21:bd:7c:04:b0:6a:6f:ea:ac:89:82:29: c3:2a:1e:e6:7d:19:ad:d3:bc:25:19:a4:53:31:98:57: 43:fe:18:f6:6a:67:11:30:d4:62 Fingerprint (SHA-256): 47:CE:8C:6F:A6:6E:78:77:B4:6D:7A:E1:9D:C2:18:D6:4C:A9:D7:D1:77:0F:7B:92:09:22:A8:8A:D8:7D:34:6B Fingerprint (SHA1): E7:72:96:08:9A:71:2C:0C:A5:0F:F6:01:6C:2F:A2:BF:EA:FD:4A:99 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 15:42:05 2023 Not After : Wed Oct 18 15:42:05 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:3d:85:d5:3a:b3:2b:01:ea:17:9a:ce:16:b9:70:d1: 25:7a:45:19:8e:c4:76:86:2e:2f:13:10:93:58:09:25: f3:d1:c4:a6:1a:f7:fc:8c:3f:d2:a0:f1:28:53:ab:bd: ab:2e:ed:06:0a:d0:be:92:a8:8b:e4:31:dd:cc:63:07: 59:dc:03:80:a7:47:6e:74:75:c7:a2:40:a0:c8:7f:4d: 2e:c4:8e:b3:b9:07:03:5e:c0:71:a9:24:af:e3:c4:f2: 27 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:db:59:77:1d:6d:d0:b2:5e:b6:22: b4:60:64:ae:fb:2b:39:52:7f:8f:42:cc:48:3d:3e:91: a1:f1:eb:d5:4d:fe:c9:2b:e8:e4:6f:58:a6:66:56:a9: d3:b9:40:1b:d5:fb:64:82:4f:30:e7:96:73:de:f6:a2: 3c:ff:7f:94:5c:50:8b:02:42:00:d2:f9:5d:26:8f:43: d8:02:1a:b1:db:8a:6d:ef:3b:9e:85:03:bf:ff:bf:a8: 61:6e:9c:35:0e:e8:b1:98:f9:15:5d:1b:2d:df:62:82: 15:0d:33:1c:70:d9:d1:77:55:cc:21:38:6b:e8:5f:9b: 01:02:37:fb:a6:57:f8:81:5d:e4:ef Fingerprint (SHA-256): 06:3E:3C:FE:71:D4:7D:BE:98:AC:86:E9:ED:C2:6C:FF:AB:A9:28:0F:BE:74:4C:5D:3F:92:3E:2E:28:01:13:8A Fingerprint (SHA1): BB:8B:77:8B:77:BE:DE:98:63:39:78:0A:5E:DD:A9:08:DA:DB:48:49 Friendly Name: Alice-ec tools.sh: #8: Listing Alice's pk12 EC file (pk12util -l) - PASSED tools.sh: Exporting Alice's email EC cert & key with long pw------ pk12util -o Alice-ec-long.p12 -n "Alice-ec" -d ../alicedir -k ../tests.pw \ -w ../tests.longpw pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #9: Exporting Alice's email EC cert & key with long pw (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #10: Verifying p12 file generated with [default:default:default] - PASSED tools.sh: Importing Alice's email EC cert & key with long pw----- pk12util -i Alice-ec-long.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.longpw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #11: Importing Alice's email EC cert & key with long pw (pk12util -i) - PASSED tools.sh: Listing Alice's pk12 EC file with long pw ------------ pk12util -l Alice-ec-long.p12 -w ../tests.longpw Key(shrouded): Friendly Name: Alice-ec Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b9:4a:9c:bc:fc:97:a2:d5:d9:8e:9f:cf:91:e6:a0:d3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 15:40:07 2023 Not After : Wed Oct 18 15:40:07 2073 Subject: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Califor nia,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:23 EC Public Key: PublicValue: 04:00:ea:dd:cc:16:6b:cf:f4:c5:fc:9a:84:8a:b3:4d: c6:5e:71:1b:00:7a:ab:c5:cc:ba:d6:59:97:d6:f0:1d: 26:77:d1:a1:d8:6f:04:43:6c:e8:e0:73:d7:09:c3:3c: c3:b5:e1:d0:f7:c5:fc:08:bd:62:cc:11:bb:fc:43:df: fe:8c:6e:00:5d:54:1c:66:bf:81:bd:09:33:42:36:50: 69:74:78:03:82:9c:ab:d3:da:35:62:7c:66:ad:70:49: 9d:7c:50:32:2f:fe:0f:7b:66:08:99:3a:50:09:9a:c0: cc:0c:91:98:b8:2f:5e:e8:30:6f:50:45:35:69:f7:cb: 9e:4a:64:a5:cd Curve: SECG elliptic curve secp521r1 (aka NIST P-521) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:87:02:42:01:57:d8:c9:93:16:05:e8:10:43:07: 48:ba:96:d2:a5:89:da:36:ac:3a:20:c0:20:35:57:34: 5f:12:62:da:0c:e4:d5:e3:e7:74:bf:a0:5c:64:66:53: d2:4d:1a:af:fc:a9:18:88:5f:59:0b:95:75:f2:22:8e: 34:f4:70:1b:f1:e0:d4:02:41:26:54:a4:09:1b:da:a1: 81:65:be:ab:62:a5:fe:0d:ec:e4:f3:d5:13:87:db:69: 32:25:b7:a6:21:bd:7c:04:b0:6a:6f:ea:ac:89:82:29: c3:2a:1e:e6:7d:19:ad:d3:bc:25:19:a4:53:31:98:57: 43:fe:18:f6:6a:67:11:30:d4:62 Fingerprint (SHA-256): 47:CE:8C:6F:A6:6E:78:77:B4:6D:7A:E1:9D:C2:18:D6:4C:A9:D7:D1:77:0F:7B:92:09:22:A8:8A:D8:7D:34:6B Fingerprint (SHA1): E7:72:96:08:9A:71:2C:0C:A5:0F:F6:01:6C:2F:A2:BF:EA:FD:4A:99 Friendly Name: TestCA-ec Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: X9.62 ECDSA signature with SHA256 Issuer: "CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=Californ ia,C=US" Validity: Not Before: Wed Oct 18 15:42:05 2023 Not After : Wed Oct 18 15:42:05 2028 Subject: "CN=Alice,E=Alice-ec@example.com,O=BOGUS NSS,L=Mountain View ,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: X9.62 elliptic curve public key Args: 06:05:2b:81:04:00:22 EC Public Key: PublicValue: 04:3d:85:d5:3a:b3:2b:01:ea:17:9a:ce:16:b9:70:d1: 25:7a:45:19:8e:c4:76:86:2e:2f:13:10:93:58:09:25: f3:d1:c4:a6:1a:f7:fc:8c:3f:d2:a0:f1:28:53:ab:bd: ab:2e:ed:06:0a:d0:be:92:a8:8b:e4:31:dd:cc:63:07: 59:dc:03:80:a7:47:6e:74:75:c7:a2:40:a0:c8:7f:4d: 2e:c4:8e:b3:b9:07:03:5e:c0:71:a9:24:af:e3:c4:f2: 27 Curve: SECG elliptic curve secp384r1 (aka NIST P-384) Signature Algorithm: X9.62 ECDSA signature with SHA256 Signature: 30:81:88:02:42:01:db:59:77:1d:6d:d0:b2:5e:b6:22: b4:60:64:ae:fb:2b:39:52:7f:8f:42:cc:48:3d:3e:91: a1:f1:eb:d5:4d:fe:c9:2b:e8:e4:6f:58:a6:66:56:a9: d3:b9:40:1b:d5:fb:64:82:4f:30:e7:96:73:de:f6:a2: 3c:ff:7f:94:5c:50:8b:02:42:00:d2:f9:5d:26:8f:43: d8:02:1a:b1:db:8a:6d:ef:3b:9e:85:03:bf:ff:bf:a8: 61:6e:9c:35:0e:e8:b1:98:f9:15:5d:1b:2d:df:62:82: 15:0d:33:1c:70:d9:d1:77:55:cc:21:38:6b:e8:5f:9b: 01:02:37:fb:a6:57:f8:81:5d:e4:ef Fingerprint (SHA-256): 06:3E:3C:FE:71:D4:7D:BE:98:AC:86:E9:ED:C2:6C:FF:AB:A9:28:0F:BE:74:4C:5D:3F:92:3E:2E:28:01:13:8A Fingerprint (SHA1): BB:8B:77:8B:77:BE:DE:98:63:39:78:0A:5E:DD:A9:08:DA:DB:48:49 Friendly Name: Alice-ec tools.sh: #12: Listing Alice's pk12 EC file with long pw (pk12util -l) - PASSED Iteration count=600000 pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #13: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #14: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f5:23:4d:c4:a7:62:04:c9:fb:57:d9:5a:f8:fa:d1:43 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #15: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #16: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #17: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #18: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 21:f8:9b:6c:29:02:c9:75:c8:bb:e1:14:9c:22:5c:2c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #19: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #20: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #21: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #22: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b1:14:d1:4a:96:33:3d:09:3b:0c:fd:01:40:7e:d9:57 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #23: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #24: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #25: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #26: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 65:ef:98:cf:47:9f:51:2f:55:d0:5f:3e:47:ec:b5:d7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #27: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #28: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #29: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #30: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 6e:b4:96:62:e6:f2:c2:9a:2e:60:92:50:1a:c1:d2:e2 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:a4:f2:db:50:f9:7a:78:34:01:45:f5:e3:46:ba: 43:07 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #31: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #32: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #33: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #34: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 22:04:ec:83:06:de:4e:34:62:21:5a:1d:f0:d5:27:f5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #35: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #36: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #37: Exporting with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #38: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6e:3f:0d:c1:f6:d8:f8:1b:63:89:cc:23:a5:7b:f7:0c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #39: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #40: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #41: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #42: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 37:56:de:6b:34:1b:14:cb:1f:ce:2a:95:f7:ba:36:7f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #43: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #44: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #45: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #46: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 85:ff:85:e6:2a:10:e1:4e:fb:7b:8e:6a:b1:b2:01:94 Iteration Count: 600000 (0x927c0) tools.sh: #47: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #48: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD2 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #49: Exporting with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #50: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD2 and DES-CBC:PKCS #5 Password Based Encryption with MD2 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD2 and DES-CBC Parameters: Salt: 07:ac:75:71:4d:0a:b5:1e:7f:f6:0c:28:d7:1a:22:7e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #51: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #52: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #53: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #54: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 84:6c:f4:0e:54:0f:60:e3:80:a1:1a:61:b1:7d:12:06 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #55: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #56: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #57: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #58: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: c5:94:7e:cc:b9:93:94:9a:58:5d:69:50:4e:96:bf:27 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #59: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #60: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #61: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #62: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 07:95:da:d6:5f:1c:47:92:01:54:a2:16:f6:bb:90:51 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #63: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #64: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #65: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #66: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: fd:5f:ec:fd:19:45:7e:b0:68:7b:9b:57:f4:90:82:36 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #67: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #68: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #69: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #70: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f7:d9:f1:01:43:d4:30:45:0f:a8:93:56:71:b3:f8:b9 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:88:a0:c5:35:d9:33:22:03:42:11:d3:f4:98:aa: 75:49 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #71: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #72: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #73: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #74: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: e6:6b:bb:12:97:56:4a:c5:41:f3:05:ec:70:49:18:2a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #75: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #76: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #77: Exporting with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #78: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 0b:38:4b:b4:db:5a:cf:99:8a:77:88:4e:4b:22:f0:42 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #79: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #80: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #81: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #82: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 24:09:84:6f:fd:55:ce:fc:3b:9c:c4:2b:d6:73:ff:64 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #83: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #84: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #85: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #86: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 20:0e:36:c3:a8:36:d4:69:e5:56:b9:a7:d9:d7:85:cb Iteration Count: 600000 (0x927c0) tools.sh: #87: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #88: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with MD5 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #89: Exporting with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #90: Verifying p12 file generated with [PKCS #5 Password Based Encryption with MD5 and DES-CBC:PKCS #5 Password Based Encryption with MD5 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with MD5 and DES-CBC Parameters: Salt: 37:c0:6e:8a:99:15:8d:39:0b:6c:40:5f:a6:8a:d3:5a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #91: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #92: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #93: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #94: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b6:b8:a9:2e:b6:31:06:85:e2:8b:84:ee:cb:03:fc:ec Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #95: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #96: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #97: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #98: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d0:83:89:b6:a4:b2:15:2f:8a:b5:21:5b:7c:76:af:0c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #99: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #100: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #101: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #102: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9e:eb:f5:4a:5b:3b:33:8e:af:0f:08:0d:3e:3c:87:c0 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:40:9a:0b:74:30:1e:97:40:26:55:06:e1:9f:2b: 65:c6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #103: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #104: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #105: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #106: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 57:17:ac:5e:bc:23:57:6a:df:a9:36:ed:c9:a4:9c:49 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #107: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #108: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #109: Exporting with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #110: Verifying p12 file generated with [default:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 47:97:8e:da:9c:34:a7:9a:c2:0c:74:06:ac:0d:09:38 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #111: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #112: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #113: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #114: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 0e:f4:51:3f:90:ad:30:c3:26:41:35:f9:b1:50:0d:04 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #115: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #116: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #117: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #118: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 4f:f8:97:b5:88:a7:96:cc:a2:9a:c1:5f:c2:16:56:f3 Iteration Count: 600000 (0x927c0) tools.sh: #119: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #120: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #121: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #122: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: fb:40:bb:dd:db:22:4b:7e:1d:38:46:80:fd:47:fc:cf Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #123: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #124: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #125: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #126: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: b0:ae:76:43:1b:1c:ab:81:02:78:7b:e4:5a:73:57:c1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #127: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #128: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #129: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #130: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 11:24:93:7f:37:c4:75:19:1e:1e:52:98:d6:df:5b:72 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #131: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #132: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #133: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #134: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: be:c8:f6:d1:17:ae:69:cc:b6:af:44:77:bd:21:b5:88 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #135: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #136: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #137: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #138: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 3d:0e:ad:d9:45:a0:d7:53:16:8f:94:53:2f:e3:fb:32 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #139: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #140: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #141: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #142: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 32:75:80:0d:3e:45:a7:cd:64:d0:2f:d5:b1:74:24:10 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:91:3b:a8:5f:a9:05:be:a1:79:38:d2:54:f4:6c: 21:d2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #143: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #144: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #145: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #146: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 80:30:61:34:fb:0b:9b:76:d6:17:e6:93:3f:c7:c6:b7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #147: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #148: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #149: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #150: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3b:2d:e9:f6:b1:3c:28:89:2e:42:8d:22:73:a5:bb:e0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #151: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #152: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #153: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #154: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: fc:a8:d6:57:70:f2:64:fb:9b:f6:63:b7:70:24:2c:d0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #155: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #156: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #157: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #158: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 40:96:cf:9a:06:9b:47:83:1e:d9:ab:91:a9:5f:57:51 Iteration Count: 600000 (0x927c0) tools.sh: #159: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #160: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #161: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #162: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC4 Parameters: Salt: 1e:3f:3c:e1:6b:4b:46:3a:ad:6a:ad:ff:16:85:46:af Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #163: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #164: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #165: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #166: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 4d:af:82:7a:63:af:91:9c:a8:1e:e3:3c:96:37:13:ae Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #167: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #168: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #169: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #170: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 15:0c:e5:d1:e6:00:de:24:08:5e:03:38:bc:c5:76:ad Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #171: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #172: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #173: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #174: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 3e:7b:ff:f3:fd:3e:d0:56:e7:bd:bf:54:c0:c3:6f:38 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #175: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #176: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #177: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #178: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 6c:01:33:3c:64:e2:96:1d:bc:57:a7:4d:e2:46:c8:c5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #179: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #180: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #181: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #182: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 28:57:8c:68:78:36:d8:21:7c:94:cc:34:e1:e3:6e:00 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:42:4e:15:58:df:84:db:a3:5d:10:2a:48:10:f8: 0d:f7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #183: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #184: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #185: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #186: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 16:2c:9e:86:09:0c:36:da:04:01:aa:f7:91:b6:2c:c1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #187: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #188: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #189: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #190: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c8:90:da:9a:6a:08:2e:fe:12:4d:30:ec:a0:e0:57:b3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #191: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #192: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #193: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #194: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 7e:9d:62:2d:67:dc:f8:5f:07:bf:79:64:ef:b1:7e:cb Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #195: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #196: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #197: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #198: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: b3:1a:cc:bc:9d:ad:64:bc:4f:73:45:92:29:e3:ca:44 Iteration Count: 600000 (0x927c0) tools.sh: #199: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #200: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #201: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #202: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC4 Parameters: Salt: 3a:4e:bc:4e:2f:1c:ec:42:43:f1:e6:0b:29:bf:a5:8e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #203: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #204: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #205: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #206: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 37:ab:9e:02:86:0a:d6:e6:a5:98:01:ce:40:af:57:e8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #207: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #208: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #209: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #210: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d5:15:06:34:c9:b4:8a:b7:5f:d3:ca:01:97:8c:d3:95 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #211: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #212: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #213: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #214: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c5:d9:78:00:0c:bc:a7:96:c2:99:16:f4:a5:61:91:82 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:ac:62:e5:45:df:b5:1e:7e:75:0e:17:79:47:ad: ab:74 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #215: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #216: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #217: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #218: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d5:3b:b9:f8:d4:bf:1d:a7:9b:0e:e9:87:71:9c:4a:ef Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #219: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #220: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #221: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #222: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e6:fe:4f:a4:9f:33:88:aa:e9:e8:be:ca:e7:ee:3f:e2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #223: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #224: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #225: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #226: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c4:d2:6e:b0:9a:61:33:c2:93:b0:48:69:a7:ee:2c:16 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #227: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #228: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #229: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #230: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: db:46:c3:28:4d:80:5f:9b:5f:01:12:5c:5e:b4:a4:c7 Iteration Count: 600000 (0x927c0) tools.sh: #231: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #232: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #233: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #234: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 6d:f5:f1:63:cc:cf:79:18:43:1c:1f:91:08:1d:d2:59 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #235: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #236: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #237: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #238: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: de:7a:fb:82:aa:c4:55:04:fe:e5:27:9c:ed:bb:ef:3c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #239: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #240: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #241: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #242: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 7d:a4:f1:b4:8f:3a:1c:db:b9:6b:e7:13:ff:c1:ad:b7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #243: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #244: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #245: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #246: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8d:a3:9d:9e:08:25:06:70:78:8f:e2:58:21:e4:1c:93 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #247: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #248: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #249: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #250: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 65:28:fe:27:81:cd:7e:e4:a8:d0:ad:bd:ca:d8:0d:91 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #251: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #252: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #253: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #254: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 80:54:8c:64:28:d6:ed:c2:dd:67:8d:67:95:f4:69:0e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:4e:ee:52:c7:7d:e0:8b:ec:71:f0:71:51:31:44: 91:8e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #255: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #256: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #257: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #258: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 21:ab:1c:70:02:f2:bd:f9:ca:40:08:1c:70:16:ae:5c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #259: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #260: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #261: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #262: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 70:ab:5c:f1:66:4f:61:22:10:9e:0c:87:59:2b:86:cd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #263: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #264: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #265: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #266: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 45:9c:30:eb:a6:3a:38:61:67:6b:67:c6:a5:e4:16:d1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #267: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #268: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #269: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #270: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 9b:99:49:32:21:f1:20:09:a7:90:2d:3f:c5:06:e2:13 Iteration Count: 600000 (0x927c0) tools.sh: #271: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #272: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #273: Exporting with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #274: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: a7:f0:00:b6:f4:f8:07:fa:cb:53:13:ad:96:60:5d:22 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #275: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #276: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #277: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #278: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 44:13:e2:df:a5:58:2a:28:14:f9:e6:bb:40:a6:df:e6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #279: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #280: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #281: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #282: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: a5:e6:b7:32:3c:5b:53:8a:1a:a9:0f:a0:0f:fa:90:82 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #283: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #284: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #285: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #286: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a8:9e:b9:64:4e:da:b1:4b:ee:ac:08:85:4a:79:27:b2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #287: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #288: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #289: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #290: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 77:e8:ec:d1:f8:9f:2a:2a:28:61:54:17:85:27:68:37 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #291: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #292: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #293: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #294: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 00:7f:de:7e:18:ed:8a:9b:fc:a7:97:d6:db:6c:73:50 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:b1:e4:6b:a5:5b:9c:f9:58:f7:b4:fa:2e:1b:5c: be:74 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #295: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #296: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #297: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #298: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 31:1c:ff:76:59:d5:67:cd:90:ff:d7:85:48:2d:6f:b8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #299: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #300: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #301: Exporting with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #302: Verifying p12 file generated with [default:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8d:c2:2e:ea:cf:8c:ce:12:60:6d:6d:63:63:0f:50:ee Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #303: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #304: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #305: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #306: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: d9:74:a6:fd:72:a2:01:29:37:ee:87:7f:ae:33:85:c5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #307: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #308: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #309: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #310: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 92:3c:ed:00:08:d0:67:0a:4c:95:b8:b6:fd:64:82:a6 Iteration Count: 600000 (0x927c0) tools.sh: #311: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #312: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #313: Exporting with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #314: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 40 Bit RC2 CBC Parameters: Salt: 63:07:7d:be:fc:fe:30:ac:e3:06:74:56:3d:02:87:ad Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #315: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #316: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #317: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #318: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 9b:1d:a2:46:74:c2:67:4a:89:73:08:05:ef:77:5f:fa Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #319: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #320: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #321: Exporting with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #322: Verifying p12 file generated with [RC2-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: d1:c0:bc:28:9f:3f:81:b0:94:00:a2:63:a2:6e:84:e2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #323: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #324: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #325: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #326: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2a:eb:3c:d5:a0:41:70:7c:a7:6c:5c:bf:56:3f:21:c0 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #327: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #328: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #329: Exporting with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #330: Verifying p12 file generated with [RC2-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 90:57:bc:9f:aa:f3:0b:92:be:b6:d0:78:a9:d6:38:93 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #331: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #332: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #333: Exporting with [AES-256-CBC:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #334: Verifying p12 file generated with [AES-256-CBC:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ff:b8:f3:95:7e:90:d9:d1:02:71:70:79:69:e0:a8:a6 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:20:0f:6c:28:b8:76:06:68:9d:e0:ce:58:c3:f9: 36:67 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #335: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #336: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #337: Exporting with [RC2-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #338: Verifying p12 file generated with [RC2-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: ac:4f:a1:b8:e5:a7:aa:2c:75:08:09:88:61:55:1a:0e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #339: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #340: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "RC2-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #341: Exporting with [default:RC2-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #342: Verifying p12 file generated with [default:RC2-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 2c:4d:ca:84:e2:fc:49:97:51:e3:59:db:73:1a:dd:5e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #343: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #344: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #345: Exporting with [RC2-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #346: Verifying p12 file generated with [RC2-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: b9:62:39:f4:3d:c6:24:47:84:91:b0:da:f1:68:80:5e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #347: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #348: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #349: Exporting with [RC2-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #350: Verifying p12 file generated with [RC2-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 1f:4c:04:38:e4:b7:3f:88:95:47:97:96:0e:91:ff:6d Iteration Count: 600000 (0x927c0) tools.sh: #351: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #352: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "RC2-CBC" \ -C "RC2-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #353: Exporting with [RC2-CBC:RC2-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #354: Verifying p12 file generated with [RC2-CBC:RC2-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 128 Bit RC2 CBC Parameters: Salt: 12:2e:0c:61:e9:eb:11:87:83:f5:05:bd:06:00:48:76 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #355: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #356: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #357: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #358: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: fb:e3:e9:10:64:0b:2e:f8:92:e7:68:f8:0c:e3:69:58 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #359: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #360: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #361: Exporting with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #362: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a4:d8:8d:4f:52:11:9e:5e:70:b2:61:c1:af:a0:35:81 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #363: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #364: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #365: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #366: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d9:f2:85:e3:8f:ea:80:26:80:be:55:a2:78:22:ed:76 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #367: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #368: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #369: Exporting with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #370: Verifying p12 file generated with [DES-EDE3-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 20:49:29:40:44:64:38:53:96:9f:0e:21:5b:32:49:06 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #371: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #372: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #373: Exporting with [AES-256-CBC:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #374: Verifying p12 file generated with [AES-256-CBC:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 2a:40:d3:48:91:e3:0f:46:78:d0:1c:c7:fe:3f:d3:d1 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:5d:aa:6d:7c:3e:19:b5:d6:11:94:e9:78:71:5f: 6a:40 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #375: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #376: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #377: Exporting with [DES-EDE3-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #378: Verifying p12 file generated with [DES-EDE3-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 45:e6:5d:9c:f0:4d:ed:6b:dd:21:2e:30:d8:bf:15:a8 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #379: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #380: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "DES-EDE3-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #381: Exporting with [default:DES-EDE3-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #382: Verifying p12 file generated with [default:DES-EDE3-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 05:f7:31:8f:2e:8b:18:b4:3b:3c:4d:a7:48:13:ec:52 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #383: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #384: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #385: Exporting with [DES-EDE3-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #386: Verifying p12 file generated with [DES-EDE3-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c3:ba:60:49:ed:80:39:f4:9c:d5:60:78:01:dc:96:92 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #387: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #388: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #389: Exporting with [DES-EDE3-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #390: Verifying p12 file generated with [DES-EDE3-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 12:25:4f:36:61:2b:ab:e9:76:99:64:53:0f:9b:09:55 Iteration Count: 600000 (0x927c0) tools.sh: #391: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #392: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "DES-EDE3-CBC" \ -C "DES-EDE3-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #393: Exporting with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #394: Verifying p12 file generated with [DES-EDE3-CBC:DES-EDE3-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 29:16:b3:65:12:8a:52:8e:c1:00:79:08:17:7f:91:0b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #395: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #396: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #397: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #398: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: d8:e7:61:db:94:75:65:51:c7:c4:cb:6b:d5:35:20:a9 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #399: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #400: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #401: Exporting with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #402: Verifying p12 file generated with [AES-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 48:c2:8e:c7:fc:1f:4f:ad:0f:33:6a:41:80:b1:38:7b Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:14:84:c5:fb:eb:1a:57:99:6d:f1:15:4d:ff:5e: 29:ff Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #403: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #404: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #405: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #406: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b8:42:09:06:34:76:99:23:e9:f7:92:2e:74:d2:28:d2 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #407: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #408: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #409: Exporting with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #410: Verifying p12 file generated with [AES-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 05:c2:87:9d:12:3e:02:40:ba:89:06:d4:b8:06:71:e9 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:92:06:69:c5:5d:65:7b:78:15:3d:71:c2:d2:fc: fd:33 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #411: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #412: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #413: Exporting with [AES-256-CBC:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #414: Verifying p12 file generated with [AES-256-CBC:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ab:d1:b8:02:64:c9:ad:5c:d8:08:d4:29:ce:0c:97:dd Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:5a:47:98:6d:f1:15:63:15:9c:18:95:b9:7b:3e: d9:de Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #415: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #416: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #417: Exporting with [AES-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #418: Verifying p12 file generated with [AES-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: c3:a5:42:9b:69:2a:5c:41:e2:bf:e2:3e:b2:36:7f:ce Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:e0:5a:86:fe:c4:0f:6b:77:bc:fd:63:6c:19:f4: f7:0b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #419: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #420: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #421: Exporting with [default:AES-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #422: Verifying p12 file generated with [default:AES-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 60:cc:85:35:5d:f1:76:70:b1:f0:03:1f:db:b4:01:a7 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #423: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #424: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #425: Exporting with [AES-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #426: Verifying p12 file generated with [AES-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a7:1f:30:da:f2:0c:54:18:34:a4:72:eb:d0:f0:5b:d2 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: AES-128-CBC Args: 04:10:07:bf:63:98:3e:00:2a:3c:36:a4:0e:72:29:07: 90:5d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #427: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #428: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #429: Exporting with [AES-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #430: Verifying p12 file generated with [AES-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 67:9c:56:6a:58:6e:84:96:4f:4d:e0:51:f9:62:df:2b Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: AES-128-CBC Args: 04:10:ac:ca:53:42:ba:12:71:84:1c:c8:f7:9a:ca:00: 7c:87 tools.sh: #431: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #432: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-128-CBC" \ -C "AES-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #433: Exporting with [AES-128-CBC:AES-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #434: Verifying p12 file generated with [AES-128-CBC:AES-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 46:8f:e5:ce:b0:e7:cf:7a:1b:2a:48:e8:07:eb:9c:04 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: AES-128-CBC Args: 04:10:02:57:ad:83:dc:be:7b:aa:41:44:2c:c5:e2:ad: a3:6c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #435: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #436: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #437: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #438: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 68:56:21:e4:99:be:de:ff:27:cc:31:15:cc:3b:78:4c Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #439: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #440: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #441: Exporting with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #442: Verifying p12 file generated with [AES-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 4a:5d:62:9a:80:48:8a:e8:a3:ed:d9:5f:2c:5a:db:f6 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:6b:15:98:42:1a:3b:8a:9e:1b:3d:40:51:32:9a: 95:80 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #443: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #444: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #445: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #446: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1d:99:c3:a7:54:61:74:cf:57:2d:f1:74:fc:c5:5d:7e Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #447: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #448: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #449: Exporting with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #450: Verifying p12 file generated with [AES-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b2:cf:54:c1:bc:bc:6a:6b:78:8c:8b:e1:aa:c5:1c:1f Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:72:77:48:4e:75:84:cf:92:4e:9f:c5:cd:6b:64: c0:fa Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #451: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #452: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #453: Exporting with [AES-256-CBC:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #454: Verifying p12 file generated with [AES-256-CBC:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 37:0f:2f:bb:e8:af:80:96:d1:bc:a3:84:a9:0e:fb:e3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:04:a9:58:dc:00:16:9b:8a:5f:54:48:2b:cf:a3: 29:35 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #455: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #456: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #457: Exporting with [AES-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #458: Verifying p12 file generated with [AES-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: e5:71:49:c0:f2:2a:43:97:e3:24:b1:d1:e2:7a:6a:8d Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:5e:d0:bb:ee:b9:dd:83:f1:86:92:af:5e:5a:b1: ed:32 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #459: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #460: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #461: Exporting with [default:AES-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #462: Verifying p12 file generated with [default:AES-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 1b:ce:d6:48:83:73:b2:37:55:47:53:8d:c3:6a:e0:68 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #463: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #464: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #465: Exporting with [AES-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #466: Verifying p12 file generated with [AES-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 46:a9:c1:35:91:14:33:f2:d6:b5:13:6f:a0:d0:90:4b Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: AES-192-CBC Args: 04:10:ce:3d:f9:09:5a:c6:04:75:38:ec:8e:fd:08:fb: 4f:4e Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #467: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #468: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #469: Exporting with [AES-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #470: Verifying p12 file generated with [AES-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: cd:49:f0:28:9a:56:f2:27:92:34:be:8d:52:33:30:e0 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: AES-192-CBC Args: 04:10:ec:56:5f:15:5a:09:d7:17:6b:ff:bb:32:e6:ef: 5b:07 tools.sh: #471: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #472: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-192-CBC" \ -C "AES-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #473: Exporting with [AES-192-CBC:AES-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #474: Verifying p12 file generated with [AES-192-CBC:AES-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f5:35:21:a9:7c:d2:e6:c3:97:98:08:4e:d2:a2:aa:9b Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: AES-192-CBC Args: 04:10:ad:52:24:0a:fd:ce:cc:6a:64:1d:f5:ab:b0:64: 68:a4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #475: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #476: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #477: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #478: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 40:20:00:e7:00:73:ee:ad:b1:63:de:3b:5f:b3:37:5f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #479: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #480: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #481: Exporting with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #482: Verifying p12 file generated with [AES-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f2:99:c9:f5:5d:c7:6c:20:c1:ad:da:ec:67:5a:39:d5 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:f8:7d:19:25:e8:e8:b4:a7:56:35:8d:57:d4:79: 0a:81 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #483: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #484: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #485: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #486: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: a4:f7:10:70:a1:23:2f:1e:08:c5:fd:9c:d6:ef:d2:96 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #487: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #488: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #489: Exporting with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #490: Verifying p12 file generated with [AES-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 23:b7:d7:12:96:3c:de:1f:f0:b3:92:bf:7b:ec:a5:c3 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:58:2e:57:a3:50:f6:66:5a:12:cd:63:ea:f3:7e: 5c:bf Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #491: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #492: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #493: Exporting with [default:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #494: Verifying p12 file generated with [default:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: fb:85:b8:14:cb:fc:78:3c:2e:44:07:b9:8b:22:8d:17 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #495: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #496: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #497: Exporting with [AES-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #498: Verifying p12 file generated with [AES-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: ed:f6:20:16:71:3a:f4:f6:71:10:15:aa:31:68:23:0a Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:36:19:d0:b3:f6:ef:95:0b:99:cb:10:bc:81:eb: 5a:cc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #499: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #500: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #501: Exporting with [AES-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #502: Verifying p12 file generated with [AES-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 94:56:ab:8d:09:1d:ea:77:fd:96:fb:5e:05:ed:b5:07 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:c9:4c:eb:cc:58:8d:ec:a0:cd:bb:b5:0b:80:f6: d7:9e tools.sh: #503: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #504: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #505: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #506: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 96:c7:88:11:e1:d1:ef:89:01:29:a2:b3:c7:1d:61:32 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:f6:69:bd:ef:3c:74:96:05:0e:b7:74:f1:19:e1: 29:3f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #507: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #508: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #509: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #510: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: f5:8a:95:35:4f:70:3f:93:5f:4b:b5:10:6a:17:9a:28 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #511: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #512: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #513: Exporting with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #514: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 25:0f:96:da:b3:e3:92:59:6a:64:ac:39:b9:81:c0:34 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:de:ed:8f:8c:d5:c0:51:ff:4c:68:a2:96:98:28: 4b:e6 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #515: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #516: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #517: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #518: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 11:98:95:12:b2:e6:92:ee:77:c6:86:71:d9:08:0e:a3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #519: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #520: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #521: Exporting with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #522: Verifying p12 file generated with [CAMELLIA-128-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 30:bb:a3:c5:d8:5e:95:5d:41:85:97:32:cc:12:02:26 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:8a:0a:70:2e:81:f4:a0:0b:5d:b5:9a:86:b4:3d: e6:e1 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #523: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #524: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #525: Exporting with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #526: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 94:ba:59:fb:e6:08:6f:f9:6e:94:b9:f6:8e:bc:22:ed Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:99:4c:1a:ba:96:b6:f9:6e:89:f8:6f:d1:2e:83: 71:6b Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #527: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #528: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #529: Exporting with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #530: Verifying p12 file generated with [CAMELLIA-128-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: a5:17:0a:e4:47:84:b4:ae:7e:2f:09:8d:f7:e3:6e:fd Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:b1:69:29:36:18:32:42:e4:ca:53:1e:16:68:db: cd:b4 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #531: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #532: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-128-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #533: Exporting with [default:CAMELLIA-128-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #534: Verifying p12 file generated with [default:CAMELLIA-128-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 22:f0:62:e0:59:c7:b1:84:58:5e:e0:35:c0:89:bd:68 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #535: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #536: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #537: Exporting with [CAMELLIA-128-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #538: Verifying p12 file generated with [CAMELLIA-128-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3d:e2:8e:e0:d2:1d:15:5d:91:33:da:14:fa:10:fb:55 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-128-CBC Args: 04:10:a4:a2:7b:ea:93:25:39:0e:4e:c1:0f:94:c4:33: 87:7c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #539: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #540: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #541: Exporting with [CAMELLIA-128-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #542: Verifying p12 file generated with [CAMELLIA-128-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 1b:ee:95:de:28:60:47:f5:44:78:95:f5:dc:c8:cc:93 Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-128-CBC Args: 04:10:76:36:7b:75:df:ab:09:15:98:3e:e3:30:ba:bc: 26:d5 tools.sh: #543: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #544: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-128-CBC" \ -C "CAMELLIA-128-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #545: Exporting with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #546: Verifying p12 file generated with [CAMELLIA-128-CBC:CAMELLIA-128-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b6:3c:7e:c7:23:f9:3c:f4:16:7b:ec:df:4c:45:ad:0d Iteration Count: 600000 (0x927c0) Key Length: 16 (0x10) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-128-CBC Args: 04:10:04:5c:25:21:3e:37:5e:9e:75:8e:28:9b:e6:77: 05:11 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #547: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #548: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #549: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #550: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: b0:26:c0:6b:d6:b9:da:34:c9:cb:eb:aa:e0:55:55:08 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #551: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #552: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #553: Exporting with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #554: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0c:82:06:75:dc:58:d9:8c:98:5d:3a:f3:2f:85:b9:ce Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:d3:6f:15:03:7b:c4:13:a6:83:ac:b6:e6:eb:e7: 8f:32 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #555: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #556: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #557: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #558: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8d:56:8b:91:91:07:d6:d0:5e:0c:8b:f6:6f:6e:bf:b1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #559: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #560: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #561: Exporting with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #562: Verifying p12 file generated with [CAMELLIA-192-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b2:24:63:8d:87:df:a9:53:2d:89:99:33:36:48:d7:56 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:d9:a1:f6:14:1a:eb:5b:76:58:f0:67:6b:18:cc: c6:6d Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #563: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #564: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #565: Exporting with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #566: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 68:d6:b8:d3:ed:66:db:d3:ef:30:f1:48:c6:a2:e7:75 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:65:49:1a:45:93:fa:1c:28:88:00:1d:55:99:51: 26:97 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #567: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #568: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #569: Exporting with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #570: Verifying p12 file generated with [CAMELLIA-192-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 88:b4:f5:22:7f:71:59:56:0e:e8:4b:0b:77:3d:d3:76 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:21:8a:60:d2:46:a9:54:26:dc:72:18:9e:6b:96: 2c:76 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #571: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #572: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-192-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #573: Exporting with [default:CAMELLIA-192-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #574: Verifying p12 file generated with [default:CAMELLIA-192-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 51:bd:31:ca:65:a6:b3:dc:3a:e9:62:59:63:64:ce:11 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #575: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #576: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #577: Exporting with [CAMELLIA-192-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #578: Verifying p12 file generated with [CAMELLIA-192-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 61:b5:a6:a9:6e:0a:38:f2:51:c6:47:67:b4:ea:9b:e0 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-192-CBC Args: 04:10:fd:70:66:76:33:8a:94:d9:56:b9:9a:e0:21:9d: f3:bc Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #579: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #580: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #581: Exporting with [CAMELLIA-192-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #582: Verifying p12 file generated with [CAMELLIA-192-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b6:9d:39:96:34:fa:a9:05:39:f8:1a:e8:14:42:d3:ae Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-192-CBC Args: 04:10:a8:7a:e8:4e:c8:48:85:17:df:b8:67:1b:c1:8d: 5d:b9 tools.sh: #583: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #584: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-192-CBC" \ -C "CAMELLIA-192-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #585: Exporting with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #586: Verifying p12 file generated with [CAMELLIA-192-CBC:CAMELLIA-192-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 08:4f:97:f1:a9:e5:0c:10:32:91:d5:03:00:23:10:67 Iteration Count: 600000 (0x927c0) Key Length: 24 (0x18) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-192-CBC Args: 04:10:36:e4:f7:03:81:fb:77:d9:40:4a:3a:1c:35:4f: 02:29 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #587: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #588: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #589: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #590: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 40:94:19:56:23:87:78:f6:f3:fc:40:34:8c:2c:2c:84 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #591: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #592: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #593: Exporting with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #594: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 57:15:39:bf:3b:e6:45:89:3c:d8:23:da:d9:50:e4:f5 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:ab:2a:3d:1d:e5:33:28:e9:d2:fc:54:22:28:01: 54:79 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #595: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #596: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #597: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #598: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: d6:53:6f:3c:9f:3e:ea:36:e7:41:72:ca:fe:fc:11:d6 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #599: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #600: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #601: Exporting with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #602: Verifying p12 file generated with [CAMELLIA-256-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 39:bd:00:c6:a7:f7:60:8e:ac:e0:4b:6c:d8:15:d8:ba Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:2c:a5:00:f6:5a:97:99:6b:f6:ad:0b:fd:65:6c: 76:6a Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #603: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #604: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #605: Exporting with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #606: Verifying p12 file generated with [AES-256-CBC:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 88:f4:5d:57:5e:05:18:be:dc:d4:6d:7d:08:22:76:21 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:cc:93:80:26:65:04:8d:05:ba:3e:73:60:6c:0a: 69:6f Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #607: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #608: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #609: Exporting with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #610: Verifying p12 file generated with [CAMELLIA-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f7:59:8b:59:13:c2:07:df:8a:f5:a2:e4:d5:bc:a2:2f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:79:86:ae:ec:32:f3:2a:b7:98:61:c9:17:dc:05: 5e:c3 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #611: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #612: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ -C "CAMELLIA-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #613: Exporting with [default:CAMELLIA-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #614: Verifying p12 file generated with [default:CAMELLIA-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: f5:11:86:67:52:3f:09:e1:79:29:2d:12:47:4e:66:8a Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #615: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #616: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #617: Exporting with [CAMELLIA-256-CBC:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #618: Verifying p12 file generated with [CAMELLIA-256-CBC:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 0e:67:6b:07:0b:4f:e6:b2:2f:9f:7c:de:ed:9a:ea:5f Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: CAMELLIA-256-CBC Args: 04:10:c4:e9:eb:a1:a4:de:04:ee:58:c9:42:cc:4a:cf: b2:22 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #619: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #620: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "none" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #621: Exporting with [CAMELLIA-256-CBC:none:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #622: Verifying p12 file generated with [CAMELLIA-256-CBC:none:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 3e:55:c2:ea:21:48:d7:1f:96:d7:e0:5b:87:5e:d0:ee Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: CAMELLIA-256-CBC Args: 04:10:c0:a3:a0:25:ed:87:51:f5:eb:05:52:36:41:6d: 0d:fb tools.sh: #623: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #624: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "CAMELLIA-256-CBC" \ -C "CAMELLIA-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #625: Exporting with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #626: Verifying p12 file generated with [CAMELLIA-256-CBC:CAMELLIA-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f9:77:fb:9d:55:f0:99:3f:47:87:0a:83:47:f0:50:26 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: CAMELLIA-256-CBC Args: 04:10:35:ee:23:41:e1:5a:2e:03:b0:37:99:75:47:e4: 74:74 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #627: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #628: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #629: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #630: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 51:8f:31:4b:a6:c0:f9:c9:17:ea:bd:ce:c6:f6:e0:90 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #631: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #632: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #633: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #634: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: bb:1e:9e:39:7b:fa:9f:7e:3b:23:53:46:3e:34:59:87 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #635: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #636: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #637: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #638: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 6f:25:98:c9:fd:94:3b:52:6b:6b:bb:d0:8f:55:61:6d Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #639: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #640: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #641: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #642: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 4b:e2:cf:25:37:5c:d8:f3:e2:5a:c5:9d:83:77:cd:79 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #643: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #644: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #645: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #646: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 1a:95:f9:91:73:b8:71:29:c1:b6:69:91:cf:0e:68:a5 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #647: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #648: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ -C "PKCS #5 Password Based Encryption with SHA-1 and DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #649: Exporting with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #650: Verifying p12 file generated with [PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:PKCS #5 Password Based Encryption with SHA-1 and DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption with SHA-1 and DES-CBC Parameters: Salt: 0b:8d:0b:22:97:ab:8a:a3:0e:8d:e4:84:05:4b:7d:4b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #651: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #652: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #653: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #654: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 37:b1:cf:a0:82:1b:43:30:f5:70:73:15:49:ca:cb:cc Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #655: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #656: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #657: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #658: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 69:24:f1:a1:42:72:bc:fc:ce:0f:55:5f:1b:3a:f6:0b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #659: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #660: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #661: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #662: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 25:8d:3d:9a:3f:a8:9a:78:b5:a5:29:c6:0d:f7:01:f4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #663: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #664: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #665: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #666: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 35:23:16:6b:42:4c:6d:c5:b2:a7:0d:76:fc:4b:23:e1 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #667: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #668: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #669: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #670: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: e1:f9:53:41:fe:28:35:21:66:c6:47:d9:23:b4:96:b4 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #671: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #672: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ -C "PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #673: Exporting with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #674: Verifying p12 file generated with [PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: c9:34:f2:a3:cf:a4:43:65:e4:4d:ce:ff:e0:e5:96:a3 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #675: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #676: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #677: Exporting with [AES-256-CBC:AES-256-CBC:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #678: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 9e:44:9b:ee:74:02:b7:67:f6:e7:3e:0a:41:97:30:5e Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:e6:65:2b:3d:b1:e7:c6:b3:2e:40:8f:f0:30:34: 23:44 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #679: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #680: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #681: Exporting with [AES-256-CBC:AES-256-CBC:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #682: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 8c:85:f8:eb:84:3c:6e:37:f1:c4:bd:4e:a0:9c:b0:48 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-224 Cipher: AES-256-CBC Args: 04:10:52:b2:b4:4b:00:9b:e7:74:64:13:40:4c:f1:fe: 71:b2 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #683: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #684: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #685: Exporting with [AES-256-CBC:AES-256-CBC:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #686: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: b4:a0:23:da:d4:07:68:22:1e:6a:ae:81:bd:ec:4f:2c Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-256 Cipher: AES-256-CBC Args: 04:10:08:9a:80:ed:e9:f2:40:c1:08:02:3e:0c:f1:af: e2:4c Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #687: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #688: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #689: Exporting with [AES-256-CBC:AES-256-CBC:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #690: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 63:40:ac:20:1f:f9:9c:03:3c:e8:61:b2:65:f5:ca:20 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-384 Cipher: AES-256-CBC Args: 04:10:3b:1e:a5:1e:68:a6:6b:10:54:f6:96:14:37:10: fa:a7 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #691: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #692: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #693: Exporting with [AES-256-CBC:AES-256-CBC:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #694: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: f7:87:be:74:e1:fa:58:07:e9:90:4c:b4:bf:bf:e8:ff Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-512 Cipher: AES-256-CBC Args: 04:10:fd:67:4d:d6:8f:8e:20:43:2f:d3:da:62:98:31: e0:81 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #695: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #696: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ -c "AES-256-CBC" \ -C "AES-256-CBC" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #697: Exporting with [AES-256-CBC:AES-256-CBC:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #698: Verifying p12 file generated with [AES-256-CBC:AES-256-CBC:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #5 Password Based Encryption v2 Encryption: KDF: PKCS #5 Password Based Key Dervive Function v2 Parameters: Salt: 59:3d:c2:b4:a8:e5:3b:37:23:78:71:57:c2:3a:48:54 Iteration Count: 600000 (0x927c0) Key Length: 32 (0x20) KDF algorithm: HMAC SHA-1 Cipher: AES-256-CBC Args: 04:10:da:26:2c:9b:dc:be:cb:28:bd:22:8d:cb:b2:ba: b6:b0 Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #699: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #700: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-1" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #701: Exporting with [default:default:SHA-1] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #702: Verifying p12 file generated with [default:default:SHA-1], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: b0:d7:4f:16:f7:93:db:28:fb:44:78:a8:f0:1e:92:91 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #703: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #704: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-224" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #705: Exporting with [default:default:SHA-224] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #706: Verifying p12 file generated with [default:default:SHA-224], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 8a:e9:31:29:d2:dd:db:7c:09:1c:4b:c6:fc:26:42:5f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #707: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #708: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-256" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #709: Exporting with [default:default:SHA-256] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #710: Verifying p12 file generated with [default:default:SHA-256], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 12:2f:47:54:8b:a5:01:e8:42:79:2e:5f:91:72:5d:1f Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #711: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #712: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-384" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #713: Exporting with [default:default:SHA-384] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #714: Verifying p12 file generated with [default:default:SHA-384], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: ee:e2:04:a1:30:63:51:4d:d5:b0:83:cd:6f:e1:0c:bd Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #715: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #716: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ -M "SHA-512" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #717: Exporting with [default:default:SHA-512] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #718: Verifying p12 file generated with [default:default:SHA-512], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 83:5b:91:0f:d0:17:e0:6d:98:0c:e6:8b:cb:64:c5:1b Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #719: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #720: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o "Alice.p12" -n "Alice" -d "../alicedir" \ -k ../tests.pw -w ../tests.pw \ "" \ "" \ "" pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #721: Exporting with [default:default:default] (pk12util -o), - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #722: Verifying p12 file generated with [default:default:default], - PASSED tools.sh: Listing Alice's pk12 file pk12util -l Alice.p12 -w ../tests.pw Key(shrouded): Friendly Name: Alice Encryption algorithm: PKCS #12 V2 PBE With SHA-1 And 3KEY Triple DES-CBC Parameters: Salt: 9e:58:e4:ff:e3:8d:41:4b:8e:b3:09:f1:75:ac:c5:89 Iteration Count: 600000 (0x927c0) Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:39:31 2023 Not After : Wed Oct 18 15:39:31 2073 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9b:61:6c:87:e4:6b:01:cb:53:ad:84:14:5a:84:c6:cb: bc:40:7b:c9:a9:c4:59:9f:fe:68:b4:5a:98:a1:2b:58: 14:eb:d6:6b:bd:b5:63:0f:5c:40:2a:fa:aa:94:51:d6: ff:d6:9e:8d:26:3b:3f:a3:e9:3b:2e:4b:11:9b:ca:ba: f0:f4:85:a5:0f:2e:8a:cf:a4:5c:42:fc:33:d3:5f:fd: 1c:6d:26:13:0e:ba:00:07:65:3c:cf:b2:23:4f:96:5a: 03:a0:93:e1:b9:95:a7:37:dc:66:d3:e7:83:69:b7:de: 85:c2:40:30:8f:35:d0:a3:3f:64:ed:e5:1a:4d:84:96: d0:2b:83:ec:f1:6b:20:4c:4c:2f:eb:e0:c9:01:3f:9d: be:78:db:df:61:fd:36:68:0c:3e:a4:5d:3c:a5:33:ac: e8:f5:97:64:f1:6d:14:cb:b3:bf:7e:f5:91:5f:d3:0e: d0:b2:de:c2:e5:fa:c6:27:00:91:35:ff:4f:ed:b1:95: fa:21:66:e8:97:03:86:36:bf:25:f5:78:53:9b:f8:97: b3:38:ad:00:c0:f0:79:4b:77:36:d4:2a:89:73:1a:ea: 17:56:60:0b:68:9d:46:23:8c:0a:05:dd:c0:d6:1a:9b: 9a:50:15:42:a1:be:90:66:ff:a4:f1:f2:47:2d:92:b9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:3e:94:14:d6:ca:ce:04:e2:0a:35:c4:50:56:23:98: f8:d0:8d:8c:79:e9:fc:7a:b4:b8:1c:89:e5:6e:6a:af: d3:0e:2d:e9:47:8d:2d:91:20:2d:23:a0:ce:cb:b3:75: f6:c2:94:cb:c7:a7:ba:c5:bb:63:84:ae:0d:75:88:3f: 27:79:02:97:80:3a:34:db:40:8a:07:e7:5f:f4:58:e2: 2b:9d:f5:75:c6:50:a4:81:30:01:99:10:76:ea:f6:8d: 02:66:4e:42:da:c5:c2:c5:d8:e5:ff:ee:0e:1d:1f:00: 2a:de:8d:af:f4:bd:37:f1:b8:a1:35:c1:f7:45:be:7a: 51:05:8d:06:45:12:c8:b6:33:5d:4c:d8:f4:b6:ae:de: e4:d5:48:80:11:32:9a:21:4b:6e:57:06:b6:d3:de:75: 43:de:5e:c6:41:f3:30:b2:9d:7f:f5:97:d8:39:72:c8: 79:cc:1b:1b:24:69:46:70:ab:01:3b:86:3b:08:a0:42: b3:42:4d:04:82:38:04:3e:c1:ca:aa:52:43:da:b7:9d: 58:14:fe:2a:df:bb:6b:80:80:9a:be:ab:3a:14:1e:d2: 33:ec:5f:ca:64:14:31:ad:18:91:8f:db:05:13:d8:2b: 76:cd:bc:5d:f8:c5:b9:bb:c1:89:e7:fd:b3:ea:e7:ac Fingerprint (SHA-256): A4:63:50:0E:F1:63:A3:93:09:67:E5:34:E1:B1:F7:5F:CE:92:D2:BA:0D:E1:6B:8E:13:ED:CE:A8:54:91:F8:0F Fingerprint (SHA1): 93:D5:90:C3:D2:CB:18:95:FB:BC:50:EC:75:D2:49:93:F8:70:71:B4 Friendly Name: TestCA Certificate(has private key): Data: Version: 3 (0x2) Serial Number: 30 (0x1e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:41:59 2023 Not After : Wed Oct 18 15:41:59 2028 Subject: "CN=Alice,E=Alice@example.com,O=BOGUS NSS,L=Mountain View,ST =California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:48:c1:2a:16:78:78:66:74:58:a4:39:71:7c:ae:67: 39:23:36:d2:be:f8:81:3f:bb:9c:04:5b:5d:ad:44:12: 5c:4f:61:37:bf:75:c4:a9:e5:a1:15:0a:7b:c2:93:05: d2:7a:15:51:00:d9:14:0c:ff:57:61:34:e0:2a:29:86: 8a:4f:03:22:e6:9f:e2:b9:13:f9:69:5a:4f:d0:f0:a3: 57:7e:90:7b:a6:ab:5b:d3:d8:9a:1e:f5:80:60:ef:93: 71:7f:c3:ab:d3:c0:19:88:d5:ce:91:c2:e4:26:3a:8c: 53:f4:0e:fb:5b:2c:7b:db:da:a2:9b:35:98:f6:74:03: e9:25:c6:d4:c4:98:27:b6:82:f2:4d:3e:7e:b8:79:98: 75:ef:f5:84:db:d6:79:fb:b7:47:22:f6:f7:6e:79:a6: 65:1d:73:96:be:58:32:12:cd:0c:ac:d8:d2:87:16:84: 91:bb:1b:d5:ca:20:40:03:86:dc:6b:a2:a0:1f:71:3c: 52:4c:8a:a0:26:cd:01:fe:ed:8b:01:bf:13:49:d6:47: 0e:f6:77:e1:1c:af:10:34:c6:f2:04:ad:ad:40:0d:88: 05:1b:ee:ba:11:58:2b:e9:19:7b:96:f1:3c:b7:a8:0c: c1:20:d8:24:83:b8:dc:76:e6:9a:bd:3e:bf:df:56:67 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:0c:eb:12:0d:63:cb:81:51:4e:cf:ff:cc:83:45:7a: 77:b9:a8:c3:60:99:c5:24:96:08:f9:07:26:0f:d7:63: 0a:8c:0c:84:ee:f6:7a:06:06:db:b6:1c:14:b3:86:0f: b6:1d:0d:06:99:fe:6b:eb:00:69:a5:ed:c3:51:10:25: 92:ee:b0:19:ec:89:fd:54:3c:9d:2e:32:28:fd:90:c7: c2:e3:90:b0:53:26:22:e4:1e:b1:40:fb:9a:3a:09:e3: 8c:6d:05:31:a9:d4:3c:a1:b2:11:c7:d9:2a:03:f6:10: 3b:12:58:00:c0:78:0f:57:f6:e9:d1:01:72:7a:0b:c1: 5a:a2:0d:e4:1e:28:b6:ef:58:38:f6:05:ef:55:dd:62: d2:3c:29:11:87:3b:b0:02:22:c3:0f:0a:c7:32:81:b4: 17:31:36:f2:a5:12:ef:9b:b4:18:65:63:58:55:30:7a: 1b:d7:d7:d4:58:52:34:3b:f4:91:23:a9:62:ec:af:c3: 6a:8f:2e:73:2d:7b:46:f0:85:62:0b:f9:75:70:a9:3f: b3:b3:2c:b9:12:7f:bc:61:85:97:1e:e9:3c:fa:9d:1e: cd:17:fe:84:f0:22:41:17:54:ec:ef:f2:c4:28:b1:89: 93:53:f8:bb:0f:46:35:54:3d:53:bd:5f:0b:ba:8d:38 Fingerprint (SHA-256): 0C:58:76:24:33:47:6B:90:72:C4:FF:7D:5B:F1:67:A3:5B:79:45:CB:CA:4B:F8:78:7D:42:41:E8:00:77:96:EF Fingerprint (SHA1): DF:9A:FF:DA:28:A9:09:33:5D:05:10:68:F8:34:62:E5:CF:7E:77:21 Friendly Name: Alice tools.sh: #723: Listing Alice.p12 (pk12util -l), - PASSED tools.sh: Importing Alice's pk12 Alice.p12 file pk12util -i Alice.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #724: Importing Alice.p12 (pk12util -i), - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c none pk12util: Algorithm: "none": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #725: Exporting with [none:default:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C none pk12util: PKCS12 EXPORT SUCCESSFUL tools.sh: #726: Exporting with [default:none:default] (pk12util -o) - PASSED /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util tools.sh: #727: Verifying p12 file generated with [default:none:default] - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -c INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #728: Exporting with [INVALID_CIPHER:default] (pk12util -o) - PASSED pk12util -o Alice.p12 -n "Alice" -d ../alicedir \ -k ../tests.pw -w ../tests.pw -C INVALID_CIPHER pk12util: Algorithm: "INVALID_CIPHER": SEC_ERROR_INVALID_ALGORITHM: security library: invalid algorithm. tools.sh: #729: Exporting with [default:INVALID_CIPHER] (pk12util -o) - PASSED tools.sh: Importing PKCS#12 files created with older NSS -------------- pk12util -i TestOldCA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #730: Importing PKCS#12 file created with NSS 3.21 (PBES2 with BMPString password) - PASSED pk12util -i TestOldAES128CA.p12 -d ../tools/copydir -k ../tests.pw -w ../tests.pw pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #731: Importing PKCS#12 file created with NSS 3.29.5 (PBES2 with incorrect AES-128-CBC algorithm ID) - PASSED tools.sh: Importing RSA-PSS private key from PKCS#12 file -------------- pk12util: PKCS12 IMPORT SUCCESSFUL tools.sh: #732: Importing RSA-PSS private key from PKCS#12 file - PASSED < 4> rsaPss 26c20b122640e4628a5f4f451bba1be46766fe5b server tools.sh: #733: Listing RSA-PSS private key imported from PKCS#12 file - PASSED tools.sh: Create objsign cert ------------------------------- signtool -G "objectsigner" -d ../tools/signdir -p "nss" WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit the browser before continuing this operation. Enter "y" to continue, or anything else to abort: Enter certificate information. All fields are optional. Acceptable characters are numbers, letters, spaces, and apostrophes. certificate common name: organization: organization unit: state or province: country (must be exactly 2 characters): username: email address: generated public/private key pair certificate request generated certificate has been signed certificate "objsigner" added to database Exported certificate to x509.raw and x509.cacert. tools.sh: #734: Create objsign cert (signtool -G) - PASSED tools.sh: Signing a jar of files ---------------------------- signtool -Z nojs.jar -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html adding ../tools/html/sign.html to nojs.jar...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.jar...(deflated 28%) Generating zigbert.sf file.. adding ../tools/html/META-INF/manifest.mf to nojs.jar...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.jar...(deflated 36%) adding ../tools/html/META-INF/zigbert.rsa to nojs.jar...(deflated 32%) tree "../tools/html" signed successfully tools.sh: #735: Signing a jar of files (signtool -Z) - PASSED tools.sh: Listing signed files in jar ---------------------- signtool -v nojs.jar -d ../tools/signdir -p nss -k objsigner archive "nojs.jar" has passed crypto verification. found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match found a RSA signature file: META-INF/zigbert.rsa status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #736: Listing signed files in jar (signtool -v) - PASSED tools.sh: Show who signed jar ------------------------------ signtool -w nojs.jar -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #737: Show who signed jar (signtool -w) - PASSED tools.sh: Signing a xpi of files ---------------------------- signtool -Z nojs.xpi -X -d ../tools/signdir -p "nss" -k objsigner \ ../tools/html Generating ../tools/html/META-INF/manifest.mf file.. --> sign.html --> signjs.html Generating zigbert.sf file.. Creating XPI Compatible Archive adding ../tools/html/META-INF/zigbert.rsa to nojs.xpi...(deflated 32%) --> sign.html adding ../tools/html/sign.html to nojs.xpi...(deflated 26%) --> signjs.html adding ../tools/html/signjs.html to nojs.xpi...(deflated 28%) adding ../tools/html/META-INF/manifest.mf to nojs.xpi...(deflated 29%) adding ../tools/html/META-INF/zigbert.sf to nojs.xpi...(deflated 36%) tree "../tools/html" signed successfully tools.sh: #738: Signing a xpi of files (signtool -Z -X) - PASSED tools.sh: Listing signed files in xpi ---------------------- signtool -v nojs.xpi -d ../tools/signdir -p nss -k objsigner archive "nojs.xpi" has passed crypto verification. found a RSA signature file: META-INF/zigbert.rsa found a MF master manifest file: META-INF/manifest.mf found a SF signature manifest file: META-INF/zigbert.sf md5 digest on global metainfo: match sha digest on global metainfo: match status path ------------ ------------------- verified sign.html verified signjs.html tools.sh: #739: Listing signed files in xpi (signtool -v) - PASSED tools.sh: Show who signed xpi ------------------------------ signtool -w nojs.xpi -d ../tools/signdir Signer information: nickname: objsigner subject name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org issuer name: CN=TEST,O=MOZ,OU=NSS,ST=NY,C=US,UID=liz,E=liz@moz.org tools.sh: #740: Show who signed xpi (signtool -w) - PASSED tools.sh: Test if DB created by modutil -create is initialized WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Generating key. This may take a few moments... tools.sh: #741: Test if DB created by modutil -create is initialized - PASSED TIMESTAMP tools END: Wed Oct 18 16:13:55 UTC 2023 Running tests for fips TIMESTAMP fips BEGIN: Wed Oct 18 16:13:55 UTC 2023 fips.sh: FIPS 140 Compliance Tests =============================== fips.sh: Verify this module is in FIPS mode ----------------- modutil -dbdir ../fips -list Listing of PKCS #11 Modules ----------------------------------------------------------- 1. NSS Internal FIPS PKCS #11 Module uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Internal%20Crypto%20Services;library-version=3.90 slots: 1 slot attached status: loaded slot: NSS FIPS 140-2 User Private Key Services token: NSS FIPS 140-2 Certificate DB uri: pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 2. RootCerts library name: /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so uri: pkcs11:library-manufacturer=Mozilla%20Foundation;library-description=NSS%20Builtin%20Object%20Cryptoki%20Modu;library-version=2.60 slots: 1 slot attached status: loaded slot: NSS Builtin Objects token: Builtin Object Token uri: pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 ----------------------------------------------------------- FIPS mode enabled. fips.sh: #1: Verify this module is in FIPS mode (modutil -chkfips true) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #2: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys ------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 1332ea99340f03ff3ed9bb36676820b5cf1b9fae NSS FIPS 140-2 Certificate DB:FIPS_PUB_140_Test_Certificate fips.sh: #3: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Attempt to list FIPS module keys with incorrect password certutil -d ../fips -K -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests.fipsbadpw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" Incorrect password/PIN entered. certutil: could not authenticate to token NSS FIPS 140-2 Certificate DB.: SEC_ERROR_BAD_PASSWORD: The security password entered is incorrect. fips.sh: #4: Attempt to list FIPS module keys with incorrect password (certutil -K) . - PASSED certutil -K returned 255 fips.sh: Validate the certificate -------------------------- certutil -d ../fips -V -n FIPS_PUB_140_Test_Certificate -u SR -e -f ../tests.fipspw certutil: certificate is valid fips.sh: #5: Validate the certificate (certutil -V -e) . - PASSED fips.sh: Export the certificate and key as a PKCS#12 file -- pk12util -d ../fips -o fips140.p12 -n FIPS_PUB_140_Test_Certificate -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 EXPORT SUCCESSFUL fips.sh: #6: Export the certificate and key as a PKCS#12 file (pk12util -o) . - PASSED fips.sh: Export the certificate as a DER-encoded file ------ certutil -d ../fips -L -n FIPS_PUB_140_Test_Certificate -r -o fips140.crt fips.sh: #7: Export the certificate as a DER (certutil -L -r) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate Cu,Cu,Cu fips.sh: #8: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Delete the certificate and key from the FIPS module certutil -d ../fips -F -n FIPS_PUB_140_Test_Certificate -f ../tests.fipspw fips.sh: #9: Delete the certificate and key from the FIPS module (certutil -F) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #10: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys. certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" certutil: no keys found fips.sh: #11: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #12: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #13: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 1332ea99340f03ff3ed9bb36676820b5cf1b9fae FIPS_PUB_140_Test_Certificate fips.sh: #14: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Delete the certificate from the FIPS module certutil -d ../fips -D -n FIPS_PUB_140_Test_Certificate fips.sh: #15: Delete the certificate from the FIPS module (certutil -D) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI fips.sh: #16: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: Import the certificate and key from the PKCS#12 file pk12util -d ../fips -i fips140.p12 -w ../tests.fipsp12pw -k ../tests.fipspw pk12util: PKCS12 IMPORT SUCCESSFUL fips.sh: #17: Import the certificate and key from the PKCS#12 file (pk12util -i) . - PASSED fips.sh: List the FIPS module certificates ----------------- certutil -d ../fips -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI FIPS_PUB_140_Test_Certificate u,u,u fips.sh: #18: List the FIPS module certificates (certutil -L) . - PASSED fips.sh: List the FIPS module keys -------------------------- certutil -d ../fips -K -f ../tests.fipspw certutil: Checking token "NSS FIPS 140-2 Certificate DB" in slot "NSS FIPS 140-2 User Private Key Services" < 0> dsa 1332ea99340f03ff3ed9bb36676820b5cf1b9fae FIPS_PUB_140_Test_Certificate fips.sh: #19: List the FIPS module keys (certutil -K) . - PASSED fips.sh: Run PK11MODE in FIPSMODE ----------------- pk11mode -d ../fips -p fips- -f ../tests.fipspw Loaded FC_GetFunctionList for FIPS MODE; slotID 0 **** Total number of TESTS ran in FIPS MODE is 99. **** **** ALL TESTS PASSED **** fips.sh: #20: Run PK11MODE in FIPS mode (pk11mode) . - PASSED fips.sh: Run PK11MODE in Non FIPSMODE ----------------- pk11mode -d ../fips -p nonfips- -f ../tests.fipspw -n loaded C_GetFunctionList for NON FIPS MODE; slotID 1 **** Total number of TESTS ran in NON FIPS MODE is 97. **** **** ALL TESTS PASSED **** fips.sh: #21: Run PK11MODE in Non FIPS mode (pk11mode -n) . - PASSED mkdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcertdb.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcerthi.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcrmf.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libcryptohi.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libdbm.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libjar.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnss.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnss3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssb.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi-testlib.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckfw.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssdev.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnsspki.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnsssysinit.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpk11wrap.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs12.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkcs7.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcertsel.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixchecker.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixcrlsel.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixmodule.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixparams.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixpki.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixresults.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixstore.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixsystem.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixtop.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libpkixutil.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsectool.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libsmime3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libssl.a /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle cp /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libssl3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle fips.sh: Detect mangled softoken-------------------------- mangling /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so mangle -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle/libsoftokn3.so -o -8 -b 5 cp /usr/lib64/libsoftokn3.so /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle Changing byte 0x00074e38 (478776): from 00 (0) to 20 (32) LD_LIBRARY_PATH=/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/fips/mangle dbtest -r -d ../fips fips.sh: #22: Init NSS with a corrupted library (dbtest -r) . - PASSED fips.sh done TIMESTAMP fips END: Wed Oct 18 16:14:21 UTC 2023 Running tests for sdr TIMESTAMP sdr BEGIN: Wed Oct 18 16:14:21 UTC 2023 sdr.sh: SDR Tests =============================== sdr.sh: Creating an SDR key/SDR Encrypt - Value 1 sdrtest -d . -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests.v1.17687 -t "Test1" -f ../tests.pw sdr.sh: #1: Creating SDR Key/Encrypt - Value 1 - PASSED sdr.sh: SDR Encrypt - Value 2 sdrtest -d . -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests.v2.17687 -t "The quick brown fox jumped over the lazy dog" -f ../tests.pw sdr.sh: #2: Encrypt - Value 2 - PASSED sdr.sh: SDR Encrypt - Value 3 sdrtest -d . -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests.v3.17687 -t "1234567" -f ../tests.pw sdr.sh: #3: Encrypt - Value 3 - PASSED sdr.sh: SDR Decrypt - Value 1 sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests.v1.17687 -t "Test1" -f ../tests.pw sdr.sh: #4: Decrypt - Value 1 - PASSED sdr.sh: SDR Decrypt - Value 2 sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests.v2.17687 -t "The quick brown fox jumped over the lazy dog" -f ../tests.pw sdr.sh: #5: Decrypt - Value 2 - PASSED sdr.sh: SDR Decrypt - Value 3 sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests.v3.17687 -t "1234567" -f ../tests.pw sdr.sh: #6: Decrypt - Value 3 - PASSED sdr.sh: pwdecrypt - 300 Entries time pwdecrypt -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/SDR/combined.17687 -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/SDR/decoded.17687 -l /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/SDR/log.17687 -d . -f ../tests.pw ------------- result ---------------------- Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" Decrypted: "Test1" Decrypted: "The quick brown fox jumped over the lazy dog" Decrypted: "1234567" 9800 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/SDR/decoded.17687 sdr.sh: #7: pwdecrypt success - PASSED ------------- log ---------------------- 0 /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/SDR/log.17687 sdr.sh: #8: pwdecrypt no error log - PASSED ------------- time ---------------------- real 0.37 user 0.29 sys 0.07 0 seconds sdr.sh: #9: pwdecrypt no time regression - PASSED TIMESTAMP sdr END: Wed Oct 18 16:14:24 UTC 2023 Running tests for crmf TIMESTAMP crmf BEGIN: Wed Oct 18 16:14:24 UTC 2023 crmf.sh: CRMF/CMMF Tests =============================== crmf.sh: CRMF/CMMF Tests ------------------------------ crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss crmf decode crmftest v1.0 Generating CRMF request Decoding CRMF request crmftest: Processing cert request 0 crmftest: Processing cert request 1 Exiting successfully!!! crmf.sh: #1: CRMF test . - PASSED crmftest -d ../bobdir -p Bob -e dave@example.com -s TestCA -P nss cmmf crmftest v1.0 Doing CMMF Stuff Exiting successfully!!! crmf.sh: #2: CMMF test . - PASSED TIMESTAMP crmf END: Wed Oct 18 16:14:24 UTC 2023 Running tests for smime TIMESTAMP smime BEGIN: Wed Oct 18 16:14:24 UTC 2023 smime.sh: S/MIME Tests =============================== smime.sh: Signing Detached Message {1} ------------------ cmsutil -S -T -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA1 smime.sh: #1: Create Detached Signature Alice (1) . - PASSED cmsutil -D -i alice.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #2: Verifying Alice's Detached Signature (1) . - PASSED smime.sh: Signing Attached Message (1) ------------------ cmsutil -S -N Alice -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA1 smime.sh: #3: Create Attached Signature Alice (1) . - PASSED cmsutil -D -i alice.sig.SHA1 -d ../bobdir -o alice.data.1 smime.sh: #4: Decode Alice's Attached Signature (1) . - PASSED diff alice.txt alice.data.1 smime.sh: #5: Compare Attached Signed Data and Original (1) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {1} ------------------ cmsutil -S -T -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA1 smime.sh: #6: Create Detached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.dsig.SHA1 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #7: Verifying Alice's Detached Signature (ECDSA w/ 1) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 1) ------------------ cmsutil -S -N Alice-ec -H SHA1 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA1 smime.sh: #8: Create Attached Signature Alice (ECDSA w/ 1) . - PASSED cmsutil -D -i alice-ec.sig.SHA1 -d ../bobdir -o alice-ec.data.1 smime.sh: #9: Decode Alice's Attached Signature (ECDSA w/ 1) . - PASSED diff alice.txt alice-ec.data.1 smime.sh: #10: Compare Attached Signed Data and Original (ECDSA w/ 1) . - PASSED smime.sh: Signing Detached Message {256} ------------------ cmsutil -S -T -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA256 smime.sh: #11: Create Detached Signature Alice (256) . - PASSED cmsutil -D -i alice.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #12: Verifying Alice's Detached Signature (256) . - PASSED smime.sh: Signing Attached Message (256) ------------------ cmsutil -S -N Alice -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA256 smime.sh: #13: Create Attached Signature Alice (256) . - PASSED cmsutil -D -i alice.sig.SHA256 -d ../bobdir -o alice.data.256 smime.sh: #14: Decode Alice's Attached Signature (256) . - PASSED diff alice.txt alice.data.256 smime.sh: #15: Compare Attached Signed Data and Original (256) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {256} ------------------ cmsutil -S -T -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA256 smime.sh: #16: Create Detached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.dsig.SHA256 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #17: Verifying Alice's Detached Signature (ECDSA w/ 256) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 256) ------------------ cmsutil -S -N Alice-ec -H SHA256 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA256 smime.sh: #18: Create Attached Signature Alice (ECDSA w/ 256) . - PASSED cmsutil -D -i alice-ec.sig.SHA256 -d ../bobdir -o alice-ec.data.256 smime.sh: #19: Decode Alice's Attached Signature (ECDSA w/ 256) . - PASSED diff alice.txt alice-ec.data.256 smime.sh: #20: Compare Attached Signed Data and Original (ECDSA w/ 256) . - PASSED smime.sh: Signing Detached Message {384} ------------------ cmsutil -S -T -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA384 smime.sh: #21: Create Detached Signature Alice (384) . - PASSED cmsutil -D -i alice.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #22: Verifying Alice's Detached Signature (384) . - PASSED smime.sh: Signing Attached Message (384) ------------------ cmsutil -S -N Alice -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA384 smime.sh: #23: Create Attached Signature Alice (384) . - PASSED cmsutil -D -i alice.sig.SHA384 -d ../bobdir -o alice.data.384 smime.sh: #24: Decode Alice's Attached Signature (384) . - PASSED diff alice.txt alice.data.384 smime.sh: #25: Compare Attached Signed Data and Original (384) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {384} ------------------ cmsutil -S -T -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA384 smime.sh: #26: Create Detached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.dsig.SHA384 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #27: Verifying Alice's Detached Signature (ECDSA w/ 384) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 384) ------------------ cmsutil -S -N Alice-ec -H SHA384 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA384 smime.sh: #28: Create Attached Signature Alice (ECDSA w/ 384) . - PASSED cmsutil -D -i alice-ec.sig.SHA384 -d ../bobdir -o alice-ec.data.384 smime.sh: #29: Decode Alice's Attached Signature (ECDSA w/ 384) . - PASSED diff alice.txt alice-ec.data.384 smime.sh: #30: Compare Attached Signed Data and Original (ECDSA w/ 384) . - PASSED smime.sh: Signing Detached Message {512} ------------------ cmsutil -S -T -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.dsig.SHA512 smime.sh: #31: Create Detached Signature Alice (512) . - PASSED cmsutil -D -i alice.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #32: Verifying Alice's Detached Signature (512) . - PASSED smime.sh: Signing Attached Message (512) ------------------ cmsutil -S -N Alice -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice.sig.SHA512 smime.sh: #33: Create Attached Signature Alice (512) . - PASSED cmsutil -D -i alice.sig.SHA512 -d ../bobdir -o alice.data.512 smime.sh: #34: Decode Alice's Attached Signature (512) . - PASSED diff alice.txt alice.data.512 smime.sh: #35: Compare Attached Signed Data and Original (512) . - PASSED smime.sh: Signing Detached Message ECDSA w/ {512} ------------------ cmsutil -S -T -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.dsig.SHA512 smime.sh: #36: Create Detached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.dsig.SHA512 -c alice.txt -d ../bobdir This is a test message from Alice to Bob. smime.sh: #37: Verifying Alice's Detached Signature (ECDSA w/ 512) . - PASSED smime.sh: Signing Attached Message (ECDSA w/ 512) ------------------ cmsutil -S -N Alice-ec -H SHA512 -i alice.txt -d ../alicedir -p nss -o alice-ec.sig.SHA512 smime.sh: #38: Create Attached Signature Alice (ECDSA w/ 512) . - PASSED cmsutil -D -i alice-ec.sig.SHA512 -d ../bobdir -o alice-ec.data.512 smime.sh: #39: Decode Alice's Attached Signature (ECDSA w/ 512) . - PASSED diff alice.txt alice-ec.data.512 smime.sh: #40: Compare Attached Signed Data and Original (ECDSA w/ 512) . - PASSED smime.sh: Enveloped Data Tests ------------------------------ cmsutil -E -r bob@example.com -i alice.txt -d ../alicedir -p nss \ -o alice.env smime.sh: #41: Create Enveloped Data Alice . - PASSED cmsutil -D -i alice.env -d ../bobdir -p nss -o alice.data1 smime.sh: #42: Decode Enveloped Data Alice . - PASSED diff alice.txt alice.data1 smime.sh: #43: Compare Decoded Enveloped Data and Original . - PASSED smime.sh: Testing multiple recipients ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o alicecc.env \ -r bob@example.com,dave@example.com smime.sh: #44: Create Multiple Recipients Enveloped Data Alice . - PASSED smime.sh: Testing multiple email addrs ------------------------------ cmsutil -E -i alice.txt -d ../alicedir -o aliceve.env \ -r eve@example.net smime.sh: #45: Encrypt to a Multiple Email cert . - PASSED cmsutil -D -i alicecc.env -d ../bobdir -p nss -o alice.data2 smime.sh: #46: Decode Multiple Recipients Enveloped Data Alice by Bob . - PASSED cmsutil -D -i alicecc.env -d ../dave -p nss -o alice.data3 smime.sh: #47: Decode Multiple Recipients Enveloped Data Alice by Dave . - PASSED cmsutil -D -i aliceve.env -d ../eve -p nss -o alice.data4 smime.sh: #48: Decrypt with a Multiple Email cert . - PASSED smime.sh: #49: Compare Decoded Mult. Recipients Enveloped Data Alice/Bob . - PASSED smime.sh: #50: Compare Decoded Mult. Recipients Enveloped Data Alice/Dave . - PASSED smime.sh: #51: Compare Decoded with Multiple Email cert . - PASSED smime.sh: Sending CERTS-ONLY Message ------------------------------ cmsutil -O -r "Alice,bob@example.com,dave@example.com" \ -d ../alicedir > co.der smime.sh: #52: Create Certs-Only Alice . - PASSED cmsutil -D -i co.der -d ../bobdir smime.sh: #53: Verify Certs-Only by CA . - PASSED smime.sh: Encrypted-Data Message --------------------------------- cmsutil -C -i alice.txt -e alicehello.env -d ../alicedir \ -r "bob@example.com" > alice.enc smime.sh: #54: Create Encrypted-Data . - PASSED cmsutil -D -i alice.enc -d ../bobdir -e alicehello.env -p nss \ -o alice.data2 smime.sh: #55: Decode Encrypted-Data . - PASSED smime.sh: #56: Compare Decoded and Original Data . - PASSED pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL pk12util: PKCS12 EXPORT SUCCESSFUL smime.sh: p7 util Data Tests ------------------------------ p7env -d ../alicedir -r Alice -i alice.txt -o alice_p7.env smime.sh: #57: Creating envelope for user Alice . - PASSED p7content -d ../alicedir -i alice_p7.env -o alice_p7.data smime.sh: #58: Verifying file delivered to user Alice . - PASSED diff alice.txt alice_p7.data.sed smime.sh: #59: Compare Decoded Enveloped Data and Original . - PASSED p7sign -d ../alicedir -k Alice -i alice.txt -o alice.sig -p nss -e smime.sh: #60: Signing file for user Alice . - PASSED p7verify -d ../alicedir -c alice.txt -s alice.sig Signature is valid. smime.sh: #61: Verifying file delivered to user Alice . - PASSED TIMESTAMP smime END: Wed Oct 18 16:15:14 UTC 2023 Running tests for ssl TIMESTAMP ssl BEGIN: Wed Oct 18 16:15:14 UTC 2023 ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10078 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10078 found at Wed Oct 18 16:15:14 UTC 2023 selfserv_9997 with PID 10078 started at Wed Oct 18 16:15:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10078 at Wed Oct 18 16:15:15 UTC 2023 kill -USR1 10078 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10078 killed at Wed Oct 18 16:15:15 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10130 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10130 found at Wed Oct 18 16:15:16 UTC 2023 selfserv_9997 with PID 10130 started at Wed Oct 18 16:15:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10130 at Wed Oct 18 16:15:17 UTC 2023 kill -USR1 10130 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10130 killed at Wed Oct 18 16:15:17 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10206 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10206 found at Wed Oct 18 16:15:17 UTC 2023 selfserv_9997 with PID 10206 started at Wed Oct 18 16:15:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #3: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10206 at Wed Oct 18 16:15:18 UTC 2023 kill -USR1 10206 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10206 killed at Wed Oct 18 16:15:18 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:15:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10272 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10272 found at Wed Oct 18 16:15:18 UTC 2023 selfserv_9997 with PID 10272 started at Wed Oct 18 16:15:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #4: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10272 at Wed Oct 18 16:15:19 UTC 2023 kill -USR1 10272 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10272 killed at Wed Oct 18 16:15:19 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:15:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10324 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10324 found at Wed Oct 18 16:15:19 UTC 2023 selfserv_9997 with PID 10324 started at Wed Oct 18 16:15:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #5: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10324 at Wed Oct 18 16:15:20 UTC 2023 kill -USR1 10324 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10324 killed at Wed Oct 18 16:15:20 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:15:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10376 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10376 found at Wed Oct 18 16:15:20 UTC 2023 selfserv_9997 with PID 10376 started at Wed Oct 18 16:15:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #6: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10376 at Wed Oct 18 16:15:21 UTC 2023 kill -USR1 10376 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10376 killed at Wed Oct 18 16:15:21 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10442 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10442 found at Wed Oct 18 16:15:21 UTC 2023 selfserv_9997 with PID 10442 started at Wed Oct 18 16:15:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #7: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 10442 at Wed Oct 18 16:15:23 UTC 2023 kill -USR1 10442 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10442 killed at Wed Oct 18 16:15:23 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10494 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10494 found at Wed Oct 18 16:15:23 UTC 2023 selfserv_9997 with PID 10494 started at Wed Oct 18 16:15:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #8: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10494 at Wed Oct 18 16:15:24 UTC 2023 kill -USR1 10494 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10494 killed at Wed Oct 18 16:15:24 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10546 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10546 found at Wed Oct 18 16:15:25 UTC 2023 selfserv_9997 with PID 10546 started at Wed Oct 18 16:15:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #9: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 10546 at Wed Oct 18 16:15:26 UTC 2023 kill -USR1 10546 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10546 killed at Wed Oct 18 16:15:26 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10616 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10616 found at Wed Oct 18 16:15:26 UTC 2023 selfserv_9997 with PID 10616 started at Wed Oct 18 16:15:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #10: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 10616 at Wed Oct 18 16:15:27 UTC 2023 kill -USR1 10616 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10616 killed at Wed Oct 18 16:15:27 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10727 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10727 found at Wed Oct 18 16:15:27 UTC 2023 selfserv_9997 with PID 10727 started at Wed Oct 18 16:15:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #11: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 10727 at Wed Oct 18 16:15:28 UTC 2023 kill -USR1 10727 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10727 killed at Wed Oct 18 16:15:28 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10789 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10789 found at Wed Oct 18 16:15:29 UTC 2023 selfserv_9997 with PID 10789 started at Wed Oct 18 16:15:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #12: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 10789 at Wed Oct 18 16:15:30 UTC 2023 kill -USR1 10789 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10789 killed at Wed Oct 18 16:15:30 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:15:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10855 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10855 found at Wed Oct 18 16:15:30 UTC 2023 selfserv_9997 with PID 10855 started at Wed Oct 18 16:15:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #13: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 10855 at Wed Oct 18 16:15:31 UTC 2023 kill -USR1 10855 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10855 killed at Wed Oct 18 16:15:31 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:15:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10907 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10907 found at Wed Oct 18 16:15:31 UTC 2023 selfserv_9997 with PID 10907 started at Wed Oct 18 16:15:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #14: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 10907 at Wed Oct 18 16:15:32 UTC 2023 kill -USR1 10907 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10907 killed at Wed Oct 18 16:15:32 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:15:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10959 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10959 found at Wed Oct 18 16:15:32 UTC 2023 selfserv_9997 with PID 10959 started at Wed Oct 18 16:15:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #15: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 10959 at Wed Oct 18 16:15:33 UTC 2023 kill -USR1 10959 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10959 killed at Wed Oct 18 16:15:33 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11025 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11025 found at Wed Oct 18 16:15:33 UTC 2023 selfserv_9997 with PID 11025 started at Wed Oct 18 16:15:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #16: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 11025 at Wed Oct 18 16:15:34 UTC 2023 kill -USR1 11025 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11025 killed at Wed Oct 18 16:15:34 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11078 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11078 found at Wed Oct 18 16:15:35 UTC 2023 selfserv_9997 with PID 11078 started at Wed Oct 18 16:15:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #17: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11078 at Wed Oct 18 16:15:36 UTC 2023 kill -USR1 11078 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11078 killed at Wed Oct 18 16:15:36 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11130 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11130 found at Wed Oct 18 16:15:36 UTC 2023 selfserv_9997 with PID 11130 started at Wed Oct 18 16:15:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #18: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 11130 at Wed Oct 18 16:15:37 UTC 2023 kill -USR1 11130 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11130 killed at Wed Oct 18 16:15:37 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11196 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11196 found at Wed Oct 18 16:15:38 UTC 2023 selfserv_9997 with PID 11196 started at Wed Oct 18 16:15:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #19: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11196 at Wed Oct 18 16:15:39 UTC 2023 kill -USR1 11196 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11196 killed at Wed Oct 18 16:15:39 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11249 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11249 found at Wed Oct 18 16:15:39 UTC 2023 selfserv_9997 with PID 11249 started at Wed Oct 18 16:15:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #20: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11249 at Wed Oct 18 16:15:40 UTC 2023 kill -USR1 11249 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11249 killed at Wed Oct 18 16:15:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11301 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11301 found at Wed Oct 18 16:15:40 UTC 2023 selfserv_9997 with PID 11301 started at Wed Oct 18 16:15:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #21: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11301 at Wed Oct 18 16:15:41 UTC 2023 kill -USR1 11301 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11301 killed at Wed Oct 18 16:15:41 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:15:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11367 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11367 found at Wed Oct 18 16:15:42 UTC 2023 selfserv_9997 with PID 11367 started at Wed Oct 18 16:15:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #22: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11367 at Wed Oct 18 16:15:42 UTC 2023 kill -USR1 11367 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11367 killed at Wed Oct 18 16:15:42 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:15:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11435 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11435 found at Wed Oct 18 16:15:43 UTC 2023 selfserv_9997 with PID 11435 started at Wed Oct 18 16:15:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #23: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11435 at Wed Oct 18 16:15:44 UTC 2023 kill -USR1 11435 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11435 killed at Wed Oct 18 16:15:44 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:15:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11487 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11487 found at Wed Oct 18 16:15:44 UTC 2023 selfserv_9997 with PID 11487 started at Wed Oct 18 16:15:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #24: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11487 at Wed Oct 18 16:15:45 UTC 2023 kill -USR1 11487 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11487 killed at Wed Oct 18 16:15:45 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11553 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11553 found at Wed Oct 18 16:15:45 UTC 2023 selfserv_9997 with PID 11553 started at Wed Oct 18 16:15:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #25: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 11553 at Wed Oct 18 16:15:46 UTC 2023 kill -USR1 11553 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11553 killed at Wed Oct 18 16:15:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11605 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11605 found at Wed Oct 18 16:15:46 UTC 2023 selfserv_9997 with PID 11605 started at Wed Oct 18 16:15:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #26: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11605 at Wed Oct 18 16:15:47 UTC 2023 kill -USR1 11605 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11605 killed at Wed Oct 18 16:15:47 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11657 found at Wed Oct 18 16:15:48 UTC 2023 selfserv_9997 with PID 11657 started at Wed Oct 18 16:15:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #27: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 11657 at Wed Oct 18 16:15:49 UTC 2023 kill -USR1 11657 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11657 killed at Wed Oct 18 16:15:49 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11723 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11723 found at Wed Oct 18 16:15:49 UTC 2023 selfserv_9997 with PID 11723 started at Wed Oct 18 16:15:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #28: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 11723 at Wed Oct 18 16:15:50 UTC 2023 kill -USR1 11723 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11723 killed at Wed Oct 18 16:15:50 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11775 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11775 found at Wed Oct 18 16:15:50 UTC 2023 selfserv_9997 with PID 11775 started at Wed Oct 18 16:15:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #29: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 11775 at Wed Oct 18 16:15:51 UTC 2023 kill -USR1 11775 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11775 killed at Wed Oct 18 16:15:51 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11827 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11827 found at Wed Oct 18 16:15:52 UTC 2023 selfserv_9997 with PID 11827 started at Wed Oct 18 16:15:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #30: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 11827 at Wed Oct 18 16:15:53 UTC 2023 kill -USR1 11827 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11827 killed at Wed Oct 18 16:15:53 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:15:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11893 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11893 found at Wed Oct 18 16:15:53 UTC 2023 selfserv_9997 with PID 11893 started at Wed Oct 18 16:15:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #31: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 11893 at Wed Oct 18 16:15:54 UTC 2023 kill -USR1 11893 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11893 killed at Wed Oct 18 16:15:54 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:15:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11945 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11945 found at Wed Oct 18 16:15:54 UTC 2023 selfserv_9997 with PID 11945 started at Wed Oct 18 16:15:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #32: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 11945 at Wed Oct 18 16:15:55 UTC 2023 kill -USR1 11945 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11945 killed at Wed Oct 18 16:15:55 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:15:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11997 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11997 found at Wed Oct 18 16:15:55 UTC 2023 selfserv_9997 with PID 11997 started at Wed Oct 18 16:15:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #33: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 11997 at Wed Oct 18 16:15:56 UTC 2023 kill -USR1 11997 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11997 killed at Wed Oct 18 16:15:56 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12063 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12063 found at Wed Oct 18 16:15:56 UTC 2023 selfserv_9997 with PID 12063 started at Wed Oct 18 16:15:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #34: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 12063 at Wed Oct 18 16:15:57 UTC 2023 kill -USR1 12063 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12063 killed at Wed Oct 18 16:15:57 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12115 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12115 found at Wed Oct 18 16:15:57 UTC 2023 selfserv_9997 with PID 12115 started at Wed Oct 18 16:15:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #35: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12115 at Wed Oct 18 16:15:59 UTC 2023 kill -USR1 12115 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12115 killed at Wed Oct 18 16:15:59 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:15:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:15:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12167 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12167 found at Wed Oct 18 16:15:59 UTC 2023 selfserv_9997 with PID 12167 started at Wed Oct 18 16:15:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #36: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 12167 at Wed Oct 18 16:16:00 UTC 2023 kill -USR1 12167 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12167 killed at Wed Oct 18 16:16:00 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12233 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12233 found at Wed Oct 18 16:16:00 UTC 2023 selfserv_9997 with PID 12233 started at Wed Oct 18 16:16:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #37: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12233 at Wed Oct 18 16:16:01 UTC 2023 kill -USR1 12233 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12233 killed at Wed Oct 18 16:16:01 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12285 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12285 found at Wed Oct 18 16:16:02 UTC 2023 selfserv_9997 with PID 12285 started at Wed Oct 18 16:16:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #38: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12285 at Wed Oct 18 16:16:03 UTC 2023 kill -USR1 12285 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12285 killed at Wed Oct 18 16:16:03 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12337 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12337 found at Wed Oct 18 16:16:03 UTC 2023 selfserv_9997 with PID 12337 started at Wed Oct 18 16:16:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #39: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12337 at Wed Oct 18 16:16:04 UTC 2023 kill -USR1 12337 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12337 killed at Wed Oct 18 16:16:04 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:16:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12403 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12403 found at Wed Oct 18 16:16:04 UTC 2023 selfserv_9997 with PID 12403 started at Wed Oct 18 16:16:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #40: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12403 at Wed Oct 18 16:16:05 UTC 2023 kill -USR1 12403 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12403 killed at Wed Oct 18 16:16:05 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:16:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12455 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12455 found at Wed Oct 18 16:16:05 UTC 2023 selfserv_9997 with PID 12455 started at Wed Oct 18 16:16:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #41: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12455 at Wed Oct 18 16:16:06 UTC 2023 kill -USR1 12455 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12455 killed at Wed Oct 18 16:16:06 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:16:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12507 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12507 found at Wed Oct 18 16:16:07 UTC 2023 selfserv_9997 with PID 12507 started at Wed Oct 18 16:16:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #42: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12507 at Wed Oct 18 16:16:07 UTC 2023 kill -USR1 12507 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12507 killed at Wed Oct 18 16:16:07 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12573 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12573 found at Wed Oct 18 16:16:08 UTC 2023 selfserv_9997 with PID 12573 started at Wed Oct 18 16:16:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #43: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12573 at Wed Oct 18 16:16:09 UTC 2023 kill -USR1 12573 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12573 killed at Wed Oct 18 16:16:09 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12625 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12625 found at Wed Oct 18 16:16:09 UTC 2023 selfserv_9997 with PID 12625 started at Wed Oct 18 16:16:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #44: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12625 at Wed Oct 18 16:16:11 UTC 2023 kill -USR1 12625 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12625 killed at Wed Oct 18 16:16:11 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12677 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12677 found at Wed Oct 18 16:16:11 UTC 2023 selfserv_9997 with PID 12677 started at Wed Oct 18 16:16:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #45: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12677 at Wed Oct 18 16:16:12 UTC 2023 kill -USR1 12677 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12677 killed at Wed Oct 18 16:16:12 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12743 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12743 found at Wed Oct 18 16:16:12 UTC 2023 selfserv_9997 with PID 12743 started at Wed Oct 18 16:16:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #46: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12743 at Wed Oct 18 16:16:13 UTC 2023 kill -USR1 12743 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12743 killed at Wed Oct 18 16:16:13 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12795 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12795 found at Wed Oct 18 16:16:14 UTC 2023 selfserv_9997 with PID 12795 started at Wed Oct 18 16:16:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #47: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12795 at Wed Oct 18 16:16:15 UTC 2023 kill -USR1 12795 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12795 killed at Wed Oct 18 16:16:15 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12847 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12847 found at Wed Oct 18 16:16:15 UTC 2023 selfserv_9997 with PID 12847 started at Wed Oct 18 16:16:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #48: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12847 at Wed Oct 18 16:16:16 UTC 2023 kill -USR1 12847 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12847 killed at Wed Oct 18 16:16:16 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:16:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12913 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12913 found at Wed Oct 18 16:16:16 UTC 2023 selfserv_9997 with PID 12913 started at Wed Oct 18 16:16:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #49: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12913 at Wed Oct 18 16:16:17 UTC 2023 kill -USR1 12913 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12913 killed at Wed Oct 18 16:16:17 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:16:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12965 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12965 found at Wed Oct 18 16:16:18 UTC 2023 selfserv_9997 with PID 12965 started at Wed Oct 18 16:16:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #50: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12965 at Wed Oct 18 16:16:18 UTC 2023 kill -USR1 12965 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12965 killed at Wed Oct 18 16:16:18 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:16:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13017 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13017 found at Wed Oct 18 16:16:19 UTC 2023 selfserv_9997 with PID 13017 started at Wed Oct 18 16:16:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #51: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13017 at Wed Oct 18 16:16:20 UTC 2023 kill -USR1 13017 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13017 killed at Wed Oct 18 16:16:20 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13083 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13083 found at Wed Oct 18 16:16:20 UTC 2023 selfserv_9997 with PID 13083 started at Wed Oct 18 16:16:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #52: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13083 at Wed Oct 18 16:16:21 UTC 2023 kill -USR1 13083 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13083 killed at Wed Oct 18 16:16:21 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13135 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13135 found at Wed Oct 18 16:16:21 UTC 2023 selfserv_9997 with PID 13135 started at Wed Oct 18 16:16:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #53: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13135 at Wed Oct 18 16:16:23 UTC 2023 kill -USR1 13135 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13135 killed at Wed Oct 18 16:16:23 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13187 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13187 found at Wed Oct 18 16:16:23 UTC 2023 selfserv_9997 with PID 13187 started at Wed Oct 18 16:16:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #54: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13187 at Wed Oct 18 16:16:24 UTC 2023 kill -USR1 13187 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13187 killed at Wed Oct 18 16:16:24 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13253 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13253 found at Wed Oct 18 16:16:25 UTC 2023 selfserv_9997 with PID 13253 started at Wed Oct 18 16:16:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #55: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13253 at Wed Oct 18 16:16:26 UTC 2023 kill -USR1 13253 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13253 killed at Wed Oct 18 16:16:26 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13305 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13305 found at Wed Oct 18 16:16:26 UTC 2023 selfserv_9997 with PID 13305 started at Wed Oct 18 16:16:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #56: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13305 at Wed Oct 18 16:16:27 UTC 2023 kill -USR1 13305 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13305 killed at Wed Oct 18 16:16:27 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13357 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13357 found at Wed Oct 18 16:16:27 UTC 2023 selfserv_9997 with PID 13357 started at Wed Oct 18 16:16:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #57: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13357 at Wed Oct 18 16:16:28 UTC 2023 kill -USR1 13357 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13357 killed at Wed Oct 18 16:16:28 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:16:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13423 found at Wed Oct 18 16:16:29 UTC 2023 selfserv_9997 with PID 13423 started at Wed Oct 18 16:16:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #58: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13423 at Wed Oct 18 16:16:30 UTC 2023 kill -USR1 13423 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13423 killed at Wed Oct 18 16:16:30 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:16:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13475 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13475 found at Wed Oct 18 16:16:30 UTC 2023 selfserv_9997 with PID 13475 started at Wed Oct 18 16:16:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #59: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13475 at Wed Oct 18 16:16:31 UTC 2023 kill -USR1 13475 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13475 killed at Wed Oct 18 16:16:31 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:16:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13527 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13527 found at Wed Oct 18 16:16:31 UTC 2023 selfserv_9997 with PID 13527 started at Wed Oct 18 16:16:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #60: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13527 at Wed Oct 18 16:16:32 UTC 2023 kill -USR1 13527 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13527 killed at Wed Oct 18 16:16:32 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13593 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13593 found at Wed Oct 18 16:16:32 UTC 2023 selfserv_9997 with PID 13593 started at Wed Oct 18 16:16:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #61: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13593 at Wed Oct 18 16:16:34 UTC 2023 kill -USR1 13593 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13593 killed at Wed Oct 18 16:16:34 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13645 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13645 found at Wed Oct 18 16:16:34 UTC 2023 selfserv_9997 with PID 13645 started at Wed Oct 18 16:16:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #62: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13645 at Wed Oct 18 16:16:35 UTC 2023 kill -USR1 13645 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13645 killed at Wed Oct 18 16:16:35 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13697 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13697 found at Wed Oct 18 16:16:35 UTC 2023 selfserv_9997 with PID 13697 started at Wed Oct 18 16:16:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #63: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13697 at Wed Oct 18 16:16:37 UTC 2023 kill -USR1 13697 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13697 killed at Wed Oct 18 16:16:37 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13763 found at Wed Oct 18 16:16:37 UTC 2023 selfserv_9997 with PID 13763 started at Wed Oct 18 16:16:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #64: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13763 at Wed Oct 18 16:16:38 UTC 2023 kill -USR1 13763 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13763 killed at Wed Oct 18 16:16:38 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13815 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13815 found at Wed Oct 18 16:16:38 UTC 2023 selfserv_9997 with PID 13815 started at Wed Oct 18 16:16:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #65: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13815 at Wed Oct 18 16:16:39 UTC 2023 kill -USR1 13815 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13815 killed at Wed Oct 18 16:16:39 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13867 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13867 found at Wed Oct 18 16:16:40 UTC 2023 selfserv_9997 with PID 13867 started at Wed Oct 18 16:16:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #66: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13867 at Wed Oct 18 16:16:41 UTC 2023 kill -USR1 13867 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13867 killed at Wed Oct 18 16:16:41 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:16:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13933 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13933 found at Wed Oct 18 16:16:41 UTC 2023 selfserv_9997 with PID 13933 started at Wed Oct 18 16:16:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #67: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13933 at Wed Oct 18 16:16:42 UTC 2023 kill -USR1 13933 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13933 killed at Wed Oct 18 16:16:42 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:16:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13985 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13985 found at Wed Oct 18 16:16:42 UTC 2023 selfserv_9997 with PID 13985 started at Wed Oct 18 16:16:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #68: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13985 at Wed Oct 18 16:16:43 UTC 2023 kill -USR1 13985 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13985 killed at Wed Oct 18 16:16:43 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:16:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14052 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14052 found at Wed Oct 18 16:16:43 UTC 2023 selfserv_9997 with PID 14052 started at Wed Oct 18 16:16:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #69: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14052 at Wed Oct 18 16:16:44 UTC 2023 kill -USR1 14052 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14052 killed at Wed Oct 18 16:16:44 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14119 found at Wed Oct 18 16:16:45 UTC 2023 selfserv_9997 with PID 14119 started at Wed Oct 18 16:16:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #70: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14119 at Wed Oct 18 16:16:46 UTC 2023 kill -USR1 14119 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14119 killed at Wed Oct 18 16:16:46 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14171 found at Wed Oct 18 16:16:46 UTC 2023 selfserv_9997 with PID 14171 started at Wed Oct 18 16:16:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #71: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14171 at Wed Oct 18 16:16:48 UTC 2023 kill -USR1 14171 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14171 killed at Wed Oct 18 16:16:48 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14223 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14223 found at Wed Oct 18 16:16:48 UTC 2023 selfserv_9997 with PID 14223 started at Wed Oct 18 16:16:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #72: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14223 at Wed Oct 18 16:16:49 UTC 2023 kill -USR1 14223 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14223 killed at Wed Oct 18 16:16:49 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14290 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14290 found at Wed Oct 18 16:16:49 UTC 2023 selfserv_9997 with PID 14290 started at Wed Oct 18 16:16:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #73: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14290 at Wed Oct 18 16:16:50 UTC 2023 kill -USR1 14290 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14290 killed at Wed Oct 18 16:16:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14342 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14342 found at Wed Oct 18 16:16:51 UTC 2023 selfserv_9997 with PID 14342 started at Wed Oct 18 16:16:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #74: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14342 at Wed Oct 18 16:16:52 UTC 2023 kill -USR1 14342 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14342 killed at Wed Oct 18 16:16:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14394 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14394 found at Wed Oct 18 16:16:52 UTC 2023 selfserv_9997 with PID 14394 started at Wed Oct 18 16:16:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #75: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14394 at Wed Oct 18 16:16:53 UTC 2023 kill -USR1 14394 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14394 killed at Wed Oct 18 16:16:53 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:16:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14460 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14460 found at Wed Oct 18 16:16:53 UTC 2023 selfserv_9997 with PID 14460 started at Wed Oct 18 16:16:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #76: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14460 at Wed Oct 18 16:16:54 UTC 2023 kill -USR1 14460 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14460 killed at Wed Oct 18 16:16:54 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:16:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14512 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14512 found at Wed Oct 18 16:16:55 UTC 2023 selfserv_9997 with PID 14512 started at Wed Oct 18 16:16:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #77: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14512 at Wed Oct 18 16:16:55 UTC 2023 kill -USR1 14512 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14512 killed at Wed Oct 18 16:16:55 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:16:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14564 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14564 found at Wed Oct 18 16:16:56 UTC 2023 selfserv_9997 with PID 14564 started at Wed Oct 18 16:16:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #78: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14564 at Wed Oct 18 16:16:57 UTC 2023 kill -USR1 14564 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14564 killed at Wed Oct 18 16:16:57 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14630 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14630 found at Wed Oct 18 16:16:57 UTC 2023 selfserv_9997 with PID 14630 started at Wed Oct 18 16:16:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #79: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14630 at Wed Oct 18 16:16:58 UTC 2023 kill -USR1 14630 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14630 killed at Wed Oct 18 16:16:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:16:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:16:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14682 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14682 found at Wed Oct 18 16:16:58 UTC 2023 selfserv_9997 with PID 14682 started at Wed Oct 18 16:16:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #80: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14682 at Wed Oct 18 16:16:59 UTC 2023 kill -USR1 14682 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14682 killed at Wed Oct 18 16:16:59 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14735 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14735 found at Wed Oct 18 16:17:00 UTC 2023 selfserv_9997 with PID 14735 started at Wed Oct 18 16:17:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #81: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14735 at Wed Oct 18 16:17:01 UTC 2023 kill -USR1 14735 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14735 killed at Wed Oct 18 16:17:01 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14801 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14801 found at Wed Oct 18 16:17:01 UTC 2023 selfserv_9997 with PID 14801 started at Wed Oct 18 16:17:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #82: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14801 at Wed Oct 18 16:17:02 UTC 2023 kill -USR1 14801 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14801 killed at Wed Oct 18 16:17:02 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14853 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14853 found at Wed Oct 18 16:17:02 UTC 2023 selfserv_9997 with PID 14853 started at Wed Oct 18 16:17:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #83: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14853 at Wed Oct 18 16:17:04 UTC 2023 kill -USR1 14853 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14853 killed at Wed Oct 18 16:17:04 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14905 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14905 found at Wed Oct 18 16:17:04 UTC 2023 selfserv_9997 with PID 14905 started at Wed Oct 18 16:17:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #84: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14905 at Wed Oct 18 16:17:05 UTC 2023 kill -USR1 14905 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14905 killed at Wed Oct 18 16:17:05 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:17:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14972 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14972 found at Wed Oct 18 16:17:05 UTC 2023 selfserv_9997 with PID 14972 started at Wed Oct 18 16:17:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #85: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14972 at Wed Oct 18 16:17:06 UTC 2023 kill -USR1 14972 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14972 killed at Wed Oct 18 16:17:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:17:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15024 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15024 found at Wed Oct 18 16:17:06 UTC 2023 selfserv_9997 with PID 15024 started at Wed Oct 18 16:17:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #86: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15024 at Wed Oct 18 16:17:07 UTC 2023 kill -USR1 15024 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15024 killed at Wed Oct 18 16:17:07 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:17:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15076 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15076 found at Wed Oct 18 16:17:07 UTC 2023 selfserv_9997 with PID 15076 started at Wed Oct 18 16:17:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #87: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15076 at Wed Oct 18 16:17:08 UTC 2023 kill -USR1 15076 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15076 killed at Wed Oct 18 16:17:08 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15143 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15143 found at Wed Oct 18 16:17:09 UTC 2023 selfserv_9997 with PID 15143 started at Wed Oct 18 16:17:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #88: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15143 at Wed Oct 18 16:17:10 UTC 2023 kill -USR1 15143 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15143 killed at Wed Oct 18 16:17:10 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15196 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15196 found at Wed Oct 18 16:17:10 UTC 2023 selfserv_9997 with PID 15196 started at Wed Oct 18 16:17:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #89: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15196 at Wed Oct 18 16:17:11 UTC 2023 kill -USR1 15196 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15196 killed at Wed Oct 18 16:17:11 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15248 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15248 found at Wed Oct 18 16:17:11 UTC 2023 selfserv_9997 with PID 15248 started at Wed Oct 18 16:17:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #90: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15248 at Wed Oct 18 16:17:13 UTC 2023 kill -USR1 15248 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15248 killed at Wed Oct 18 16:17:13 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15314 found at Wed Oct 18 16:17:13 UTC 2023 selfserv_9997 with PID 15314 started at Wed Oct 18 16:17:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #91: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15314 at Wed Oct 18 16:17:14 UTC 2023 kill -USR1 15314 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15314 killed at Wed Oct 18 16:17:14 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15366 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15366 found at Wed Oct 18 16:17:14 UTC 2023 selfserv_9997 with PID 15366 started at Wed Oct 18 16:17:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #92: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15366 at Wed Oct 18 16:17:15 UTC 2023 kill -USR1 15366 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15366 killed at Wed Oct 18 16:17:15 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15418 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15418 found at Wed Oct 18 16:17:16 UTC 2023 selfserv_9997 with PID 15418 started at Wed Oct 18 16:17:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #93: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15418 at Wed Oct 18 16:17:17 UTC 2023 kill -USR1 15418 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15418 killed at Wed Oct 18 16:17:17 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15484 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15484 found at Wed Oct 18 16:17:17 UTC 2023 selfserv_9997 with PID 15484 started at Wed Oct 18 16:17:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #94: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15484 at Wed Oct 18 16:17:18 UTC 2023 kill -USR1 15484 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15484 killed at Wed Oct 18 16:17:18 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15536 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15536 found at Wed Oct 18 16:17:18 UTC 2023 selfserv_9997 with PID 15536 started at Wed Oct 18 16:17:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #95: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15536 at Wed Oct 18 16:17:20 UTC 2023 kill -USR1 15536 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15536 killed at Wed Oct 18 16:17:20 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15588 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15588 found at Wed Oct 18 16:17:20 UTC 2023 selfserv_9997 with PID 15588 started at Wed Oct 18 16:17:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #96: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15588 at Wed Oct 18 16:17:21 UTC 2023 kill -USR1 15588 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15588 killed at Wed Oct 18 16:17:21 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15654 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15654 found at Wed Oct 18 16:17:21 UTC 2023 selfserv_9997 with PID 15654 started at Wed Oct 18 16:17:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #97: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15654 at Wed Oct 18 16:17:22 UTC 2023 kill -USR1 15654 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15654 killed at Wed Oct 18 16:17:22 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15706 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15706 found at Wed Oct 18 16:17:22 UTC 2023 selfserv_9997 with PID 15706 started at Wed Oct 18 16:17:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #98: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15706 at Wed Oct 18 16:17:23 UTC 2023 kill -USR1 15706 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15706 killed at Wed Oct 18 16:17:23 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15758 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15758 found at Wed Oct 18 16:17:24 UTC 2023 selfserv_9997 with PID 15758 started at Wed Oct 18 16:17:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #99: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15758 at Wed Oct 18 16:17:25 UTC 2023 kill -USR1 15758 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15758 killed at Wed Oct 18 16:17:25 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15824 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15824 found at Wed Oct 18 16:17:25 UTC 2023 selfserv_9997 with PID 15824 started at Wed Oct 18 16:17:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #100: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15824 at Wed Oct 18 16:17:26 UTC 2023 kill -USR1 15824 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15824 killed at Wed Oct 18 16:17:26 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15876 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15876 found at Wed Oct 18 16:17:26 UTC 2023 selfserv_9997 with PID 15876 started at Wed Oct 18 16:17:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #101: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15876 at Wed Oct 18 16:17:27 UTC 2023 kill -USR1 15876 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15876 killed at Wed Oct 18 16:17:27 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15928 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15928 found at Wed Oct 18 16:17:27 UTC 2023 selfserv_9997 with PID 15928 started at Wed Oct 18 16:17:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #102: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15928 at Wed Oct 18 16:17:28 UTC 2023 kill -USR1 15928 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15928 killed at Wed Oct 18 16:17:28 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15994 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15994 found at Wed Oct 18 16:17:29 UTC 2023 selfserv_9997 with PID 15994 started at Wed Oct 18 16:17:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #103: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15994 at Wed Oct 18 16:17:30 UTC 2023 kill -USR1 15994 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15994 killed at Wed Oct 18 16:17:30 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16046 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16046 found at Wed Oct 18 16:17:30 UTC 2023 selfserv_9997 with PID 16046 started at Wed Oct 18 16:17:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #104: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16046 at Wed Oct 18 16:17:31 UTC 2023 kill -USR1 16046 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16046 killed at Wed Oct 18 16:17:31 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16098 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16098 found at Wed Oct 18 16:17:31 UTC 2023 selfserv_9997 with PID 16098 started at Wed Oct 18 16:17:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #105: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16098 at Wed Oct 18 16:17:32 UTC 2023 kill -USR1 16098 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16098 killed at Wed Oct 18 16:17:33 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16164 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16164 found at Wed Oct 18 16:17:33 UTC 2023 selfserv_9997 with PID 16164 started at Wed Oct 18 16:17:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #106: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16164 at Wed Oct 18 16:17:34 UTC 2023 kill -USR1 16164 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16164 killed at Wed Oct 18 16:17:34 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16217 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16217 found at Wed Oct 18 16:17:34 UTC 2023 selfserv_9997 with PID 16217 started at Wed Oct 18 16:17:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #107: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16217 at Wed Oct 18 16:17:36 UTC 2023 kill -USR1 16217 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16217 killed at Wed Oct 18 16:17:36 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16269 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16269 found at Wed Oct 18 16:17:36 UTC 2023 selfserv_9997 with PID 16269 started at Wed Oct 18 16:17:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #108: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16269 at Wed Oct 18 16:17:37 UTC 2023 kill -USR1 16269 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16269 killed at Wed Oct 18 16:17:37 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:17:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16335 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16335 found at Wed Oct 18 16:17:38 UTC 2023 selfserv_9997 with PID 16335 started at Wed Oct 18 16:17:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #109: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16335 at Wed Oct 18 16:17:38 UTC 2023 kill -USR1 16335 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16335 killed at Wed Oct 18 16:17:38 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:17:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16388 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16388 found at Wed Oct 18 16:17:39 UTC 2023 selfserv_9997 with PID 16388 started at Wed Oct 18 16:17:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #110: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16388 at Wed Oct 18 16:17:40 UTC 2023 kill -USR1 16388 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16388 killed at Wed Oct 18 16:17:40 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:17:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16440 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16440 found at Wed Oct 18 16:17:40 UTC 2023 selfserv_9997 with PID 16440 started at Wed Oct 18 16:17:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #111: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16440 at Wed Oct 18 16:17:41 UTC 2023 kill -USR1 16440 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16440 killed at Wed Oct 18 16:17:41 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16506 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16506 found at Wed Oct 18 16:17:41 UTC 2023 selfserv_9997 with PID 16506 started at Wed Oct 18 16:17:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #112: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 16506 at Wed Oct 18 16:17:42 UTC 2023 kill -USR1 16506 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16506 killed at Wed Oct 18 16:17:42 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16558 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16558 found at Wed Oct 18 16:17:42 UTC 2023 selfserv_9997 with PID 16558 started at Wed Oct 18 16:17:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #113: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16558 at Wed Oct 18 16:17:43 UTC 2023 kill -USR1 16558 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16558 killed at Wed Oct 18 16:17:43 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16625 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16625 found at Wed Oct 18 16:17:43 UTC 2023 selfserv_9997 with PID 16625 started at Wed Oct 18 16:17:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #114: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 16625 at Wed Oct 18 16:17:44 UTC 2023 kill -USR1 16625 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16625 killed at Wed Oct 18 16:17:44 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:17:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16691 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16691 found at Wed Oct 18 16:17:44 UTC 2023 selfserv_9997 with PID 16691 started at Wed Oct 18 16:17:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #115: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 16691 at Wed Oct 18 16:17:45 UTC 2023 kill -USR1 16691 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16691 killed at Wed Oct 18 16:17:45 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:17:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16743 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16743 found at Wed Oct 18 16:17:45 UTC 2023 selfserv_9997 with PID 16743 started at Wed Oct 18 16:17:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #116: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 16743 at Wed Oct 18 16:17:46 UTC 2023 kill -USR1 16743 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16743 killed at Wed Oct 18 16:17:46 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:17:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16795 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16795 found at Wed Oct 18 16:17:46 UTC 2023 selfserv_9997 with PID 16795 started at Wed Oct 18 16:17:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #117: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 16795 at Wed Oct 18 16:17:47 UTC 2023 kill -USR1 16795 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16795 killed at Wed Oct 18 16:17:47 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16861 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16861 found at Wed Oct 18 16:17:48 UTC 2023 selfserv_9997 with PID 16861 started at Wed Oct 18 16:17:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #118: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 16861 at Wed Oct 18 16:17:49 UTC 2023 kill -USR1 16861 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16861 killed at Wed Oct 18 16:17:49 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16913 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16913 found at Wed Oct 18 16:17:49 UTC 2023 selfserv_9997 with PID 16913 started at Wed Oct 18 16:17:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #119: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16913 at Wed Oct 18 16:17:50 UTC 2023 kill -USR1 16913 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16913 killed at Wed Oct 18 16:17:50 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16965 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16965 found at Wed Oct 18 16:17:50 UTC 2023 selfserv_9997 with PID 16965 started at Wed Oct 18 16:17:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #120: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 16965 at Wed Oct 18 16:17:51 UTC 2023 kill -USR1 16965 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16965 killed at Wed Oct 18 16:17:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:17:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17031 found at Wed Oct 18 16:17:51 UTC 2023 selfserv_9997 with PID 17031 started at Wed Oct 18 16:17:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #121: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17031 at Wed Oct 18 16:17:52 UTC 2023 kill -USR1 17031 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17031 killed at Wed Oct 18 16:17:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:17:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17083 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17083 found at Wed Oct 18 16:17:52 UTC 2023 selfserv_9997 with PID 17083 started at Wed Oct 18 16:17:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #122: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17083 at Wed Oct 18 16:17:53 UTC 2023 kill -USR1 17083 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17083 killed at Wed Oct 18 16:17:53 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:17:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17135 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17135 found at Wed Oct 18 16:17:53 UTC 2023 selfserv_9997 with PID 17135 started at Wed Oct 18 16:17:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #123: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17135 at Wed Oct 18 16:17:54 UTC 2023 kill -USR1 17135 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17135 killed at Wed Oct 18 16:17:54 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17201 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17201 found at Wed Oct 18 16:17:54 UTC 2023 selfserv_9997 with PID 17201 started at Wed Oct 18 16:17:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #124: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 17201 at Wed Oct 18 16:17:55 UTC 2023 kill -USR1 17201 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17201 killed at Wed Oct 18 16:17:55 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17253 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17253 found at Wed Oct 18 16:17:56 UTC 2023 selfserv_9997 with PID 17253 started at Wed Oct 18 16:17:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #125: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17253 at Wed Oct 18 16:17:57 UTC 2023 kill -USR1 17253 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17253 killed at Wed Oct 18 16:17:57 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:17:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17305 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17305 found at Wed Oct 18 16:17:57 UTC 2023 selfserv_9997 with PID 17305 started at Wed Oct 18 16:17:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #126: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 17305 at Wed Oct 18 16:17:58 UTC 2023 kill -USR1 17305 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17305 killed at Wed Oct 18 16:17:58 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:17:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17371 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17371 found at Wed Oct 18 16:17:58 UTC 2023 selfserv_9997 with PID 17371 started at Wed Oct 18 16:17:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #127: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 17371 at Wed Oct 18 16:17:59 UTC 2023 kill -USR1 17371 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17371 killed at Wed Oct 18 16:17:59 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:17:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:17:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17423 found at Wed Oct 18 16:17:59 UTC 2023 selfserv_9997 with PID 17423 started at Wed Oct 18 16:17:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #128: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 17423 at Wed Oct 18 16:18:00 UTC 2023 kill -USR1 17423 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17423 killed at Wed Oct 18 16:18:00 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:18:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17475 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17475 found at Wed Oct 18 16:18:00 UTC 2023 selfserv_9997 with PID 17475 started at Wed Oct 18 16:18:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #129: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 17475 at Wed Oct 18 16:18:01 UTC 2023 kill -USR1 17475 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17475 killed at Wed Oct 18 16:18:01 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17541 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17541 found at Wed Oct 18 16:18:01 UTC 2023 selfserv_9997 with PID 17541 started at Wed Oct 18 16:18:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #130: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 17541 at Wed Oct 18 16:18:02 UTC 2023 kill -USR1 17541 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17541 killed at Wed Oct 18 16:18:02 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17593 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17593 found at Wed Oct 18 16:18:03 UTC 2023 selfserv_9997 with PID 17593 started at Wed Oct 18 16:18:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #131: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17593 at Wed Oct 18 16:18:04 UTC 2023 kill -USR1 17593 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17593 killed at Wed Oct 18 16:18:04 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17645 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17645 found at Wed Oct 18 16:18:04 UTC 2023 selfserv_9997 with PID 17645 started at Wed Oct 18 16:18:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #132: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 17645 at Wed Oct 18 16:18:05 UTC 2023 kill -USR1 17645 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17645 killed at Wed Oct 18 16:18:05 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:18:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17714 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17714 found at Wed Oct 18 16:18:05 UTC 2023 selfserv_9997 with PID 17714 started at Wed Oct 18 16:18:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #133: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17714 at Wed Oct 18 16:18:06 UTC 2023 kill -USR1 17714 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17714 killed at Wed Oct 18 16:18:06 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:18:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17766 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17766 found at Wed Oct 18 16:18:06 UTC 2023 selfserv_9997 with PID 17766 started at Wed Oct 18 16:18:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #134: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17766 at Wed Oct 18 16:18:07 UTC 2023 kill -USR1 17766 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17766 killed at Wed Oct 18 16:18:07 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:18:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17820 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17820 found at Wed Oct 18 16:18:07 UTC 2023 selfserv_9997 with PID 17820 started at Wed Oct 18 16:18:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #135: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17820 at Wed Oct 18 16:18:08 UTC 2023 kill -USR1 17820 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17820 killed at Wed Oct 18 16:18:08 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17886 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17886 found at Wed Oct 18 16:18:09 UTC 2023 selfserv_9997 with PID 17886 started at Wed Oct 18 16:18:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #136: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17886 at Wed Oct 18 16:18:10 UTC 2023 kill -USR1 17886 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17886 killed at Wed Oct 18 16:18:10 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17938 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17938 found at Wed Oct 18 16:18:10 UTC 2023 selfserv_9997 with PID 17938 started at Wed Oct 18 16:18:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #137: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17938 at Wed Oct 18 16:18:11 UTC 2023 kill -USR1 17938 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17938 killed at Wed Oct 18 16:18:11 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17990 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17990 found at Wed Oct 18 16:18:11 UTC 2023 selfserv_9997 with PID 17990 started at Wed Oct 18 16:18:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #138: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17990 at Wed Oct 18 16:18:12 UTC 2023 kill -USR1 17990 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17990 killed at Wed Oct 18 16:18:12 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:18:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18056 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18056 found at Wed Oct 18 16:18:12 UTC 2023 selfserv_9997 with PID 18056 started at Wed Oct 18 16:18:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #139: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18056 at Wed Oct 18 16:18:13 UTC 2023 kill -USR1 18056 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18056 killed at Wed Oct 18 16:18:13 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:18:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18108 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18108 found at Wed Oct 18 16:18:13 UTC 2023 selfserv_9997 with PID 18108 started at Wed Oct 18 16:18:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #140: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18108 at Wed Oct 18 16:18:14 UTC 2023 kill -USR1 18108 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18108 killed at Wed Oct 18 16:18:14 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:18:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18160 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18160 found at Wed Oct 18 16:18:14 UTC 2023 selfserv_9997 with PID 18160 started at Wed Oct 18 16:18:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #141: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18160 at Wed Oct 18 16:18:15 UTC 2023 kill -USR1 18160 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18160 killed at Wed Oct 18 16:18:15 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18226 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18226 found at Wed Oct 18 16:18:16 UTC 2023 selfserv_9997 with PID 18226 started at Wed Oct 18 16:18:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #142: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18226 at Wed Oct 18 16:18:17 UTC 2023 kill -USR1 18226 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18226 killed at Wed Oct 18 16:18:17 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18278 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18278 found at Wed Oct 18 16:18:17 UTC 2023 selfserv_9997 with PID 18278 started at Wed Oct 18 16:18:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #143: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18278 at Wed Oct 18 16:18:18 UTC 2023 kill -USR1 18278 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18278 killed at Wed Oct 18 16:18:18 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18330 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18330 found at Wed Oct 18 16:18:18 UTC 2023 selfserv_9997 with PID 18330 started at Wed Oct 18 16:18:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #144: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18330 at Wed Oct 18 16:18:19 UTC 2023 kill -USR1 18330 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18330 killed at Wed Oct 18 16:18:19 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:18:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18396 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18396 found at Wed Oct 18 16:18:19 UTC 2023 selfserv_9997 with PID 18396 started at Wed Oct 18 16:18:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18396 at Wed Oct 18 16:18:20 UTC 2023 kill -USR1 18396 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18396 killed at Wed Oct 18 16:18:20 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:18:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18448 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18448 found at Wed Oct 18 16:18:20 UTC 2023 selfserv_9997 with PID 18448 started at Wed Oct 18 16:18:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #146: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18448 at Wed Oct 18 16:18:21 UTC 2023 kill -USR1 18448 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18448 killed at Wed Oct 18 16:18:21 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:18:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18500 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18500 found at Wed Oct 18 16:18:22 UTC 2023 selfserv_9997 with PID 18500 started at Wed Oct 18 16:18:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #147: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18500 at Wed Oct 18 16:18:23 UTC 2023 kill -USR1 18500 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18500 killed at Wed Oct 18 16:18:23 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18566 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18566 found at Wed Oct 18 16:18:23 UTC 2023 selfserv_9997 with PID 18566 started at Wed Oct 18 16:18:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #148: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18566 at Wed Oct 18 16:18:24 UTC 2023 kill -USR1 18566 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18566 killed at Wed Oct 18 16:18:24 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18618 found at Wed Oct 18 16:18:24 UTC 2023 selfserv_9997 with PID 18618 started at Wed Oct 18 16:18:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #149: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18618 at Wed Oct 18 16:18:25 UTC 2023 kill -USR1 18618 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18618 killed at Wed Oct 18 16:18:25 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18671 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18671 found at Wed Oct 18 16:18:25 UTC 2023 selfserv_9997 with PID 18671 started at Wed Oct 18 16:18:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #150: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18671 at Wed Oct 18 16:18:26 UTC 2023 kill -USR1 18671 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18671 killed at Wed Oct 18 16:18:26 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:18:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18737 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18737 found at Wed Oct 18 16:18:27 UTC 2023 selfserv_9997 with PID 18737 started at Wed Oct 18 16:18:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #151: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18737 at Wed Oct 18 16:18:27 UTC 2023 kill -USR1 18737 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18737 killed at Wed Oct 18 16:18:27 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:18:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18790 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18790 found at Wed Oct 18 16:18:28 UTC 2023 selfserv_9997 with PID 18790 started at Wed Oct 18 16:18:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #152: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18790 at Wed Oct 18 16:18:29 UTC 2023 kill -USR1 18790 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18790 killed at Wed Oct 18 16:18:29 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:18:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18842 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18842 found at Wed Oct 18 16:18:29 UTC 2023 selfserv_9997 with PID 18842 started at Wed Oct 18 16:18:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #153: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18842 at Wed Oct 18 16:18:30 UTC 2023 kill -USR1 18842 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18842 killed at Wed Oct 18 16:18:30 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18908 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18908 found at Wed Oct 18 16:18:30 UTC 2023 selfserv_9997 with PID 18908 started at Wed Oct 18 16:18:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #154: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18908 at Wed Oct 18 16:18:31 UTC 2023 kill -USR1 18908 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18908 killed at Wed Oct 18 16:18:31 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18960 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18960 found at Wed Oct 18 16:18:31 UTC 2023 selfserv_9997 with PID 18960 started at Wed Oct 18 16:18:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #155: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18960 at Wed Oct 18 16:18:32 UTC 2023 kill -USR1 18960 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18960 killed at Wed Oct 18 16:18:32 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19012 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19012 found at Wed Oct 18 16:18:33 UTC 2023 selfserv_9997 with PID 19012 started at Wed Oct 18 16:18:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #156: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19012 at Wed Oct 18 16:18:34 UTC 2023 kill -USR1 19012 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19012 killed at Wed Oct 18 16:18:34 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:18:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19078 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19078 found at Wed Oct 18 16:18:34 UTC 2023 selfserv_9997 with PID 19078 started at Wed Oct 18 16:18:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #157: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19078 at Wed Oct 18 16:18:35 UTC 2023 kill -USR1 19078 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19078 killed at Wed Oct 18 16:18:35 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:18:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19130 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19130 found at Wed Oct 18 16:18:35 UTC 2023 selfserv_9997 with PID 19130 started at Wed Oct 18 16:18:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #158: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19130 at Wed Oct 18 16:18:36 UTC 2023 kill -USR1 19130 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19130 killed at Wed Oct 18 16:18:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:18:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19182 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19182 found at Wed Oct 18 16:18:36 UTC 2023 selfserv_9997 with PID 19182 started at Wed Oct 18 16:18:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #159: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19182 at Wed Oct 18 16:18:37 UTC 2023 kill -USR1 19182 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19182 killed at Wed Oct 18 16:18:37 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19248 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19248 found at Wed Oct 18 16:18:37 UTC 2023 selfserv_9997 with PID 19248 started at Wed Oct 18 16:18:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #160: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19248 at Wed Oct 18 16:18:38 UTC 2023 kill -USR1 19248 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19248 killed at Wed Oct 18 16:18:38 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19300 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19300 found at Wed Oct 18 16:18:38 UTC 2023 selfserv_9997 with PID 19300 started at Wed Oct 18 16:18:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #161: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19300 at Wed Oct 18 16:18:40 UTC 2023 kill -USR1 19300 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19300 killed at Wed Oct 18 16:18:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19352 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19352 found at Wed Oct 18 16:18:40 UTC 2023 selfserv_9997 with PID 19352 started at Wed Oct 18 16:18:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #162: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19352 at Wed Oct 18 16:18:41 UTC 2023 kill -USR1 19352 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19352 killed at Wed Oct 18 16:18:41 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:18:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19418 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19418 found at Wed Oct 18 16:18:41 UTC 2023 selfserv_9997 with PID 19418 started at Wed Oct 18 16:18:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #163: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19418 at Wed Oct 18 16:18:42 UTC 2023 kill -USR1 19418 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19418 killed at Wed Oct 18 16:18:42 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:18:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19470 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19470 found at Wed Oct 18 16:18:42 UTC 2023 selfserv_9997 with PID 19470 started at Wed Oct 18 16:18:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #164: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19470 at Wed Oct 18 16:18:43 UTC 2023 kill -USR1 19470 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19470 killed at Wed Oct 18 16:18:43 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:18:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19537 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19537 found at Wed Oct 18 16:18:43 UTC 2023 selfserv_9997 with PID 19537 started at Wed Oct 18 16:18:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #165: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19537 at Wed Oct 18 16:18:44 UTC 2023 kill -USR1 19537 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19537 killed at Wed Oct 18 16:18:44 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19603 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19603 found at Wed Oct 18 16:18:45 UTC 2023 selfserv_9997 with PID 19603 started at Wed Oct 18 16:18:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #166: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19603 at Wed Oct 18 16:18:46 UTC 2023 kill -USR1 19603 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19603 killed at Wed Oct 18 16:18:46 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19655 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19655 found at Wed Oct 18 16:18:46 UTC 2023 selfserv_9997 with PID 19655 started at Wed Oct 18 16:18:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #167: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19655 at Wed Oct 18 16:18:47 UTC 2023 kill -USR1 19655 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19655 killed at Wed Oct 18 16:18:47 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19707 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19707 found at Wed Oct 18 16:18:47 UTC 2023 selfserv_9997 with PID 19707 started at Wed Oct 18 16:18:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #168: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19707 at Wed Oct 18 16:18:48 UTC 2023 kill -USR1 19707 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19707 killed at Wed Oct 18 16:18:48 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19773 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19773 found at Wed Oct 18 16:18:48 UTC 2023 selfserv_9997 with PID 19773 started at Wed Oct 18 16:18:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #169: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19773 at Wed Oct 18 16:18:50 UTC 2023 kill -USR1 19773 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19773 killed at Wed Oct 18 16:18:50 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19825 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19825 found at Wed Oct 18 16:18:50 UTC 2023 selfserv_9997 with PID 19825 started at Wed Oct 18 16:18:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #170: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19825 at Wed Oct 18 16:18:51 UTC 2023 kill -USR1 19825 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19825 killed at Wed Oct 18 16:18:51 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19877 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19877 found at Wed Oct 18 16:18:51 UTC 2023 selfserv_9997 with PID 19877 started at Wed Oct 18 16:18:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #171: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19877 at Wed Oct 18 16:18:53 UTC 2023 kill -USR1 19877 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19877 killed at Wed Oct 18 16:18:53 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19943 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19943 found at Wed Oct 18 16:18:53 UTC 2023 selfserv_9997 with PID 19943 started at Wed Oct 18 16:18:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #172: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19943 at Wed Oct 18 16:18:54 UTC 2023 kill -USR1 19943 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19943 killed at Wed Oct 18 16:18:54 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19996 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19996 found at Wed Oct 18 16:18:54 UTC 2023 selfserv_9997 with PID 19996 started at Wed Oct 18 16:18:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #173: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19996 at Wed Oct 18 16:18:55 UTC 2023 kill -USR1 19996 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19996 killed at Wed Oct 18 16:18:55 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:18:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20048 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20048 found at Wed Oct 18 16:18:56 UTC 2023 selfserv_9997 with PID 20048 started at Wed Oct 18 16:18:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #174: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20048 at Wed Oct 18 16:18:57 UTC 2023 kill -USR1 20048 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20048 killed at Wed Oct 18 16:18:57 UTC 2023 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/authin.tl.tmp 0 selfserv_9997 starting at Wed Oct 18 16:18:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:18:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:18:57 UTC 2023 selfserv_9997 with PID 20119 started at Wed Oct 18 16:18:57 UTC 2023 Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:18:58 UTC 2023 ssl.sh: #1: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:18:59 UTC 2023 ssl.sh: #2: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:00 UTC 2023 ssl.sh: #3: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:00 UTC 2023 ssl.sh: #4: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:01 UTC 2023 ssl.sh: #5: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:02 UTC 2023 ssl.sh: #6: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:02 UTC 2023 ssl.sh: #7: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:03 UTC 2023 ssl.sh: #8: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:04 UTC 2023 ssl.sh: #9: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:04 UTC 2023 ssl.sh: #10: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:05 UTC 2023 ssl.sh: #11: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:06 UTC 2023 ssl.sh: #12: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:06 UTC 2023 ssl.sh: #13: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:07 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #14: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:07 UTC 2023 ssl.sh: #15: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:08 UTC 2023 ssl.sh: #16: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:09 UTC 2023 ssl.sh: #17: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:09 UTC 2023 ssl.sh: #18: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:10 UTC 2023 ssl.sh: #19: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:11 UTC 2023 ssl.sh: #20: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:11 UTC 2023 ssl.sh: #21: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:12 UTC 2023 ssl.sh: #22: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:13 UTC 2023 ssl.sh: #23: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:13 UTC 2023 ssl.sh: #24: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:14 UTC 2023 ssl.sh: #25: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:15 UTC 2023 ssl.sh: #26: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:15 UTC 2023 ssl.sh: #27: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:16 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #28: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:17 UTC 2023 ssl.sh: #29: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:17 UTC 2023 ssl.sh: #30: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:18 UTC 2023 ssl.sh: #31: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:19 UTC 2023 ssl.sh: #32: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:19 UTC 2023 ssl.sh: #33: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:20 UTC 2023 ssl.sh: #34: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:21 UTC 2023 ssl.sh: #35: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:21 UTC 2023 ssl.sh: #36: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:22 UTC 2023 ssl.sh: #37: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:23 UTC 2023 ssl.sh: #38: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:23 UTC 2023 ssl.sh: #39: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:24 UTC 2023 ssl.sh: #40: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20119 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20119 found at Wed Oct 18 16:19:25 UTC 2023 ssl.sh: #41: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 20119 at Wed Oct 18 16:19:25 UTC 2023 kill -USR1 20119 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20119 killed at Wed Oct 18 16:19:25 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:19:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:19:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:25 UTC 2023 selfserv_9997 with PID 21380 started at Wed Oct 18 16:19:25 UTC 2023 Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:26 UTC 2023 ssl.sh: #42: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:26 UTC 2023 ssl.sh: #43: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:27 UTC 2023 ssl.sh: #44: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:28 UTC 2023 ssl.sh: #45: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:28 UTC 2023 ssl.sh: #46: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:29 UTC 2023 ssl.sh: #47: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:29 UTC 2023 ssl.sh: #48: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:30 UTC 2023 ssl.sh: #49: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:30 UTC 2023 ssl.sh: #50: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:31 UTC 2023 ssl.sh: #51: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:32 UTC 2023 ssl.sh: #52: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:32 UTC 2023 ssl.sh: #53: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:33 UTC 2023 ssl.sh: #54: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:33 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #55: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:34 UTC 2023 ssl.sh: #56: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:34 UTC 2023 ssl.sh: #57: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:35 UTC 2023 ssl.sh: #58: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:35 UTC 2023 ssl.sh: #59: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:36 UTC 2023 ssl.sh: #60: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:37 UTC 2023 ssl.sh: #61: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:37 UTC 2023 ssl.sh: #62: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:38 UTC 2023 ssl.sh: #63: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:38 UTC 2023 ssl.sh: #64: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:39 UTC 2023 ssl.sh: #65: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:39 UTC 2023 ssl.sh: #66: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:40 UTC 2023 ssl.sh: #67: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:40 UTC 2023 ssl.sh: #68: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:41 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #69: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:42 UTC 2023 ssl.sh: #70: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:42 UTC 2023 ssl.sh: #71: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:43 UTC 2023 ssl.sh: #72: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:43 UTC 2023 ssl.sh: #73: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:44 UTC 2023 ssl.sh: #74: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:44 UTC 2023 ssl.sh: #75: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:45 UTC 2023 ssl.sh: #76: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:45 UTC 2023 ssl.sh: #77: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:46 UTC 2023 ssl.sh: #78: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:46 UTC 2023 ssl.sh: #79: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:47 UTC 2023 ssl.sh: #80: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:48 UTC 2023 ssl.sh: #81: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21380 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21380 found at Wed Oct 18 16:19:48 UTC 2023 ssl.sh: #82: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 21380 at Wed Oct 18 16:19:48 UTC 2023 kill -USR1 21380 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21380 killed at Wed Oct 18 16:19:48 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:19:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:19:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:48 UTC 2023 selfserv_9997 with PID 22657 started at Wed Oct 18 16:19:48 UTC 2023 Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:49 UTC 2023 ssl.sh: #83: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:50 UTC 2023 ssl.sh: #84: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:50 UTC 2023 ssl.sh: #85: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:50 UTC 2023 ssl.sh: #86: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:50 UTC 2023 ssl.sh: #87: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:51 UTC 2023 ssl.sh: #88: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:51 UTC 2023 ssl.sh: #89: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:51 UTC 2023 ssl.sh: #90: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:52 UTC 2023 ssl.sh: #91: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:52 UTC 2023 ssl.sh: #92: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:52 UTC 2023 ssl.sh: #93: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:52 UTC 2023 ssl.sh: #94: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:53 UTC 2023 ssl.sh: #95: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:53 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #96: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:53 UTC 2023 ssl.sh: #97: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:53 UTC 2023 ssl.sh: #98: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:54 UTC 2023 ssl.sh: #99: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:54 UTC 2023 ssl.sh: #100: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:54 UTC 2023 ssl.sh: #101: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:55 UTC 2023 ssl.sh: #102: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:55 UTC 2023 ssl.sh: #103: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:55 UTC 2023 ssl.sh: #104: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:55 UTC 2023 ssl.sh: #105: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:56 UTC 2023 ssl.sh: #106: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:56 UTC 2023 ssl.sh: #107: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:56 UTC 2023 ssl.sh: #108: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:57 UTC 2023 ssl.sh: #109: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:57 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #110: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:57 UTC 2023 ssl.sh: #111: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:57 UTC 2023 ssl.sh: #112: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:58 UTC 2023 ssl.sh: #113: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:58 UTC 2023 ssl.sh: #114: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:58 UTC 2023 ssl.sh: #115: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:59 UTC 2023 ssl.sh: #116: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:59 UTC 2023 ssl.sh: #117: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:59 UTC 2023 ssl.sh: #118: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:19:59 UTC 2023 ssl.sh: #119: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:20:00 UTC 2023 ssl.sh: #120: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:20:00 UTC 2023 ssl.sh: #121: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:20:00 UTC 2023 ssl.sh: #122: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22657 found at Wed Oct 18 16:20:01 UTC 2023 ssl.sh: #123: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 22657 at Wed Oct 18 16:20:01 UTC 2023 kill -USR1 22657 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22657 killed at Wed Oct 18 16:20:01 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:20:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:20:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:01 UTC 2023 selfserv_9997 with PID 23922 started at Wed Oct 18 16:20:01 UTC 2023 Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:02 UTC 2023 ssl.sh: #124: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:02 UTC 2023 ssl.sh: #125: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:03 UTC 2023 ssl.sh: #126: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:03 UTC 2023 ssl.sh: #127: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:03 UTC 2023 ssl.sh: #128: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:04 UTC 2023 ssl.sh: #129: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:04 UTC 2023 ssl.sh: #130: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:05 UTC 2023 ssl.sh: #131: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:05 UTC 2023 ssl.sh: #132: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:05 UTC 2023 ssl.sh: #133: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:06 UTC 2023 ssl.sh: #134: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:06 UTC 2023 ssl.sh: #135: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:07 UTC 2023 ssl.sh: #136: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:07 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #137: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:07 UTC 2023 ssl.sh: #138: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:08 UTC 2023 ssl.sh: #139: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:08 UTC 2023 ssl.sh: #140: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:08 UTC 2023 ssl.sh: #141: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:09 UTC 2023 ssl.sh: #142: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:09 UTC 2023 ssl.sh: #143: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:10 UTC 2023 ssl.sh: #144: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:10 UTC 2023 ssl.sh: #145: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:10 UTC 2023 ssl.sh: #146: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:11 UTC 2023 ssl.sh: #147: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:11 UTC 2023 ssl.sh: #148: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:12 UTC 2023 ssl.sh: #149: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:12 UTC 2023 ssl.sh: #150: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:12 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #151: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:13 UTC 2023 ssl.sh: #152: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:13 UTC 2023 ssl.sh: #153: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:13 UTC 2023 ssl.sh: #154: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:14 UTC 2023 ssl.sh: #155: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:14 UTC 2023 ssl.sh: #156: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:15 UTC 2023 ssl.sh: #157: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:15 UTC 2023 ssl.sh: #158: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:15 UTC 2023 ssl.sh: #159: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:16 UTC 2023 ssl.sh: #160: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:16 UTC 2023 ssl.sh: #161: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:16 UTC 2023 ssl.sh: #162: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:17 UTC 2023 ssl.sh: #163: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 23922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23922 found at Wed Oct 18 16:20:17 UTC 2023 ssl.sh: #164: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 23922 at Wed Oct 18 16:20:17 UTC 2023 kill -USR1 23922 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23922 killed at Wed Oct 18 16:20:17 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:20:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:20:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25186 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25186 found at Wed Oct 18 16:20:18 UTC 2023 selfserv_9997 with PID 25186 started at Wed Oct 18 16:20:18 UTC 2023 trying to kill selfserv_9997 with PID 25186 at Wed Oct 18 16:20:18 UTC 2023 kill -USR1 25186 ./ssl.sh: line 228: 25186 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9997 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25186 killed at Wed Oct 18 16:20:18 UTC 2023 selfserv_9997 starting at Wed Oct 18 16:20:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:20:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:18 UTC 2023 selfserv_9997 with PID 25228 started at Wed Oct 18 16:20:18 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:19 UTC 2023 ssl.sh: #165: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:20 UTC 2023 ssl.sh: #166: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:21 UTC 2023 ssl.sh: #167: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:21 UTC 2023 ssl.sh: #168: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:22 UTC 2023 ssl.sh: #169: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:23 UTC 2023 ssl.sh: #170: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:23 UTC 2023 ssl.sh: #171: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:24 UTC 2023 ssl.sh: #172: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:25 UTC 2023 ssl.sh: #173: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:26 UTC 2023 ssl.sh: #174: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:26 UTC 2023 ssl.sh: #175: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:27 UTC 2023 ssl.sh: #176: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:28 UTC 2023 ssl.sh: #177: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:28 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #178: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:29 UTC 2023 ssl.sh: #179: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:30 UTC 2023 ssl.sh: #180: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:30 UTC 2023 ssl.sh: #181: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:31 UTC 2023 ssl.sh: #182: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:32 UTC 2023 ssl.sh: #183: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:33 UTC 2023 ssl.sh: #184: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:33 UTC 2023 ssl.sh: #185: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:34 UTC 2023 ssl.sh: #186: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:35 UTC 2023 ssl.sh: #187: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:35 UTC 2023 ssl.sh: #188: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:36 UTC 2023 ssl.sh: #189: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:37 UTC 2023 ssl.sh: #190: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:38 UTC 2023 ssl.sh: #191: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:38 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #192: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:39 UTC 2023 ssl.sh: #193: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:40 UTC 2023 ssl.sh: #194: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:40 UTC 2023 ssl.sh: #195: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:41 UTC 2023 ssl.sh: #196: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:42 UTC 2023 ssl.sh: #197: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:42 UTC 2023 ssl.sh: #198: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:43 UTC 2023 ssl.sh: #199: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:44 UTC 2023 ssl.sh: #200: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:45 UTC 2023 ssl.sh: #201: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:45 UTC 2023 ssl.sh: #202: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:46 UTC 2023 ssl.sh: #203: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:47 UTC 2023 ssl.sh: #204: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25228 found at Wed Oct 18 16:20:47 UTC 2023 ssl.sh: #205: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25228 at Wed Oct 18 16:20:47 UTC 2023 kill -USR1 25228 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25228 killed at Wed Oct 18 16:20:47 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:20:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:20:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:20:48 UTC 2023 selfserv_9997 with PID 26503 started at Wed Oct 18 16:20:48 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:20:49 UTC 2023 ssl.sh: #206: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:20:50 UTC 2023 ssl.sh: #207: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:20:51 UTC 2023 ssl.sh: #208: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:20:51 UTC 2023 ssl.sh: #209: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:20:52 UTC 2023 ssl.sh: #210: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:20:53 UTC 2023 ssl.sh: #211: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:20:54 UTC 2023 ssl.sh: #212: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:20:54 UTC 2023 ssl.sh: #213: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:20:55 UTC 2023 ssl.sh: #214: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:20:56 UTC 2023 ssl.sh: #215: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:20:57 UTC 2023 ssl.sh: #216: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:20:57 UTC 2023 ssl.sh: #217: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:20:58 UTC 2023 ssl.sh: #218: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:20:59 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #219: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:20:59 UTC 2023 ssl.sh: #220: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:00 UTC 2023 ssl.sh: #221: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:01 UTC 2023 ssl.sh: #222: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:02 UTC 2023 ssl.sh: #223: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:02 UTC 2023 ssl.sh: #224: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:03 UTC 2023 ssl.sh: #225: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:04 UTC 2023 ssl.sh: #226: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:05 UTC 2023 ssl.sh: #227: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:05 UTC 2023 ssl.sh: #228: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:06 UTC 2023 ssl.sh: #229: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:07 UTC 2023 ssl.sh: #230: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:08 UTC 2023 ssl.sh: #231: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:08 UTC 2023 ssl.sh: #232: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:09 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #233: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:10 UTC 2023 ssl.sh: #234: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:11 UTC 2023 ssl.sh: #235: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:11 UTC 2023 ssl.sh: #236: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:12 UTC 2023 ssl.sh: #237: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:13 UTC 2023 ssl.sh: #238: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:14 UTC 2023 ssl.sh: #239: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:14 UTC 2023 ssl.sh: #240: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:15 UTC 2023 ssl.sh: #241: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:16 UTC 2023 ssl.sh: #242: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:16 UTC 2023 ssl.sh: #243: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:17 UTC 2023 ssl.sh: #244: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:18 UTC 2023 ssl.sh: #245: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26503 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26503 found at Wed Oct 18 16:21:19 UTC 2023 ssl.sh: #246: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 26503 at Wed Oct 18 16:21:19 UTC 2023 kill -USR1 26503 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26503 killed at Wed Oct 18 16:21:19 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:21:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:21:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:19 UTC 2023 selfserv_9997 with PID 27763 started at Wed Oct 18 16:21:19 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:20 UTC 2023 ssl.sh: #247: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:21 UTC 2023 ssl.sh: #248: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:21 UTC 2023 ssl.sh: #249: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:22 UTC 2023 ssl.sh: #250: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:23 UTC 2023 ssl.sh: #251: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:23 UTC 2023 ssl.sh: #252: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:24 UTC 2023 ssl.sh: #253: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:24 UTC 2023 ssl.sh: #254: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:25 UTC 2023 ssl.sh: #255: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:26 UTC 2023 ssl.sh: #256: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:26 UTC 2023 ssl.sh: #257: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:27 UTC 2023 ssl.sh: #258: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:27 UTC 2023 ssl.sh: #259: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:28 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #260: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:29 UTC 2023 ssl.sh: #261: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:29 UTC 2023 ssl.sh: #262: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:30 UTC 2023 ssl.sh: #263: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:30 UTC 2023 ssl.sh: #264: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:31 UTC 2023 ssl.sh: #265: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:32 UTC 2023 ssl.sh: #266: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:32 UTC 2023 ssl.sh: #267: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:33 UTC 2023 ssl.sh: #268: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:33 UTC 2023 ssl.sh: #269: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:34 UTC 2023 ssl.sh: #270: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:35 UTC 2023 ssl.sh: #271: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:35 UTC 2023 ssl.sh: #272: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:36 UTC 2023 ssl.sh: #273: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:36 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #274: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:37 UTC 2023 ssl.sh: #275: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:38 UTC 2023 ssl.sh: #276: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:38 UTC 2023 ssl.sh: #277: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:39 UTC 2023 ssl.sh: #278: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:39 UTC 2023 ssl.sh: #279: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:40 UTC 2023 ssl.sh: #280: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:41 UTC 2023 ssl.sh: #281: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:41 UTC 2023 ssl.sh: #282: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:42 UTC 2023 ssl.sh: #283: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:42 UTC 2023 ssl.sh: #284: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:43 UTC 2023 ssl.sh: #285: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:44 UTC 2023 ssl.sh: #286: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 27763 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27763 found at Wed Oct 18 16:21:44 UTC 2023 ssl.sh: #287: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27763 at Wed Oct 18 16:21:44 UTC 2023 kill -USR1 27763 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27763 killed at Wed Oct 18 16:21:44 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:21:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:21:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:44 UTC 2023 selfserv_9997 with PID 29043 started at Wed Oct 18 16:21:44 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:45 UTC 2023 ssl.sh: #288: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:46 UTC 2023 ssl.sh: #289: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:46 UTC 2023 ssl.sh: #290: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:46 UTC 2023 ssl.sh: #291: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:47 UTC 2023 ssl.sh: #292: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:47 UTC 2023 ssl.sh: #293: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:47 UTC 2023 ssl.sh: #294: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:48 UTC 2023 ssl.sh: #295: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:48 UTC 2023 ssl.sh: #296: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:48 UTC 2023 ssl.sh: #297: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:49 UTC 2023 ssl.sh: #298: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:49 UTC 2023 ssl.sh: #299: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:49 UTC 2023 ssl.sh: #300: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:50 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #301: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:50 UTC 2023 ssl.sh: #302: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:50 UTC 2023 ssl.sh: #303: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:51 UTC 2023 ssl.sh: #304: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:51 UTC 2023 ssl.sh: #305: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:51 UTC 2023 ssl.sh: #306: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:52 UTC 2023 ssl.sh: #307: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:52 UTC 2023 ssl.sh: #308: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:52 UTC 2023 ssl.sh: #309: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:53 UTC 2023 ssl.sh: #310: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:53 UTC 2023 ssl.sh: #311: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:53 UTC 2023 ssl.sh: #312: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:54 UTC 2023 ssl.sh: #313: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:54 UTC 2023 ssl.sh: #314: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:54 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #315: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:55 UTC 2023 ssl.sh: #316: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:55 UTC 2023 ssl.sh: #317: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:55 UTC 2023 ssl.sh: #318: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:56 UTC 2023 ssl.sh: #319: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:56 UTC 2023 ssl.sh: #320: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:56 UTC 2023 ssl.sh: #321: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:57 UTC 2023 ssl.sh: #322: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:57 UTC 2023 ssl.sh: #323: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:57 UTC 2023 ssl.sh: #324: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:58 UTC 2023 ssl.sh: #325: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:58 UTC 2023 ssl.sh: #326: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:58 UTC 2023 ssl.sh: #327: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 16:21:59 UTC 2023 ssl.sh: #328: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 29043 at Wed Oct 18 16:21:59 UTC 2023 kill -USR1 29043 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29043 killed at Wed Oct 18 16:21:59 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:21:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:21:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:21:59 UTC 2023 selfserv_9997 with PID 30306 started at Wed Oct 18 16:21:59 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:00 UTC 2023 ssl.sh: #329: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:00 UTC 2023 ssl.sh: #330: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:01 UTC 2023 ssl.sh: #331: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:01 UTC 2023 ssl.sh: #332: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:01 UTC 2023 ssl.sh: #333: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:02 UTC 2023 ssl.sh: #334: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:02 UTC 2023 ssl.sh: #335: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:03 UTC 2023 ssl.sh: #336: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:03 UTC 2023 ssl.sh: #337: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:03 UTC 2023 ssl.sh: #338: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:04 UTC 2023 ssl.sh: #339: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:04 UTC 2023 ssl.sh: #340: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:05 UTC 2023 ssl.sh: #341: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:05 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #342: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:05 UTC 2023 ssl.sh: #343: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:06 UTC 2023 ssl.sh: #344: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:06 UTC 2023 ssl.sh: #345: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:06 UTC 2023 ssl.sh: #346: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:07 UTC 2023 ssl.sh: #347: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:07 UTC 2023 ssl.sh: #348: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:07 UTC 2023 ssl.sh: #349: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:08 UTC 2023 ssl.sh: #350: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:08 UTC 2023 ssl.sh: #351: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:09 UTC 2023 ssl.sh: #352: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:09 UTC 2023 ssl.sh: #353: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:09 UTC 2023 ssl.sh: #354: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:10 UTC 2023 ssl.sh: #355: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:10 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #356: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:10 UTC 2023 ssl.sh: #357: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:11 UTC 2023 ssl.sh: #358: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:11 UTC 2023 ssl.sh: #359: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:11 UTC 2023 ssl.sh: #360: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:12 UTC 2023 ssl.sh: #361: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:12 UTC 2023 ssl.sh: #362: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:13 UTC 2023 ssl.sh: #363: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:13 UTC 2023 ssl.sh: #364: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:13 UTC 2023 ssl.sh: #365: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:14 UTC 2023 ssl.sh: #366: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:14 UTC 2023 ssl.sh: #367: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:14 UTC 2023 ssl.sh: #368: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30306 found at Wed Oct 18 16:22:15 UTC 2023 ssl.sh: #369: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 30306 at Wed Oct 18 16:22:15 UTC 2023 kill -USR1 30306 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30306 killed at Wed Oct 18 16:22:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:22:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:22:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:15 UTC 2023 selfserv_9997 with PID 31568 started at Wed Oct 18 16:22:15 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:16 UTC 2023 ssl.sh: #370: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:16 UTC 2023 ssl.sh: #371: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:17 UTC 2023 ssl.sh: #372: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:17 UTC 2023 ssl.sh: #373: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:18 UTC 2023 ssl.sh: #374: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:18 UTC 2023 ssl.sh: #375: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:19 UTC 2023 ssl.sh: #376: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:19 UTC 2023 ssl.sh: #377: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:20 UTC 2023 ssl.sh: #378: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:20 UTC 2023 ssl.sh: #379: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:20 UTC 2023 ssl.sh: #380: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:21 UTC 2023 ssl.sh: #381: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:21 UTC 2023 ssl.sh: #382: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:22 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #383: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:22 UTC 2023 ssl.sh: #384: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:23 UTC 2023 ssl.sh: #385: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:23 UTC 2023 ssl.sh: #386: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:23 UTC 2023 ssl.sh: #387: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:24 UTC 2023 ssl.sh: #388: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:24 UTC 2023 ssl.sh: #389: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:25 UTC 2023 ssl.sh: #390: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:25 UTC 2023 ssl.sh: #391: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:26 UTC 2023 ssl.sh: #392: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:26 UTC 2023 ssl.sh: #393: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:26 UTC 2023 ssl.sh: #394: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:27 UTC 2023 ssl.sh: #395: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:27 UTC 2023 ssl.sh: #396: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:28 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #397: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:28 UTC 2023 ssl.sh: #398: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:29 UTC 2023 ssl.sh: #399: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:29 UTC 2023 ssl.sh: #400: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:30 UTC 2023 ssl.sh: #401: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:30 UTC 2023 ssl.sh: #402: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:30 UTC 2023 ssl.sh: #403: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:31 UTC 2023 ssl.sh: #404: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:31 UTC 2023 ssl.sh: #405: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:32 UTC 2023 ssl.sh: #406: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:32 UTC 2023 ssl.sh: #407: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:33 UTC 2023 ssl.sh: #408: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:33 UTC 2023 ssl.sh: #409: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31568 found at Wed Oct 18 16:22:33 UTC 2023 ssl.sh: #410: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 31568 at Wed Oct 18 16:22:33 UTC 2023 kill -USR1 31568 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31568 killed at Wed Oct 18 16:22:33 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:22:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:22:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 361 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 361 found at Wed Oct 18 16:22:34 UTC 2023 selfserv_9997 with PID 361 started at Wed Oct 18 16:22:34 UTC 2023 trying to kill selfserv_9997 with PID 361 at Wed Oct 18 16:22:34 UTC 2023 kill -USR1 361 ./ssl.sh: line 228: 361 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9997 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 361 killed at Wed Oct 18 16:22:34 UTC 2023 selfserv_9997 starting at Wed Oct 18 16:22:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:22:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:34 UTC 2023 selfserv_9997 with PID 395 started at Wed Oct 18 16:22:34 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:35 UTC 2023 ssl.sh: #411: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:36 UTC 2023 ssl.sh: #412: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:37 UTC 2023 ssl.sh: #413: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:37 UTC 2023 ssl.sh: #414: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:38 UTC 2023 ssl.sh: #415: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:39 UTC 2023 ssl.sh: #416: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:39 UTC 2023 ssl.sh: #417: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:40 UTC 2023 ssl.sh: #418: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:41 UTC 2023 ssl.sh: #419: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:42 UTC 2023 ssl.sh: #420: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:42 UTC 2023 ssl.sh: #421: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:43 UTC 2023 ssl.sh: #422: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:44 UTC 2023 ssl.sh: #423: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:44 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #424: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:45 UTC 2023 ssl.sh: #425: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:46 UTC 2023 ssl.sh: #426: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:47 UTC 2023 ssl.sh: #427: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:47 UTC 2023 ssl.sh: #428: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:48 UTC 2023 ssl.sh: #429: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:49 UTC 2023 ssl.sh: #430: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:49 UTC 2023 ssl.sh: #431: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:50 UTC 2023 ssl.sh: #432: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:51 UTC 2023 ssl.sh: #433: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:51 UTC 2023 ssl.sh: #434: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:52 UTC 2023 ssl.sh: #435: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:53 UTC 2023 ssl.sh: #436: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:54 UTC 2023 ssl.sh: #437: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:54 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #438: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:55 UTC 2023 ssl.sh: #439: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:56 UTC 2023 ssl.sh: #440: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:56 UTC 2023 ssl.sh: #441: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:57 UTC 2023 ssl.sh: #442: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:58 UTC 2023 ssl.sh: #443: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:59 UTC 2023 ssl.sh: #444: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:22:59 UTC 2023 ssl.sh: #445: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:23:00 UTC 2023 ssl.sh: #446: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:23:01 UTC 2023 ssl.sh: #447: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:23:01 UTC 2023 ssl.sh: #448: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:23:02 UTC 2023 ssl.sh: #449: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:23:03 UTC 2023 ssl.sh: #450: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 395 found at Wed Oct 18 16:23:03 UTC 2023 ssl.sh: #451: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 395 at Wed Oct 18 16:23:04 UTC 2023 kill -USR1 395 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 395 killed at Wed Oct 18 16:23:04 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:23:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:23:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:04 UTC 2023 selfserv_9997 with PID 1772 started at Wed Oct 18 16:23:04 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:05 UTC 2023 ssl.sh: #452: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:06 UTC 2023 ssl.sh: #453: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:07 UTC 2023 ssl.sh: #454: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:07 UTC 2023 ssl.sh: #455: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:08 UTC 2023 ssl.sh: #456: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:09 UTC 2023 ssl.sh: #457: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:10 UTC 2023 ssl.sh: #458: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:10 UTC 2023 ssl.sh: #459: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:11 UTC 2023 ssl.sh: #460: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:12 UTC 2023 ssl.sh: #461: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:13 UTC 2023 ssl.sh: #462: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:13 UTC 2023 ssl.sh: #463: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:14 UTC 2023 ssl.sh: #464: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:15 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #465: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:16 UTC 2023 ssl.sh: #466: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:16 UTC 2023 ssl.sh: #467: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:17 UTC 2023 ssl.sh: #468: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:18 UTC 2023 ssl.sh: #469: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:18 UTC 2023 ssl.sh: #470: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:19 UTC 2023 ssl.sh: #471: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:20 UTC 2023 ssl.sh: #472: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:21 UTC 2023 ssl.sh: #473: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:21 UTC 2023 ssl.sh: #474: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:22 UTC 2023 ssl.sh: #475: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:23 UTC 2023 ssl.sh: #476: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:24 UTC 2023 ssl.sh: #477: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:24 UTC 2023 ssl.sh: #478: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:25 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #479: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:26 UTC 2023 ssl.sh: #480: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:27 UTC 2023 ssl.sh: #481: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:27 UTC 2023 ssl.sh: #482: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:28 UTC 2023 ssl.sh: #483: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:29 UTC 2023 ssl.sh: #484: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:30 UTC 2023 ssl.sh: #485: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:30 UTC 2023 ssl.sh: #486: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:31 UTC 2023 ssl.sh: #487: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:32 UTC 2023 ssl.sh: #488: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:33 UTC 2023 ssl.sh: #489: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:33 UTC 2023 ssl.sh: #490: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:34 UTC 2023 ssl.sh: #491: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:23:35 UTC 2023 ssl.sh: #492: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1772 at Wed Oct 18 16:23:35 UTC 2023 kill -USR1 1772 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1772 killed at Wed Oct 18 16:23:35 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:23:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:23:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:35 UTC 2023 selfserv_9997 with PID 3037 started at Wed Oct 18 16:23:35 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:36 UTC 2023 ssl.sh: #493: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:37 UTC 2023 ssl.sh: #494: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:37 UTC 2023 ssl.sh: #495: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:38 UTC 2023 ssl.sh: #496: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:39 UTC 2023 ssl.sh: #497: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:39 UTC 2023 ssl.sh: #498: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:40 UTC 2023 ssl.sh: #499: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:40 UTC 2023 ssl.sh: #500: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:41 UTC 2023 ssl.sh: #501: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:42 UTC 2023 ssl.sh: #502: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:42 UTC 2023 ssl.sh: #503: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:43 UTC 2023 ssl.sh: #504: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:43 UTC 2023 ssl.sh: #505: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:44 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #506: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:45 UTC 2023 ssl.sh: #507: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:45 UTC 2023 ssl.sh: #508: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:46 UTC 2023 ssl.sh: #509: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:46 UTC 2023 ssl.sh: #510: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:47 UTC 2023 ssl.sh: #511: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:48 UTC 2023 ssl.sh: #512: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:48 UTC 2023 ssl.sh: #513: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:49 UTC 2023 ssl.sh: #514: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:49 UTC 2023 ssl.sh: #515: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:50 UTC 2023 ssl.sh: #516: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:51 UTC 2023 ssl.sh: #517: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:51 UTC 2023 ssl.sh: #518: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:52 UTC 2023 ssl.sh: #519: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:52 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #520: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:53 UTC 2023 ssl.sh: #521: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:54 UTC 2023 ssl.sh: #522: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:54 UTC 2023 ssl.sh: #523: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:55 UTC 2023 ssl.sh: #524: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:55 UTC 2023 ssl.sh: #525: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:56 UTC 2023 ssl.sh: #526: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:57 UTC 2023 ssl.sh: #527: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:57 UTC 2023 ssl.sh: #528: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:58 UTC 2023 ssl.sh: #529: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:58 UTC 2023 ssl.sh: #530: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:23:59 UTC 2023 ssl.sh: #531: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:24:00 UTC 2023 ssl.sh: #532: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3037 found at Wed Oct 18 16:24:00 UTC 2023 ssl.sh: #533: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3037 at Wed Oct 18 16:24:00 UTC 2023 kill -USR1 3037 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3037 killed at Wed Oct 18 16:24:00 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:24:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:24:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:00 UTC 2023 selfserv_9997 with PID 4311 started at Wed Oct 18 16:24:00 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:01 UTC 2023 ssl.sh: #534: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:02 UTC 2023 ssl.sh: #535: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:02 UTC 2023 ssl.sh: #536: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:02 UTC 2023 ssl.sh: #537: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:03 UTC 2023 ssl.sh: #538: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:03 UTC 2023 ssl.sh: #539: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:03 UTC 2023 ssl.sh: #540: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:04 UTC 2023 ssl.sh: #541: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:04 UTC 2023 ssl.sh: #542: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:04 UTC 2023 ssl.sh: #543: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:05 UTC 2023 ssl.sh: #544: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:05 UTC 2023 ssl.sh: #545: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:05 UTC 2023 ssl.sh: #546: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:06 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #547: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:06 UTC 2023 ssl.sh: #548: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:06 UTC 2023 ssl.sh: #549: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:07 UTC 2023 ssl.sh: #550: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:07 UTC 2023 ssl.sh: #551: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:07 UTC 2023 ssl.sh: #552: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:08 UTC 2023 ssl.sh: #553: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:08 UTC 2023 ssl.sh: #554: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:08 UTC 2023 ssl.sh: #555: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:09 UTC 2023 ssl.sh: #556: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:09 UTC 2023 ssl.sh: #557: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:09 UTC 2023 ssl.sh: #558: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:10 UTC 2023 ssl.sh: #559: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:10 UTC 2023 ssl.sh: #560: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:10 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #561: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:11 UTC 2023 ssl.sh: #562: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:11 UTC 2023 ssl.sh: #563: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:11 UTC 2023 ssl.sh: #564: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:12 UTC 2023 ssl.sh: #565: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:12 UTC 2023 ssl.sh: #566: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:12 UTC 2023 ssl.sh: #567: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:13 UTC 2023 ssl.sh: #568: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:13 UTC 2023 ssl.sh: #569: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:13 UTC 2023 ssl.sh: #570: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:14 UTC 2023 ssl.sh: #571: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:14 UTC 2023 ssl.sh: #572: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:14 UTC 2023 ssl.sh: #573: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4311 found at Wed Oct 18 16:24:15 UTC 2023 ssl.sh: #574: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4311 at Wed Oct 18 16:24:15 UTC 2023 kill -USR1 4311 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4311 killed at Wed Oct 18 16:24:15 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:24:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:24:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:15 UTC 2023 selfserv_9997 with PID 5571 started at Wed Oct 18 16:24:15 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:16 UTC 2023 ssl.sh: #575: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:16 UTC 2023 ssl.sh: #576: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:17 UTC 2023 ssl.sh: #577: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:17 UTC 2023 ssl.sh: #578: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:17 UTC 2023 ssl.sh: #579: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:18 UTC 2023 ssl.sh: #580: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:18 UTC 2023 ssl.sh: #581: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:18 UTC 2023 ssl.sh: #582: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:19 UTC 2023 ssl.sh: #583: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:19 UTC 2023 ssl.sh: #584: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:20 UTC 2023 ssl.sh: #585: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:20 UTC 2023 ssl.sh: #586: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:20 UTC 2023 ssl.sh: #587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:21 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #588: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:21 UTC 2023 ssl.sh: #589: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:21 UTC 2023 ssl.sh: #590: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:22 UTC 2023 ssl.sh: #591: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:22 UTC 2023 ssl.sh: #592: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:23 UTC 2023 ssl.sh: #593: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:23 UTC 2023 ssl.sh: #594: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:23 UTC 2023 ssl.sh: #595: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:24 UTC 2023 ssl.sh: #596: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:24 UTC 2023 ssl.sh: #597: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:24 UTC 2023 ssl.sh: #598: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:25 UTC 2023 ssl.sh: #599: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:25 UTC 2023 ssl.sh: #600: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:25 UTC 2023 ssl.sh: #601: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:26 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #602: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:26 UTC 2023 ssl.sh: #603: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:27 UTC 2023 ssl.sh: #604: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:27 UTC 2023 ssl.sh: #605: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:27 UTC 2023 ssl.sh: #606: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:28 UTC 2023 ssl.sh: #607: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:28 UTC 2023 ssl.sh: #608: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:28 UTC 2023 ssl.sh: #609: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:29 UTC 2023 ssl.sh: #610: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:29 UTC 2023 ssl.sh: #611: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:29 UTC 2023 ssl.sh: #612: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:30 UTC 2023 ssl.sh: #613: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:30 UTC 2023 ssl.sh: #614: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5571 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5571 found at Wed Oct 18 16:24:31 UTC 2023 ssl.sh: #615: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5571 at Wed Oct 18 16:24:31 UTC 2023 kill -USR1 5571 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5571 killed at Wed Oct 18 16:24:31 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:24:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:24:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:31 UTC 2023 selfserv_9997 with PID 6830 started at Wed Oct 18 16:24:31 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:32 UTC 2023 ssl.sh: #616: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:32 UTC 2023 ssl.sh: #617: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:33 UTC 2023 ssl.sh: #618: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:33 UTC 2023 ssl.sh: #619: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:34 UTC 2023 ssl.sh: #620: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:34 UTC 2023 ssl.sh: #621: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:35 UTC 2023 ssl.sh: #622: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:35 UTC 2023 ssl.sh: #623: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:35 UTC 2023 ssl.sh: #624: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:36 UTC 2023 ssl.sh: #625: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:36 UTC 2023 ssl.sh: #626: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:37 UTC 2023 ssl.sh: #627: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:37 UTC 2023 ssl.sh: #628: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:38 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #629: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:38 UTC 2023 ssl.sh: #630: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:38 UTC 2023 ssl.sh: #631: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:39 UTC 2023 ssl.sh: #632: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:39 UTC 2023 ssl.sh: #633: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:40 UTC 2023 ssl.sh: #634: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:40 UTC 2023 ssl.sh: #635: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:41 UTC 2023 ssl.sh: #636: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:41 UTC 2023 ssl.sh: #637: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:41 UTC 2023 ssl.sh: #638: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:42 UTC 2023 ssl.sh: #639: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:42 UTC 2023 ssl.sh: #640: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:43 UTC 2023 ssl.sh: #641: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:43 UTC 2023 ssl.sh: #642: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:44 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #643: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:44 UTC 2023 ssl.sh: #644: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:45 UTC 2023 ssl.sh: #645: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:45 UTC 2023 ssl.sh: #646: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:45 UTC 2023 ssl.sh: #647: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:46 UTC 2023 ssl.sh: #648: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:46 UTC 2023 ssl.sh: #649: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:47 UTC 2023 ssl.sh: #650: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:47 UTC 2023 ssl.sh: #651: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:48 UTC 2023 ssl.sh: #652: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:48 UTC 2023 ssl.sh: #653: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:49 UTC 2023 ssl.sh: #654: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:49 UTC 2023 ssl.sh: #655: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 6830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6830 found at Wed Oct 18 16:24:49 UTC 2023 ssl.sh: #656: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6830 at Wed Oct 18 16:24:49 UTC 2023 kill -USR1 6830 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6830 killed at Wed Oct 18 16:24:49 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:24:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:24:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8105 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8105 found at Wed Oct 18 16:24:50 UTC 2023 selfserv_9997 with PID 8105 started at Wed Oct 18 16:24:50 UTC 2023 trying to kill selfserv_9997 with PID 8105 at Wed Oct 18 16:24:50 UTC 2023 kill -USR1 8105 ./ssl.sh: line 228: 8105 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9997 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8105 killed at Wed Oct 18 16:24:50 UTC 2023 ssl.sh: SSL POLICY LISTSUITES - server /client =============================== Saving pkcs11.txt ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #657: listsuites with all cipher disallowed by policy produced a returncode of 1, expected is 1 - PASSED ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #658: listsuites with rsa cipher disallowed by policy produced a returncode of 1, expected is 1 - PASSED ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #659: listsuites with all ciphers enabled by policy but disabled by default produced a returncode of 1, expected is 1 - PASSED ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: #660: listsuites with all ciphers enabled by policy but rsa disabled by default produced a returncode of 1, expected is 1 - PASSED ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all flags=policy-lock library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** NSS_SetAlgorithmPolicy failed: Could not change the policy because the policy is now locked. ssl.sh: #661: listsuites with policy locked produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL POLICY SELFSERV - server /client =============================== Saving pkcs11.txt ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** ssl.sh: Disallow RSA key exchange explicitly ---- selfserv_9997 starting at Wed Oct 18 16:24:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain -M 3 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:24:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8210 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8210 found at Wed Oct 18 16:24:50 UTC 2023 selfserv_9997 with PID 8210 started at Wed Oct 18 16:24:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #662: Disallow RSA key exchange explicitly produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 8210 at Wed Oct 18 16:24:51 UTC 2023 kill -USR1 8210 SIG_USER: Parent got sig_user, killing children (3). Child 3 exited with exit code 100 Child 2 exited with exit code 100 Child 1 exited with exit code 100 selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8210 killed at Wed Oct 18 16:24:51 UTC 2023 ssl.sh: SSL POLICY - server /client =============================== Saving pkcs11.txt selfserv_9997 starting at Wed Oct 18 16:24:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:24:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8275 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8275 found at Wed Oct 18 16:24:52 UTC 2023 selfserv_9997 with PID 8275 started at Wed Oct 18 16:24:52 UTC 2023 ssl.sh: running Allowed by Narrow Policy ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #663: Allowed by Narrow Policy produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Allowed by Strict Policy ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1/ssl,ssl-key-exchange:sha256/all-signature:rsa-pkcs/all-signature:rsa/ssl-key-exchange:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #664: Allowed by Strict Policy produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Allow All Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:dsa/all:rsa-pss/all:ecdsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #665: Allow All Explicitly produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disallow All Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #666: Disallow All Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow all signatures with Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all/signature library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #667: Disallow all signatures with Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Explicitly ---------------------------- selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256 library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. ssl.sh: #668: Disallow SHA256 Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Certificate signature Explicitly ---------------------------- selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/cert-signature library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #669: Disallow SHA256 Certificate signature Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow All SHA256 signatures Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/signature library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #670: Disallow All SHA256 signatures Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Any SHA256 signature Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=sha256/all-signature library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #671: Disallow Any SHA256 signature Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Implicitly Narrow ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:rsa/ssl-key-exchange:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #672: Disallow SHA256 Signatures Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow SHA256 Signatures Implicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:dsa/all:ecdsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #673: Disallow SHA256 Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=des-ede3-cbc library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #674: Disallow Cipher Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Implicitly Narrow ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #675: Disallow Cipher Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Cipher Implicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-verion-max=tls1.2 library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #676: Disallow Cipher Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=hmac-sha1 library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #677: Disallow HMAC Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Implicitly Narrow ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md5:sha256:rsa:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #678: Disallow HMAC Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow HMAC Signatures Implicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #679: Disallow HMAC Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa/ssl-key-exchange library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #680: Disallow Key Exchange Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Implicitly Narrow ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:dh-dss:des-ede3-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #681: Disallow Key Exchange Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Key Exchange Signatures Implicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=ssl2.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_SSL_DISABLED: Cannot connect: SSL is disabled. ssl.sh: #682: Disallow Key Exchange Signatures Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Exlicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #683: Disallow Version Exlicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Implicitly Narrow ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=hmac-sha1:sha256:rsa-pkcs:rsa:des-ede3-cbc:tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #684: Disallow Version Implicitly Narrow produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow Version Implicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=all allow=md2/all:md4/all:md5/all:sha1/all:sha256/all:sha384/all:sha512/all:rsa-pkcs/all:rsa-pss/all:ecdsa/all:dsa/all:hmac-sha1/all:hmac-sha224/all:hmac-sha256/all:hmac-sha384/all:hmac-sha512/all:hmac-md5/all:camellia128-cbc/all:camellia192-cbc/all:camellia256-cbc/all:seed-cbc/all:des-ede3-cbc/all:des-40-cbc/all:des-cbc/all:null-cipher/all:rc2/all:rc4/all:idea/all:rsa/all:rsa-export/all:dhe-rsa/all:dhe-dss/all:ecdhe-ecdsa/all:ecdhe-rsa/all:ecdh-ecdsa/all:ecdh-rsa/all:tls-version-min=tls1.0:tls-version-max=tls1.2 library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: error setting SSL/TLS version range : PR_NOT_CONNECTED_ERROR: Network file descriptor is not connected ssl.sh: #685: Disallow Version Implicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disallow DSA Signatures Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=dsa library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #686: Disallow DSA Signatures Explicitly produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disallow RSA PKCS 1 Signatures Explicitly ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=disallow=rsa-pkcs library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #687: Disallow RSA PKCS 1 Signatures Explicitly produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Restrict RSA keys on signature verification ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=16384:key-size-flags=key-size-verify library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #688: Restrict RSA keys on signature verification produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Restrict RSA keys on signing ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=16384:key-size-flags=key-size-sign library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: authentication of server cert failed: SEC_ERROR_CERT_SIGNATURE_ALGORITHM_DISABLED: The certificate was signed using a signature algorithm that is disabled because it is not secure. selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. ssl.sh: #689: Restrict RSA keys on signing produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Restrict RSA keys when used in SSL ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=16384:key-size-flags=key-size-ssl library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12226: SSL peer rejected a handshake message for unacceptable content. tstclnt: write to SSL socket failed: SSL_ERROR_WEAK_SERVER_CERT_KEY: The server certificate included a public key that was too weak. ssl.sh: #690: Restrict RSA keys when used in SSL produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Restrict RSA keys when used in SSL ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=rsa-min=1023 library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #691: Restrict RSA keys when used in SSL produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disable all by default, application override ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #692: Disable all by default, application override produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Disable all by default, prevent application from enabling ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all flags=ssl-lock,policy-lock library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: write to SSL socket failed: SSL_ERROR_NO_CIPHERS_SUPPORTED: No cipher suites are present and enabled in this program. ssl.sh: #693: Disable all by default, prevent application from enabling produced a returncode of 1, expected is 1 - PASSED ssl.sh: running Disable all by default, lock policy (application can still change the ciphers) ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all flags=policy-lock library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #694: Disable all by default, lock policy (application can still change the ciphers) produced a returncode of 0, expected is 0 - PASSED ssl.sh: running Lock in a different ciphersuite that the one the application asks for ---------------------------- ******************************Testing with: library= name=NSS Internal PKCS #11 Module parameters=configdir='./client' certPrefix='' keyPrefix='' secmod='secmod.db' flags= updatedir='' updateCertPrefix='' updateKeyPrefix='' updateid='' updateTokenDescription='' NSS=Flags=internal,critical trustOrder=75 cipherOrder=100 slotParams=(1={slotFlags=[RSA,DSA,DH,RC2,RC4,DES,RANDOM,SHA1,MD5,MD2,SSL,TLS,AES,Camellia,SEED,SHA256,SHA512] askpw=any timeout=30}) config=allow=all disable=all enable=hmac-sha1:sha256:rsa-pkcs:rsa:aes128-cbc:tls-version-min=ssl3.0:tls-version-max=ssl3.0 flags=ssl-lock library=/builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so name=RootCerts NSS=trustOrder=100 ****************************** tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #695: Lock in a different ciphersuite that the one the application asks for produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8275 at Wed Oct 18 16:24:57 UTC 2023 kill -USR1 8275 selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8275 killed at Wed Oct 18 16:24:57 UTC 2023 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9997 starting at Wed Oct 18 16:24:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:24:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 8782 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8782 found at Wed Oct 18 16:24:57 UTC 2023 selfserv_9997 with PID 8782 started at Wed Oct 18 16:24:57 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #663: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #664: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #665: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #666: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #667: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #668: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #669: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #670: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #671: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #672: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #673: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #674: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #675: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #676: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #677: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #678: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #679: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #680: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #681: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #682: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #683: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #684: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #685: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #686: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #687: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #688: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #689: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #690: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #691: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #692: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #693: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #694: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #695: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #696: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #697: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #698: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #699: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #700: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #701: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #702: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #703: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #704: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #705: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #706: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #707: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #708: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #709: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #710: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #711: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #712: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #713: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 8782 at Wed Oct 18 16:25:06 UTC 2023 kill -USR1 8782 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8782 killed at Wed Oct 18 16:25:06 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 16:25:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 9334 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9334 found at Wed Oct 18 16:25:06 UTC 2023 selfserv_9997 with PID 9334 started at Wed Oct 18 16:25:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #714: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #715: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #716: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #717: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #718: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #719: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #720: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #721: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #722: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #723: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #724: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #725: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #726: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #727: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #728: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #729: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #730: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #731: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #732: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #733: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #734: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #735: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #736: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #737: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #738: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #739: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #740: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #741: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #742: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #743: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #744: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #745: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #746: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #747: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #748: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #749: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #750: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #751: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #752: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #753: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #754: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #755: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #756: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #757: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #758: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #759: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #760: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #761: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #762: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #763: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #764: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #765: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #766: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #767: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #768: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #769: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #770: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #771: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #772: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #773: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #774: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #775: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #776: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #777: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #778: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #779: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #780: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #781: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #782: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #783: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #784: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #785: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #786: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #787: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #788: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #789: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9334 at Wed Oct 18 16:25:20 UTC 2023 kill -USR1 9334 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9334 killed at Wed Oct 18 16:25:20 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9997 starting at Wed Oct 18 16:25:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10135 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10135 found at Wed Oct 18 16:25:20 UTC 2023 selfserv_9997 with PID 10135 started at Wed Oct 18 16:25:20 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10135 at Wed Oct 18 16:25:21 UTC 2023 kill -USR1 10135 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10135 killed at Wed Oct 18 16:25:21 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:25:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10202 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10202 found at Wed Oct 18 16:25:21 UTC 2023 selfserv_9997 with PID 10202 started at Wed Oct 18 16:25:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #790: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10202 at Wed Oct 18 16:25:22 UTC 2023 kill -USR1 10202 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10202 killed at Wed Oct 18 16:25:22 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:25:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10254 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10254 found at Wed Oct 18 16:25:22 UTC 2023 selfserv_9997 with PID 10254 started at Wed Oct 18 16:25:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10254 at Wed Oct 18 16:25:23 UTC 2023 kill -USR1 10254 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10254 killed at Wed Oct 18 16:25:23 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:25:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10306 found at Wed Oct 18 16:25:23 UTC 2023 selfserv_9997 with PID 10306 started at Wed Oct 18 16:25:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10306 at Wed Oct 18 16:25:24 UTC 2023 kill -USR1 10306 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10306 killed at Wed Oct 18 16:25:24 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:25:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10358 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10358 found at Wed Oct 18 16:25:25 UTC 2023 selfserv_9997 with PID 10358 started at Wed Oct 18 16:25:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #793: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10358 at Wed Oct 18 16:25:26 UTC 2023 kill -USR1 10358 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10358 killed at Wed Oct 18 16:25:26 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:25:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10410 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10410 found at Wed Oct 18 16:25:26 UTC 2023 selfserv_9997 with PID 10410 started at Wed Oct 18 16:25:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #794: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10410 at Wed Oct 18 16:25:27 UTC 2023 kill -USR1 10410 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10410 killed at Wed Oct 18 16:25:27 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:25:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10462 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10462 found at Wed Oct 18 16:25:27 UTC 2023 selfserv_9997 with PID 10462 started at Wed Oct 18 16:25:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10462 at Wed Oct 18 16:25:28 UTC 2023 kill -USR1 10462 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10462 killed at Wed Oct 18 16:25:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:25:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10514 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10514 found at Wed Oct 18 16:25:29 UTC 2023 selfserv_9997 with PID 10514 started at Wed Oct 18 16:25:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10514 at Wed Oct 18 16:25:30 UTC 2023 kill -USR1 10514 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10514 killed at Wed Oct 18 16:25:30 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:25:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10566 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10566 found at Wed Oct 18 16:25:30 UTC 2023 selfserv_9997 with PID 10566 started at Wed Oct 18 16:25:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #797: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10566 at Wed Oct 18 16:25:31 UTC 2023 kill -USR1 10566 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10566 killed at Wed Oct 18 16:25:31 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:25:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10618 found at Wed Oct 18 16:25:31 UTC 2023 selfserv_9997 with PID 10618 started at Wed Oct 18 16:25:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10618 at Wed Oct 18 16:25:32 UTC 2023 kill -USR1 10618 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10618 killed at Wed Oct 18 16:25:32 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:25:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10670 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10670 found at Wed Oct 18 16:25:32 UTC 2023 selfserv_9997 with PID 10670 started at Wed Oct 18 16:25:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #799: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10670 at Wed Oct 18 16:25:33 UTC 2023 kill -USR1 10670 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10670 killed at Wed Oct 18 16:25:33 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:25:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10722 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10722 found at Wed Oct 18 16:25:34 UTC 2023 selfserv_9997 with PID 10722 started at Wed Oct 18 16:25:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10722 at Wed Oct 18 16:25:34 UTC 2023 kill -USR1 10722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10722 killed at Wed Oct 18 16:25:34 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:25:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10774 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10774 found at Wed Oct 18 16:25:35 UTC 2023 selfserv_9997 with PID 10774 started at Wed Oct 18 16:25:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10774 at Wed Oct 18 16:25:36 UTC 2023 kill -USR1 10774 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10774 killed at Wed Oct 18 16:25:36 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:25:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10826 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10826 found at Wed Oct 18 16:25:36 UTC 2023 selfserv_9997 with PID 10826 started at Wed Oct 18 16:25:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #802: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10826 at Wed Oct 18 16:25:37 UTC 2023 kill -USR1 10826 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10826 killed at Wed Oct 18 16:25:37 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:25:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10878 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10878 found at Wed Oct 18 16:25:37 UTC 2023 selfserv_9997 with PID 10878 started at Wed Oct 18 16:25:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10878 at Wed Oct 18 16:25:38 UTC 2023 kill -USR1 10878 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10878 killed at Wed Oct 18 16:25:38 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:25:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10930 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10930 found at Wed Oct 18 16:25:39 UTC 2023 selfserv_9997 with PID 10930 started at Wed Oct 18 16:25:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10930 at Wed Oct 18 16:25:40 UTC 2023 kill -USR1 10930 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10930 killed at Wed Oct 18 16:25:40 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:25:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10982 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10982 found at Wed Oct 18 16:25:40 UTC 2023 selfserv_9997 with PID 10982 started at Wed Oct 18 16:25:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10982 at Wed Oct 18 16:25:41 UTC 2023 kill -USR1 10982 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10982 killed at Wed Oct 18 16:25:41 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:25:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11034 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11034 found at Wed Oct 18 16:25:42 UTC 2023 selfserv_9997 with PID 11034 started at Wed Oct 18 16:25:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #806: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11034 at Wed Oct 18 16:25:42 UTC 2023 kill -USR1 11034 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11034 killed at Wed Oct 18 16:25:42 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:25:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11102 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11102 found at Wed Oct 18 16:25:43 UTC 2023 selfserv_9997 with PID 11102 started at Wed Oct 18 16:25:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11102 at Wed Oct 18 16:25:44 UTC 2023 kill -USR1 11102 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11102 killed at Wed Oct 18 16:25:44 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:25:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11154 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11154 found at Wed Oct 18 16:25:44 UTC 2023 selfserv_9997 with PID 11154 started at Wed Oct 18 16:25:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #808: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11154 at Wed Oct 18 16:25:45 UTC 2023 kill -USR1 11154 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11154 killed at Wed Oct 18 16:25:45 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:25:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11206 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11206 found at Wed Oct 18 16:25:46 UTC 2023 selfserv_9997 with PID 11206 started at Wed Oct 18 16:25:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #809: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11206 at Wed Oct 18 16:25:47 UTC 2023 kill -USR1 11206 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11206 killed at Wed Oct 18 16:25:47 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:25:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11259 found at Wed Oct 18 16:25:47 UTC 2023 selfserv_9997 with PID 11259 started at Wed Oct 18 16:25:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11259 at Wed Oct 18 16:25:48 UTC 2023 kill -USR1 11259 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11259 killed at Wed Oct 18 16:25:48 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:25:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11311 found at Wed Oct 18 16:25:48 UTC 2023 selfserv_9997 with PID 11311 started at Wed Oct 18 16:25:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #811: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11311 at Wed Oct 18 16:25:50 UTC 2023 kill -USR1 11311 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11311 killed at Wed Oct 18 16:25:50 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:25:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11363 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11363 found at Wed Oct 18 16:25:50 UTC 2023 selfserv_9997 with PID 11363 started at Wed Oct 18 16:25:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #812: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11363 at Wed Oct 18 16:25:51 UTC 2023 kill -USR1 11363 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11363 killed at Wed Oct 18 16:25:51 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:25:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11415 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11415 found at Wed Oct 18 16:25:51 UTC 2023 selfserv_9997 with PID 11415 started at Wed Oct 18 16:25:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11415 at Wed Oct 18 16:25:52 UTC 2023 kill -USR1 11415 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11415 killed at Wed Oct 18 16:25:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:25:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11468 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11468 found at Wed Oct 18 16:25:53 UTC 2023 selfserv_9997 with PID 11468 started at Wed Oct 18 16:25:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #814: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11468 at Wed Oct 18 16:25:54 UTC 2023 kill -USR1 11468 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11468 killed at Wed Oct 18 16:25:54 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:25:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11520 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11520 found at Wed Oct 18 16:25:54 UTC 2023 selfserv_9997 with PID 11520 started at Wed Oct 18 16:25:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11520 at Wed Oct 18 16:25:55 UTC 2023 kill -USR1 11520 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11520 killed at Wed Oct 18 16:25:55 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:25:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11572 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11572 found at Wed Oct 18 16:25:55 UTC 2023 selfserv_9997 with PID 11572 started at Wed Oct 18 16:25:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11572 at Wed Oct 18 16:25:56 UTC 2023 kill -USR1 11572 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11572 killed at Wed Oct 18 16:25:56 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:25:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11624 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11624 found at Wed Oct 18 16:25:56 UTC 2023 selfserv_9997 with PID 11624 started at Wed Oct 18 16:25:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #817: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11624 at Wed Oct 18 16:25:58 UTC 2023 kill -USR1 11624 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11624 killed at Wed Oct 18 16:25:58 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:25:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11676 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11676 found at Wed Oct 18 16:25:58 UTC 2023 selfserv_9997 with PID 11676 started at Wed Oct 18 16:25:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #818: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11676 at Wed Oct 18 16:25:59 UTC 2023 kill -USR1 11676 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11676 killed at Wed Oct 18 16:25:59 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:25:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:25:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11728 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11728 found at Wed Oct 18 16:25:59 UTC 2023 selfserv_9997 with PID 11728 started at Wed Oct 18 16:25:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #819: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11728 at Wed Oct 18 16:26:00 UTC 2023 kill -USR1 11728 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11728 killed at Wed Oct 18 16:26:00 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:26:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11780 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11780 found at Wed Oct 18 16:26:00 UTC 2023 selfserv_9997 with PID 11780 started at Wed Oct 18 16:26:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #820: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11780 at Wed Oct 18 16:26:01 UTC 2023 kill -USR1 11780 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11780 killed at Wed Oct 18 16:26:02 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:26:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11832 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11832 found at Wed Oct 18 16:26:02 UTC 2023 selfserv_9997 with PID 11832 started at Wed Oct 18 16:26:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #821: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11832 at Wed Oct 18 16:26:03 UTC 2023 kill -USR1 11832 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11832 killed at Wed Oct 18 16:26:03 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:26:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11884 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11884 found at Wed Oct 18 16:26:03 UTC 2023 selfserv_9997 with PID 11884 started at Wed Oct 18 16:26:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #822: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11884 at Wed Oct 18 16:26:04 UTC 2023 kill -USR1 11884 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11884 killed at Wed Oct 18 16:26:04 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:26:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11936 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11936 found at Wed Oct 18 16:26:04 UTC 2023 selfserv_9997 with PID 11936 started at Wed Oct 18 16:26:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #823: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11936 at Wed Oct 18 16:26:05 UTC 2023 kill -USR1 11936 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11936 killed at Wed Oct 18 16:26:05 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:26:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11988 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11988 found at Wed Oct 18 16:26:06 UTC 2023 selfserv_9997 with PID 11988 started at Wed Oct 18 16:26:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11988 at Wed Oct 18 16:26:07 UTC 2023 kill -USR1 11988 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11988 killed at Wed Oct 18 16:26:07 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:26:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12040 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12040 found at Wed Oct 18 16:26:07 UTC 2023 selfserv_9997 with PID 12040 started at Wed Oct 18 16:26:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12040 at Wed Oct 18 16:26:08 UTC 2023 kill -USR1 12040 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12040 killed at Wed Oct 18 16:26:08 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:26:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12092 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12092 found at Wed Oct 18 16:26:09 UTC 2023 selfserv_9997 with PID 12092 started at Wed Oct 18 16:26:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #826: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12092 at Wed Oct 18 16:26:09 UTC 2023 kill -USR1 12092 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12092 killed at Wed Oct 18 16:26:09 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:26:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12144 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12144 found at Wed Oct 18 16:26:10 UTC 2023 selfserv_9997 with PID 12144 started at Wed Oct 18 16:26:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12144 at Wed Oct 18 16:26:11 UTC 2023 kill -USR1 12144 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12144 killed at Wed Oct 18 16:26:11 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:26:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12196 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12196 found at Wed Oct 18 16:26:11 UTC 2023 selfserv_9997 with PID 12196 started at Wed Oct 18 16:26:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #828: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12196 at Wed Oct 18 16:26:12 UTC 2023 kill -USR1 12196 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12196 killed at Wed Oct 18 16:26:12 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:26:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12248 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12248 found at Wed Oct 18 16:26:12 UTC 2023 selfserv_9997 with PID 12248 started at Wed Oct 18 16:26:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12248 at Wed Oct 18 16:26:13 UTC 2023 kill -USR1 12248 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12248 killed at Wed Oct 18 16:26:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:26:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12300 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12300 found at Wed Oct 18 16:26:13 UTC 2023 selfserv_9997 with PID 12300 started at Wed Oct 18 16:26:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #830: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12300 at Wed Oct 18 16:26:14 UTC 2023 kill -USR1 12300 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12300 killed at Wed Oct 18 16:26:14 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:26:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12352 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12352 found at Wed Oct 18 16:26:14 UTC 2023 selfserv_9997 with PID 12352 started at Wed Oct 18 16:26:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12352 at Wed Oct 18 16:26:15 UTC 2023 kill -USR1 12352 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12352 killed at Wed Oct 18 16:26:15 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:26:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12404 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12404 found at Wed Oct 18 16:26:15 UTC 2023 selfserv_9997 with PID 12404 started at Wed Oct 18 16:26:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #832: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12404 at Wed Oct 18 16:26:16 UTC 2023 kill -USR1 12404 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12404 killed at Wed Oct 18 16:26:16 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:26:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12456 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12456 found at Wed Oct 18 16:26:17 UTC 2023 selfserv_9997 with PID 12456 started at Wed Oct 18 16:26:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #833: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12456 at Wed Oct 18 16:26:18 UTC 2023 kill -USR1 12456 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12456 killed at Wed Oct 18 16:26:18 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:26:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12508 found at Wed Oct 18 16:26:18 UTC 2023 selfserv_9997 with PID 12508 started at Wed Oct 18 16:26:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #834: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12508 at Wed Oct 18 16:26:19 UTC 2023 kill -USR1 12508 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12508 killed at Wed Oct 18 16:26:19 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:26:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12560 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12560 found at Wed Oct 18 16:26:19 UTC 2023 selfserv_9997 with PID 12560 started at Wed Oct 18 16:26:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #835: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12560 at Wed Oct 18 16:26:20 UTC 2023 kill -USR1 12560 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12560 killed at Wed Oct 18 16:26:20 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:26:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12612 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12612 found at Wed Oct 18 16:26:20 UTC 2023 selfserv_9997 with PID 12612 started at Wed Oct 18 16:26:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #836: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12612 at Wed Oct 18 16:26:21 UTC 2023 kill -USR1 12612 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12612 killed at Wed Oct 18 16:26:21 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:26:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12664 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12664 found at Wed Oct 18 16:26:21 UTC 2023 selfserv_9997 with PID 12664 started at Wed Oct 18 16:26:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12664 at Wed Oct 18 16:26:22 UTC 2023 kill -USR1 12664 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12664 killed at Wed Oct 18 16:26:22 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:26:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12716 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12716 found at Wed Oct 18 16:26:23 UTC 2023 selfserv_9997 with PID 12716 started at Wed Oct 18 16:26:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #838: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12716 at Wed Oct 18 16:26:24 UTC 2023 kill -USR1 12716 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12716 killed at Wed Oct 18 16:26:24 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:26:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12768 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12768 found at Wed Oct 18 16:26:24 UTC 2023 selfserv_9997 with PID 12768 started at Wed Oct 18 16:26:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12768 at Wed Oct 18 16:26:25 UTC 2023 kill -USR1 12768 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12768 killed at Wed Oct 18 16:26:25 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:26:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12820 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12820 found at Wed Oct 18 16:26:25 UTC 2023 selfserv_9997 with PID 12820 started at Wed Oct 18 16:26:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #840: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12820 at Wed Oct 18 16:26:26 UTC 2023 kill -USR1 12820 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12820 killed at Wed Oct 18 16:26:26 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:26:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12872 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12872 found at Wed Oct 18 16:26:26 UTC 2023 selfserv_9997 with PID 12872 started at Wed Oct 18 16:26:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12872 at Wed Oct 18 16:26:27 UTC 2023 kill -USR1 12872 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12872 killed at Wed Oct 18 16:26:27 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:26:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12924 found at Wed Oct 18 16:26:27 UTC 2023 selfserv_9997 with PID 12924 started at Wed Oct 18 16:26:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #842: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12924 at Wed Oct 18 16:26:28 UTC 2023 kill -USR1 12924 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12924 killed at Wed Oct 18 16:26:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:26:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12976 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12976 found at Wed Oct 18 16:26:29 UTC 2023 selfserv_9997 with PID 12976 started at Wed Oct 18 16:26:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12976 at Wed Oct 18 16:26:30 UTC 2023 kill -USR1 12976 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12976 killed at Wed Oct 18 16:26:30 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:26:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13028 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13028 found at Wed Oct 18 16:26:30 UTC 2023 selfserv_9997 with PID 13028 started at Wed Oct 18 16:26:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #844: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13028 at Wed Oct 18 16:26:31 UTC 2023 kill -USR1 13028 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13028 killed at Wed Oct 18 16:26:31 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:26:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13080 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13080 found at Wed Oct 18 16:26:31 UTC 2023 selfserv_9997 with PID 13080 started at Wed Oct 18 16:26:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #845: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13080 at Wed Oct 18 16:26:32 UTC 2023 kill -USR1 13080 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13080 killed at Wed Oct 18 16:26:32 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:26:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13132 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13132 found at Wed Oct 18 16:26:32 UTC 2023 selfserv_9997 with PID 13132 started at Wed Oct 18 16:26:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #846: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13132 at Wed Oct 18 16:26:34 UTC 2023 kill -USR1 13132 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13132 killed at Wed Oct 18 16:26:34 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:26:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13184 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13184 found at Wed Oct 18 16:26:34 UTC 2023 selfserv_9997 with PID 13184 started at Wed Oct 18 16:26:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #847: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13184 at Wed Oct 18 16:26:35 UTC 2023 kill -USR1 13184 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13184 killed at Wed Oct 18 16:26:35 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 16:26:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13242 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13242 found at Wed Oct 18 16:26:35 UTC 2023 selfserv_9997 with PID 13242 started at Wed Oct 18 16:26:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #848: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13242 at Wed Oct 18 16:26:36 UTC 2023 kill -USR1 13242 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13242 killed at Wed Oct 18 16:26:36 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 16:26:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13300 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13300 found at Wed Oct 18 16:26:37 UTC 2023 selfserv_9997 with PID 13300 started at Wed Oct 18 16:26:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #849: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13300 at Wed Oct 18 16:26:38 UTC 2023 kill -USR1 13300 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13300 killed at Wed Oct 18 16:26:38 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 16:26:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13358 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13358 found at Wed Oct 18 16:26:38 UTC 2023 selfserv_9997 with PID 13358 started at Wed Oct 18 16:26:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #850: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13358 at Wed Oct 18 16:26:39 UTC 2023 kill -USR1 13358 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13358 killed at Wed Oct 18 16:26:39 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 16:26:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13416 found at Wed Oct 18 16:26:39 UTC 2023 selfserv_9997 with PID 13416 started at Wed Oct 18 16:26:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #851: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13416 at Wed Oct 18 16:26:40 UTC 2023 kill -USR1 13416 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13416 killed at Wed Oct 18 16:26:40 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9997 starting at Wed Oct 18 16:26:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13474 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13474 found at Wed Oct 18 16:26:41 UTC 2023 selfserv_9997 with PID 13474 started at Wed Oct 18 16:26:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #852: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13474 at Wed Oct 18 16:26:41 UTC 2023 kill -USR1 13474 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13474 killed at Wed Oct 18 16:26:41 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 16:26:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13532 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13532 found at Wed Oct 18 16:26:42 UTC 2023 selfserv_9997 with PID 13532 started at Wed Oct 18 16:26:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #853: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13532 at Wed Oct 18 16:26:43 UTC 2023 kill -USR1 13532 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13532 killed at Wed Oct 18 16:26:43 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 16:26:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13605 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13605 found at Wed Oct 18 16:26:43 UTC 2023 selfserv_9997 with PID 13605 started at Wed Oct 18 16:26:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #854: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13605 at Wed Oct 18 16:26:45 UTC 2023 kill -USR1 13605 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13605 killed at Wed Oct 18 16:26:45 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9997 starting at Wed Oct 18 16:26:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13663 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13663 found at Wed Oct 18 16:26:45 UTC 2023 selfserv_9997 with PID 13663 started at Wed Oct 18 16:26:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #855: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13663 at Wed Oct 18 16:26:46 UTC 2023 kill -USR1 13663 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13663 killed at Wed Oct 18 16:26:46 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9997 starting at Wed Oct 18 16:26:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13721 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13721 found at Wed Oct 18 16:26:46 UTC 2023 selfserv_9997 with PID 13721 started at Wed Oct 18 16:26:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #856: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13721 at Wed Oct 18 16:26:47 UTC 2023 kill -USR1 13721 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13721 killed at Wed Oct 18 16:26:47 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 16:26:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13779 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13779 found at Wed Oct 18 16:26:47 UTC 2023 selfserv_9997 with PID 13779 started at Wed Oct 18 16:26:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #857: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13779 at Wed Oct 18 16:26:48 UTC 2023 kill -USR1 13779 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13779 killed at Wed Oct 18 16:26:48 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9997 starting at Wed Oct 18 16:26:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13821 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13821 found at Wed Oct 18 16:26:48 UTC 2023 selfserv_9997 with PID 13821 started at Wed Oct 18 16:26:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #790: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13821 at Wed Oct 18 16:26:49 UTC 2023 kill -USR1 13821 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13821 killed at Wed Oct 18 16:26:49 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9997 starting at Wed Oct 18 16:26:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13863 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13863 found at Wed Oct 18 16:26:50 UTC 2023 selfserv_9997 with PID 13863 started at Wed Oct 18 16:26:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #791: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9997 with PID 13863 at Wed Oct 18 16:26:51 UTC 2023 kill -USR1 13863 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13863 killed at Wed Oct 18 16:26:51 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9997 starting at Wed Oct 18 16:26:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13905 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13905 found at Wed Oct 18 16:26:51 UTC 2023 selfserv_9997 with PID 13905 started at Wed Oct 18 16:26:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #792: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 13905 at Wed Oct 18 16:26:52 UTC 2023 kill -USR1 13905 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13905 killed at Wed Oct 18 16:26:52 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9997 starting at Wed Oct 18 16:26:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13947 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13947 found at Wed Oct 18 16:26:52 UTC 2023 selfserv_9997 with PID 13947 started at Wed Oct 18 16:26:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #793: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 13947 at Wed Oct 18 16:26:53 UTC 2023 kill -USR1 13947 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13947 killed at Wed Oct 18 16:26:53 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9997 starting at Wed Oct 18 16:26:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13989 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13989 found at Wed Oct 18 16:26:53 UTC 2023 selfserv_9997 with PID 13989 started at Wed Oct 18 16:26:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #794: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 13989 at Wed Oct 18 16:26:54 UTC 2023 kill -USR1 13989 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13989 killed at Wed Oct 18 16:26:54 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9997 starting at Wed Oct 18 16:26:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14031 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14031 found at Wed Oct 18 16:26:54 UTC 2023 selfserv_9997 with PID 14031 started at Wed Oct 18 16:26:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #795: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 14031 at Wed Oct 18 16:26:55 UTC 2023 kill -USR1 14031 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14031 killed at Wed Oct 18 16:26:55 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9997 starting at Wed Oct 18 16:26:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14074 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14074 found at Wed Oct 18 16:26:55 UTC 2023 selfserv_9997 with PID 14074 started at Wed Oct 18 16:26:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #796: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 14074 at Wed Oct 18 16:26:56 UTC 2023 kill -USR1 14074 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14074 killed at Wed Oct 18 16:26:56 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9997 starting at Wed Oct 18 16:26:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:26:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14116 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14116 found at Wed Oct 18 16:26:56 UTC 2023 selfserv_9997 with PID 14116 started at Wed Oct 18 16:26:56 UTC 2023 strsclnt -q -p 9997 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 16:26:56 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 16:27:13 UTC 2023 ssl.sh: #797: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9997 with PID 14116 at Wed Oct 18 16:27:13 UTC 2023 kill -USR1 14116 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14116 killed at Wed Oct 18 16:27:13 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 16:27:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14167 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14167 found at Wed Oct 18 16:27:13 UTC 2023 selfserv_9997 with PID 14167 started at Wed Oct 18 16:27:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14167 at Wed Oct 18 16:27:14 UTC 2023 kill -USR1 14167 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14167 killed at Wed Oct 18 16:27:14 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:27:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14209 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14209 found at Wed Oct 18 16:27:14 UTC 2023 selfserv_9997 with PID 14209 started at Wed Oct 18 16:27:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #799: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14209 at Wed Oct 18 16:27:14 UTC 2023 kill -USR1 14209 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14209 killed at Wed Oct 18 16:27:14 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:27:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14248 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14248 found at Wed Oct 18 16:27:15 UTC 2023 selfserv_9997 with PID 14248 started at Wed Oct 18 16:27:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #800: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 14248 at Wed Oct 18 16:27:15 UTC 2023 kill -USR1 14248 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14248 killed at Wed Oct 18 16:27:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:27:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14288 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14288 found at Wed Oct 18 16:27:15 UTC 2023 selfserv_9997 with PID 14288 started at Wed Oct 18 16:27:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #801: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14288 at Wed Oct 18 16:27:16 UTC 2023 kill -USR1 14288 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14288 killed at Wed Oct 18 16:27:16 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:27:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14327 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14327 found at Wed Oct 18 16:27:16 UTC 2023 selfserv_9997 with PID 14327 started at Wed Oct 18 16:27:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #802: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 14327 at Wed Oct 18 16:27:17 UTC 2023 kill -USR1 14327 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14327 killed at Wed Oct 18 16:27:17 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:27:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14366 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14366 found at Wed Oct 18 16:27:17 UTC 2023 selfserv_9997 with PID 14366 started at Wed Oct 18 16:27:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #803: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14366 at Wed Oct 18 16:27:17 UTC 2023 kill -USR1 14366 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14366 killed at Wed Oct 18 16:27:17 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:27:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14405 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14405 found at Wed Oct 18 16:27:18 UTC 2023 selfserv_9997 with PID 14405 started at Wed Oct 18 16:27:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #804: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14405 at Wed Oct 18 16:27:18 UTC 2023 kill -USR1 14405 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14405 killed at Wed Oct 18 16:27:18 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:27:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14444 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14444 found at Wed Oct 18 16:27:18 UTC 2023 selfserv_9997 with PID 14444 started at Wed Oct 18 16:27:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #805: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14444 at Wed Oct 18 16:27:19 UTC 2023 kill -USR1 14444 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14444 killed at Wed Oct 18 16:27:19 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:27:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14483 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14483 found at Wed Oct 18 16:27:19 UTC 2023 selfserv_9997 with PID 14483 started at Wed Oct 18 16:27:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #806: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14483 at Wed Oct 18 16:27:20 UTC 2023 kill -USR1 14483 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14483 killed at Wed Oct 18 16:27:20 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:27:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14522 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14522 found at Wed Oct 18 16:27:20 UTC 2023 selfserv_9997 with PID 14522 started at Wed Oct 18 16:27:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14522 at Wed Oct 18 16:27:20 UTC 2023 kill -USR1 14522 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14522 killed at Wed Oct 18 16:27:20 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:27:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14561 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14561 found at Wed Oct 18 16:27:21 UTC 2023 selfserv_9997 with PID 14561 started at Wed Oct 18 16:27:21 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #808: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14561 at Wed Oct 18 16:27:21 UTC 2023 kill -USR1 14561 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14561 killed at Wed Oct 18 16:27:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:27:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14601 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14601 found at Wed Oct 18 16:27:21 UTC 2023 selfserv_9997 with PID 14601 started at Wed Oct 18 16:27:21 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #809: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14601 at Wed Oct 18 16:27:22 UTC 2023 kill -USR1 14601 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14601 killed at Wed Oct 18 16:27:22 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:27:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14641 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14641 found at Wed Oct 18 16:27:22 UTC 2023 selfserv_9997 with PID 14641 started at Wed Oct 18 16:27:22 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #810: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14641 at Wed Oct 18 16:27:23 UTC 2023 kill -USR1 14641 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14641 killed at Wed Oct 18 16:27:23 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:27:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14681 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14681 found at Wed Oct 18 16:27:23 UTC 2023 selfserv_9997 with PID 14681 started at Wed Oct 18 16:27:23 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #811: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14681 at Wed Oct 18 16:27:23 UTC 2023 kill -USR1 14681 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14681 killed at Wed Oct 18 16:27:24 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:27:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14722 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14722 found at Wed Oct 18 16:27:24 UTC 2023 selfserv_9997 with PID 14722 started at Wed Oct 18 16:27:24 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #812: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14722 at Wed Oct 18 16:27:24 UTC 2023 kill -USR1 14722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14722 killed at Wed Oct 18 16:27:24 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:27:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14762 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14762 found at Wed Oct 18 16:27:24 UTC 2023 selfserv_9997 with PID 14762 started at Wed Oct 18 16:27:24 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #813: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14762 at Wed Oct 18 16:27:25 UTC 2023 kill -USR1 14762 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14762 killed at Wed Oct 18 16:27:25 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:27:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14802 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14802 found at Wed Oct 18 16:27:25 UTC 2023 selfserv_9997 with PID 14802 started at Wed Oct 18 16:27:25 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #814: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14802 at Wed Oct 18 16:27:26 UTC 2023 kill -USR1 14802 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14802 killed at Wed Oct 18 16:27:26 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:27:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14842 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14842 found at Wed Oct 18 16:27:26 UTC 2023 selfserv_9997 with PID 14842 started at Wed Oct 18 16:27:26 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #815: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14842 at Wed Oct 18 16:27:27 UTC 2023 kill -USR1 14842 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14842 killed at Wed Oct 18 16:27:27 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:27:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14882 found at Wed Oct 18 16:27:27 UTC 2023 selfserv_9997 with PID 14882 started at Wed Oct 18 16:27:27 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #816: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14882 at Wed Oct 18 16:27:27 UTC 2023 kill -USR1 14882 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14882 killed at Wed Oct 18 16:27:27 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9997 starting at Wed Oct 18 16:27:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 14922 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14922 found at Wed Oct 18 16:27:28 UTC 2023 selfserv_9997 with PID 14922 started at Wed Oct 18 16:27:28 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #817: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #818: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #819: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #820: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #821: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #822: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #823: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #824: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #825: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #826: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #827: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #828: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #829: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #830: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #831: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #832: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #833: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #834: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #835: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #836: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #837: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #838: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #839: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #840: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #841: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #842: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #843: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #844: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #845: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #846: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #847: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #848: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #849: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #850: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #851: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #852: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #853: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #854: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #855: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #856: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #857: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #858: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #859: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #860: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #861: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #862: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #863: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #864: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #865: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #866: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #867: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 14922 at Wed Oct 18 16:27:37 UTC 2023 kill -USR1 14922 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14922 killed at Wed Oct 18 16:27:37 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 16:27:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 15474 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15474 found at Wed Oct 18 16:27:37 UTC 2023 selfserv_9997 with PID 15474 started at Wed Oct 18 16:27:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #868: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #869: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #870: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #871: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #872: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #873: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #874: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #875: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #876: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #877: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #878: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #879: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #880: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #881: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #882: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #883: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #884: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #885: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #886: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #887: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #888: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #889: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #890: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #891: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #892: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #893: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #894: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #895: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #896: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #897: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #898: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #899: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #900: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #901: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #902: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #903: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #904: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #905: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #906: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #907: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #908: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #909: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #910: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #911: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #912: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #913: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #914: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #915: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #916: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #917: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #918: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #919: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #920: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #921: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #922: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #923: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #924: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #925: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #926: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #927: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #928: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #929: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #930: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #931: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #932: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #933: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #934: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #935: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #936: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #937: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #938: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #939: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #940: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #941: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #942: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #943: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15474 at Wed Oct 18 16:27:50 UTC 2023 kill -USR1 15474 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15474 killed at Wed Oct 18 16:27:50 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:27:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16300 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16300 found at Wed Oct 18 16:27:51 UTC 2023 selfserv_9997 with PID 16300 started at Wed Oct 18 16:27:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16300 at Wed Oct 18 16:27:52 UTC 2023 kill -USR1 16300 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16300 killed at Wed Oct 18 16:27:53 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:27:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16352 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16352 found at Wed Oct 18 16:27:53 UTC 2023 selfserv_9997 with PID 16352 started at Wed Oct 18 16:27:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16352 at Wed Oct 18 16:27:55 UTC 2023 kill -USR1 16352 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16352 killed at Wed Oct 18 16:27:55 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:27:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16405 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16405 found at Wed Oct 18 16:27:55 UTC 2023 selfserv_9997 with PID 16405 started at Wed Oct 18 16:27:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #946: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16405 at Wed Oct 18 16:27:57 UTC 2023 kill -USR1 16405 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16405 killed at Wed Oct 18 16:27:57 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:27:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16457 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16457 found at Wed Oct 18 16:27:58 UTC 2023 selfserv_9997 with PID 16457 started at Wed Oct 18 16:27:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #947: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16457 at Wed Oct 18 16:27:59 UTC 2023 kill -USR1 16457 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16457 killed at Wed Oct 18 16:27:59 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:27:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:27:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16509 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16509 found at Wed Oct 18 16:28:00 UTC 2023 selfserv_9997 with PID 16509 started at Wed Oct 18 16:28:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #948: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16509 at Wed Oct 18 16:28:01 UTC 2023 kill -USR1 16509 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16509 killed at Wed Oct 18 16:28:01 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:28:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16561 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16561 found at Wed Oct 18 16:28:02 UTC 2023 selfserv_9997 with PID 16561 started at Wed Oct 18 16:28:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16561 at Wed Oct 18 16:28:04 UTC 2023 kill -USR1 16561 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16561 killed at Wed Oct 18 16:28:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:28:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16613 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16613 found at Wed Oct 18 16:28:04 UTC 2023 selfserv_9997 with PID 16613 started at Wed Oct 18 16:28:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16613 at Wed Oct 18 16:28:06 UTC 2023 kill -USR1 16613 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16613 killed at Wed Oct 18 16:28:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:28:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16665 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16665 found at Wed Oct 18 16:28:06 UTC 2023 selfserv_9997 with PID 16665 started at Wed Oct 18 16:28:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16665 at Wed Oct 18 16:28:08 UTC 2023 kill -USR1 16665 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16665 killed at Wed Oct 18 16:28:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:28:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16717 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16717 found at Wed Oct 18 16:28:09 UTC 2023 selfserv_9997 with PID 16717 started at Wed Oct 18 16:28:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16717 at Wed Oct 18 16:28:11 UTC 2023 kill -USR1 16717 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16717 killed at Wed Oct 18 16:28:11 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:28:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16769 found at Wed Oct 18 16:28:11 UTC 2023 selfserv_9997 with PID 16769 started at Wed Oct 18 16:28:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #953: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16769 at Wed Oct 18 16:28:13 UTC 2023 kill -USR1 16769 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16769 killed at Wed Oct 18 16:28:13 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:28:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16821 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16821 found at Wed Oct 18 16:28:13 UTC 2023 selfserv_9997 with PID 16821 started at Wed Oct 18 16:28:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #954: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16821 at Wed Oct 18 16:28:15 UTC 2023 kill -USR1 16821 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16821 killed at Wed Oct 18 16:28:15 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:28:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16873 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16873 found at Wed Oct 18 16:28:16 UTC 2023 selfserv_9997 with PID 16873 started at Wed Oct 18 16:28:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #955: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16873 at Wed Oct 18 16:28:18 UTC 2023 kill -USR1 16873 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16873 killed at Wed Oct 18 16:28:18 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:28:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16925 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16925 found at Wed Oct 18 16:28:18 UTC 2023 selfserv_9997 with PID 16925 started at Wed Oct 18 16:28:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #956: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16925 at Wed Oct 18 16:28:20 UTC 2023 kill -USR1 16925 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16925 killed at Wed Oct 18 16:28:20 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:28:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16977 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16977 found at Wed Oct 18 16:28:20 UTC 2023 selfserv_9997 with PID 16977 started at Wed Oct 18 16:28:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #957: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16977 at Wed Oct 18 16:28:22 UTC 2023 kill -USR1 16977 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16977 killed at Wed Oct 18 16:28:22 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:28:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17029 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17029 found at Wed Oct 18 16:28:22 UTC 2023 selfserv_9997 with PID 17029 started at Wed Oct 18 16:28:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #958: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17029 at Wed Oct 18 16:28:25 UTC 2023 kill -USR1 17029 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17029 killed at Wed Oct 18 16:28:25 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:28:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17081 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17081 found at Wed Oct 18 16:28:25 UTC 2023 selfserv_9997 with PID 17081 started at Wed Oct 18 16:28:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #959: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17081 at Wed Oct 18 16:28:27 UTC 2023 kill -USR1 17081 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17081 killed at Wed Oct 18 16:28:27 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:28:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17133 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17133 found at Wed Oct 18 16:28:27 UTC 2023 selfserv_9997 with PID 17133 started at Wed Oct 18 16:28:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #960: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17133 at Wed Oct 18 16:28:29 UTC 2023 kill -USR1 17133 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17133 killed at Wed Oct 18 16:28:29 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:28:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17185 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17185 found at Wed Oct 18 16:28:29 UTC 2023 selfserv_9997 with PID 17185 started at Wed Oct 18 16:28:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #961: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17185 at Wed Oct 18 16:28:32 UTC 2023 kill -USR1 17185 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17185 killed at Wed Oct 18 16:28:32 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:28:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17237 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17237 found at Wed Oct 18 16:28:32 UTC 2023 selfserv_9997 with PID 17237 started at Wed Oct 18 16:28:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #962: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17237 at Wed Oct 18 16:28:34 UTC 2023 kill -USR1 17237 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17237 killed at Wed Oct 18 16:28:34 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:28:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17289 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17289 found at Wed Oct 18 16:28:34 UTC 2023 selfserv_9997 with PID 17289 started at Wed Oct 18 16:28:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #963: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17289 at Wed Oct 18 16:28:36 UTC 2023 kill -USR1 17289 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17289 killed at Wed Oct 18 16:28:36 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:28:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17341 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17341 found at Wed Oct 18 16:28:36 UTC 2023 selfserv_9997 with PID 17341 started at Wed Oct 18 16:28:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #964: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17341 at Wed Oct 18 16:28:39 UTC 2023 kill -USR1 17341 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17341 killed at Wed Oct 18 16:28:39 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:28:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17393 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17393 found at Wed Oct 18 16:28:39 UTC 2023 selfserv_9997 with PID 17393 started at Wed Oct 18 16:28:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #965: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17393 at Wed Oct 18 16:28:41 UTC 2023 kill -USR1 17393 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17393 killed at Wed Oct 18 16:28:41 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:28:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17445 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17445 found at Wed Oct 18 16:28:41 UTC 2023 selfserv_9997 with PID 17445 started at Wed Oct 18 16:28:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #966: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17445 at Wed Oct 18 16:28:43 UTC 2023 kill -USR1 17445 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17445 killed at Wed Oct 18 16:28:43 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:28:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17512 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17512 found at Wed Oct 18 16:28:43 UTC 2023 selfserv_9997 with PID 17512 started at Wed Oct 18 16:28:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #967: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17512 at Wed Oct 18 16:28:46 UTC 2023 kill -USR1 17512 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17512 killed at Wed Oct 18 16:28:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:28:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17564 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17564 found at Wed Oct 18 16:28:46 UTC 2023 selfserv_9997 with PID 17564 started at Wed Oct 18 16:28:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #968: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17564 at Wed Oct 18 16:28:48 UTC 2023 kill -USR1 17564 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17564 killed at Wed Oct 18 16:28:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:28:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17616 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17616 found at Wed Oct 18 16:28:48 UTC 2023 selfserv_9997 with PID 17616 started at Wed Oct 18 16:28:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #969: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17616 at Wed Oct 18 16:28:50 UTC 2023 kill -USR1 17616 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17616 killed at Wed Oct 18 16:28:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:28:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17669 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17669 found at Wed Oct 18 16:28:50 UTC 2023 selfserv_9997 with PID 17669 started at Wed Oct 18 16:28:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #970: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17669 at Wed Oct 18 16:28:53 UTC 2023 kill -USR1 17669 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17669 killed at Wed Oct 18 16:28:53 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:28:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17723 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17723 found at Wed Oct 18 16:28:53 UTC 2023 selfserv_9997 with PID 17723 started at Wed Oct 18 16:28:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #971: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17723 at Wed Oct 18 16:28:55 UTC 2023 kill -USR1 17723 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17723 killed at Wed Oct 18 16:28:55 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:28:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17775 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17775 found at Wed Oct 18 16:28:55 UTC 2023 selfserv_9997 with PID 17775 started at Wed Oct 18 16:28:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #972: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17775 at Wed Oct 18 16:28:57 UTC 2023 kill -USR1 17775 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17775 killed at Wed Oct 18 16:28:57 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:28:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:28:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17829 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17829 found at Wed Oct 18 16:28:58 UTC 2023 selfserv_9997 with PID 17829 started at Wed Oct 18 16:28:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #973: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17829 at Wed Oct 18 16:29:00 UTC 2023 kill -USR1 17829 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17829 killed at Wed Oct 18 16:29:00 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:29:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17881 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17881 found at Wed Oct 18 16:29:00 UTC 2023 selfserv_9997 with PID 17881 started at Wed Oct 18 16:29:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #974: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17881 at Wed Oct 18 16:29:03 UTC 2023 kill -USR1 17881 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17881 killed at Wed Oct 18 16:29:03 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:29:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17933 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17933 found at Wed Oct 18 16:29:03 UTC 2023 selfserv_9997 with PID 17933 started at Wed Oct 18 16:29:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #975: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17933 at Wed Oct 18 16:29:06 UTC 2023 kill -USR1 17933 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17933 killed at Wed Oct 18 16:29:06 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:29:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17985 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17985 found at Wed Oct 18 16:29:06 UTC 2023 selfserv_9997 with PID 17985 started at Wed Oct 18 16:29:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #976: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17985 at Wed Oct 18 16:29:08 UTC 2023 kill -USR1 17985 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17985 killed at Wed Oct 18 16:29:08 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:29:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18037 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18037 found at Wed Oct 18 16:29:08 UTC 2023 selfserv_9997 with PID 18037 started at Wed Oct 18 16:29:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #977: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18037 at Wed Oct 18 16:29:10 UTC 2023 kill -USR1 18037 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18037 killed at Wed Oct 18 16:29:10 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:29:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18089 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18089 found at Wed Oct 18 16:29:10 UTC 2023 selfserv_9997 with PID 18089 started at Wed Oct 18 16:29:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #978: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18089 at Wed Oct 18 16:29:12 UTC 2023 kill -USR1 18089 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18089 killed at Wed Oct 18 16:29:12 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:29:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18141 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18141 found at Wed Oct 18 16:29:13 UTC 2023 selfserv_9997 with PID 18141 started at Wed Oct 18 16:29:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #979: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18141 at Wed Oct 18 16:29:15 UTC 2023 kill -USR1 18141 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18141 killed at Wed Oct 18 16:29:15 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:29:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18193 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18193 found at Wed Oct 18 16:29:15 UTC 2023 selfserv_9997 with PID 18193 started at Wed Oct 18 16:29:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #980: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18193 at Wed Oct 18 16:29:17 UTC 2023 kill -USR1 18193 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18193 killed at Wed Oct 18 16:29:17 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:29:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18245 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18245 found at Wed Oct 18 16:29:18 UTC 2023 selfserv_9997 with PID 18245 started at Wed Oct 18 16:29:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #981: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18245 at Wed Oct 18 16:29:20 UTC 2023 kill -USR1 18245 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18245 killed at Wed Oct 18 16:29:20 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:29:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18297 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18297 found at Wed Oct 18 16:29:20 UTC 2023 selfserv_9997 with PID 18297 started at Wed Oct 18 16:29:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #982: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18297 at Wed Oct 18 16:29:22 UTC 2023 kill -USR1 18297 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18297 killed at Wed Oct 18 16:29:22 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:29:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18349 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18349 found at Wed Oct 18 16:29:22 UTC 2023 selfserv_9997 with PID 18349 started at Wed Oct 18 16:29:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #983: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18349 at Wed Oct 18 16:29:24 UTC 2023 kill -USR1 18349 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18349 killed at Wed Oct 18 16:29:24 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:29:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18401 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18401 found at Wed Oct 18 16:29:24 UTC 2023 selfserv_9997 with PID 18401 started at Wed Oct 18 16:29:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #984: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18401 at Wed Oct 18 16:29:26 UTC 2023 kill -USR1 18401 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18401 killed at Wed Oct 18 16:29:26 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:29:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18453 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18453 found at Wed Oct 18 16:29:27 UTC 2023 selfserv_9997 with PID 18453 started at Wed Oct 18 16:29:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #985: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18453 at Wed Oct 18 16:29:29 UTC 2023 kill -USR1 18453 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18453 killed at Wed Oct 18 16:29:29 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:29:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18505 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18505 found at Wed Oct 18 16:29:29 UTC 2023 selfserv_9997 with PID 18505 started at Wed Oct 18 16:29:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #986: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18505 at Wed Oct 18 16:29:31 UTC 2023 kill -USR1 18505 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18505 killed at Wed Oct 18 16:29:31 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:29:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18557 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18557 found at Wed Oct 18 16:29:31 UTC 2023 selfserv_9997 with PID 18557 started at Wed Oct 18 16:29:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #987: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18557 at Wed Oct 18 16:29:33 UTC 2023 kill -USR1 18557 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18557 killed at Wed Oct 18 16:29:33 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:29:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18609 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18609 found at Wed Oct 18 16:29:34 UTC 2023 selfserv_9997 with PID 18609 started at Wed Oct 18 16:29:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #988: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18609 at Wed Oct 18 16:29:35 UTC 2023 kill -USR1 18609 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18609 killed at Wed Oct 18 16:29:35 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:29:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18662 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18662 found at Wed Oct 18 16:29:36 UTC 2023 selfserv_9997 with PID 18662 started at Wed Oct 18 16:29:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #989: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18662 at Wed Oct 18 16:29:38 UTC 2023 kill -USR1 18662 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18662 killed at Wed Oct 18 16:29:38 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:29:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18714 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18714 found at Wed Oct 18 16:29:38 UTC 2023 selfserv_9997 with PID 18714 started at Wed Oct 18 16:29:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #990: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18714 at Wed Oct 18 16:29:40 UTC 2023 kill -USR1 18714 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18714 killed at Wed Oct 18 16:29:40 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:29:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18766 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18766 found at Wed Oct 18 16:29:40 UTC 2023 selfserv_9997 with PID 18766 started at Wed Oct 18 16:29:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #991: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18766 at Wed Oct 18 16:29:43 UTC 2023 kill -USR1 18766 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18766 killed at Wed Oct 18 16:29:43 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:29:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18834 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18834 found at Wed Oct 18 16:29:43 UTC 2023 selfserv_9997 with PID 18834 started at Wed Oct 18 16:29:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #992: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18834 at Wed Oct 18 16:29:45 UTC 2023 kill -USR1 18834 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18834 killed at Wed Oct 18 16:29:45 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:29:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18886 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18886 found at Wed Oct 18 16:29:45 UTC 2023 selfserv_9997 with PID 18886 started at Wed Oct 18 16:29:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #993: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18886 at Wed Oct 18 16:29:47 UTC 2023 kill -USR1 18886 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18886 killed at Wed Oct 18 16:29:47 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:29:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18938 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18938 found at Wed Oct 18 16:29:47 UTC 2023 selfserv_9997 with PID 18938 started at Wed Oct 18 16:29:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #994: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18938 at Wed Oct 18 16:29:49 UTC 2023 kill -USR1 18938 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18938 killed at Wed Oct 18 16:29:49 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:29:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18990 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18990 found at Wed Oct 18 16:29:50 UTC 2023 selfserv_9997 with PID 18990 started at Wed Oct 18 16:29:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #995: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18990 at Wed Oct 18 16:29:52 UTC 2023 kill -USR1 18990 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18990 killed at Wed Oct 18 16:29:52 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:29:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19042 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19042 found at Wed Oct 18 16:29:52 UTC 2023 selfserv_9997 with PID 19042 started at Wed Oct 18 16:29:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #996: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19042 at Wed Oct 18 16:29:54 UTC 2023 kill -USR1 19042 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19042 killed at Wed Oct 18 16:29:54 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:29:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19094 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19094 found at Wed Oct 18 16:29:54 UTC 2023 selfserv_9997 with PID 19094 started at Wed Oct 18 16:29:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #997: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19094 at Wed Oct 18 16:29:56 UTC 2023 kill -USR1 19094 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19094 killed at Wed Oct 18 16:29:56 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:29:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19146 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19146 found at Wed Oct 18 16:29:57 UTC 2023 selfserv_9997 with PID 19146 started at Wed Oct 18 16:29:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #998: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19146 at Wed Oct 18 16:29:59 UTC 2023 kill -USR1 19146 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19146 killed at Wed Oct 18 16:29:59 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:29:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:29:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19198 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19198 found at Wed Oct 18 16:29:59 UTC 2023 selfserv_9997 with PID 19198 started at Wed Oct 18 16:29:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #999: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19198 at Wed Oct 18 16:30:01 UTC 2023 kill -USR1 19198 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19198 killed at Wed Oct 18 16:30:01 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:30:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19250 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19250 found at Wed Oct 18 16:30:01 UTC 2023 selfserv_9997 with PID 19250 started at Wed Oct 18 16:30:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1000: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19250 at Wed Oct 18 16:30:04 UTC 2023 kill -USR1 19250 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19250 killed at Wed Oct 18 16:30:04 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:30:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19359 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19359 found at Wed Oct 18 16:30:04 UTC 2023 selfserv_9997 with PID 19359 started at Wed Oct 18 16:30:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1001: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19359 at Wed Oct 18 16:30:06 UTC 2023 kill -USR1 19359 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19359 killed at Wed Oct 18 16:30:06 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 16:30:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19441 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19441 found at Wed Oct 18 16:30:06 UTC 2023 selfserv_9997 with PID 19441 started at Wed Oct 18 16:30:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #944: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19441 at Wed Oct 18 16:30:08 UTC 2023 kill -USR1 19441 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19441 killed at Wed Oct 18 16:30:08 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:30:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19483 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19483 found at Wed Oct 18 16:30:08 UTC 2023 selfserv_9997 with PID 19483 started at Wed Oct 18 16:30:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #945: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19483 at Wed Oct 18 16:30:09 UTC 2023 kill -USR1 19483 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19483 killed at Wed Oct 18 16:30:09 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:30:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19522 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19522 found at Wed Oct 18 16:30:09 UTC 2023 selfserv_9997 with PID 19522 started at Wed Oct 18 16:30:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #946: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 19522 at Wed Oct 18 16:30:10 UTC 2023 kill -USR1 19522 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19522 killed at Wed Oct 18 16:30:10 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:30:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19561 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19561 found at Wed Oct 18 16:30:10 UTC 2023 selfserv_9997 with PID 19561 started at Wed Oct 18 16:30:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #947: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19561 at Wed Oct 18 16:30:11 UTC 2023 kill -USR1 19561 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19561 killed at Wed Oct 18 16:30:11 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:30:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19600 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19600 found at Wed Oct 18 16:30:12 UTC 2023 selfserv_9997 with PID 19600 started at Wed Oct 18 16:30:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #948: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 19600 at Wed Oct 18 16:30:13 UTC 2023 kill -USR1 19600 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19600 killed at Wed Oct 18 16:30:13 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:30:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19639 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19639 found at Wed Oct 18 16:30:13 UTC 2023 selfserv_9997 with PID 19639 started at Wed Oct 18 16:30:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #949: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19639 at Wed Oct 18 16:30:14 UTC 2023 kill -USR1 19639 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19639 killed at Wed Oct 18 16:30:14 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:30:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19678 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19678 found at Wed Oct 18 16:30:14 UTC 2023 selfserv_9997 with PID 19678 started at Wed Oct 18 16:30:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #950: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19678 at Wed Oct 18 16:30:15 UTC 2023 kill -USR1 19678 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19678 killed at Wed Oct 18 16:30:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:30:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19717 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19717 found at Wed Oct 18 16:30:15 UTC 2023 selfserv_9997 with PID 19717 started at Wed Oct 18 16:30:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #951: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19717 at Wed Oct 18 16:30:16 UTC 2023 kill -USR1 19717 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19717 killed at Wed Oct 18 16:30:16 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:30:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19756 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19756 found at Wed Oct 18 16:30:16 UTC 2023 selfserv_9997 with PID 19756 started at Wed Oct 18 16:30:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #952: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19756 at Wed Oct 18 16:30:17 UTC 2023 kill -USR1 19756 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19756 killed at Wed Oct 18 16:30:17 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:30:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19795 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19795 found at Wed Oct 18 16:30:18 UTC 2023 selfserv_9997 with PID 19795 started at Wed Oct 18 16:30:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #953: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19795 at Wed Oct 18 16:30:19 UTC 2023 kill -USR1 19795 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19795 killed at Wed Oct 18 16:30:19 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:30:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19834 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19834 found at Wed Oct 18 16:30:19 UTC 2023 selfserv_9997 with PID 19834 started at Wed Oct 18 16:30:19 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #954: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19834 at Wed Oct 18 16:30:20 UTC 2023 kill -USR1 19834 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19834 killed at Wed Oct 18 16:30:20 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:30:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19874 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19874 found at Wed Oct 18 16:30:20 UTC 2023 selfserv_9997 with PID 19874 started at Wed Oct 18 16:30:20 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #955: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19874 at Wed Oct 18 16:30:21 UTC 2023 kill -USR1 19874 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19874 killed at Wed Oct 18 16:30:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:30:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19914 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19914 found at Wed Oct 18 16:30:21 UTC 2023 selfserv_9997 with PID 19914 started at Wed Oct 18 16:30:21 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #956: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19914 at Wed Oct 18 16:30:22 UTC 2023 kill -USR1 19914 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19914 killed at Wed Oct 18 16:30:22 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:30:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19954 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19954 found at Wed Oct 18 16:30:22 UTC 2023 selfserv_9997 with PID 19954 started at Wed Oct 18 16:30:23 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #957: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 19954 at Wed Oct 18 16:30:23 UTC 2023 kill -USR1 19954 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19954 killed at Wed Oct 18 16:30:23 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:30:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19995 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19995 found at Wed Oct 18 16:30:24 UTC 2023 selfserv_9997 with PID 19995 started at Wed Oct 18 16:30:24 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #958: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19995 at Wed Oct 18 16:30:25 UTC 2023 kill -USR1 19995 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19995 killed at Wed Oct 18 16:30:25 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:30:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20035 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20035 found at Wed Oct 18 16:30:25 UTC 2023 selfserv_9997 with PID 20035 started at Wed Oct 18 16:30:25 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #959: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20035 at Wed Oct 18 16:30:26 UTC 2023 kill -USR1 20035 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20035 killed at Wed Oct 18 16:30:26 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:30:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20075 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20075 found at Wed Oct 18 16:30:26 UTC 2023 selfserv_9997 with PID 20075 started at Wed Oct 18 16:30:26 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #960: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20075 at Wed Oct 18 16:30:27 UTC 2023 kill -USR1 20075 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20075 killed at Wed Oct 18 16:30:27 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:30:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20115 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20115 found at Wed Oct 18 16:30:27 UTC 2023 selfserv_9997 with PID 20115 started at Wed Oct 18 16:30:27 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #961: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20115 at Wed Oct 18 16:30:28 UTC 2023 kill -USR1 20115 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20115 killed at Wed Oct 18 16:30:28 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:30:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20155 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20155 found at Wed Oct 18 16:30:29 UTC 2023 selfserv_9997 with PID 20155 started at Wed Oct 18 16:30:29 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #962: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20155 at Wed Oct 18 16:30:30 UTC 2023 kill -USR1 20155 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20155 killed at Wed Oct 18 16:30:30 UTC 2023 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -fips true -force FIPS mode enabled. ssl.sh: #963: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -list ssl.sh: #964: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #965: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -fips true -force FIPS mode enabled. ssl.sh: #966: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -list ssl.sh: #967: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #968: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9997 starting at Wed Oct 18 16:30:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 20240 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20240 found at Wed Oct 18 16:30:31 UTC 2023 selfserv_9997 with PID 20240 started at Wed Oct 18 16:30:31 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #969: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #970: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #971: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #972: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #973: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #974: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #975: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #976: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #977: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #978: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #979: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #980: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #981: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #982: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #983: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #984: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #985: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #986: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #987: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #988: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #989: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #990: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #991: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #992: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #993: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #994: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #995: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #996: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #997: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #998: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #999: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1000: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1001: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1002: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1003: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1004: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1005: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1006: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1007: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1008: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1009: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1010: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1011: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1012: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1013: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1014: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1015: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1016: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1017: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1018: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1019: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 20240 at Wed Oct 18 16:30:40 UTC 2023 kill -USR1 20240 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20240 killed at Wed Oct 18 16:30:40 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 16:30:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 20790 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20790 found at Wed Oct 18 16:30:40 UTC 2023 selfserv_9997 with PID 20790 started at Wed Oct 18 16:30:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1020: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1021: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1022: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1023: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1024: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1025: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1026: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1027: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1028: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1029: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1030: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1031: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1032: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1033: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1034: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1035: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1036: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1037: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1038: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1039: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1040: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1041: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1042: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1043: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1044: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1045: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1046: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1047: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1048: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1049: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1050: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1051: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1052: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1053: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1054: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1055: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1056: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1057: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1058: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1059: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1060: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1061: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1062: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1063: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1064: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1065: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1066: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1067: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1068: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1069: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1070: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1071: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1072: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1073: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1074: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1075: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1076: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1077: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1078: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1079: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1080: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1081: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1082: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1083: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1084: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1085: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1086: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1087: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1088: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1089: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1090: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1091: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1092: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1093: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1094: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1095: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20790 at Wed Oct 18 16:30:54 UTC 2023 kill -USR1 20790 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20790 killed at Wed Oct 18 16:30:54 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9997 starting at Wed Oct 18 16:30:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21604 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21604 found at Wed Oct 18 16:30:54 UTC 2023 selfserv_9997 with PID 21604 started at Wed Oct 18 16:30:54 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21604 at Wed Oct 18 16:30:55 UTC 2023 kill -USR1 21604 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21604 killed at Wed Oct 18 16:30:55 UTC 2023 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:30:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21670 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21670 found at Wed Oct 18 16:30:55 UTC 2023 selfserv_9997 with PID 21670 started at Wed Oct 18 16:30:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1096: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21670 at Wed Oct 18 16:30:56 UTC 2023 kill -USR1 21670 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21670 killed at Wed Oct 18 16:30:56 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:30:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21722 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21722 found at Wed Oct 18 16:30:56 UTC 2023 selfserv_9997 with PID 21722 started at Wed Oct 18 16:30:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1097: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21722 at Wed Oct 18 16:30:57 UTC 2023 kill -USR1 21722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21722 killed at Wed Oct 18 16:30:57 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:30:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21774 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21774 found at Wed Oct 18 16:30:57 UTC 2023 selfserv_9997 with PID 21774 started at Wed Oct 18 16:30:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1098: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21774 at Wed Oct 18 16:30:59 UTC 2023 kill -USR1 21774 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21774 killed at Wed Oct 18 16:30:59 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:30:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:30:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21826 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21826 found at Wed Oct 18 16:30:59 UTC 2023 selfserv_9997 with PID 21826 started at Wed Oct 18 16:30:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1099: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 21826 at Wed Oct 18 16:31:00 UTC 2023 kill -USR1 21826 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21826 killed at Wed Oct 18 16:31:00 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:31:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21878 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21878 found at Wed Oct 18 16:31:00 UTC 2023 selfserv_9997 with PID 21878 started at Wed Oct 18 16:31:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1100: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 21878 at Wed Oct 18 16:31:01 UTC 2023 kill -USR1 21878 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21878 killed at Wed Oct 18 16:31:01 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21930 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21930 found at Wed Oct 18 16:31:02 UTC 2023 selfserv_9997 with PID 21930 started at Wed Oct 18 16:31:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1101: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21930 at Wed Oct 18 16:31:03 UTC 2023 kill -USR1 21930 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21930 killed at Wed Oct 18 16:31:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21982 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21982 found at Wed Oct 18 16:31:03 UTC 2023 selfserv_9997 with PID 21982 started at Wed Oct 18 16:31:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1102: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21982 at Wed Oct 18 16:31:04 UTC 2023 kill -USR1 21982 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21982 killed at Wed Oct 18 16:31:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:31:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22034 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22034 found at Wed Oct 18 16:31:04 UTC 2023 selfserv_9997 with PID 22034 started at Wed Oct 18 16:31:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1103: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22034 at Wed Oct 18 16:31:05 UTC 2023 kill -USR1 22034 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22034 killed at Wed Oct 18 16:31:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22088 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22088 found at Wed Oct 18 16:31:06 UTC 2023 selfserv_9997 with PID 22088 started at Wed Oct 18 16:31:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22088 at Wed Oct 18 16:31:07 UTC 2023 kill -USR1 22088 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22088 killed at Wed Oct 18 16:31:07 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22140 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22140 found at Wed Oct 18 16:31:07 UTC 2023 selfserv_9997 with PID 22140 started at Wed Oct 18 16:31:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1105: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22140 at Wed Oct 18 16:31:08 UTC 2023 kill -USR1 22140 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22140 killed at Wed Oct 18 16:31:08 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:31:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22192 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22192 found at Wed Oct 18 16:31:09 UTC 2023 selfserv_9997 with PID 22192 started at Wed Oct 18 16:31:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1106: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22192 at Wed Oct 18 16:31:09 UTC 2023 kill -USR1 22192 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22192 killed at Wed Oct 18 16:31:09 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22244 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22244 found at Wed Oct 18 16:31:10 UTC 2023 selfserv_9997 with PID 22244 started at Wed Oct 18 16:31:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22244 at Wed Oct 18 16:31:11 UTC 2023 kill -USR1 22244 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22244 killed at Wed Oct 18 16:31:11 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22296 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22296 found at Wed Oct 18 16:31:11 UTC 2023 selfserv_9997 with PID 22296 started at Wed Oct 18 16:31:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1108: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22296 at Wed Oct 18 16:31:12 UTC 2023 kill -USR1 22296 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22296 killed at Wed Oct 18 16:31:12 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:31:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22348 found at Wed Oct 18 16:31:13 UTC 2023 selfserv_9997 with PID 22348 started at Wed Oct 18 16:31:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22348 at Wed Oct 18 16:31:14 UTC 2023 kill -USR1 22348 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22348 killed at Wed Oct 18 16:31:14 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22400 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22400 found at Wed Oct 18 16:31:14 UTC 2023 selfserv_9997 with PID 22400 started at Wed Oct 18 16:31:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22400 at Wed Oct 18 16:31:15 UTC 2023 kill -USR1 22400 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22400 killed at Wed Oct 18 16:31:15 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22453 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22453 found at Wed Oct 18 16:31:15 UTC 2023 selfserv_9997 with PID 22453 started at Wed Oct 18 16:31:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1111: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22453 at Wed Oct 18 16:31:17 UTC 2023 kill -USR1 22453 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22453 killed at Wed Oct 18 16:31:17 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:31:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22505 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22505 found at Wed Oct 18 16:31:17 UTC 2023 selfserv_9997 with PID 22505 started at Wed Oct 18 16:31:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1112: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22505 at Wed Oct 18 16:31:18 UTC 2023 kill -USR1 22505 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22505 killed at Wed Oct 18 16:31:18 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22557 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22557 found at Wed Oct 18 16:31:18 UTC 2023 selfserv_9997 with PID 22557 started at Wed Oct 18 16:31:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22557 at Wed Oct 18 16:31:19 UTC 2023 kill -USR1 22557 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22557 killed at Wed Oct 18 16:31:19 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22609 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22609 found at Wed Oct 18 16:31:20 UTC 2023 selfserv_9997 with PID 22609 started at Wed Oct 18 16:31:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1114: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22609 at Wed Oct 18 16:31:21 UTC 2023 kill -USR1 22609 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22609 killed at Wed Oct 18 16:31:21 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:31:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22661 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22661 found at Wed Oct 18 16:31:21 UTC 2023 selfserv_9997 with PID 22661 started at Wed Oct 18 16:31:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1115: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22661 at Wed Oct 18 16:31:22 UTC 2023 kill -USR1 22661 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22661 killed at Wed Oct 18 16:31:22 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22716 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22716 found at Wed Oct 18 16:31:22 UTC 2023 selfserv_9997 with PID 22716 started at Wed Oct 18 16:31:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1116: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22716 at Wed Oct 18 16:31:24 UTC 2023 kill -USR1 22716 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22716 killed at Wed Oct 18 16:31:24 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22768 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22768 found at Wed Oct 18 16:31:24 UTC 2023 selfserv_9997 with PID 22768 started at Wed Oct 18 16:31:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1117: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22768 at Wed Oct 18 16:31:25 UTC 2023 kill -USR1 22768 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22768 killed at Wed Oct 18 16:31:25 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:31:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22821 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22821 found at Wed Oct 18 16:31:25 UTC 2023 selfserv_9997 with PID 22821 started at Wed Oct 18 16:31:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1118: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22821 at Wed Oct 18 16:31:26 UTC 2023 kill -USR1 22821 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22821 killed at Wed Oct 18 16:31:26 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22873 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22873 found at Wed Oct 18 16:31:27 UTC 2023 selfserv_9997 with PID 22873 started at Wed Oct 18 16:31:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1119: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22873 at Wed Oct 18 16:31:28 UTC 2023 kill -USR1 22873 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22873 killed at Wed Oct 18 16:31:28 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22925 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22925 found at Wed Oct 18 16:31:28 UTC 2023 selfserv_9997 with PID 22925 started at Wed Oct 18 16:31:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1120: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22925 at Wed Oct 18 16:31:30 UTC 2023 kill -USR1 22925 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22925 killed at Wed Oct 18 16:31:30 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:31:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22977 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22977 found at Wed Oct 18 16:31:30 UTC 2023 selfserv_9997 with PID 22977 started at Wed Oct 18 16:31:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1121: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22977 at Wed Oct 18 16:31:31 UTC 2023 kill -USR1 22977 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22977 killed at Wed Oct 18 16:31:31 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23029 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23029 found at Wed Oct 18 16:31:31 UTC 2023 selfserv_9997 with PID 23029 started at Wed Oct 18 16:31:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1122: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23029 at Wed Oct 18 16:31:32 UTC 2023 kill -USR1 23029 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23029 killed at Wed Oct 18 16:31:32 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23081 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23081 found at Wed Oct 18 16:31:33 UTC 2023 selfserv_9997 with PID 23081 started at Wed Oct 18 16:31:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1123: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23081 at Wed Oct 18 16:31:34 UTC 2023 kill -USR1 23081 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23081 killed at Wed Oct 18 16:31:34 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:31:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23133 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23133 found at Wed Oct 18 16:31:34 UTC 2023 selfserv_9997 with PID 23133 started at Wed Oct 18 16:31:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1124: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23133 at Wed Oct 18 16:31:35 UTC 2023 kill -USR1 23133 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23133 killed at Wed Oct 18 16:31:35 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23185 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23185 found at Wed Oct 18 16:31:35 UTC 2023 selfserv_9997 with PID 23185 started at Wed Oct 18 16:31:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1125: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23185 at Wed Oct 18 16:31:37 UTC 2023 kill -USR1 23185 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23185 killed at Wed Oct 18 16:31:37 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23237 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23237 found at Wed Oct 18 16:31:37 UTC 2023 selfserv_9997 with PID 23237 started at Wed Oct 18 16:31:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1126: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23237 at Wed Oct 18 16:31:38 UTC 2023 kill -USR1 23237 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23237 killed at Wed Oct 18 16:31:38 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23289 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23289 found at Wed Oct 18 16:31:38 UTC 2023 selfserv_9997 with PID 23289 started at Wed Oct 18 16:31:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1127: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23289 at Wed Oct 18 16:31:40 UTC 2023 kill -USR1 23289 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23289 killed at Wed Oct 18 16:31:40 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23341 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23341 found at Wed Oct 18 16:31:40 UTC 2023 selfserv_9997 with PID 23341 started at Wed Oct 18 16:31:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1128: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23341 at Wed Oct 18 16:31:41 UTC 2023 kill -USR1 23341 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23341 killed at Wed Oct 18 16:31:41 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23393 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23393 found at Wed Oct 18 16:31:41 UTC 2023 selfserv_9997 with PID 23393 started at Wed Oct 18 16:31:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1129: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23393 at Wed Oct 18 16:31:42 UTC 2023 kill -USR1 23393 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23393 killed at Wed Oct 18 16:31:42 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23446 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23446 found at Wed Oct 18 16:31:42 UTC 2023 selfserv_9997 with PID 23446 started at Wed Oct 18 16:31:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1130: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23446 at Wed Oct 18 16:31:44 UTC 2023 kill -USR1 23446 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23446 killed at Wed Oct 18 16:31:44 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23514 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23514 found at Wed Oct 18 16:31:44 UTC 2023 selfserv_9997 with PID 23514 started at Wed Oct 18 16:31:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1131: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23514 at Wed Oct 18 16:31:45 UTC 2023 kill -USR1 23514 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23514 killed at Wed Oct 18 16:31:45 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:31:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23566 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23566 found at Wed Oct 18 16:31:45 UTC 2023 selfserv_9997 with PID 23566 started at Wed Oct 18 16:31:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1132: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23566 at Wed Oct 18 16:31:46 UTC 2023 kill -USR1 23566 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23566 killed at Wed Oct 18 16:31:46 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23618 found at Wed Oct 18 16:31:47 UTC 2023 selfserv_9997 with PID 23618 started at Wed Oct 18 16:31:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1133: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23618 at Wed Oct 18 16:31:48 UTC 2023 kill -USR1 23618 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23618 killed at Wed Oct 18 16:31:48 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:31:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23670 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23670 found at Wed Oct 18 16:31:48 UTC 2023 selfserv_9997 with PID 23670 started at Wed Oct 18 16:31:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1134: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23670 at Wed Oct 18 16:31:49 UTC 2023 kill -USR1 23670 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23670 killed at Wed Oct 18 16:31:49 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23722 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23722 found at Wed Oct 18 16:31:49 UTC 2023 selfserv_9997 with PID 23722 started at Wed Oct 18 16:31:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1135: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23722 at Wed Oct 18 16:31:50 UTC 2023 kill -USR1 23722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23722 killed at Wed Oct 18 16:31:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:31:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23774 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23774 found at Wed Oct 18 16:31:50 UTC 2023 selfserv_9997 with PID 23774 started at Wed Oct 18 16:31:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1136: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23774 at Wed Oct 18 16:31:51 UTC 2023 kill -USR1 23774 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23774 killed at Wed Oct 18 16:31:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23826 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23826 found at Wed Oct 18 16:31:51 UTC 2023 selfserv_9997 with PID 23826 started at Wed Oct 18 16:31:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1137: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23826 at Wed Oct 18 16:31:53 UTC 2023 kill -USR1 23826 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23826 killed at Wed Oct 18 16:31:53 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:31:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23879 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23879 found at Wed Oct 18 16:31:53 UTC 2023 selfserv_9997 with PID 23879 started at Wed Oct 18 16:31:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1138: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23879 at Wed Oct 18 16:31:54 UTC 2023 kill -USR1 23879 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23879 killed at Wed Oct 18 16:31:54 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23931 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23931 found at Wed Oct 18 16:31:54 UTC 2023 selfserv_9997 with PID 23931 started at Wed Oct 18 16:31:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1139: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23931 at Wed Oct 18 16:31:55 UTC 2023 kill -USR1 23931 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23931 killed at Wed Oct 18 16:31:55 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:31:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23983 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23983 found at Wed Oct 18 16:31:55 UTC 2023 selfserv_9997 with PID 23983 started at Wed Oct 18 16:31:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1140: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23983 at Wed Oct 18 16:31:56 UTC 2023 kill -USR1 23983 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23983 killed at Wed Oct 18 16:31:56 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24035 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24035 found at Wed Oct 18 16:31:57 UTC 2023 selfserv_9997 with PID 24035 started at Wed Oct 18 16:31:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1141: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24035 at Wed Oct 18 16:31:58 UTC 2023 kill -USR1 24035 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24035 killed at Wed Oct 18 16:31:58 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:31:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24087 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24087 found at Wed Oct 18 16:31:58 UTC 2023 selfserv_9997 with PID 24087 started at Wed Oct 18 16:31:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1142: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24087 at Wed Oct 18 16:31:59 UTC 2023 kill -USR1 24087 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24087 killed at Wed Oct 18 16:31:59 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:31:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:31:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24139 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24139 found at Wed Oct 18 16:31:59 UTC 2023 selfserv_9997 with PID 24139 started at Wed Oct 18 16:31:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1143: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24139 at Wed Oct 18 16:32:00 UTC 2023 kill -USR1 24139 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24139 killed at Wed Oct 18 16:32:00 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:32:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24191 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24191 found at Wed Oct 18 16:32:00 UTC 2023 selfserv_9997 with PID 24191 started at Wed Oct 18 16:32:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1144: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24191 at Wed Oct 18 16:32:01 UTC 2023 kill -USR1 24191 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24191 killed at Wed Oct 18 16:32:01 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:32:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24243 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24243 found at Wed Oct 18 16:32:02 UTC 2023 selfserv_9997 with PID 24243 started at Wed Oct 18 16:32:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1145: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24243 at Wed Oct 18 16:32:03 UTC 2023 kill -USR1 24243 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24243 killed at Wed Oct 18 16:32:03 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:32:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24296 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24296 found at Wed Oct 18 16:32:03 UTC 2023 selfserv_9997 with PID 24296 started at Wed Oct 18 16:32:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1146: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24296 at Wed Oct 18 16:32:04 UTC 2023 kill -USR1 24296 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24296 killed at Wed Oct 18 16:32:04 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:32:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24348 found at Wed Oct 18 16:32:04 UTC 2023 selfserv_9997 with PID 24348 started at Wed Oct 18 16:32:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1147: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24348 at Wed Oct 18 16:32:05 UTC 2023 kill -USR1 24348 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24348 killed at Wed Oct 18 16:32:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:32:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24400 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24400 found at Wed Oct 18 16:32:05 UTC 2023 selfserv_9997 with PID 24400 started at Wed Oct 18 16:32:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1148: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24400 at Wed Oct 18 16:32:07 UTC 2023 kill -USR1 24400 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24400 killed at Wed Oct 18 16:32:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:32:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24453 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24453 found at Wed Oct 18 16:32:07 UTC 2023 selfserv_9997 with PID 24453 started at Wed Oct 18 16:32:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1149: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24453 at Wed Oct 18 16:32:08 UTC 2023 kill -USR1 24453 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24453 killed at Wed Oct 18 16:32:08 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:32:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24505 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24505 found at Wed Oct 18 16:32:08 UTC 2023 selfserv_9997 with PID 24505 started at Wed Oct 18 16:32:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1150: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24505 at Wed Oct 18 16:32:09 UTC 2023 kill -USR1 24505 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24505 killed at Wed Oct 18 16:32:09 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:32:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24559 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24559 found at Wed Oct 18 16:32:09 UTC 2023 selfserv_9997 with PID 24559 started at Wed Oct 18 16:32:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1151: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24559 at Wed Oct 18 16:32:11 UTC 2023 kill -USR1 24559 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24559 killed at Wed Oct 18 16:32:11 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:32:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24611 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24611 found at Wed Oct 18 16:32:11 UTC 2023 selfserv_9997 with PID 24611 started at Wed Oct 18 16:32:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1152: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24611 at Wed Oct 18 16:32:12 UTC 2023 kill -USR1 24611 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24611 killed at Wed Oct 18 16:32:12 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:32:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24663 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24663 found at Wed Oct 18 16:32:12 UTC 2023 selfserv_9997 with PID 24663 started at Wed Oct 18 16:32:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1153: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24663 at Wed Oct 18 16:32:14 UTC 2023 kill -USR1 24663 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24663 killed at Wed Oct 18 16:32:14 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 16:32:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24722 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24722 found at Wed Oct 18 16:32:14 UTC 2023 selfserv_9997 with PID 24722 started at Wed Oct 18 16:32:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1154: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24722 at Wed Oct 18 16:32:15 UTC 2023 kill -USR1 24722 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24722 killed at Wed Oct 18 16:32:15 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 16:32:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24780 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24780 found at Wed Oct 18 16:32:15 UTC 2023 selfserv_9997 with PID 24780 started at Wed Oct 18 16:32:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1155: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24780 at Wed Oct 18 16:32:17 UTC 2023 kill -USR1 24780 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24780 killed at Wed Oct 18 16:32:17 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 16:32:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24839 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24839 found at Wed Oct 18 16:32:17 UTC 2023 selfserv_9997 with PID 24839 started at Wed Oct 18 16:32:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1156: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24839 at Wed Oct 18 16:32:18 UTC 2023 kill -USR1 24839 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24839 killed at Wed Oct 18 16:32:18 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 16:32:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24897 found at Wed Oct 18 16:32:18 UTC 2023 selfserv_9997 with PID 24897 started at Wed Oct 18 16:32:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1157: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24897 at Wed Oct 18 16:32:19 UTC 2023 kill -USR1 24897 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24897 killed at Wed Oct 18 16:32:19 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9997 starting at Wed Oct 18 16:32:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24955 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24955 found at Wed Oct 18 16:32:20 UTC 2023 selfserv_9997 with PID 24955 started at Wed Oct 18 16:32:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1158: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24955 at Wed Oct 18 16:32:20 UTC 2023 kill -USR1 24955 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24955 killed at Wed Oct 18 16:32:20 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 16:32:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25013 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25013 found at Wed Oct 18 16:32:21 UTC 2023 selfserv_9997 with PID 25013 started at Wed Oct 18 16:32:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1159: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25013 at Wed Oct 18 16:32:22 UTC 2023 kill -USR1 25013 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25013 killed at Wed Oct 18 16:32:22 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 16:32:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25072 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25072 found at Wed Oct 18 16:32:22 UTC 2023 selfserv_9997 with PID 25072 started at Wed Oct 18 16:32:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1160: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25072 at Wed Oct 18 16:32:24 UTC 2023 kill -USR1 25072 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25072 killed at Wed Oct 18 16:32:24 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9997 starting at Wed Oct 18 16:32:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25130 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25130 found at Wed Oct 18 16:32:24 UTC 2023 selfserv_9997 with PID 25130 started at Wed Oct 18 16:32:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1161: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25130 at Wed Oct 18 16:32:25 UTC 2023 kill -USR1 25130 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25130 killed at Wed Oct 18 16:32:25 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9997 starting at Wed Oct 18 16:32:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25189 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25189 found at Wed Oct 18 16:32:25 UTC 2023 selfserv_9997 with PID 25189 started at Wed Oct 18 16:32:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1162: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25189 at Wed Oct 18 16:32:26 UTC 2023 kill -USR1 25189 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25189 killed at Wed Oct 18 16:32:26 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 16:32:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25247 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25247 found at Wed Oct 18 16:32:27 UTC 2023 selfserv_9997 with PID 25247 started at Wed Oct 18 16:32:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1163: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25247 at Wed Oct 18 16:32:27 UTC 2023 kill -USR1 25247 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25247 killed at Wed Oct 18 16:32:27 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9997 starting at Wed Oct 18 16:32:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25289 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25289 found at Wed Oct 18 16:32:28 UTC 2023 selfserv_9997 with PID 25289 started at Wed Oct 18 16:32:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1096: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25289 at Wed Oct 18 16:32:29 UTC 2023 kill -USR1 25289 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25289 killed at Wed Oct 18 16:32:29 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9997 starting at Wed Oct 18 16:32:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25331 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25331 found at Wed Oct 18 16:32:29 UTC 2023 selfserv_9997 with PID 25331 started at Wed Oct 18 16:32:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1097: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9997 with PID 25331 at Wed Oct 18 16:32:30 UTC 2023 kill -USR1 25331 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25331 killed at Wed Oct 18 16:32:30 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9997 starting at Wed Oct 18 16:32:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25374 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25374 found at Wed Oct 18 16:32:30 UTC 2023 selfserv_9997 with PID 25374 started at Wed Oct 18 16:32:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1098: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 25374 at Wed Oct 18 16:32:31 UTC 2023 kill -USR1 25374 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25374 killed at Wed Oct 18 16:32:31 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9997 starting at Wed Oct 18 16:32:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25416 found at Wed Oct 18 16:32:32 UTC 2023 selfserv_9997 with PID 25416 started at Wed Oct 18 16:32:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1099: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 25416 at Wed Oct 18 16:32:32 UTC 2023 kill -USR1 25416 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25416 killed at Wed Oct 18 16:32:32 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9997 starting at Wed Oct 18 16:32:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25459 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25459 found at Wed Oct 18 16:32:33 UTC 2023 selfserv_9997 with PID 25459 started at Wed Oct 18 16:32:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1100: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 25459 at Wed Oct 18 16:32:33 UTC 2023 kill -USR1 25459 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25459 killed at Wed Oct 18 16:32:33 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9997 starting at Wed Oct 18 16:32:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25501 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25501 found at Wed Oct 18 16:32:34 UTC 2023 selfserv_9997 with PID 25501 started at Wed Oct 18 16:32:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1101: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 25501 at Wed Oct 18 16:32:34 UTC 2023 kill -USR1 25501 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25501 killed at Wed Oct 18 16:32:34 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9997 starting at Wed Oct 18 16:32:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25543 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25543 found at Wed Oct 18 16:32:35 UTC 2023 selfserv_9997 with PID 25543 started at Wed Oct 18 16:32:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1102: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 25543 at Wed Oct 18 16:32:35 UTC 2023 kill -USR1 25543 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25543 killed at Wed Oct 18 16:32:35 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9997 starting at Wed Oct 18 16:32:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25585 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25585 found at Wed Oct 18 16:32:36 UTC 2023 selfserv_9997 with PID 25585 started at Wed Oct 18 16:32:36 UTC 2023 strsclnt -q -p 9997 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 16:32:36 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 16:32:52 UTC 2023 ssl.sh: #1103: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9997 with PID 25585 at Wed Oct 18 16:32:52 UTC 2023 kill -USR1 25585 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25585 killed at Wed Oct 18 16:32:52 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 16:32:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25651 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25651 found at Wed Oct 18 16:32:52 UTC 2023 selfserv_9997 with PID 25651 started at Wed Oct 18 16:32:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1104: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25651 at Wed Oct 18 16:32:53 UTC 2023 kill -USR1 25651 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25651 killed at Wed Oct 18 16:32:53 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:32:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25693 found at Wed Oct 18 16:32:53 UTC 2023 selfserv_9997 with PID 25693 started at Wed Oct 18 16:32:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1105: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25693 at Wed Oct 18 16:32:54 UTC 2023 kill -USR1 25693 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25693 killed at Wed Oct 18 16:32:54 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:32:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25732 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25732 found at Wed Oct 18 16:32:54 UTC 2023 selfserv_9997 with PID 25732 started at Wed Oct 18 16:32:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1106: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 25732 at Wed Oct 18 16:32:55 UTC 2023 kill -USR1 25732 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25732 killed at Wed Oct 18 16:32:55 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:32:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25771 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25771 found at Wed Oct 18 16:32:55 UTC 2023 selfserv_9997 with PID 25771 started at Wed Oct 18 16:32:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1107: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25771 at Wed Oct 18 16:32:55 UTC 2023 kill -USR1 25771 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25771 killed at Wed Oct 18 16:32:55 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:32:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25810 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25810 found at Wed Oct 18 16:32:56 UTC 2023 selfserv_9997 with PID 25810 started at Wed Oct 18 16:32:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1108: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 25810 at Wed Oct 18 16:32:56 UTC 2023 kill -USR1 25810 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25810 killed at Wed Oct 18 16:32:56 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:32:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25849 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25849 found at Wed Oct 18 16:32:56 UTC 2023 selfserv_9997 with PID 25849 started at Wed Oct 18 16:32:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1109: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25849 at Wed Oct 18 16:32:57 UTC 2023 kill -USR1 25849 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25849 killed at Wed Oct 18 16:32:57 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:32:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25888 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25888 found at Wed Oct 18 16:32:57 UTC 2023 selfserv_9997 with PID 25888 started at Wed Oct 18 16:32:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1110: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25888 at Wed Oct 18 16:32:58 UTC 2023 kill -USR1 25888 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25888 killed at Wed Oct 18 16:32:58 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:32:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25927 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25927 found at Wed Oct 18 16:32:58 UTC 2023 selfserv_9997 with PID 25927 started at Wed Oct 18 16:32:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1111: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25927 at Wed Oct 18 16:32:59 UTC 2023 kill -USR1 25927 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25927 killed at Wed Oct 18 16:32:59 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:32:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:32:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25967 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25967 found at Wed Oct 18 16:32:59 UTC 2023 selfserv_9997 with PID 25967 started at Wed Oct 18 16:32:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1112: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25967 at Wed Oct 18 16:33:00 UTC 2023 kill -USR1 25967 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25967 killed at Wed Oct 18 16:33:00 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:33:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26006 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26006 found at Wed Oct 18 16:33:00 UTC 2023 selfserv_9997 with PID 26006 started at Wed Oct 18 16:33:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1113: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26006 at Wed Oct 18 16:33:00 UTC 2023 kill -USR1 26006 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26006 killed at Wed Oct 18 16:33:00 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:33:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26045 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26045 found at Wed Oct 18 16:33:01 UTC 2023 selfserv_9997 with PID 26045 started at Wed Oct 18 16:33:01 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1114: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26045 at Wed Oct 18 16:33:01 UTC 2023 kill -USR1 26045 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26045 killed at Wed Oct 18 16:33:01 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:33:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26085 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26085 found at Wed Oct 18 16:33:01 UTC 2023 selfserv_9997 with PID 26085 started at Wed Oct 18 16:33:01 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1115: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 26085 at Wed Oct 18 16:33:02 UTC 2023 kill -USR1 26085 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26085 killed at Wed Oct 18 16:33:02 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:33:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26125 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26125 found at Wed Oct 18 16:33:02 UTC 2023 selfserv_9997 with PID 26125 started at Wed Oct 18 16:33:02 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1116: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26125 at Wed Oct 18 16:33:03 UTC 2023 kill -USR1 26125 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26125 killed at Wed Oct 18 16:33:03 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:33:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26165 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26165 found at Wed Oct 18 16:33:03 UTC 2023 selfserv_9997 with PID 26165 started at Wed Oct 18 16:33:03 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1117: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 26165 at Wed Oct 18 16:33:04 UTC 2023 kill -USR1 26165 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26165 killed at Wed Oct 18 16:33:04 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:33:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26205 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26205 found at Wed Oct 18 16:33:04 UTC 2023 selfserv_9997 with PID 26205 started at Wed Oct 18 16:33:04 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1118: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26205 at Wed Oct 18 16:33:05 UTC 2023 kill -USR1 26205 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26205 killed at Wed Oct 18 16:33:05 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:33:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26245 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26245 found at Wed Oct 18 16:33:05 UTC 2023 selfserv_9997 with PID 26245 started at Wed Oct 18 16:33:05 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1119: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26245 at Wed Oct 18 16:33:05 UTC 2023 kill -USR1 26245 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26245 killed at Wed Oct 18 16:33:05 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:33:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26285 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26285 found at Wed Oct 18 16:33:06 UTC 2023 selfserv_9997 with PID 26285 started at Wed Oct 18 16:33:06 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1120: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26285 at Wed Oct 18 16:33:06 UTC 2023 kill -USR1 26285 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26285 killed at Wed Oct 18 16:33:06 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:33:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26325 found at Wed Oct 18 16:33:06 UTC 2023 selfserv_9997 with PID 26325 started at Wed Oct 18 16:33:06 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1121: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26325 at Wed Oct 18 16:33:07 UTC 2023 kill -USR1 26325 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26325 killed at Wed Oct 18 16:33:07 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:33:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26365 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26365 found at Wed Oct 18 16:33:07 UTC 2023 selfserv_9997 with PID 26365 started at Wed Oct 18 16:33:07 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1122: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26365 at Wed Oct 18 16:33:08 UTC 2023 kill -USR1 26365 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26365 killed at Wed Oct 18 16:33:08 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9997 starting at Wed Oct 18 16:33:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 26405 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26405 found at Wed Oct 18 16:33:08 UTC 2023 selfserv_9997 with PID 26405 started at Wed Oct 18 16:33:08 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1123: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1124: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1125: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1126: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1127: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1128: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1129: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1130: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1131: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1132: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1133: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1134: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1135: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1136: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1137: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1138: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1139: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1140: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1141: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1142: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1143: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1144: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1145: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1146: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1147: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1148: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1149: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1150: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1151: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1152: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1153: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1154: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1155: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1156: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1157: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1158: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1159: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1160: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1161: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1162: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1163: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1164: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1165: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1166: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1167: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1168: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1169: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1170: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1171: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1172: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1173: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 26405 at Wed Oct 18 16:33:18 UTC 2023 kill -USR1 26405 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26405 killed at Wed Oct 18 16:33:18 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 16:33:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 26954 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26954 found at Wed Oct 18 16:33:18 UTC 2023 selfserv_9997 with PID 26954 started at Wed Oct 18 16:33:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1174: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1175: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1176: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1177: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1178: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1179: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1180: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1181: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1182: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1183: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1184: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1185: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1186: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1187: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1188: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1189: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1190: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1191: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1192: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1193: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1194: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1195: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1196: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1197: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1198: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1199: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1200: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1201: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1202: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1203: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1204: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1205: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1206: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1207: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1208: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1209: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1210: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1211: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1212: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1213: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1214: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1215: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1216: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1217: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1218: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1219: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1220: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1221: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1222: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1223: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1224: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1225: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1226: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1227: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1228: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1229: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1230: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1231: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1232: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1233: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1234: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1235: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1236: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1237: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1238: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1239: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1240: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1241: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1242: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1243: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1244: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1245: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1246: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1247: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1248: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1249: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26954 at Wed Oct 18 16:33:32 UTC 2023 kill -USR1 26954 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26954 killed at Wed Oct 18 16:33:32 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:33:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27766 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27766 found at Wed Oct 18 16:33:32 UTC 2023 selfserv_9997 with PID 27766 started at Wed Oct 18 16:33:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27766 at Wed Oct 18 16:33:34 UTC 2023 kill -USR1 27766 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27766 killed at Wed Oct 18 16:33:34 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:33:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27818 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27818 found at Wed Oct 18 16:33:34 UTC 2023 selfserv_9997 with PID 27818 started at Wed Oct 18 16:33:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27818 at Wed Oct 18 16:33:36 UTC 2023 kill -USR1 27818 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27818 killed at Wed Oct 18 16:33:36 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:33:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27870 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27870 found at Wed Oct 18 16:33:36 UTC 2023 selfserv_9997 with PID 27870 started at Wed Oct 18 16:33:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1252: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27870 at Wed Oct 18 16:33:39 UTC 2023 kill -USR1 27870 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27870 killed at Wed Oct 18 16:33:39 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:33:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27924 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27924 found at Wed Oct 18 16:33:39 UTC 2023 selfserv_9997 with PID 27924 started at Wed Oct 18 16:33:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1253: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27924 at Wed Oct 18 16:33:41 UTC 2023 kill -USR1 27924 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27924 killed at Wed Oct 18 16:33:41 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:33:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27976 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27976 found at Wed Oct 18 16:33:41 UTC 2023 selfserv_9997 with PID 27976 started at Wed Oct 18 16:33:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1254: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27976 at Wed Oct 18 16:33:43 UTC 2023 kill -USR1 27976 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27976 killed at Wed Oct 18 16:33:43 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:33:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28043 found at Wed Oct 18 16:33:43 UTC 2023 selfserv_9997 with PID 28043 started at Wed Oct 18 16:33:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28043 at Wed Oct 18 16:33:46 UTC 2023 kill -USR1 28043 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28043 killed at Wed Oct 18 16:33:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:33:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28095 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28095 found at Wed Oct 18 16:33:46 UTC 2023 selfserv_9997 with PID 28095 started at Wed Oct 18 16:33:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28095 at Wed Oct 18 16:33:48 UTC 2023 kill -USR1 28095 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28095 killed at Wed Oct 18 16:33:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:33:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28147 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28147 found at Wed Oct 18 16:33:48 UTC 2023 selfserv_9997 with PID 28147 started at Wed Oct 18 16:33:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28147 at Wed Oct 18 16:33:50 UTC 2023 kill -USR1 28147 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28147 killed at Wed Oct 18 16:33:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:33:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28199 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28199 found at Wed Oct 18 16:33:51 UTC 2023 selfserv_9997 with PID 28199 started at Wed Oct 18 16:33:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28199 at Wed Oct 18 16:33:53 UTC 2023 kill -USR1 28199 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28199 killed at Wed Oct 18 16:33:53 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:33:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28253 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28253 found at Wed Oct 18 16:33:53 UTC 2023 selfserv_9997 with PID 28253 started at Wed Oct 18 16:33:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1259: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28253 at Wed Oct 18 16:33:55 UTC 2023 kill -USR1 28253 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28253 killed at Wed Oct 18 16:33:55 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:33:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28306 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28306 found at Wed Oct 18 16:33:56 UTC 2023 selfserv_9997 with PID 28306 started at Wed Oct 18 16:33:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1260: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28306 at Wed Oct 18 16:33:58 UTC 2023 kill -USR1 28306 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28306 killed at Wed Oct 18 16:33:58 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:33:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:33:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28358 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28358 found at Wed Oct 18 16:33:58 UTC 2023 selfserv_9997 with PID 28358 started at Wed Oct 18 16:33:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1261: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28358 at Wed Oct 18 16:34:00 UTC 2023 kill -USR1 28358 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28358 killed at Wed Oct 18 16:34:00 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:34:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28410 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28410 found at Wed Oct 18 16:34:01 UTC 2023 selfserv_9997 with PID 28410 started at Wed Oct 18 16:34:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1262: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28410 at Wed Oct 18 16:34:03 UTC 2023 kill -USR1 28410 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28410 killed at Wed Oct 18 16:34:03 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:34:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28462 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28462 found at Wed Oct 18 16:34:03 UTC 2023 selfserv_9997 with PID 28462 started at Wed Oct 18 16:34:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1263: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28462 at Wed Oct 18 16:34:05 UTC 2023 kill -USR1 28462 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28462 killed at Wed Oct 18 16:34:05 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:34:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28514 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28514 found at Wed Oct 18 16:34:05 UTC 2023 selfserv_9997 with PID 28514 started at Wed Oct 18 16:34:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1264: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28514 at Wed Oct 18 16:34:08 UTC 2023 kill -USR1 28514 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28514 killed at Wed Oct 18 16:34:08 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:34:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28566 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28566 found at Wed Oct 18 16:34:08 UTC 2023 selfserv_9997 with PID 28566 started at Wed Oct 18 16:34:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1265: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28566 at Wed Oct 18 16:34:10 UTC 2023 kill -USR1 28566 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28566 killed at Wed Oct 18 16:34:10 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:34:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28618 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28618 found at Wed Oct 18 16:34:10 UTC 2023 selfserv_9997 with PID 28618 started at Wed Oct 18 16:34:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1266: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28618 at Wed Oct 18 16:34:12 UTC 2023 kill -USR1 28618 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28618 killed at Wed Oct 18 16:34:12 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:34:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28670 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28670 found at Wed Oct 18 16:34:12 UTC 2023 selfserv_9997 with PID 28670 started at Wed Oct 18 16:34:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1267: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28670 at Wed Oct 18 16:34:15 UTC 2023 kill -USR1 28670 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28670 killed at Wed Oct 18 16:34:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:34:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28722 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28722 found at Wed Oct 18 16:34:15 UTC 2023 selfserv_9997 with PID 28722 started at Wed Oct 18 16:34:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1268: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28722 at Wed Oct 18 16:34:17 UTC 2023 kill -USR1 28722 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28722 killed at Wed Oct 18 16:34:17 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:34:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28774 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28774 found at Wed Oct 18 16:34:17 UTC 2023 selfserv_9997 with PID 28774 started at Wed Oct 18 16:34:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1269: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28774 at Wed Oct 18 16:34:19 UTC 2023 kill -USR1 28774 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28774 killed at Wed Oct 18 16:34:19 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:34:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28828 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28828 found at Wed Oct 18 16:34:19 UTC 2023 selfserv_9997 with PID 28828 started at Wed Oct 18 16:34:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1270: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28828 at Wed Oct 18 16:34:22 UTC 2023 kill -USR1 28828 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28828 killed at Wed Oct 18 16:34:22 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:34:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28880 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28880 found at Wed Oct 18 16:34:22 UTC 2023 selfserv_9997 with PID 28880 started at Wed Oct 18 16:34:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1271: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28880 at Wed Oct 18 16:34:24 UTC 2023 kill -USR1 28880 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28880 killed at Wed Oct 18 16:34:24 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:34:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28932 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28932 found at Wed Oct 18 16:34:24 UTC 2023 selfserv_9997 with PID 28932 started at Wed Oct 18 16:34:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1272: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28932 at Wed Oct 18 16:34:26 UTC 2023 kill -USR1 28932 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28932 killed at Wed Oct 18 16:34:26 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:34:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28984 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28984 found at Wed Oct 18 16:34:27 UTC 2023 selfserv_9997 with PID 28984 started at Wed Oct 18 16:34:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1273: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28984 at Wed Oct 18 16:34:29 UTC 2023 kill -USR1 28984 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28984 killed at Wed Oct 18 16:34:29 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:34:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29036 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29036 found at Wed Oct 18 16:34:29 UTC 2023 selfserv_9997 with PID 29036 started at Wed Oct 18 16:34:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1274: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29036 at Wed Oct 18 16:34:31 UTC 2023 kill -USR1 29036 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29036 killed at Wed Oct 18 16:34:31 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:34:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29088 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29088 found at Wed Oct 18 16:34:32 UTC 2023 selfserv_9997 with PID 29088 started at Wed Oct 18 16:34:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1275: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29088 at Wed Oct 18 16:34:34 UTC 2023 kill -USR1 29088 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29088 killed at Wed Oct 18 16:34:34 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:34:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29141 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29141 found at Wed Oct 18 16:34:34 UTC 2023 selfserv_9997 with PID 29141 started at Wed Oct 18 16:34:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1276: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29141 at Wed Oct 18 16:34:37 UTC 2023 kill -USR1 29141 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29141 killed at Wed Oct 18 16:34:37 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:34:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29193 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29193 found at Wed Oct 18 16:34:37 UTC 2023 selfserv_9997 with PID 29193 started at Wed Oct 18 16:34:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1277: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 29193 at Wed Oct 18 16:34:39 UTC 2023 kill -USR1 29193 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29193 killed at Wed Oct 18 16:34:39 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:34:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29245 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29245 found at Wed Oct 18 16:34:39 UTC 2023 selfserv_9997 with PID 29245 started at Wed Oct 18 16:34:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1278: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 29245 at Wed Oct 18 16:34:41 UTC 2023 kill -USR1 29245 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29245 killed at Wed Oct 18 16:34:41 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:34:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29297 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29297 found at Wed Oct 18 16:34:41 UTC 2023 selfserv_9997 with PID 29297 started at Wed Oct 18 16:34:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1279: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29297 at Wed Oct 18 16:34:44 UTC 2023 kill -USR1 29297 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29297 killed at Wed Oct 18 16:34:44 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:34:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29364 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29364 found at Wed Oct 18 16:34:44 UTC 2023 selfserv_9997 with PID 29364 started at Wed Oct 18 16:34:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1280: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29364 at Wed Oct 18 16:34:47 UTC 2023 kill -USR1 29364 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29364 killed at Wed Oct 18 16:34:47 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:34:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29417 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29417 found at Wed Oct 18 16:34:47 UTC 2023 selfserv_9997 with PID 29417 started at Wed Oct 18 16:34:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1281: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29417 at Wed Oct 18 16:34:50 UTC 2023 kill -USR1 29417 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29417 killed at Wed Oct 18 16:34:50 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:34:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29469 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29469 found at Wed Oct 18 16:34:50 UTC 2023 selfserv_9997 with PID 29469 started at Wed Oct 18 16:34:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1282: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29469 at Wed Oct 18 16:34:52 UTC 2023 kill -USR1 29469 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29469 killed at Wed Oct 18 16:34:52 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:34:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29521 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29521 found at Wed Oct 18 16:34:52 UTC 2023 selfserv_9997 with PID 29521 started at Wed Oct 18 16:34:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1283: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 29521 at Wed Oct 18 16:34:54 UTC 2023 kill -USR1 29521 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29521 killed at Wed Oct 18 16:34:54 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:34:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29573 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29573 found at Wed Oct 18 16:34:54 UTC 2023 selfserv_9997 with PID 29573 started at Wed Oct 18 16:34:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1284: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29573 at Wed Oct 18 16:34:57 UTC 2023 kill -USR1 29573 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29573 killed at Wed Oct 18 16:34:57 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:34:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:34:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29625 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29625 found at Wed Oct 18 16:34:57 UTC 2023 selfserv_9997 with PID 29625 started at Wed Oct 18 16:34:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1285: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29625 at Wed Oct 18 16:35:00 UTC 2023 kill -USR1 29625 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29625 killed at Wed Oct 18 16:35:00 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:35:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29677 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29677 found at Wed Oct 18 16:35:00 UTC 2023 selfserv_9997 with PID 29677 started at Wed Oct 18 16:35:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1286: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29677 at Wed Oct 18 16:35:02 UTC 2023 kill -USR1 29677 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29677 killed at Wed Oct 18 16:35:02 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:35:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29741 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29741 found at Wed Oct 18 16:35:02 UTC 2023 selfserv_9997 with PID 29741 started at Wed Oct 18 16:35:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1287: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29741 at Wed Oct 18 16:35:04 UTC 2023 kill -USR1 29741 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29741 killed at Wed Oct 18 16:35:04 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:35:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29793 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29793 found at Wed Oct 18 16:35:04 UTC 2023 selfserv_9997 with PID 29793 started at Wed Oct 18 16:35:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1288: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 29793 at Wed Oct 18 16:35:06 UTC 2023 kill -USR1 29793 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29793 killed at Wed Oct 18 16:35:06 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:35:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29845 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29845 found at Wed Oct 18 16:35:07 UTC 2023 selfserv_9997 with PID 29845 started at Wed Oct 18 16:35:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1289: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29845 at Wed Oct 18 16:35:09 UTC 2023 kill -USR1 29845 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29845 killed at Wed Oct 18 16:35:09 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:35:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29897 found at Wed Oct 18 16:35:09 UTC 2023 selfserv_9997 with PID 29897 started at Wed Oct 18 16:35:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1290: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29897 at Wed Oct 18 16:35:11 UTC 2023 kill -USR1 29897 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29897 killed at Wed Oct 18 16:35:11 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:35:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29949 found at Wed Oct 18 16:35:11 UTC 2023 selfserv_9997 with PID 29949 started at Wed Oct 18 16:35:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1291: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29949 at Wed Oct 18 16:35:14 UTC 2023 kill -USR1 29949 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29949 killed at Wed Oct 18 16:35:14 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:35:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30003 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30003 found at Wed Oct 18 16:35:14 UTC 2023 selfserv_9997 with PID 30003 started at Wed Oct 18 16:35:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1292: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 30003 at Wed Oct 18 16:35:16 UTC 2023 kill -USR1 30003 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30003 killed at Wed Oct 18 16:35:16 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:35:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30056 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30056 found at Wed Oct 18 16:35:16 UTC 2023 selfserv_9997 with PID 30056 started at Wed Oct 18 16:35:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1293: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30056 at Wed Oct 18 16:35:18 UTC 2023 kill -USR1 30056 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30056 killed at Wed Oct 18 16:35:18 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:35:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30108 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30108 found at Wed Oct 18 16:35:19 UTC 2023 selfserv_9997 with PID 30108 started at Wed Oct 18 16:35:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1294: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30108 at Wed Oct 18 16:35:21 UTC 2023 kill -USR1 30108 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30108 killed at Wed Oct 18 16:35:21 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:35:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30160 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30160 found at Wed Oct 18 16:35:21 UTC 2023 selfserv_9997 with PID 30160 started at Wed Oct 18 16:35:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1295: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30160 at Wed Oct 18 16:35:23 UTC 2023 kill -USR1 30160 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30160 killed at Wed Oct 18 16:35:23 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:35:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30212 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30212 found at Wed Oct 18 16:35:23 UTC 2023 selfserv_9997 with PID 30212 started at Wed Oct 18 16:35:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1296: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 30212 at Wed Oct 18 16:35:25 UTC 2023 kill -USR1 30212 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30212 killed at Wed Oct 18 16:35:25 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:35:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30264 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30264 found at Wed Oct 18 16:35:26 UTC 2023 selfserv_9997 with PID 30264 started at Wed Oct 18 16:35:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1297: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30264 at Wed Oct 18 16:35:28 UTC 2023 kill -USR1 30264 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30264 killed at Wed Oct 18 16:35:28 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:35:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30316 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30316 found at Wed Oct 18 16:35:28 UTC 2023 selfserv_9997 with PID 30316 started at Wed Oct 18 16:35:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1298: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30316 at Wed Oct 18 16:35:30 UTC 2023 kill -USR1 30316 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30316 killed at Wed Oct 18 16:35:30 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:35:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30368 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30368 found at Wed Oct 18 16:35:30 UTC 2023 selfserv_9997 with PID 30368 started at Wed Oct 18 16:35:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1299: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30368 at Wed Oct 18 16:35:33 UTC 2023 kill -USR1 30368 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30368 killed at Wed Oct 18 16:35:33 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:35:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30420 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30420 found at Wed Oct 18 16:35:33 UTC 2023 selfserv_9997 with PID 30420 started at Wed Oct 18 16:35:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1300: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 30420 at Wed Oct 18 16:35:35 UTC 2023 kill -USR1 30420 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30420 killed at Wed Oct 18 16:35:35 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:35:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30473 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30473 found at Wed Oct 18 16:35:35 UTC 2023 selfserv_9997 with PID 30473 started at Wed Oct 18 16:35:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1301: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30473 at Wed Oct 18 16:35:37 UTC 2023 kill -USR1 30473 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30473 killed at Wed Oct 18 16:35:37 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:35:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30525 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30525 found at Wed Oct 18 16:35:38 UTC 2023 selfserv_9997 with PID 30525 started at Wed Oct 18 16:35:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1302: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30525 at Wed Oct 18 16:35:40 UTC 2023 kill -USR1 30525 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30525 killed at Wed Oct 18 16:35:40 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:35:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30578 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30578 found at Wed Oct 18 16:35:40 UTC 2023 selfserv_9997 with PID 30578 started at Wed Oct 18 16:35:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1303: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30578 at Wed Oct 18 16:35:42 UTC 2023 kill -USR1 30578 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30578 killed at Wed Oct 18 16:35:42 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:35:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30641 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30641 found at Wed Oct 18 16:35:43 UTC 2023 selfserv_9997 with PID 30641 started at Wed Oct 18 16:35:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1304: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 30641 at Wed Oct 18 16:35:45 UTC 2023 kill -USR1 30641 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30641 killed at Wed Oct 18 16:35:45 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:35:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30697 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30697 found at Wed Oct 18 16:35:45 UTC 2023 selfserv_9997 with PID 30697 started at Wed Oct 18 16:35:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1305: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30697 at Wed Oct 18 16:35:47 UTC 2023 kill -USR1 30697 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30697 killed at Wed Oct 18 16:35:47 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:35:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30749 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30749 found at Wed Oct 18 16:35:47 UTC 2023 selfserv_9997 with PID 30749 started at Wed Oct 18 16:35:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1306: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30749 at Wed Oct 18 16:35:50 UTC 2023 kill -USR1 30749 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30749 killed at Wed Oct 18 16:35:50 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:35:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30801 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30801 found at Wed Oct 18 16:35:50 UTC 2023 selfserv_9997 with PID 30801 started at Wed Oct 18 16:35:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1307: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30801 at Wed Oct 18 16:35:52 UTC 2023 kill -USR1 30801 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30801 killed at Wed Oct 18 16:35:52 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 16:35:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30883 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30883 found at Wed Oct 18 16:35:53 UTC 2023 selfserv_9997 with PID 30883 started at Wed Oct 18 16:35:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1250: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30883 at Wed Oct 18 16:35:54 UTC 2023 kill -USR1 30883 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30883 killed at Wed Oct 18 16:35:54 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:35:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30925 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30925 found at Wed Oct 18 16:35:54 UTC 2023 selfserv_9997 with PID 30925 started at Wed Oct 18 16:35:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1251: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30925 at Wed Oct 18 16:35:55 UTC 2023 kill -USR1 30925 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30925 killed at Wed Oct 18 16:35:55 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:35:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30964 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30964 found at Wed Oct 18 16:35:56 UTC 2023 selfserv_9997 with PID 30964 started at Wed Oct 18 16:35:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1252: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 30964 at Wed Oct 18 16:35:57 UTC 2023 kill -USR1 30964 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30964 killed at Wed Oct 18 16:35:57 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:35:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31003 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31003 found at Wed Oct 18 16:35:57 UTC 2023 selfserv_9997 with PID 31003 started at Wed Oct 18 16:35:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1253: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31003 at Wed Oct 18 16:35:58 UTC 2023 kill -USR1 31003 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31003 killed at Wed Oct 18 16:35:58 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:35:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31042 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31042 found at Wed Oct 18 16:35:58 UTC 2023 selfserv_9997 with PID 31042 started at Wed Oct 18 16:35:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1254: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 31042 at Wed Oct 18 16:35:59 UTC 2023 kill -USR1 31042 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31042 killed at Wed Oct 18 16:35:59 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:35:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:35:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31081 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31081 found at Wed Oct 18 16:35:59 UTC 2023 selfserv_9997 with PID 31081 started at Wed Oct 18 16:35:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1255: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31081 at Wed Oct 18 16:36:00 UTC 2023 kill -USR1 31081 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31081 killed at Wed Oct 18 16:36:00 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:36:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:36:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31120 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31120 found at Wed Oct 18 16:36:01 UTC 2023 selfserv_9997 with PID 31120 started at Wed Oct 18 16:36:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1256: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31120 at Wed Oct 18 16:36:02 UTC 2023 kill -USR1 31120 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31120 killed at Wed Oct 18 16:36:02 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:36:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:36:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31159 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31159 found at Wed Oct 18 16:36:02 UTC 2023 selfserv_9997 with PID 31159 started at Wed Oct 18 16:36:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1257: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31159 at Wed Oct 18 16:36:03 UTC 2023 kill -USR1 31159 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31159 killed at Wed Oct 18 16:36:03 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:36:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:36:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31198 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31198 found at Wed Oct 18 16:36:03 UTC 2023 selfserv_9997 with PID 31198 started at Wed Oct 18 16:36:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1258: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31198 at Wed Oct 18 16:36:04 UTC 2023 kill -USR1 31198 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31198 killed at Wed Oct 18 16:36:04 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:36:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:36:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31237 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31237 found at Wed Oct 18 16:36:05 UTC 2023 selfserv_9997 with PID 31237 started at Wed Oct 18 16:36:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1259: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31237 at Wed Oct 18 16:36:06 UTC 2023 kill -USR1 31237 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31237 killed at Wed Oct 18 16:36:06 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:36:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:36:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31276 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31276 found at Wed Oct 18 16:36:06 UTC 2023 selfserv_9997 with PID 31276 started at Wed Oct 18 16:36:06 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1260: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31276 at Wed Oct 18 16:36:07 UTC 2023 kill -USR1 31276 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31276 killed at Wed Oct 18 16:36:07 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:36:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:36:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31317 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31317 found at Wed Oct 18 16:36:07 UTC 2023 selfserv_9997 with PID 31317 started at Wed Oct 18 16:36:07 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1261: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 31317 at Wed Oct 18 16:36:08 UTC 2023 kill -USR1 31317 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31317 killed at Wed Oct 18 16:36:08 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:36:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:36:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31357 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31357 found at Wed Oct 18 16:36:08 UTC 2023 selfserv_9997 with PID 31357 started at Wed Oct 18 16:36:08 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1262: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31357 at Wed Oct 18 16:36:09 UTC 2023 kill -USR1 31357 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31357 killed at Wed Oct 18 16:36:09 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:36:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:36:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31397 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31397 found at Wed Oct 18 16:36:10 UTC 2023 selfserv_9997 with PID 31397 started at Wed Oct 18 16:36:10 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1263: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 31397 at Wed Oct 18 16:36:11 UTC 2023 kill -USR1 31397 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31397 killed at Wed Oct 18 16:36:11 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:36:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:36:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31437 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31437 found at Wed Oct 18 16:36:11 UTC 2023 selfserv_9997 with PID 31437 started at Wed Oct 18 16:36:11 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1264: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31437 at Wed Oct 18 16:36:12 UTC 2023 kill -USR1 31437 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31437 killed at Wed Oct 18 16:36:12 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:36:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:36:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31477 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31477 found at Wed Oct 18 16:36:12 UTC 2023 selfserv_9997 with PID 31477 started at Wed Oct 18 16:36:12 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1265: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31477 at Wed Oct 18 16:36:13 UTC 2023 kill -USR1 31477 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31477 killed at Wed Oct 18 16:36:13 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:36:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:36:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31517 found at Wed Oct 18 16:36:13 UTC 2023 selfserv_9997 with PID 31517 started at Wed Oct 18 16:36:13 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1266: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31517 at Wed Oct 18 16:36:14 UTC 2023 kill -USR1 31517 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31517 killed at Wed Oct 18 16:36:14 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:36:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:36:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31558 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31558 found at Wed Oct 18 16:36:15 UTC 2023 selfserv_9997 with PID 31558 started at Wed Oct 18 16:36:15 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1267: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31558 at Wed Oct 18 16:36:16 UTC 2023 kill -USR1 31558 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31558 killed at Wed Oct 18 16:36:16 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:36:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:36:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31598 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31598 found at Wed Oct 18 16:36:16 UTC 2023 selfserv_9997 with PID 31598 started at Wed Oct 18 16:36:16 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1268: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31598 at Wed Oct 18 16:36:17 UTC 2023 kill -USR1 31598 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31598 killed at Wed Oct 18 16:36:17 UTC 2023 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -fips false -force FIPS mode disabled. ssl.sh: #1269: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/server -list ssl.sh: #1270: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1271: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1272: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_server -list ssl.sh: #1273: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1274: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -fips true -force FIPS mode enabled. ssl.sh: #1275: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -list ssl.sh: #1276: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1277: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1278: (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -list ssl.sh: #1279: (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1280: (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9997 starting at Wed Oct 18 16:36:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:36:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 31720 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31720 found at Wed Oct 18 16:36:19 UTC 2023 selfserv_9997 with PID 31720 started at Wed Oct 18 16:36:19 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1281: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1282: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1283: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1284: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1285: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1286: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1287: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1288: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1289: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1290: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1291: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1292: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1293: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1294: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1295: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1296: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1297: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1298: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1299: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1300: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1301: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1302: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1303: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1304: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1305: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1306: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1307: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1308: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1309: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1310: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1311: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1312: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1313: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1314: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1315: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1316: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1317: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1318: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1319: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1320: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1321: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1322: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1323: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1324: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1325: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1326: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1327: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1328: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1329: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1330: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1331: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 31720 at Wed Oct 18 16:36:37 UTC 2023 kill -USR1 31720 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31720 killed at Wed Oct 18 16:36:37 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 16:36:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:36:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 32271 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32271 found at Wed Oct 18 16:36:37 UTC 2023 selfserv_9997 with PID 32271 started at Wed Oct 18 16:36:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1332: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1333: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1334: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1335: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1336: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1337: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1338: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1339: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1340: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1341: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1342: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1343: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1344: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1345: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1346: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1347: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1348: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1349: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1350: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1351: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1352: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1353: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1354: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1355: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1356: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1357: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1358: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1359: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1360: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1361: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1362: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1363: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1364: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1365: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1366: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1367: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1368: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1369: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1370: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1371: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1372: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1373: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1374: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1402: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1403: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1404: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1405: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1406: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1407: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32271 at Wed Oct 18 16:37:05 UTC 2023 kill -USR1 32271 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32271 killed at Wed Oct 18 16:37:05 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9997 starting at Wed Oct 18 16:37:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:37:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 628 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 628 found at Wed Oct 18 16:37:06 UTC 2023 selfserv_9997 with PID 628 started at Wed Oct 18 16:37:06 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1408: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1409: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 628 at Wed Oct 18 16:37:07 UTC 2023 kill -USR1 628 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 628 killed at Wed Oct 18 16:37:07 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:37:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:37:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 715 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 715 found at Wed Oct 18 16:37:07 UTC 2023 selfserv_9997 with PID 715 started at Wed Oct 18 16:37:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1408: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 715 at Wed Oct 18 16:37:08 UTC 2023 kill -USR1 715 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 715 killed at Wed Oct 18 16:37:08 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:37:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:37:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 777 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 777 found at Wed Oct 18 16:37:09 UTC 2023 selfserv_9997 with PID 777 started at Wed Oct 18 16:37:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1409: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 777 at Wed Oct 18 16:37:33 UTC 2023 kill -USR1 777 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 777 killed at Wed Oct 18 16:37:33 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:37:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:37:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 847 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 847 found at Wed Oct 18 16:37:33 UTC 2023 selfserv_9997 with PID 847 started at Wed Oct 18 16:37:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1410: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 847 at Wed Oct 18 16:37:34 UTC 2023 kill -USR1 847 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 847 killed at Wed Oct 18 16:37:34 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:37:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:37:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 927 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 927 found at Wed Oct 18 16:37:35 UTC 2023 selfserv_9997 with PID 927 started at Wed Oct 18 16:37:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1411: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 927 at Wed Oct 18 16:37:36 UTC 2023 kill -USR1 927 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 927 killed at Wed Oct 18 16:37:36 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:37:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:37:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 982 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 982 found at Wed Oct 18 16:37:36 UTC 2023 selfserv_9997 with PID 982 started at Wed Oct 18 16:37:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1412: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 982 at Wed Oct 18 16:38:00 UTC 2023 kill -USR1 982 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 982 killed at Wed Oct 18 16:38:00 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:38:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:38:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1049 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1049 found at Wed Oct 18 16:38:00 UTC 2023 selfserv_9997 with PID 1049 started at Wed Oct 18 16:38:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1413: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1049 at Wed Oct 18 16:38:01 UTC 2023 kill -USR1 1049 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1049 killed at Wed Oct 18 16:38:01 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:38:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:38:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1115 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1115 found at Wed Oct 18 16:38:01 UTC 2023 selfserv_9997 with PID 1115 started at Wed Oct 18 16:38:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1414: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1115 at Wed Oct 18 16:38:03 UTC 2023 kill -USR1 1115 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1115 killed at Wed Oct 18 16:38:03 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:38:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:38:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1188 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1188 found at Wed Oct 18 16:38:03 UTC 2023 selfserv_9997 with PID 1188 started at Wed Oct 18 16:38:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1415: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1188 at Wed Oct 18 16:38:27 UTC 2023 kill -USR1 1188 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1188 killed at Wed Oct 18 16:38:27 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:38:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:38:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1242 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1242 found at Wed Oct 18 16:38:28 UTC 2023 selfserv_9997 with PID 1242 started at Wed Oct 18 16:38:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1242 at Wed Oct 18 16:38:29 UTC 2023 kill -USR1 1242 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1242 killed at Wed Oct 18 16:38:29 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:38:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:38:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1315 found at Wed Oct 18 16:38:29 UTC 2023 selfserv_9997 with PID 1315 started at Wed Oct 18 16:38:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1417: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1315 at Wed Oct 18 16:38:31 UTC 2023 kill -USR1 1315 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1315 killed at Wed Oct 18 16:38:31 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:38:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:38:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1368 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1368 found at Wed Oct 18 16:38:31 UTC 2023 selfserv_9997 with PID 1368 started at Wed Oct 18 16:38:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1418: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1368 at Wed Oct 18 16:38:55 UTC 2023 kill -USR1 1368 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1368 killed at Wed Oct 18 16:38:55 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:38:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:38:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1436 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1436 found at Wed Oct 18 16:38:55 UTC 2023 selfserv_9997 with PID 1436 started at Wed Oct 18 16:38:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1436 at Wed Oct 18 16:38:57 UTC 2023 kill -USR1 1436 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1436 killed at Wed Oct 18 16:38:57 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:38:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:38:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1500 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1500 found at Wed Oct 18 16:38:57 UTC 2023 selfserv_9997 with PID 1500 started at Wed Oct 18 16:38:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1420: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1500 at Wed Oct 18 16:38:59 UTC 2023 kill -USR1 1500 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1500 killed at Wed Oct 18 16:38:59 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:38:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:38:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1552 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1552 found at Wed Oct 18 16:38:59 UTC 2023 selfserv_9997 with PID 1552 started at Wed Oct 18 16:38:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1421: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1552 at Wed Oct 18 16:39:22 UTC 2023 kill -USR1 1552 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1552 killed at Wed Oct 18 16:39:22 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:39:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:39:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1604 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1604 found at Wed Oct 18 16:39:22 UTC 2023 selfserv_9997 with PID 1604 started at Wed Oct 18 16:39:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1422: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1604 at Wed Oct 18 16:39:24 UTC 2023 kill -USR1 1604 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1604 killed at Wed Oct 18 16:39:24 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:39:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:39:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1660 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1660 found at Wed Oct 18 16:39:24 UTC 2023 selfserv_9997 with PID 1660 started at Wed Oct 18 16:39:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1660 at Wed Oct 18 16:39:25 UTC 2023 kill -USR1 1660 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1660 killed at Wed Oct 18 16:39:25 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:39:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:39:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1716 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1716 found at Wed Oct 18 16:39:26 UTC 2023 selfserv_9997 with PID 1716 started at Wed Oct 18 16:39:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1424: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1716 at Wed Oct 18 16:39:27 UTC 2023 kill -USR1 1716 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1716 killed at Wed Oct 18 16:39:27 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:39:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:39:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1772 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1772 found at Wed Oct 18 16:39:27 UTC 2023 selfserv_9997 with PID 1772 started at Wed Oct 18 16:39:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1772 at Wed Oct 18 16:39:29 UTC 2023 kill -USR1 1772 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1772 killed at Wed Oct 18 16:39:29 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:39:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:39:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1833 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1833 found at Wed Oct 18 16:39:29 UTC 2023 selfserv_9997 with PID 1833 started at Wed Oct 18 16:39:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1426: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1833 at Wed Oct 18 16:39:53 UTC 2023 kill -USR1 1833 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1833 killed at Wed Oct 18 16:39:53 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:39:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:39:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1900 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1900 found at Wed Oct 18 16:39:54 UTC 2023 selfserv_9997 with PID 1900 started at Wed Oct 18 16:39:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1427: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1900 at Wed Oct 18 16:39:55 UTC 2023 kill -USR1 1900 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1900 killed at Wed Oct 18 16:39:55 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:39:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:39:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1960 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1960 found at Wed Oct 18 16:39:55 UTC 2023 selfserv_9997 with PID 1960 started at Wed Oct 18 16:39:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1428: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1960 at Wed Oct 18 16:40:18 UTC 2023 kill -USR1 1960 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1960 killed at Wed Oct 18 16:40:18 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:40:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:40:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2012 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2012 found at Wed Oct 18 16:40:18 UTC 2023 selfserv_9997 with PID 2012 started at Wed Oct 18 16:40:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1429: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2012 at Wed Oct 18 16:40:20 UTC 2023 kill -USR1 2012 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2012 killed at Wed Oct 18 16:40:20 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:40:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:40:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2073 found at Wed Oct 18 16:40:20 UTC 2023 selfserv_9997 with PID 2073 started at Wed Oct 18 16:40:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1430: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2073 at Wed Oct 18 16:40:44 UTC 2023 kill -USR1 2073 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2073 killed at Wed Oct 18 16:40:44 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:40:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:40:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2141 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2141 found at Wed Oct 18 16:40:44 UTC 2023 selfserv_9997 with PID 2141 started at Wed Oct 18 16:40:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1431: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2141 at Wed Oct 18 16:40:45 UTC 2023 kill -USR1 2141 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2141 killed at Wed Oct 18 16:40:45 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:40:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:40:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2201 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2201 found at Wed Oct 18 16:40:46 UTC 2023 selfserv_9997 with PID 2201 started at Wed Oct 18 16:40:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1432: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2201 at Wed Oct 18 16:41:10 UTC 2023 kill -USR1 2201 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2201 killed at Wed Oct 18 16:41:10 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:41:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:41:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2253 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2253 found at Wed Oct 18 16:41:10 UTC 2023 selfserv_9997 with PID 2253 started at Wed Oct 18 16:41:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1433: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2253 at Wed Oct 18 16:41:11 UTC 2023 kill -USR1 2253 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2253 killed at Wed Oct 18 16:41:11 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:41:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:41:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2313 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2313 found at Wed Oct 18 16:41:11 UTC 2023 selfserv_9997 with PID 2313 started at Wed Oct 18 16:41:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1434: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2313 at Wed Oct 18 16:41:35 UTC 2023 kill -USR1 2313 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2313 killed at Wed Oct 18 16:41:35 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:41:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:41:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2365 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2365 found at Wed Oct 18 16:41:35 UTC 2023 selfserv_9997 with PID 2365 started at Wed Oct 18 16:41:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1435: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2365 at Wed Oct 18 16:41:36 UTC 2023 kill -USR1 2365 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2365 killed at Wed Oct 18 16:41:36 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:41:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:41:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2417 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2417 found at Wed Oct 18 16:41:36 UTC 2023 selfserv_9997 with PID 2417 started at Wed Oct 18 16:41:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1436: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2417 at Wed Oct 18 16:41:38 UTC 2023 kill -USR1 2417 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2417 killed at Wed Oct 18 16:41:38 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:41:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:41:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2490 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2490 found at Wed Oct 18 16:41:38 UTC 2023 selfserv_9997 with PID 2490 started at Wed Oct 18 16:41:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1437: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2490 at Wed Oct 18 16:41:40 UTC 2023 kill -USR1 2490 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2490 killed at Wed Oct 18 16:41:40 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 16:41:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:41:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2548 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2548 found at Wed Oct 18 16:41:40 UTC 2023 selfserv_9997 with PID 2548 started at Wed Oct 18 16:41:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1438: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2548 at Wed Oct 18 16:41:41 UTC 2023 kill -USR1 2548 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2548 killed at Wed Oct 18 16:41:41 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 16:41:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:41:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2610 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2610 found at Wed Oct 18 16:41:41 UTC 2023 selfserv_9997 with PID 2610 started at Wed Oct 18 16:41:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1439: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2610 at Wed Oct 18 16:41:43 UTC 2023 kill -USR1 2610 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2610 killed at Wed Oct 18 16:41:43 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 16:41:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:41:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2680 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2680 found at Wed Oct 18 16:41:43 UTC 2023 selfserv_9997 with PID 2680 started at Wed Oct 18 16:41:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1440: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2680 at Wed Oct 18 16:41:44 UTC 2023 kill -USR1 2680 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2680 killed at Wed Oct 18 16:41:44 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 16:41:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:41:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2742 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2742 found at Wed Oct 18 16:41:44 UTC 2023 selfserv_9997 with PID 2742 started at Wed Oct 18 16:41:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1441: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2742 at Wed Oct 18 16:41:45 UTC 2023 kill -USR1 2742 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2742 killed at Wed Oct 18 16:41:45 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9997 starting at Wed Oct 18 16:41:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:41:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2800 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2800 found at Wed Oct 18 16:41:46 UTC 2023 selfserv_9997 with PID 2800 started at Wed Oct 18 16:41:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1442: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2800 at Wed Oct 18 16:41:47 UTC 2023 kill -USR1 2800 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2800 killed at Wed Oct 18 16:41:47 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 16:41:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:41:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2858 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2858 found at Wed Oct 18 16:41:47 UTC 2023 selfserv_9997 with PID 2858 started at Wed Oct 18 16:41:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1443: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2858 at Wed Oct 18 16:41:48 UTC 2023 kill -USR1 2858 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2858 killed at Wed Oct 18 16:41:48 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 16:41:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:41:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2917 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2917 found at Wed Oct 18 16:41:48 UTC 2023 selfserv_9997 with PID 2917 started at Wed Oct 18 16:41:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1444: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2917 at Wed Oct 18 16:41:50 UTC 2023 kill -USR1 2917 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2917 killed at Wed Oct 18 16:41:50 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9997 starting at Wed Oct 18 16:41:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:41:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2976 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2976 found at Wed Oct 18 16:41:50 UTC 2023 selfserv_9997 with PID 2976 started at Wed Oct 18 16:41:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1445: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2976 at Wed Oct 18 16:41:51 UTC 2023 kill -USR1 2976 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2976 killed at Wed Oct 18 16:41:51 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9997 starting at Wed Oct 18 16:41:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:41:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3034 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3034 found at Wed Oct 18 16:41:52 UTC 2023 selfserv_9997 with PID 3034 started at Wed Oct 18 16:41:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1446: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3034 at Wed Oct 18 16:41:53 UTC 2023 kill -USR1 3034 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3034 killed at Wed Oct 18 16:41:53 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 16:41:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:41:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3092 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3092 found at Wed Oct 18 16:41:53 UTC 2023 selfserv_9997 with PID 3092 started at Wed Oct 18 16:41:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1447: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3092 at Wed Oct 18 16:41:54 UTC 2023 kill -USR1 3092 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3092 killed at Wed Oct 18 16:41:54 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9997 starting at Wed Oct 18 16:41:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:41:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3134 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3134 found at Wed Oct 18 16:41:54 UTC 2023 selfserv_9997 with PID 3134 started at Wed Oct 18 16:41:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1408: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3134 at Wed Oct 18 16:41:55 UTC 2023 kill -USR1 3134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3134 killed at Wed Oct 18 16:41:55 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9997 starting at Wed Oct 18 16:41:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:41:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3176 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3176 found at Wed Oct 18 16:41:55 UTC 2023 selfserv_9997 with PID 3176 started at Wed Oct 18 16:41:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1409: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9997 with PID 3176 at Wed Oct 18 16:41:57 UTC 2023 kill -USR1 3176 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3176 killed at Wed Oct 18 16:41:57 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9997 starting at Wed Oct 18 16:41:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:41:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3218 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3218 found at Wed Oct 18 16:41:57 UTC 2023 selfserv_9997 with PID 3218 started at Wed Oct 18 16:41:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1410: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 3218 at Wed Oct 18 16:41:58 UTC 2023 kill -USR1 3218 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3218 killed at Wed Oct 18 16:41:58 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9997 starting at Wed Oct 18 16:41:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:41:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3260 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3260 found at Wed Oct 18 16:41:58 UTC 2023 selfserv_9997 with PID 3260 started at Wed Oct 18 16:41:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1411: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 3260 at Wed Oct 18 16:41:59 UTC 2023 kill -USR1 3260 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3260 killed at Wed Oct 18 16:41:59 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9997 starting at Wed Oct 18 16:41:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:41:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3302 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3302 found at Wed Oct 18 16:41:59 UTC 2023 selfserv_9997 with PID 3302 started at Wed Oct 18 16:41:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1412: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 3302 at Wed Oct 18 16:42:00 UTC 2023 kill -USR1 3302 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3302 killed at Wed Oct 18 16:42:00 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9997 starting at Wed Oct 18 16:42:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3344 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3344 found at Wed Oct 18 16:42:00 UTC 2023 selfserv_9997 with PID 3344 started at Wed Oct 18 16:42:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1413: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 3344 at Wed Oct 18 16:42:01 UTC 2023 kill -USR1 3344 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3344 killed at Wed Oct 18 16:42:01 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9997 starting at Wed Oct 18 16:42:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3386 found at Wed Oct 18 16:42:01 UTC 2023 selfserv_9997 with PID 3386 started at Wed Oct 18 16:42:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1414: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 3386 at Wed Oct 18 16:42:02 UTC 2023 kill -USR1 3386 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3386 killed at Wed Oct 18 16:42:02 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9997 starting at Wed Oct 18 16:42:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3428 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3428 found at Wed Oct 18 16:42:03 UTC 2023 selfserv_9997 with PID 3428 started at Wed Oct 18 16:42:03 UTC 2023 strsclnt -q -p 9997 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 16:42:03 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 16:42:19 UTC 2023 ssl.sh: #1415: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9997 with PID 3428 at Wed Oct 18 16:42:19 UTC 2023 kill -USR1 3428 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3428 killed at Wed Oct 18 16:42:19 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 16:42:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3479 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3479 found at Wed Oct 18 16:42:19 UTC 2023 selfserv_9997 with PID 3479 started at Wed Oct 18 16:42:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1416: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3479 at Wed Oct 18 16:42:20 UTC 2023 kill -USR1 3479 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3479 killed at Wed Oct 18 16:42:20 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:42:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3521 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3521 found at Wed Oct 18 16:42:20 UTC 2023 selfserv_9997 with PID 3521 started at Wed Oct 18 16:42:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1417: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3521 at Wed Oct 18 16:42:21 UTC 2023 kill -USR1 3521 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3521 killed at Wed Oct 18 16:42:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:42:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3560 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3560 found at Wed Oct 18 16:42:21 UTC 2023 selfserv_9997 with PID 3560 started at Wed Oct 18 16:42:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1418: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 3560 at Wed Oct 18 16:42:22 UTC 2023 kill -USR1 3560 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3560 killed at Wed Oct 18 16:42:22 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:42:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3599 found at Wed Oct 18 16:42:22 UTC 2023 selfserv_9997 with PID 3599 started at Wed Oct 18 16:42:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1419: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3599 at Wed Oct 18 16:42:23 UTC 2023 kill -USR1 3599 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3599 killed at Wed Oct 18 16:42:23 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:42:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3638 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3638 found at Wed Oct 18 16:42:23 UTC 2023 selfserv_9997 with PID 3638 started at Wed Oct 18 16:42:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1420: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 3638 at Wed Oct 18 16:42:23 UTC 2023 kill -USR1 3638 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3638 killed at Wed Oct 18 16:42:23 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:42:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3677 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3677 found at Wed Oct 18 16:42:24 UTC 2023 selfserv_9997 with PID 3677 started at Wed Oct 18 16:42:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1421: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3677 at Wed Oct 18 16:42:24 UTC 2023 kill -USR1 3677 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3677 killed at Wed Oct 18 16:42:24 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:42:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3716 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3716 found at Wed Oct 18 16:42:25 UTC 2023 selfserv_9997 with PID 3716 started at Wed Oct 18 16:42:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1422: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3716 at Wed Oct 18 16:42:25 UTC 2023 kill -USR1 3716 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3716 killed at Wed Oct 18 16:42:25 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:42:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3755 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3755 found at Wed Oct 18 16:42:25 UTC 2023 selfserv_9997 with PID 3755 started at Wed Oct 18 16:42:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1423: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3755 at Wed Oct 18 16:42:26 UTC 2023 kill -USR1 3755 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3755 killed at Wed Oct 18 16:42:26 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:42:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3794 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3794 found at Wed Oct 18 16:42:26 UTC 2023 selfserv_9997 with PID 3794 started at Wed Oct 18 16:42:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1424: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3794 at Wed Oct 18 16:42:27 UTC 2023 kill -USR1 3794 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3794 killed at Wed Oct 18 16:42:27 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:42:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3833 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3833 found at Wed Oct 18 16:42:27 UTC 2023 selfserv_9997 with PID 3833 started at Wed Oct 18 16:42:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1425: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3833 at Wed Oct 18 16:42:28 UTC 2023 kill -USR1 3833 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3833 killed at Wed Oct 18 16:42:28 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:42:28 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:28 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3873 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3873 found at Wed Oct 18 16:42:28 UTC 2023 selfserv_9997 with PID 3873 started at Wed Oct 18 16:42:28 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1426: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3873 at Wed Oct 18 16:42:29 UTC 2023 kill -USR1 3873 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3873 killed at Wed Oct 18 16:42:29 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:42:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3913 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3913 found at Wed Oct 18 16:42:29 UTC 2023 selfserv_9997 with PID 3913 started at Wed Oct 18 16:42:29 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1427: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3913 at Wed Oct 18 16:42:30 UTC 2023 kill -USR1 3913 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3913 killed at Wed Oct 18 16:42:30 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:42:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3953 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3953 found at Wed Oct 18 16:42:30 UTC 2023 selfserv_9997 with PID 3953 started at Wed Oct 18 16:42:30 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1428: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3953 at Wed Oct 18 16:42:30 UTC 2023 kill -USR1 3953 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3953 killed at Wed Oct 18 16:42:30 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:42:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3993 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3993 found at Wed Oct 18 16:42:31 UTC 2023 selfserv_9997 with PID 3993 started at Wed Oct 18 16:42:31 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1429: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3993 at Wed Oct 18 16:42:31 UTC 2023 kill -USR1 3993 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3993 killed at Wed Oct 18 16:42:31 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:42:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4033 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4033 found at Wed Oct 18 16:42:31 UTC 2023 selfserv_9997 with PID 4033 started at Wed Oct 18 16:42:31 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1430: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4033 at Wed Oct 18 16:42:32 UTC 2023 kill -USR1 4033 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4033 killed at Wed Oct 18 16:42:32 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:42:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4073 found at Wed Oct 18 16:42:32 UTC 2023 selfserv_9997 with PID 4073 started at Wed Oct 18 16:42:32 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1431: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4073 at Wed Oct 18 16:42:33 UTC 2023 kill -USR1 4073 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4073 killed at Wed Oct 18 16:42:33 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:42:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4113 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4113 found at Wed Oct 18 16:42:33 UTC 2023 selfserv_9997 with PID 4113 started at Wed Oct 18 16:42:33 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1432: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4113 at Wed Oct 18 16:42:34 UTC 2023 kill -USR1 4113 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4113 killed at Wed Oct 18 16:42:34 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:42:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4153 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4153 found at Wed Oct 18 16:42:34 UTC 2023 selfserv_9997 with PID 4153 started at Wed Oct 18 16:42:34 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1433: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4153 at Wed Oct 18 16:42:35 UTC 2023 kill -USR1 4153 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4153 killed at Wed Oct 18 16:42:35 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:42:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4193 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4193 found at Wed Oct 18 16:42:35 UTC 2023 selfserv_9997 with PID 4193 started at Wed Oct 18 16:42:35 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1434: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4193 at Wed Oct 18 16:42:36 UTC 2023 kill -USR1 4193 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4193 killed at Wed Oct 18 16:42:36 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9997 starting at Wed Oct 18 16:42:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 4233 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4233 found at Wed Oct 18 16:42:36 UTC 2023 selfserv_9997 with PID 4233 started at Wed Oct 18 16:42:36 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 4233 at Wed Oct 18 16:42:54 UTC 2023 kill -USR1 4233 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4233 killed at Wed Oct 18 16:42:54 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 16:42:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:42:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 4798 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4798 found at Wed Oct 18 16:42:55 UTC 2023 selfserv_9997 with PID 4798 started at Wed Oct 18 16:42:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1502: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1503: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1504: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1505: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1506: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1507: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1508: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1509: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1510: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1511: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1512: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1513: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1514: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1515: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1516: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1517: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1518: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1519: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1520: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1521: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1522: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1523: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1524: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1525: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1526: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1527: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1528: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1556: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1557: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1558: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1559: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1560: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1561: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4798 at Wed Oct 18 16:43:23 UTC 2023 kill -USR1 4798 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4798 killed at Wed Oct 18 16:43:23 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:43:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:43:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5622 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5622 found at Wed Oct 18 16:43:23 UTC 2023 selfserv_9997 with PID 5622 started at Wed Oct 18 16:43:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1562: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5622 at Wed Oct 18 16:43:26 UTC 2023 kill -USR1 5622 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5622 killed at Wed Oct 18 16:43:26 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:43:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:43:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5674 found at Wed Oct 18 16:43:27 UTC 2023 selfserv_9997 with PID 5674 started at Wed Oct 18 16:43:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1563: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5674 at Wed Oct 18 16:43:52 UTC 2023 kill -USR1 5674 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5674 killed at Wed Oct 18 16:43:52 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:43:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:43:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5741 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5741 found at Wed Oct 18 16:43:52 UTC 2023 selfserv_9997 with PID 5741 started at Wed Oct 18 16:43:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1564: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5741 at Wed Oct 18 16:43:55 UTC 2023 kill -USR1 5741 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5741 killed at Wed Oct 18 16:43:55 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:43:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:43:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5805 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5805 found at Wed Oct 18 16:43:55 UTC 2023 selfserv_9997 with PID 5805 started at Wed Oct 18 16:43:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1565: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5805 at Wed Oct 18 16:43:58 UTC 2023 kill -USR1 5805 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5805 killed at Wed Oct 18 16:43:58 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:43:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:43:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5857 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5857 found at Wed Oct 18 16:43:59 UTC 2023 selfserv_9997 with PID 5857 started at Wed Oct 18 16:43:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1566: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5857 at Wed Oct 18 16:44:22 UTC 2023 kill -USR1 5857 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5857 killed at Wed Oct 18 16:44:22 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:44:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:44:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5909 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5909 found at Wed Oct 18 16:44:23 UTC 2023 selfserv_9997 with PID 5909 started at Wed Oct 18 16:44:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5909 at Wed Oct 18 16:44:25 UTC 2023 kill -USR1 5909 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5909 killed at Wed Oct 18 16:44:25 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:44:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:44:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5975 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5975 found at Wed Oct 18 16:44:25 UTC 2023 selfserv_9997 with PID 5975 started at Wed Oct 18 16:44:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1568: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5975 at Wed Oct 18 16:44:29 UTC 2023 kill -USR1 5975 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5975 killed at Wed Oct 18 16:44:29 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:44:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:44:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6027 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6027 found at Wed Oct 18 16:44:29 UTC 2023 selfserv_9997 with PID 6027 started at Wed Oct 18 16:44:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1569: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6027 at Wed Oct 18 16:44:54 UTC 2023 kill -USR1 6027 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6027 killed at Wed Oct 18 16:44:54 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:44:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:44:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6098 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6098 found at Wed Oct 18 16:44:54 UTC 2023 selfserv_9997 with PID 6098 started at Wed Oct 18 16:44:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6098 at Wed Oct 18 16:44:57 UTC 2023 kill -USR1 6098 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6098 killed at Wed Oct 18 16:44:57 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:44:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:44:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6162 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6162 found at Wed Oct 18 16:44:57 UTC 2023 selfserv_9997 with PID 6162 started at Wed Oct 18 16:44:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1571: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6162 at Wed Oct 18 16:45:00 UTC 2023 kill -USR1 6162 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6162 killed at Wed Oct 18 16:45:00 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:45:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:45:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6218 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6218 found at Wed Oct 18 16:45:01 UTC 2023 selfserv_9997 with PID 6218 started at Wed Oct 18 16:45:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1572: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6218 at Wed Oct 18 16:45:26 UTC 2023 kill -USR1 6218 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6218 killed at Wed Oct 18 16:45:26 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:45:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:45:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6270 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6270 found at Wed Oct 18 16:45:26 UTC 2023 selfserv_9997 with PID 6270 started at Wed Oct 18 16:45:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1573: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6270 at Wed Oct 18 16:45:29 UTC 2023 kill -USR1 6270 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6270 killed at Wed Oct 18 16:45:29 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:45:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:45:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6334 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6334 found at Wed Oct 18 16:45:29 UTC 2023 selfserv_9997 with PID 6334 started at Wed Oct 18 16:45:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1574: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6334 at Wed Oct 18 16:45:32 UTC 2023 kill -USR1 6334 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6334 killed at Wed Oct 18 16:45:32 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:45:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:45:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6386 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6386 found at Wed Oct 18 16:45:33 UTC 2023 selfserv_9997 with PID 6386 started at Wed Oct 18 16:45:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1575: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6386 at Wed Oct 18 16:45:56 UTC 2023 kill -USR1 6386 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6386 killed at Wed Oct 18 16:45:56 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:45:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:45:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6453 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6453 found at Wed Oct 18 16:45:56 UTC 2023 selfserv_9997 with PID 6453 started at Wed Oct 18 16:45:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1576: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6453 at Wed Oct 18 16:45:59 UTC 2023 kill -USR1 6453 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6453 killed at Wed Oct 18 16:45:59 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:45:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:45:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6509 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6509 found at Wed Oct 18 16:45:59 UTC 2023 selfserv_9997 with PID 6509 started at Wed Oct 18 16:45:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1577: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6509 at Wed Oct 18 16:46:02 UTC 2023 kill -USR1 6509 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6509 killed at Wed Oct 18 16:46:02 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 16:46:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:46:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6573 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6573 found at Wed Oct 18 16:46:02 UTC 2023 selfserv_9997 with PID 6573 started at Wed Oct 18 16:46:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1578: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6573 at Wed Oct 18 16:46:05 UTC 2023 kill -USR1 6573 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6573 killed at Wed Oct 18 16:46:05 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:46:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:46:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6629 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6629 found at Wed Oct 18 16:46:05 UTC 2023 selfserv_9997 with PID 6629 started at Wed Oct 18 16:46:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1579: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6629 at Wed Oct 18 16:46:09 UTC 2023 kill -USR1 6629 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6629 killed at Wed Oct 18 16:46:09 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:46:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:46:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6689 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6689 found at Wed Oct 18 16:46:09 UTC 2023 selfserv_9997 with PID 6689 started at Wed Oct 18 16:46:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1580: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6689 at Wed Oct 18 16:46:35 UTC 2023 kill -USR1 6689 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6689 killed at Wed Oct 18 16:46:35 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:46:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:46:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6741 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6741 found at Wed Oct 18 16:46:35 UTC 2023 selfserv_9997 with PID 6741 started at Wed Oct 18 16:46:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1581: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6741 at Wed Oct 18 16:46:37 UTC 2023 kill -USR1 6741 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6741 killed at Wed Oct 18 16:46:37 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:46:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:46:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6801 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6801 found at Wed Oct 18 16:46:37 UTC 2023 selfserv_9997 with PID 6801 started at Wed Oct 18 16:46:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1582: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6801 at Wed Oct 18 16:47:01 UTC 2023 kill -USR1 6801 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6801 killed at Wed Oct 18 16:47:01 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:47:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:47:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6868 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6868 found at Wed Oct 18 16:47:01 UTC 2023 selfserv_9997 with PID 6868 started at Wed Oct 18 16:47:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1583: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6868 at Wed Oct 18 16:47:04 UTC 2023 kill -USR1 6868 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6868 killed at Wed Oct 18 16:47:04 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:47:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:47:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6928 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6928 found at Wed Oct 18 16:47:04 UTC 2023 selfserv_9997 with PID 6928 started at Wed Oct 18 16:47:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1584: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6928 at Wed Oct 18 16:47:29 UTC 2023 kill -USR1 6928 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6928 killed at Wed Oct 18 16:47:29 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:47:29 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:47:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6980 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6980 found at Wed Oct 18 16:47:29 UTC 2023 selfserv_9997 with PID 6980 started at Wed Oct 18 16:47:29 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1585: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6980 at Wed Oct 18 16:47:32 UTC 2023 kill -USR1 6980 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6980 killed at Wed Oct 18 16:47:32 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:47:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:47:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7040 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7040 found at Wed Oct 18 16:47:32 UTC 2023 selfserv_9997 with PID 7040 started at Wed Oct 18 16:47:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #1586: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7040 at Wed Oct 18 16:47:57 UTC 2023 kill -USR1 7040 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7040 killed at Wed Oct 18 16:47:57 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:47:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:47:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7111 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7111 found at Wed Oct 18 16:47:57 UTC 2023 selfserv_9997 with PID 7111 started at Wed Oct 18 16:47:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1587: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7111 at Wed Oct 18 16:48:00 UTC 2023 kill -USR1 7111 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7111 killed at Wed Oct 18 16:48:00 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 16:48:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7171 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7171 found at Wed Oct 18 16:48:00 UTC 2023 selfserv_9997 with PID 7171 started at Wed Oct 18 16:48:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #1588: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7171 at Wed Oct 18 16:48:23 UTC 2023 kill -USR1 7171 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7171 killed at Wed Oct 18 16:48:23 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:48:23 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:23 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7223 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7223 found at Wed Oct 18 16:48:24 UTC 2023 selfserv_9997 with PID 7223 started at Wed Oct 18 16:48:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1589: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7223 at Wed Oct 18 16:48:26 UTC 2023 kill -USR1 7223 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7223 killed at Wed Oct 18 16:48:26 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:48:26 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7275 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7275 found at Wed Oct 18 16:48:26 UTC 2023 selfserv_9997 with PID 7275 started at Wed Oct 18 16:48:26 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1590: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7275 at Wed Oct 18 16:48:30 UTC 2023 kill -USR1 7275 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7275 killed at Wed Oct 18 16:48:30 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 16:48:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7327 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7327 found at Wed Oct 18 16:48:30 UTC 2023 selfserv_9997 with PID 7327 started at Wed Oct 18 16:48:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1591: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7327 at Wed Oct 18 16:48:33 UTC 2023 kill -USR1 7327 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7327 killed at Wed Oct 18 16:48:33 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 16:48:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7409 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7409 found at Wed Oct 18 16:48:33 UTC 2023 selfserv_9997 with PID 7409 started at Wed Oct 18 16:48:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1562: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7409 at Wed Oct 18 16:48:35 UTC 2023 kill -USR1 7409 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7409 killed at Wed Oct 18 16:48:35 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:48:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7451 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7451 found at Wed Oct 18 16:48:35 UTC 2023 selfserv_9997 with PID 7451 started at Wed Oct 18 16:48:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7451 at Wed Oct 18 16:48:36 UTC 2023 kill -USR1 7451 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7451 killed at Wed Oct 18 16:48:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:48:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7490 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7490 found at Wed Oct 18 16:48:36 UTC 2023 selfserv_9997 with PID 7490 started at Wed Oct 18 16:48:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1564: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 7490 at Wed Oct 18 16:48:37 UTC 2023 kill -USR1 7490 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7490 killed at Wed Oct 18 16:48:37 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:48:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7529 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7529 found at Wed Oct 18 16:48:38 UTC 2023 selfserv_9997 with PID 7529 started at Wed Oct 18 16:48:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7529 at Wed Oct 18 16:48:39 UTC 2023 kill -USR1 7529 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7529 killed at Wed Oct 18 16:48:39 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:48:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7568 found at Wed Oct 18 16:48:39 UTC 2023 selfserv_9997 with PID 7568 started at Wed Oct 18 16:48:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1566: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 7568 at Wed Oct 18 16:48:40 UTC 2023 kill -USR1 7568 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7568 killed at Wed Oct 18 16:48:40 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:48:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7607 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7607 found at Wed Oct 18 16:48:40 UTC 2023 selfserv_9997 with PID 7607 started at Wed Oct 18 16:48:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1567: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7607 at Wed Oct 18 16:48:41 UTC 2023 kill -USR1 7607 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7607 killed at Wed Oct 18 16:48:41 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:48:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7646 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7646 found at Wed Oct 18 16:48:41 UTC 2023 selfserv_9997 with PID 7646 started at Wed Oct 18 16:48:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1568: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7646 at Wed Oct 18 16:48:42 UTC 2023 kill -USR1 7646 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7646 killed at Wed Oct 18 16:48:42 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:48:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7696 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7696 found at Wed Oct 18 16:48:43 UTC 2023 selfserv_9997 with PID 7696 started at Wed Oct 18 16:48:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1569: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7696 at Wed Oct 18 16:48:44 UTC 2023 kill -USR1 7696 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7696 killed at Wed Oct 18 16:48:44 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:48:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7739 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7739 found at Wed Oct 18 16:48:44 UTC 2023 selfserv_9997 with PID 7739 started at Wed Oct 18 16:48:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1570: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7739 at Wed Oct 18 16:48:45 UTC 2023 kill -USR1 7739 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7739 killed at Wed Oct 18 16:48:45 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:48:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7778 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7778 found at Wed Oct 18 16:48:45 UTC 2023 selfserv_9997 with PID 7778 started at Wed Oct 18 16:48:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1571: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7778 at Wed Oct 18 16:48:46 UTC 2023 kill -USR1 7778 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7778 killed at Wed Oct 18 16:48:46 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:48:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7817 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7817 found at Wed Oct 18 16:48:47 UTC 2023 selfserv_9997 with PID 7817 started at Wed Oct 18 16:48:47 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1572: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7817 at Wed Oct 18 16:48:48 UTC 2023 kill -USR1 7817 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7817 killed at Wed Oct 18 16:48:48 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:48:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7858 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7858 found at Wed Oct 18 16:48:48 UTC 2023 selfserv_9997 with PID 7858 started at Wed Oct 18 16:48:48 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1573: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7858 at Wed Oct 18 16:48:49 UTC 2023 kill -USR1 7858 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7858 killed at Wed Oct 18 16:48:49 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:48:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7898 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7898 found at Wed Oct 18 16:48:49 UTC 2023 selfserv_9997 with PID 7898 started at Wed Oct 18 16:48:49 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1574: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7898 at Wed Oct 18 16:48:50 UTC 2023 kill -USR1 7898 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7898 killed at Wed Oct 18 16:48:50 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:48:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7938 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7938 found at Wed Oct 18 16:48:50 UTC 2023 selfserv_9997 with PID 7938 started at Wed Oct 18 16:48:50 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1575: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 7938 at Wed Oct 18 16:48:51 UTC 2023 kill -USR1 7938 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7938 killed at Wed Oct 18 16:48:51 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:48:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7979 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7979 found at Wed Oct 18 16:48:52 UTC 2023 selfserv_9997 with PID 7979 started at Wed Oct 18 16:48:52 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1576: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7979 at Wed Oct 18 16:48:53 UTC 2023 kill -USR1 7979 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7979 killed at Wed Oct 18 16:48:53 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:48:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8019 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8019 found at Wed Oct 18 16:48:53 UTC 2023 selfserv_9997 with PID 8019 started at Wed Oct 18 16:48:53 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1577: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8019 at Wed Oct 18 16:48:54 UTC 2023 kill -USR1 8019 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8019 killed at Wed Oct 18 16:48:54 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:48:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8059 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8059 found at Wed Oct 18 16:48:54 UTC 2023 selfserv_9997 with PID 8059 started at Wed Oct 18 16:48:54 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1578: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8059 at Wed Oct 18 16:48:55 UTC 2023 kill -USR1 8059 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8059 killed at Wed Oct 18 16:48:55 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:48:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8099 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8099 found at Wed Oct 18 16:48:56 UTC 2023 selfserv_9997 with PID 8099 started at Wed Oct 18 16:48:56 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1579: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8099 at Wed Oct 18 16:48:57 UTC 2023 kill -USR1 8099 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8099 killed at Wed Oct 18 16:48:57 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 16:48:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 16:48:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8139 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8139 found at Wed Oct 18 16:48:57 UTC 2023 selfserv_9997 with PID 8139 started at Wed Oct 18 16:48:57 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1580: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8139 at Wed Oct 18 16:48:58 UTC 2023 kill -USR1 8139 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8139 killed at Wed Oct 18 16:48:58 UTC 2023 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -fips false -force FIPS mode disabled. ssl.sh: #1581: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/client -list ssl.sh: #1582: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1583: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -fips false -force FIPS mode disabled. ssl.sh: #1584: (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/ext_client -list ssl.sh: #1585: (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1586: (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Wed Oct 18 16:48:59 UTC 2023 Running tests for ocsp TIMESTAMP ocsp BEGIN: Wed Oct 18 16:48:59 UTC 2023 ocsp.sh: OCSP tests =============================== TIMESTAMP ocsp END: Wed Oct 18 16:48:59 UTC 2023 Running tests for merge TIMESTAMP merge BEGIN: Wed Oct 18 16:48:59 UTC 2023 merge.sh: Merge Tests =============================== merge.sh: Creating an SDR key & Encrypt sdrtest -d . -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests.v3.17687 -t Test2 -f ../tests.pw merge.sh: #1: Creating SDR Key - PASSED merge.sh: Merging in Key for Existing user certutil --merge --source-dir ../dave -d . -f ../tests.pw -@ ../tests.pw merge.sh: #2: Merging Dave - PASSED merge.sh: Merging in new user certutil --merge --source-dir ../server -d . -f ../tests.pw -@ ../tests.pw merge.sh: #3: Merging server - PASSED merge.sh: Merging in new chain certutil --merge --source-dir ../ext_client -d . -f ../tests.pw -@ ../tests.pw merge.sh: #4: Merging ext_client - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict1 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #5: Merging conflicting nicknames 1 - PASSED merge.sh: Merging in conflicting nicknames 1 certutil --merge --source-dir conflict2 -d . -f ../tests.pw -@ ../tests.pw merge.sh: #6: Merging conflicting nicknames 2 - PASSED merge.sh: Verify nicknames were deconflicted (Alice #4) Certificate: Data: Version: 3 (0x2) Serial Number: 45 (0x2d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:46:22 2023 Not After : Wed Oct 18 15:46:22 2028 Subject: "CN=TestUser45,E=TestUser45@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:ec:da:e4:1d:c3:65:bc:f1:77:98:52:0a:86:c9:43: c1:e3:5c:12:37:30:44:f5:a5:5b:43:1a:8a:25:b7:d0: 08:a3:9e:d9:e5:9b:72:eb:d3:00:ac:3b:32:c2:6d:c5: 44:40:eb:ab:71:d7:91:0b:90:71:96:fa:a1:ea:3b:1d: 31:9e:b7:02:e4:1a:39:5a:cd:ed:28:85:6e:0b:66:34: 0f:73:19:96:f0:6d:f9:ac:e4:6b:ec:3c:71:f8:d0:c9: bd:44:4a:32:fc:35:3d:e1:fa:5d:a9:f5:a0:d6:3c:34: b2:69:46:5c:4f:fb:b5:39:f3:39:5c:11:fc:dc:9f:85: f2:74:47:7e:1b:ec:00:a1:e8:35:f1:4a:58:72:81:d0: 12:f8:88:d7:e7:85:ac:e7:38:aa:85:73:0c:75:e3:7d: 53:f8:5d:8d:1b:f2:af:a9:52:e1:f9:aa:3e:4f:ae:f5: c9:5a:e4:40:49:f4:7d:41:7a:9a:5e:a6:7f:72:c2:57: ae:1a:99:2c:4f:57:5f:a4:e9:9e:9c:cd:e4:64:2f:96: be:d6:62:75:89:2e:15:38:ac:f3:e1:98:4f:b5:e4:90: b0:c9:f8:91:55:80:6d:e7:71:58:35:ea:5f:ab:02:26: cc:99:50:c7:f7:2b:ec:a7:4f:83:3d:8b:39:b9:b8:e9 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8e:8f:de:bc:7a:4c:c6:69:9b:09:44:ba:ec:4c:3e:05: 11:09:e0:f1:a0:e6:84:c9:4d:c8:67:6f:58:00:c8:6c: 0b:2b:7e:43:58:ad:ba:b5:e7:b7:65:28:18:f4:4d:4e: df:ed:bb:3f:01:5a:1f:09:1e:43:78:c8:8f:4d:2c:61: 0e:d8:b6:ed:39:a2:b0:99:b4:b2:bc:30:dc:5b:37:24: c5:1e:01:e5:36:13:4c:ce:cc:dc:23:fe:68:a4:32:c2: 53:6c:0c:e2:18:f1:2d:19:b0:f5:68:33:42:c6:61:97: 52:ae:fe:2e:84:75:c6:8f:f5:67:ae:80:5c:a2:2f:16: c3:cb:08:28:d6:af:89:59:4d:c0:68:0d:83:ed:0b:44: d2:3d:f2:2a:b5:8f:9a:ac:1e:8e:7c:49:25:db:c1:66: 4b:a6:3d:af:4b:1e:50:27:f0:27:18:12:8c:b2:03:e5: 2a:a0:7d:34:89:b4:6e:1f:e7:ba:05:2f:9f:51:90:a0: d3:eb:19:c9:72:88:3b:78:d5:3e:63:3a:6e:32:a7:1e: 18:a5:c5:66:94:5a:ac:b4:c3:1f:84:37:63:2b:6a:8f: 4c:e6:c6:35:20:f7:62:36:31:a1:96:72:55:2b:ba:47: 86:e3:04:1e:66:29:ca:05:79:60:4c:94:9f:7b:10:da Fingerprint (SHA-256): B7:80:9B:EB:8E:99:82:F5:73:49:F7:48:91:4C:AC:2A:A7:6D:1C:7A:14:38:72:FE:12:7B:FF:1C:DE:41:FC:10 Fingerprint (SHA1): 30:7B:A5:59:8D:9C:CA:F6:87:D5:EA:26:F1:53:D5:F9:8C:88:CC:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #7: Verify nicknames were deconflicted (Alice #4) - PASSED merge.sh: Verify nicknames were deconflicted (Alice #100) Certificate: Data: Version: 3 (0x2) Serial Number: 46 (0x2e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Wed Oct 18 15:46:33 2023 Not After : Wed Oct 18 15:46:33 2028 Subject: "CN=TestUser46,E=TestUser46@example.com,O=BOGUS NSS,L=Mounta in View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:90:2a:28:b7:28:46:ab:ad:0a:90:f3:ff:56:e2:1f: 83:04:99:fe:f0:22:0d:a1:7d:59:4f:b3:a7:c6:a6:50: 0a:18:a3:2f:51:1a:71:c7:cf:49:46:c5:52:68:7a:30: d8:1e:6d:ed:ad:9f:d3:5a:7f:e4:fd:93:60:55:da:bc: 49:07:77:4c:c3:ba:a7:67:b1:5b:10:c7:1e:cd:3a:4f: c3:7e:23:e7:85:3b:4f:cb:ed:10:96:dc:ac:ce:9d:81: 4a:52:5c:36:1b:6a:c5:74:39:cb:23:e9:d9:ea:3c:91: 1b:e8:90:0a:b9:20:53:92:8b:25:ac:8b:03:89:92:be: 92:60:1c:da:eb:5a:14:40:3f:e0:41:86:20:56:d5:30: 26:09:a5:da:43:42:b2:ad:94:6d:6f:0e:59:7e:4e:23: 92:00:cc:2d:e1:8c:d4:51:10:d0:4b:38:cc:af:9f:cc: c4:27:42:e9:15:d2:65:81:ce:8a:9f:7f:0c:ba:b9:67: a0:3d:8a:3a:2a:0d:cb:35:44:13:08:f2:21:bc:96:db: c1:d9:a2:70:26:cf:67:a6:7d:26:84:da:bb:a5:cf:3c: 4d:aa:7f:69:1c:e5:2c:10:e0:c6:b9:af:ca:1a:91:77: aa:17:37:7d:e1:5c:c2:6e:bd:32:fc:b1:17:c4:78:4d Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:86:97:20:bb:24:d5:e2:4e:69:23:63:0b:27:21:16: a6:63:a3:11:26:e3:c1:a9:ec:b1:f5:d8:a3:f2:b8:cd: 8d:fa:0c:61:97:bc:3f:d0:fa:ed:a6:5c:3e:26:fe:28: cb:1f:ee:f2:dc:79:49:12:5c:ce:46:59:fa:00:6d:e4: 7f:09:7b:41:84:0c:2d:2a:7c:cc:09:69:de:bb:08:55: 25:f0:7a:3f:43:e5:99:73:86:ee:a8:94:22:53:86:91: 1a:94:07:1b:0e:a2:01:83:f0:ce:1f:c5:9e:95:5a:08: e1:26:10:ce:f8:32:fe:f5:9b:e1:57:5d:5a:b5:b3:b2: 71:88:67:c3:09:56:3c:d4:13:8c:8d:0a:2f:e4:5e:98: 77:e2:4c:91:db:b1:e2:eb:13:90:08:e5:e2:57:42:34: 59:0f:8a:9f:dd:e1:d1:9f:67:51:b6:47:52:9d:11:c7: f1:d9:29:30:a1:13:a9:2c:20:3f:01:f1:28:f4:e5:aa: 42:73:f0:53:23:a8:7b:f1:f7:36:24:c3:b1:da:38:2e: 9c:73:39:17:56:a2:cc:cb:9f:69:27:fd:9a:7f:da:d3: fd:f2:ed:a7:8d:48:2c:cd:ac:80:2c:37:9d:b5:6b:fa: 09:51:1d:f7:85:58:e9:ba:f7:a5:27:43:14:fe:ab:7b Fingerprint (SHA-256): 9F:F1:56:B7:BA:CC:78:6F:95:EF:A0:08:C8:67:E6:A3:CE:FC:D8:34:9C:9A:2D:10:CC:85:EA:F0:37:67:12:91 Fingerprint (SHA1): A2:62:DE:1F:40:6C:C4:A2:70:8B:B5:77:9E:71:B1:AB:48:28:39:46 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: merge.sh: #8: Verify nicknames were deconflicted (Alice #100) - PASSED merge.sh: Merging in SDR certutil --merge --source-dir ../SDR -d . -f ../tests.pw -@ ../tests.pw merge.sh: #9: Merging SDR - PASSED Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI TestCA CT,C,C TestCA-dsa CT,C,C TestCA-ec CT,C,C Alice u,u,u Alice-dsa u,u,u Alice-dsamixed u,u,u Alice-ec u,u,u Alice-ecmixed u,u,u TestUser-rsa-pss-interop u,u,u Alice-rsa-pss u,u,u bob@example.com ,, Dave u,u,u eve@example.com ,, bob-ec@example.com ,, Dave-ec u,u,u Dave-dsa u,u,u Dave-dsamixed u,u,u Dave-ecmixed u,u,u Dave-rsa-pss u,u,u localhost.localdomain u,u,u localhost.localdomain-dsa u,u,u localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u localhost.localdomain-ecmixed u,u,u localhost.localdomain-rsa-pss u,u,u localhost-sni.localdomain u,u,u localhost-sni.localdomain-dsa u,u,u localhost-sni.localdomain-dsamixed u,u,u localhost-sni.localdomain-ec u,u,u localhost-sni.localdomain-ecmixed u,u,u localhost-sni.localdomain-rsa-pss u,u,u ExtendedSSLUser u,u,u serverCA C,C,C ExtendedSSLUser-dsa u,u,u serverCA-dsa C,C,C ExtendedSSLUser-dsamixed u,u,u ExtendedSSLUser-ec u,u,u serverCA-ec C,C,C ExtendedSSLUser-ecmixed u,u,u chain-2-clientCA-dsa ,, chain-2-clientCA ,, clientCA-ec T,C,C clientCA-dsa T,C,C chain-1-clientCA-dsa ,, chain-2-clientCA-ec ,, chain-1-clientCA ,, clientCA T,C,C chain-1-clientCA-ec ,, Alice #2 ,, Alice #1 ,, Alice #99 ,, Alice #3 ,, Alice #4 ,, Alice #100 ,, CRL names CRL Type TestCA CRL TestCA-ec CRL merge.sh: Decrypt - With Original SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests.v3.17687 -t Test2 -f ../tests.pw merge.sh: #10: Decrypt - Value 3 - PASSED merge.sh: Decrypt - With Merged SDR Key sdrtest -d . -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests.v1.17687 -t Test1 -f ../tests.pw merge.sh: #11: Decrypt - Value 1 - PASSED merge.sh: Signing with merged key ------------------ cmsutil -S -T -N Dave -H SHA1 -i alice.txt -d . -p nss -o dave.dsig merge.sh: #12: Create Detached Signature Dave . - PASSED cmsutil -D -i dave.dsig -c alice.txt -d . This is a test message from Alice to Bob. merge.sh: #13: Verifying Dave's Detached Signature - PASSED merge.sh: verifying merged cert ------------------ certutil -V -n ExtendedSSLUser -u C -d . certutil: certificate is valid merge.sh: #14: Verifying ExtendedSSL User Cert - PASSED merge.sh: verifying merged crl ------------------ crlutil -L -n TestCA -d . CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US" This Update: Wed Oct 18 15:48:09 2023 Entry 1 (0x1): Serial Number: 40 (0x28) Revocation Date: Wed Oct 18 15:39:29 2023 Entry Extensions: Name: CRL reason code Entry 2 (0x2): Serial Number: 42 (0x2a) Revocation Date: Wed Oct 18 15:48:03 2023 CRL Extensions: Name: Certificate Issuer Alt Name RFC822 Name: "caemail@ca.com" DNS name: "ca.com" Directory Name: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=Califo rnia,C=US" URI: "http://ca.com" IP Address: 87:0b:31:39:32:2e:31:36:38:2e:30:2e:31 merge.sh: #15: Verifying TestCA CRL - PASSED TEST_MODE=SHARED_DB NSS_DEFAULT_DB_TYPE=sql TIMESTAMP merge END: Wed Oct 18 16:49:41 UTC 2023 Running tests for pkits TIMESTAMP pkits BEGIN: Wed Oct 18 16:49:41 UTC 2023 pkits.sh: PKITS data directory not defined, skipping. TIMESTAMP pkits END: Wed Oct 18 16:49:41 UTC 2023 Running tests for chains TIMESTAMP chains BEGIN: Wed Oct 18 16:49:41 UTC 2023 chains.sh: Certificate Chains Tests =============================== chains.sh: Creating DB OCSPRootDB certutil -N -d OCSPRootDB -f OCSPRootDB/dbpasswd chains.sh: #1: OCSPD: Creating DB OCSPRootDB - PASSED chains.sh: Creating Root CA OCSPRoot certutil -s "CN=OCSPRoot ROOT CA, O=OCSPRoot, C=US" -S -n OCSPRoot -t CTu,CTu,CTu -v 600 -x -d OCSPRootDB -1 -2 -5 -f OCSPRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018164942 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #2: OCSPD: Creating Root CA OCSPRoot - PASSED chains.sh: Exporting Root CA OCSPRoot.der certutil -L -d OCSPRootDB -r -n OCSPRoot -o OCSPRoot.der chains.sh: #3: OCSPD: Exporting Root CA OCSPRoot.der - PASSED chains.sh: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPRootDB -o OCSPRoot.p12 -n OCSPRoot -k OCSPRootDB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #4: OCSPD: Exporting OCSPRoot as OCSPRoot.p12 from OCSPRootDB database - PASSED chains.sh: Creating DB OCSPCA1DB certutil -N -d OCSPCA1DB -f OCSPCA1DB/dbpasswd chains.sh: #5: OCSPD: Creating DB OCSPCA1DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA1Req.der certutil -s "CN=OCSPCA1 Intermediate, O=OCSPCA1, C=US" -R -2 -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #6: OCSPD: Creating Intermediate certifiate request OCSPCA1Req.der - PASSED chains.sh: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA1Req.der -o OCSPCA1OCSPRoot.der -f OCSPRootDB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #7: OCSPD: Creating certficate OCSPCA1OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database certutil -A -n OCSPCA1 -t u,u,u -d OCSPCA1DB -f OCSPCA1DB/dbpasswd -i OCSPCA1OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #8: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to OCSPCA1DB database - PASSED chains.sh: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA1DB -o OCSPCA1.p12 -n OCSPCA1 -k OCSPCA1DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #9: OCSPD: Exporting OCSPCA1 as OCSPCA1.p12 from OCSPCA1DB database - PASSED chains.sh: Creating DB OCSPCA2DB certutil -N -d OCSPCA2DB -f OCSPCA2DB/dbpasswd chains.sh: #10: OCSPD: Creating DB OCSPCA2DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA2Req.der certutil -s "CN=OCSPCA2 Intermediate, O=OCSPCA2, C=US" -R -2 -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #11: OCSPD: Creating Intermediate certifiate request OCSPCA2Req.der - PASSED chains.sh: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA2Req.der -o OCSPCA2OCSPRoot.der -f OCSPRootDB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #12: OCSPD: Creating certficate OCSPCA2OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database certutil -A -n OCSPCA2 -t u,u,u -d OCSPCA2DB -f OCSPCA2DB/dbpasswd -i OCSPCA2OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #13: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to OCSPCA2DB database - PASSED chains.sh: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA2DB -o OCSPCA2.p12 -n OCSPCA2 -k OCSPCA2DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #14: OCSPD: Exporting OCSPCA2 as OCSPCA2.p12 from OCSPCA2DB database - PASSED chains.sh: Creating DB OCSPCA3DB certutil -N -d OCSPCA3DB -f OCSPCA3DB/dbpasswd chains.sh: #15: OCSPD: Creating DB OCSPCA3DB - PASSED chains.sh: Creating Intermediate certifiate request OCSPCA3Req.der certutil -s "CN=OCSPCA3 Intermediate, O=OCSPCA3, C=US" -R -2 -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPCA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #16: OCSPD: Creating Intermediate certifiate request OCSPCA3Req.der - PASSED chains.sh: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot certutil -C -c OCSPRoot -v 60 -d OCSPRootDB -i OCSPCA3Req.der -o OCSPCA3OCSPRoot.der -f OCSPRootDB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10008 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #17: OCSPD: Creating certficate OCSPCA3OCSPRoot.der signed by OCSPRoot - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database certutil -A -n OCSPCA3 -t u,u,u -d OCSPCA3DB -f OCSPCA3DB/dbpasswd -i OCSPCA3OCSPRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #18: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to OCSPCA3DB database - PASSED chains.sh: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d OCSPCA3DB -o OCSPCA3.p12 -n OCSPCA3 -k OCSPCA3DB/dbpasswd -W nssnss pk12util: PKCS12 EXPORT SUCCESSFUL chains.sh: #19: OCSPD: Exporting OCSPCA3 as OCSPCA3.p12 from OCSPCA3DB database - PASSED chains.sh: Creating DB OCSPEE11DB certutil -N -d OCSPEE11DB -f OCSPEE11DB/dbpasswd chains.sh: #20: OCSPD: Creating DB OCSPEE11DB - PASSED chains.sh: Creating EE certifiate request OCSPEE11Req.der certutil -s "CN=OCSPEE11 EE, O=OCSPEE11, C=US" -R -2 -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #21: OCSPD: Creating EE certifiate request OCSPEE11Req.der - PASSED chains.sh: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE11Req.der -o OCSPEE11OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #22: OCSPD: Creating certficate OCSPEE11OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database certutil -A -n OCSPEE11 -t u,u,u -d OCSPEE11DB -f OCSPEE11DB/dbpasswd -i OCSPEE11OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #23: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to OCSPEE11DB database - PASSED chains.sh: Creating DB OCSPEE12DB certutil -N -d OCSPEE12DB -f OCSPEE12DB/dbpasswd chains.sh: #24: OCSPD: Creating DB OCSPEE12DB - PASSED chains.sh: Creating EE certifiate request OCSPEE12Req.der certutil -s "CN=OCSPEE12 EE, O=OCSPEE12, C=US" -R -2 -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #25: OCSPD: Creating EE certifiate request OCSPEE12Req.der - PASSED chains.sh: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE12Req.der -o OCSPEE12OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #26: OCSPD: Creating certficate OCSPEE12OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database certutil -A -n OCSPEE12 -t u,u,u -d OCSPEE12DB -f OCSPEE12DB/dbpasswd -i OCSPEE12OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #27: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to OCSPEE12DB database - PASSED chains.sh: Creating DB OCSPEE13DB certutil -N -d OCSPEE13DB -f OCSPEE13DB/dbpasswd chains.sh: #28: OCSPD: Creating DB OCSPEE13DB - PASSED chains.sh: Creating EE certifiate request OCSPEE13Req.der certutil -s "CN=OCSPEE13 EE, O=OCSPEE13, C=US" -R -2 -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #29: OCSPD: Creating EE certifiate request OCSPEE13Req.der - PASSED chains.sh: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE13Req.der -o OCSPEE13OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #30: OCSPD: Creating certficate OCSPEE13OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database certutil -A -n OCSPEE13 -t u,u,u -d OCSPEE13DB -f OCSPEE13DB/dbpasswd -i OCSPEE13OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #31: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to OCSPEE13DB database - PASSED chains.sh: Creating DB OCSPEE14DB certutil -N -d OCSPEE14DB -f OCSPEE14DB/dbpasswd chains.sh: #32: OCSPD: Creating DB OCSPEE14DB - PASSED chains.sh: Creating EE certifiate request OCSPEE14Req.der certutil -s "CN=OCSPEE14 EE, O=OCSPEE14, C=US" -R -2 -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE14Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #33: OCSPD: Creating EE certifiate request OCSPEE14Req.der - PASSED chains.sh: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE14Req.der -o OCSPEE14OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 4 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #34: OCSPD: Creating certficate OCSPEE14OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database certutil -A -n OCSPEE14 -t u,u,u -d OCSPEE14DB -f OCSPEE14DB/dbpasswd -i OCSPEE14OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #35: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to OCSPEE14DB database - PASSED chains.sh: Creating DB OCSPEE15DB certutil -N -d OCSPEE15DB -f OCSPEE15DB/dbpasswd chains.sh: #36: OCSPD: Creating DB OCSPEE15DB - PASSED chains.sh: Creating EE certifiate request OCSPEE15Req.der certutil -s "CN=OCSPEE15 EE, O=OCSPEE15, C=US" -R -2 -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE15Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #37: OCSPD: Creating EE certifiate request OCSPEE15Req.der - PASSED chains.sh: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 certutil -C -c OCSPCA1 -v 60 -d OCSPCA1DB -i OCSPEE15Req.der -o OCSPEE15OCSPCA1.der -f OCSPCA1DB/dbpasswd -m 5 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10008 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #38: OCSPD: Creating certficate OCSPEE15OCSPCA1.der signed by OCSPCA1 - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database certutil -A -n OCSPEE15 -t u,u,u -d OCSPEE15DB -f OCSPEE15DB/dbpasswd -i OCSPEE15OCSPCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #39: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to OCSPEE15DB database - PASSED chains.sh: Creating DB OCSPEE21DB certutil -N -d OCSPEE21DB -f OCSPEE21DB/dbpasswd chains.sh: #40: OCSPD: Creating DB OCSPEE21DB - PASSED chains.sh: Creating EE certifiate request OCSPEE21Req.der certutil -s "CN=OCSPEE21 EE, O=OCSPEE21, C=US" -R -2 -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #41: OCSPD: Creating EE certifiate request OCSPEE21Req.der - PASSED chains.sh: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE21Req.der -o OCSPEE21OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #42: OCSPD: Creating certficate OCSPEE21OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database certutil -A -n OCSPEE21 -t u,u,u -d OCSPEE21DB -f OCSPEE21DB/dbpasswd -i OCSPEE21OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #43: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to OCSPEE21DB database - PASSED chains.sh: Creating DB OCSPEE22DB certutil -N -d OCSPEE22DB -f OCSPEE22DB/dbpasswd chains.sh: #44: OCSPD: Creating DB OCSPEE22DB - PASSED chains.sh: Creating EE certifiate request OCSPEE22Req.der certutil -s "CN=OCSPEE22 EE, O=OCSPEE22, C=US" -R -2 -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE22Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #45: OCSPD: Creating EE certifiate request OCSPEE22Req.der - PASSED chains.sh: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE22Req.der -o OCSPEE22OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #46: OCSPD: Creating certficate OCSPEE22OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database certutil -A -n OCSPEE22 -t u,u,u -d OCSPEE22DB -f OCSPEE22DB/dbpasswd -i OCSPEE22OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #47: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to OCSPEE22DB database - PASSED chains.sh: Creating DB OCSPEE23DB certutil -N -d OCSPEE23DB -f OCSPEE23DB/dbpasswd chains.sh: #48: OCSPD: Creating DB OCSPEE23DB - PASSED chains.sh: Creating EE certifiate request OCSPEE23Req.der certutil -s "CN=OCSPEE23 EE, O=OCSPEE23, C=US" -R -2 -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE23Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #49: OCSPD: Creating EE certifiate request OCSPEE23Req.der - PASSED chains.sh: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 certutil -C -c OCSPCA2 -v 60 -d OCSPCA2DB -i OCSPEE23Req.der -o OCSPEE23OCSPCA2.der -f OCSPCA2DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10008 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #50: OCSPD: Creating certficate OCSPEE23OCSPCA2.der signed by OCSPCA2 - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database certutil -A -n OCSPEE23 -t u,u,u -d OCSPEE23DB -f OCSPEE23DB/dbpasswd -i OCSPEE23OCSPCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #51: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to OCSPEE23DB database - PASSED chains.sh: Creating DB OCSPEE31DB certutil -N -d OCSPEE31DB -f OCSPEE31DB/dbpasswd chains.sh: #52: OCSPD: Creating DB OCSPEE31DB - PASSED chains.sh: Creating EE certifiate request OCSPEE31Req.der certutil -s "CN=OCSPEE31 EE, O=OCSPEE31, C=US" -R -2 -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE31Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #53: OCSPD: Creating EE certifiate request OCSPEE31Req.der - PASSED chains.sh: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE31Req.der -o OCSPEE31OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 1 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #54: OCSPD: Creating certficate OCSPEE31OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database certutil -A -n OCSPEE31 -t u,u,u -d OCSPEE31DB -f OCSPEE31DB/dbpasswd -i OCSPEE31OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #55: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to OCSPEE31DB database - PASSED chains.sh: Creating DB OCSPEE32DB certutil -N -d OCSPEE32DB -f OCSPEE32DB/dbpasswd chains.sh: #56: OCSPD: Creating DB OCSPEE32DB - PASSED chains.sh: Creating EE certifiate request OCSPEE32Req.der certutil -s "CN=OCSPEE32 EE, O=OCSPEE32, C=US" -R -2 -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE32Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #57: OCSPD: Creating EE certifiate request OCSPEE32Req.der - PASSED chains.sh: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE32Req.der -o OCSPEE32OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 2 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10007/ocsp 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #58: OCSPD: Creating certficate OCSPEE32OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database certutil -A -n OCSPEE32 -t u,u,u -d OCSPEE32DB -f OCSPEE32DB/dbpasswd -i OCSPEE32OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #59: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to OCSPEE32DB database - PASSED chains.sh: Creating DB OCSPEE33DB certutil -N -d OCSPEE33DB -f OCSPEE33DB/dbpasswd chains.sh: #60: OCSPD: Creating DB OCSPEE33DB - PASSED chains.sh: Creating EE certifiate request OCSPEE33Req.der certutil -s "CN=OCSPEE33 EE, O=OCSPEE33, C=US" -R -2 -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OCSPEE33Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #61: OCSPD: Creating EE certifiate request OCSPEE33Req.der - PASSED chains.sh: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 certutil -C -c OCSPCA3 -v 60 -d OCSPCA3DB -i OCSPEE33Req.der -o OCSPEE33OCSPCA3.der -f OCSPCA3DB/dbpasswd -m 3 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 2 7 http://localhost.localdomain:10008 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #62: OCSPD: Creating certficate OCSPEE33OCSPCA3.der signed by OCSPCA3 - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database certutil -A -n OCSPEE33 -t u,u,u -d OCSPEE33DB -f OCSPEE33DB/dbpasswd -i OCSPEE33OCSPCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #63: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to OCSPEE33DB database - PASSED chains.sh: Create CRL for OCSPRootDB crlutil -G -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20231018165037Z nextupdate=20241018165037Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Wed Oct 18 16:50:37 2023 Next Update: Fri Oct 18 16:50:37 2024 CRL Extensions: chains.sh: #64: OCSPD: Create CRL for OCSPRootDB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPRoot crlutil -M -d OCSPRootDB -n OCSPRoot -f OCSPRootDB/dbpasswd -o OCSPRoot.crl === Crlutil input data === update=20231018165038Z addcert 2 20231018165038Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" This Update: Wed Oct 18 16:50:38 2023 Next Update: Fri Oct 18 16:50:37 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 16:50:38 2023 CRL Extensions: chains.sh: #65: OCSPD: Revoking certificate with SN 2 issued by OCSPRoot - PASSED chains.sh: Create CRL for OCSPCA1DB crlutil -G -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20231018165039Z nextupdate=20241018165039Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Oct 18 16:50:39 2023 Next Update: Fri Oct 18 16:50:39 2024 CRL Extensions: chains.sh: #66: OCSPD: Create CRL for OCSPCA1DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20231018165040Z addcert 2 20231018165040Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Oct 18 16:50:40 2023 Next Update: Fri Oct 18 16:50:39 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 16:50:40 2023 CRL Extensions: chains.sh: #67: OCSPD: Revoking certificate with SN 2 issued by OCSPCA1 - PASSED chains.sh: Revoking certificate with SN 4 issued by OCSPCA1 crlutil -M -d OCSPCA1DB -n OCSPCA1 -f OCSPCA1DB/dbpasswd -o OCSPCA1.crl === Crlutil input data === update=20231018165041Z addcert 4 20231018165041Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" This Update: Wed Oct 18 16:50:41 2023 Next Update: Fri Oct 18 16:50:39 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 16:50:40 2023 Entry 2 (0x2): Serial Number: 4 (0x4) Revocation Date: Wed Oct 18 16:50:41 2023 CRL Extensions: chains.sh: #68: OCSPD: Revoking certificate with SN 4 issued by OCSPCA1 - PASSED chains.sh: Create CRL for OCSPCA2DB crlutil -G -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20231018165042Z nextupdate=20241018165042Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Oct 18 16:50:42 2023 Next Update: Fri Oct 18 16:50:42 2024 CRL Extensions: chains.sh: #69: OCSPD: Create CRL for OCSPCA2DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20231018165043Z addcert 2 20231018165043Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Oct 18 16:50:43 2023 Next Update: Fri Oct 18 16:50:42 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 16:50:43 2023 CRL Extensions: chains.sh: #70: OCSPD: Revoking certificate with SN 2 issued by OCSPCA2 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA2 crlutil -M -d OCSPCA2DB -n OCSPCA2 -f OCSPCA2DB/dbpasswd -o OCSPCA2.crl === Crlutil input data === update=20231018165044Z addcert 3 20231018165044Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA2 Intermediate,O=OCSPCA2,C=US" This Update: Wed Oct 18 16:50:44 2023 Next Update: Fri Oct 18 16:50:42 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 16:50:43 2023 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Wed Oct 18 16:50:44 2023 CRL Extensions: chains.sh: #71: OCSPD: Revoking certificate with SN 3 issued by OCSPCA2 - PASSED chains.sh: Create CRL for OCSPCA3DB crlutil -G -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20231018165045Z nextupdate=20241018165045Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Oct 18 16:50:45 2023 Next Update: Fri Oct 18 16:50:45 2024 CRL Extensions: chains.sh: #72: OCSPD: Create CRL for OCSPCA3DB - PASSED chains.sh: Revoking certificate with SN 2 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20231018165046Z addcert 2 20231018165046Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Oct 18 16:50:46 2023 Next Update: Fri Oct 18 16:50:45 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 16:50:46 2023 CRL Extensions: chains.sh: #73: OCSPD: Revoking certificate with SN 2 issued by OCSPCA3 - PASSED chains.sh: Revoking certificate with SN 3 issued by OCSPCA3 crlutil -M -d OCSPCA3DB -n OCSPCA3 -f OCSPCA3DB/dbpasswd -o OCSPCA3.crl === Crlutil input data === update=20231018165047Z addcert 3 20231018165047Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPCA3 Intermediate,O=OCSPCA3,C=US" This Update: Wed Oct 18 16:50:47 2023 Next Update: Fri Oct 18 16:50:45 2024 Entry 1 (0x1): Serial Number: 2 (0x2) Revocation Date: Wed Oct 18 16:50:46 2023 Entry 2 (0x2): Serial Number: 3 (0x3) Revocation Date: Wed Oct 18 16:50:47 2023 CRL Extensions: chains.sh: #74: OCSPD: Revoking certificate with SN 3 issued by OCSPCA3 - PASSED chains.sh: Creating DB ServerDB certutil -N -d ServerDB -f ServerDB/dbpasswd chains.sh: #75: OCSPD: Creating DB ServerDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ServerDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.der chains.sh: #76: OCSPD: Importing certificate OCSPRoot.der to ServerDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ServerDB database crlutil -I -d ServerDB -f ServerDB/dbpasswd -i OCSPRoot.crl chains.sh: #77: OCSPD: Importing CRL OCSPRoot.crl to ServerDB database - PASSED chains.sh: Importing p12 key OCSPRoot.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPRoot.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #78: OCSPD: Importing p12 key OCSPRoot.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA1.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA1.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #79: OCSPD: Importing p12 key OCSPCA1.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA2.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA2.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #80: OCSPD: Importing p12 key OCSPCA2.p12 to ServerDB database - PASSED chains.sh: Importing p12 key OCSPCA3.p12 to ServerDB database /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/bin/pk12util -d ServerDB -i ../OCSPD/OCSPCA3.p12 -k ServerDB/dbpasswd -W nssnss pk12util: PKCS12 IMPORT SUCCESSFUL chains.sh: #81: OCSPD: Importing p12 key OCSPCA3.p12 to ServerDB database - PASSED chains.sh: Creating DB ClientDB certutil -N -d ClientDB -f ClientDB/dbpasswd chains.sh: #82: OCSPD: Creating DB ClientDB - PASSED chains.sh: Importing certificate OCSPRoot.der to ClientDB database certutil -A -n OCSPRoot -t "CT,C,C" -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.der chains.sh: #83: OCSPD: Importing certificate OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing CRL OCSPRoot.crl to ClientDB database crlutil -I -d ClientDB -f ClientDB/dbpasswd -i OCSPRoot.crl chains.sh: #84: OCSPD: Importing CRL OCSPRoot.crl to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database certutil -A -n OCSPCA1OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA1OCSPRoot.der chains.sh: #85: OCSPD: Importing certificate OCSPCA1OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database certutil -A -n OCSPCA2OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA2OCSPRoot.der chains.sh: #86: OCSPD: Importing certificate OCSPCA2OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database certutil -A -n OCSPCA3OCSPRoot -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPCA3OCSPRoot.der chains.sh: #87: OCSPD: Importing certificate OCSPCA3OCSPRoot.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database certutil -A -n OCSPEE11OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE11OCSPCA1.der chains.sh: #88: OCSPD: Importing certificate OCSPEE11OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database certutil -A -n OCSPEE12OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE12OCSPCA1.der chains.sh: #89: OCSPD: Importing certificate OCSPEE12OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database certutil -A -n OCSPEE13OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE13OCSPCA1.der chains.sh: #90: OCSPD: Importing certificate OCSPEE13OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database certutil -A -n OCSPEE14OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE14OCSPCA1.der chains.sh: #91: OCSPD: Importing certificate OCSPEE14OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database certutil -A -n OCSPEE15OCSPCA1 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE15OCSPCA1.der chains.sh: #92: OCSPD: Importing certificate OCSPEE15OCSPCA1.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database certutil -A -n OCSPEE21OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE21OCSPCA2.der chains.sh: #93: OCSPD: Importing certificate OCSPEE21OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database certutil -A -n OCSPEE22OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE22OCSPCA2.der chains.sh: #94: OCSPD: Importing certificate OCSPEE22OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database certutil -A -n OCSPEE23OCSPCA2 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE23OCSPCA2.der chains.sh: #95: OCSPD: Importing certificate OCSPEE23OCSPCA2.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database certutil -A -n OCSPEE31OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE31OCSPCA3.der chains.sh: #96: OCSPD: Importing certificate OCSPEE31OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database certutil -A -n OCSPEE32OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE32OCSPCA3.der chains.sh: #97: OCSPD: Importing certificate OCSPEE32OCSPCA3.der to ClientDB database - PASSED chains.sh: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database certutil -A -n OCSPEE33OCSPCA3 -t "" -d ClientDB -f ClientDB/dbpasswd -i OCSPEE33OCSPCA3.der chains.sh: #98: OCSPD: Importing certificate OCSPEE33OCSPCA3.der to ClientDB database - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #99: IPsec: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018164943 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #100: IPsec: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #101: IPsec: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #102: IPsec: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #103: IPsec: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018164944 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #104: IPsec: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #105: IPsec: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB NoKUDB certutil -N -d NoKUDB -f NoKUDB/dbpasswd chains.sh: #106: IPsec: Creating DB NoKUDB - PASSED chains.sh: Creating EE certifiate request NoKUReq.der certutil -s "CN=NoKU EE, O=NoKU, C=US" -R -2 -d NoKUDB -f NoKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o NoKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #107: IPsec: Creating EE certifiate request NoKUReq.der - PASSED chains.sh: Creating certficate NoKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoKUReq.der -o NoKUCA1.der -f CA1DB/dbpasswd -m 1018164945 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #108: IPsec: Creating certficate NoKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoKUCA1.der to NoKUDB database certutil -A -n NoKU -t u,u,u -d NoKUDB -f NoKUDB/dbpasswd -i NoKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #109: IPsec: Importing certificate NoKUCA1.der to NoKUDB database - PASSED chains.sh: Creating DB DigSigDB certutil -N -d DigSigDB -f DigSigDB/dbpasswd chains.sh: #110: IPsec: Creating DB DigSigDB - PASSED chains.sh: Creating EE certifiate request DigSigReq.der certutil -s "CN=DigSig EE, O=DigSig, C=US" -R -2 -d DigSigDB -f DigSigDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o DigSigReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #111: IPsec: Creating EE certifiate request DigSigReq.der - PASSED chains.sh: Creating certficate DigSigCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigReq.der -o DigSigCA1.der -f CA1DB/dbpasswd -m 1018164946 --keyUsage digitalSignature < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #112: IPsec: Creating certficate DigSigCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigCA1.der to DigSigDB database certutil -A -n DigSig -t u,u,u -d DigSigDB -f DigSigDB/dbpasswd -i DigSigCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #113: IPsec: Importing certificate DigSigCA1.der to DigSigDB database - PASSED chains.sh: Creating DB NonRepDB certutil -N -d NonRepDB -f NonRepDB/dbpasswd chains.sh: #114: IPsec: Creating DB NonRepDB - PASSED chains.sh: Creating EE certifiate request NonRepReq.der certutil -s "CN=NonRep EE, O=NonRep, C=US" -R -2 -d NonRepDB -f NonRepDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o NonRepReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #115: IPsec: Creating EE certifiate request NonRepReq.der - PASSED chains.sh: Creating certficate NonRepCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonRepReq.der -o NonRepCA1.der -f CA1DB/dbpasswd -m 1018164947 --keyUsage nonRepudiation < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #116: IPsec: Creating certficate NonRepCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonRepCA1.der to NonRepDB database certutil -A -n NonRep -t u,u,u -d NonRepDB -f NonRepDB/dbpasswd -i NonRepCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #117: IPsec: Importing certificate NonRepCA1.der to NonRepDB database - PASSED chains.sh: Creating DB DigSigNonRepAndExtraDB certutil -N -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd chains.sh: #118: IPsec: Creating DB DigSigNonRepAndExtraDB - PASSED chains.sh: Creating EE certifiate request DigSigNonRepAndExtraReq.der certutil -s "CN=DigSigNonRepAndExtra EE, O=DigSigNonRepAndExtra, C=US" -R -2 -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o DigSigNonRepAndExtraReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #119: IPsec: Creating EE certifiate request DigSigNonRepAndExtraReq.der - PASSED chains.sh: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i DigSigNonRepAndExtraReq.der -o DigSigNonRepAndExtraCA1.der -f CA1DB/dbpasswd -m 1018164948 --keyUsage digitalSignature,nonRepudiation,keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #120: IPsec: Creating certficate DigSigNonRepAndExtraCA1.der signed by CA1 - PASSED chains.sh: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database certutil -A -n DigSigNonRepAndExtra -t u,u,u -d DigSigNonRepAndExtraDB -f DigSigNonRepAndExtraDB/dbpasswd -i DigSigNonRepAndExtraCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #121: IPsec: Importing certificate DigSigNonRepAndExtraCA1.der to DigSigNonRepAndExtraDB database - PASSED chains.sh: Creating DB NoMatchDB certutil -N -d NoMatchDB -f NoMatchDB/dbpasswd chains.sh: #122: IPsec: Creating DB NoMatchDB - PASSED chains.sh: Creating EE certifiate request NoMatchReq.der certutil -s "CN=NoMatch EE, O=NoMatch, C=US" -R -2 -d NoMatchDB -f NoMatchDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o NoMatchReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #123: IPsec: Creating EE certifiate request NoMatchReq.der - PASSED chains.sh: Creating certficate NoMatchCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NoMatchReq.der -o NoMatchCA1.der -f CA1DB/dbpasswd -m 1018164949 --keyUsage keyEncipherment,dataEncipherment,keyAgreement < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #124: IPsec: Creating certficate NoMatchCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NoMatchCA1.der to NoMatchDB database certutil -A -n NoMatch -t u,u,u -d NoMatchDB -f NoMatchDB/dbpasswd -i NoMatchCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #125: IPsec: Importing certificate NoMatchCA1.der to NoMatchDB database - PASSED chains.sh: Creating DB NonCriticalServerAuthEKUDB certutil -N -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd chains.sh: #126: IPsec: Creating DB NonCriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request NonCriticalServerAuthEKUReq.der certutil -s "CN=NonCriticalServerAuthEKU EE, O=NonCriticalServerAuthEKU, C=US" -R -2 -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o NonCriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #127: IPsec: Creating EE certifiate request NonCriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonCriticalServerAuthEKUReq.der -o NonCriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 1018164950 --extKeyUsage serverAuth < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #128: IPsec: Creating certficate NonCriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database certutil -A -n NonCriticalServerAuthEKU -t u,u,u -d NonCriticalServerAuthEKUDB -f NonCriticalServerAuthEKUDB/dbpasswd -i NonCriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #129: IPsec: Importing certificate NonCriticalServerAuthEKUCA1.der to NonCriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB NonIPSECEKUDB certutil -N -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd chains.sh: #130: IPsec: Creating DB NonIPSECEKUDB - PASSED chains.sh: Creating EE certifiate request NonIPSECEKUReq.der certutil -s "CN=NonIPSECEKU EE, O=NonIPSECEKU, C=US" -R -2 -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o NonIPSECEKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #131: IPsec: Creating EE certifiate request NonIPSECEKUReq.der - PASSED chains.sh: Creating certficate NonIPSECEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i NonIPSECEKUReq.der -o NonIPSECEKUCA1.der -f CA1DB/dbpasswd -m 1018164951 --extKeyUsage codeSigning < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #132: IPsec: Creating certficate NonIPSECEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database certutil -A -n NonIPSECEKU -t u,u,u -d NonIPSECEKUDB -f NonIPSECEKUDB/dbpasswd -i NonIPSECEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #133: IPsec: Importing certificate NonIPSECEKUCA1.der to NonIPSECEKUDB database - PASSED chains.sh: Creating DB CriticalServerAuthEKUDB certutil -N -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd chains.sh: #134: IPsec: Creating DB CriticalServerAuthEKUDB - PASSED chains.sh: Creating EE certifiate request CriticalServerAuthEKUReq.der certutil -s "CN=CriticalServerAuthEKU EE, O=CriticalServerAuthEKU, C=US" -R -2 -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CriticalServerAuthEKUReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #135: IPsec: Creating EE certifiate request CriticalServerAuthEKUReq.der - PASSED chains.sh: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CriticalServerAuthEKUReq.der -o CriticalServerAuthEKUCA1.der -f CA1DB/dbpasswd -m 1018164952 --keyUsage digitalSignature --extKeyUsage critical,serverAuth < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #136: IPsec: Creating certficate CriticalServerAuthEKUCA1.der signed by CA1 - PASSED chains.sh: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database certutil -A -n CriticalServerAuthEKU -t u,u,u -d CriticalServerAuthEKUDB -f CriticalServerAuthEKUDB/dbpasswd -i CriticalServerAuthEKUCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #137: IPsec: Importing certificate CriticalServerAuthEKUCA1.der to CriticalServerAuthEKUDB database - PASSED chains.sh: Creating DB EKUIPsecIKEDB certutil -N -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd chains.sh: #138: IPsec: Creating DB EKUIPsecIKEDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEReq.der certutil -s "CN=EKUIPsecIKE EE, O=EKUIPsecIKE, C=US" -R -2 -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EKUIPsecIKEReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #139: IPsec: Creating EE certifiate request EKUIPsecIKEReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKECA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEReq.der -o EKUIPsecIKECA1.der -f CA1DB/dbpasswd -m 1018164953 --keyUsage digitalSignature --extKeyUsage critical,ipsecIKE < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #140: IPsec: Creating certficate EKUIPsecIKECA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database certutil -A -n EKUIPsecIKE -t u,u,u -d EKUIPsecIKEDB -f EKUIPsecIKEDB/dbpasswd -i EKUIPsecIKECA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #141: IPsec: Importing certificate EKUIPsecIKECA1.der to EKUIPsecIKEDB database - PASSED chains.sh: Creating DB EKUIPsecIKEEndDB certutil -N -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd chains.sh: #142: IPsec: Creating DB EKUIPsecIKEEndDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEEndReq.der certutil -s "CN=EKUIPsecIKEEnd EE, O=EKUIPsecIKEEnd, C=US" -R -2 -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EKUIPsecIKEEndReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #143: IPsec: Creating EE certifiate request EKUIPsecIKEEndReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEEndReq.der -o EKUIPsecIKEEndCA1.der -f CA1DB/dbpasswd -m 1018164954 --keyUsage digitalSignature --extKeyUsage ipsecIKEEnd < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #144: IPsec: Creating certficate EKUIPsecIKEEndCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database certutil -A -n EKUIPsecIKEEnd -t u,u,u -d EKUIPsecIKEEndDB -f EKUIPsecIKEEndDB/dbpasswd -i EKUIPsecIKEEndCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #145: IPsec: Importing certificate EKUIPsecIKEEndCA1.der to EKUIPsecIKEEndDB database - PASSED chains.sh: Creating DB EKUIPsecIKEIntermediateDB certutil -N -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd chains.sh: #146: IPsec: Creating DB EKUIPsecIKEIntermediateDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der certutil -s "CN=EKUIPsecIKEIntermediate EE, O=EKUIPsecIKEIntermediate, C=US" -R -2 -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EKUIPsecIKEIntermediateReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #147: IPsec: Creating EE certifiate request EKUIPsecIKEIntermediateReq.der - PASSED chains.sh: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecIKEIntermediateReq.der -o EKUIPsecIKEIntermediateCA1.der -f CA1DB/dbpasswd -m 1018164955 --keyUsage digitalSignature --extKeyUsage codeSigning,serverAuth,ipsecIKEIntermediate < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #148: IPsec: Creating certficate EKUIPsecIKEIntermediateCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database certutil -A -n EKUIPsecIKEIntermediate -t u,u,u -d EKUIPsecIKEIntermediateDB -f EKUIPsecIKEIntermediateDB/dbpasswd -i EKUIPsecIKEIntermediateCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #149: IPsec: Importing certificate EKUIPsecIKEIntermediateCA1.der to EKUIPsecIKEIntermediateDB database - PASSED chains.sh: Creating DB EKUAnyDB certutil -N -d EKUAnyDB -f EKUAnyDB/dbpasswd chains.sh: #150: IPsec: Creating DB EKUAnyDB - PASSED chains.sh: Creating EE certifiate request EKUAnyReq.der certutil -s "CN=EKUAny EE, O=EKUAny, C=US" -R -2 -d EKUAnyDB -f EKUAnyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EKUAnyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #151: IPsec: Creating EE certifiate request EKUAnyReq.der - PASSED chains.sh: Creating certficate EKUAnyCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUAnyReq.der -o EKUAnyCA1.der -f CA1DB/dbpasswd -m 1018164956 --keyUsage digitalSignature --extKeyUsage x509Any < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #152: IPsec: Creating certficate EKUAnyCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUAnyCA1.der to EKUAnyDB database certutil -A -n EKUAny -t u,u,u -d EKUAnyDB -f EKUAnyDB/dbpasswd -i EKUAnyCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #153: IPsec: Importing certificate EKUAnyCA1.der to EKUAnyDB database - PASSED chains.sh: Creating DB EKUEmailDB certutil -N -d EKUEmailDB -f EKUEmailDB/dbpasswd chains.sh: #154: IPsec: Creating DB EKUEmailDB - PASSED chains.sh: Creating EE certifiate request EKUEmailReq.der certutil -s "CN=EKUEmail EE, O=EKUEmail, C=US" -R -2 -d EKUEmailDB -f EKUEmailDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EKUEmailReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #155: IPsec: Creating EE certifiate request EKUEmailReq.der - PASSED chains.sh: Creating certficate EKUEmailCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUEmailReq.der -o EKUEmailCA1.der -f CA1DB/dbpasswd -m 1018164957 --keyUsage digitalSignature --extKeyUsage emailProtection < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #156: IPsec: Creating certficate EKUEmailCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUEmailCA1.der to EKUEmailDB database certutil -A -n EKUEmail -t u,u,u -d EKUEmailDB -f EKUEmailDB/dbpasswd -i EKUEmailCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #157: IPsec: Importing certificate EKUEmailCA1.der to EKUEmailDB database - PASSED chains.sh: Creating DB EKUIPsecUserDB certutil -N -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd chains.sh: #158: IPsec: Creating DB EKUIPsecUserDB - PASSED chains.sh: Creating EE certifiate request EKUIPsecUserReq.der certutil -s "CN=EKUIPsecUser EE, O=EKUIPsecUser, C=US" -R -2 -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EKUIPsecUserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #159: IPsec: Creating EE certifiate request EKUIPsecUserReq.der - PASSED chains.sh: Creating certficate EKUIPsecUserCA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EKUIPsecUserReq.der -o EKUIPsecUserCA1.der -f CA1DB/dbpasswd -m 1018164958 --keyUsage digitalSignature --extKeyUsage ipsecUser < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #160: IPsec: Creating certficate EKUIPsecUserCA1.der signed by CA1 - PASSED chains.sh: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database certutil -A -n EKUIPsecUser -t u,u,u -d EKUIPsecUserDB -f EKUIPsecUserDB/dbpasswd -i EKUIPsecUserCA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #161: IPsec: Importing certificate EKUIPsecUserCA1.der to EKUIPsecUserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #162: IPsec: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,," -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #163: IPsec: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #164: IPsec: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164943 (0x3caff6cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:51:15 2023 Not After : Wed Oct 18 16:51:15 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:9e:c1:a7:a4:60:f9:b0:60:49:cf:f1:26:f7:67:7c: 04:76:55:16:b4:c0:27:2c:bf:03:c9:7d:e8:c4:99:74: e7:4b:35:1c:9b:2d:86:22:1e:44:50:8b:80:92:14:91: 14:f4:62:d2:1c:39:5e:50:73:fb:38:fe:ec:2d:4a:0c: 76:5a:63:a1:9b:b2:09:a8:44:2b:dc:f1:d0:0d:c5:f4: d0:e7:c8:cd:65:0f:f5:94:41:32:61:21:c4:03:09:e5: 50:0d:78:d9:0c:56:e0:dd:cc:24:23:27:66:46:98:f3: f0:df:0f:90:c6:2f:3a:2b:db:68:f2:24:dc:af:98:bb: 15:d9:4d:d2:19:0b:05:83:b8:d7:11:43:59:a7:69:42: 41:58:ca:12:7a:60:97:38:3b:f2:35:cd:36:c5:e4:d7: a7:25:c7:dc:8f:89:ce:10:5c:fa:c7:2f:8f:bf:9e:69: b2:88:98:d1:54:be:d1:95:7a:d9:ec:80:d1:0d:05:dc: 07:3b:7a:a2:a8:99:8f:06:19:a2:57:5f:03:bf:b5:48: 84:64:2f:2b:6b:a6:c4:26:45:12:96:de:08:9b:71:ce: 06:c8:79:a2:14:63:e3:11:27:ae:b5:3e:0b:65:b0:00: b0:5e:2e:af:f0:7b:58:d8:80:12:3d:7b:53:6b:9d:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:4f:09:bc:34:e3:2c:67:d7:25:db:28:14:3e:7d:78: c0:e4:9d:98:18:83:61:cb:0f:98:b0:0c:d5:eb:91:c0: 4d:c6:9b:6f:29:55:80:de:e6:a8:9f:91:39:73:1d:f4: 97:d0:50:d3:ee:84:22:0b:19:e4:a6:70:75:33:92:be: 4c:64:5b:82:88:dc:a4:cb:95:41:9e:43:70:96:c4:d2: eb:d8:a6:73:3d:98:74:b3:f2:33:ac:c2:94:14:26:d1: df:76:84:4b:90:00:69:70:03:92:c0:8a:25:c5:7e:c1: d0:b5:f1:55:f2:6c:c2:e7:1f:01:93:57:9d:40:2c:aa: cd:97:88:ec:d3:c7:52:41:1f:2f:8d:75:53:08:7a:c9: 23:26:1e:ec:26:c2:ed:7b:4d:1f:cd:b2:2c:5a:39:be: 8f:1c:8a:a8:8f:c9:d2:7b:97:8d:f2:cf:f2:31:54:bc: 5b:d4:23:31:bf:db:02:e0:6e:30:43:60:f8:42:7b:d3: 35:8b:f6:78:9f:2b:d8:e8:fb:a3:d6:74:f4:1c:2f:d9: 3e:2d:a6:ca:a0:35:fd:73:0e:01:7f:fa:5d:5b:04:cf: d3:8a:57:7f:22:26:7f:5c:54:56:44:d0:b3:f7:e3:f2: 81:ce:6c:a4:8f:88:dd:d7:e9:60:13:33:13:1b:d7:03 Fingerprint (SHA-256): BA:FE:94:DB:82:43:DB:40:5B:F7:FE:EA:A3:C6:41:A8:BE:FB:A9:46:8C:2E:5D:30:EB:18:09:6E:AB:AB:A0:8E Fingerprint (SHA1): C6:93:74:B3:11:6A:D6:3C:71:21:3E:79:FB:34:96:AF:D1:09:20:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NoKU EE,O=NoKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #165: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #166: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #167: IPsec: Verifying certificate(s) NoKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164943 (0x3caff6cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:51:15 2023 Not After : Wed Oct 18 16:51:15 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:9e:c1:a7:a4:60:f9:b0:60:49:cf:f1:26:f7:67:7c: 04:76:55:16:b4:c0:27:2c:bf:03:c9:7d:e8:c4:99:74: e7:4b:35:1c:9b:2d:86:22:1e:44:50:8b:80:92:14:91: 14:f4:62:d2:1c:39:5e:50:73:fb:38:fe:ec:2d:4a:0c: 76:5a:63:a1:9b:b2:09:a8:44:2b:dc:f1:d0:0d:c5:f4: d0:e7:c8:cd:65:0f:f5:94:41:32:61:21:c4:03:09:e5: 50:0d:78:d9:0c:56:e0:dd:cc:24:23:27:66:46:98:f3: f0:df:0f:90:c6:2f:3a:2b:db:68:f2:24:dc:af:98:bb: 15:d9:4d:d2:19:0b:05:83:b8:d7:11:43:59:a7:69:42: 41:58:ca:12:7a:60:97:38:3b:f2:35:cd:36:c5:e4:d7: a7:25:c7:dc:8f:89:ce:10:5c:fa:c7:2f:8f:bf:9e:69: b2:88:98:d1:54:be:d1:95:7a:d9:ec:80:d1:0d:05:dc: 07:3b:7a:a2:a8:99:8f:06:19:a2:57:5f:03:bf:b5:48: 84:64:2f:2b:6b:a6:c4:26:45:12:96:de:08:9b:71:ce: 06:c8:79:a2:14:63:e3:11:27:ae:b5:3e:0b:65:b0:00: b0:5e:2e:af:f0:7b:58:d8:80:12:3d:7b:53:6b:9d:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:4f:09:bc:34:e3:2c:67:d7:25:db:28:14:3e:7d:78: c0:e4:9d:98:18:83:61:cb:0f:98:b0:0c:d5:eb:91:c0: 4d:c6:9b:6f:29:55:80:de:e6:a8:9f:91:39:73:1d:f4: 97:d0:50:d3:ee:84:22:0b:19:e4:a6:70:75:33:92:be: 4c:64:5b:82:88:dc:a4:cb:95:41:9e:43:70:96:c4:d2: eb:d8:a6:73:3d:98:74:b3:f2:33:ac:c2:94:14:26:d1: df:76:84:4b:90:00:69:70:03:92:c0:8a:25:c5:7e:c1: d0:b5:f1:55:f2:6c:c2:e7:1f:01:93:57:9d:40:2c:aa: cd:97:88:ec:d3:c7:52:41:1f:2f:8d:75:53:08:7a:c9: 23:26:1e:ec:26:c2:ed:7b:4d:1f:cd:b2:2c:5a:39:be: 8f:1c:8a:a8:8f:c9:d2:7b:97:8d:f2:cf:f2:31:54:bc: 5b:d4:23:31:bf:db:02:e0:6e:30:43:60:f8:42:7b:d3: 35:8b:f6:78:9f:2b:d8:e8:fb:a3:d6:74:f4:1c:2f:d9: 3e:2d:a6:ca:a0:35:fd:73:0e:01:7f:fa:5d:5b:04:cf: d3:8a:57:7f:22:26:7f:5c:54:56:44:d0:b3:f7:e3:f2: 81:ce:6c:a4:8f:88:dd:d7:e9:60:13:33:13:1b:d7:03 Fingerprint (SHA-256): BA:FE:94:DB:82:43:DB:40:5B:F7:FE:EA:A3:C6:41:A8:BE:FB:A9:46:8C:2E:5D:30:EB:18:09:6E:AB:AB:A0:8E Fingerprint (SHA1): C6:93:74:B3:11:6A:D6:3C:71:21:3E:79:FB:34:96:AF:D1:09:20:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSig EE,O=DigSig,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #168: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #169: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #170: IPsec: Verifying certificate(s) DigSigCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonRepCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164943 (0x3caff6cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:51:15 2023 Not After : Wed Oct 18 16:51:15 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:9e:c1:a7:a4:60:f9:b0:60:49:cf:f1:26:f7:67:7c: 04:76:55:16:b4:c0:27:2c:bf:03:c9:7d:e8:c4:99:74: e7:4b:35:1c:9b:2d:86:22:1e:44:50:8b:80:92:14:91: 14:f4:62:d2:1c:39:5e:50:73:fb:38:fe:ec:2d:4a:0c: 76:5a:63:a1:9b:b2:09:a8:44:2b:dc:f1:d0:0d:c5:f4: d0:e7:c8:cd:65:0f:f5:94:41:32:61:21:c4:03:09:e5: 50:0d:78:d9:0c:56:e0:dd:cc:24:23:27:66:46:98:f3: f0:df:0f:90:c6:2f:3a:2b:db:68:f2:24:dc:af:98:bb: 15:d9:4d:d2:19:0b:05:83:b8:d7:11:43:59:a7:69:42: 41:58:ca:12:7a:60:97:38:3b:f2:35:cd:36:c5:e4:d7: a7:25:c7:dc:8f:89:ce:10:5c:fa:c7:2f:8f:bf:9e:69: b2:88:98:d1:54:be:d1:95:7a:d9:ec:80:d1:0d:05:dc: 07:3b:7a:a2:a8:99:8f:06:19:a2:57:5f:03:bf:b5:48: 84:64:2f:2b:6b:a6:c4:26:45:12:96:de:08:9b:71:ce: 06:c8:79:a2:14:63:e3:11:27:ae:b5:3e:0b:65:b0:00: b0:5e:2e:af:f0:7b:58:d8:80:12:3d:7b:53:6b:9d:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:4f:09:bc:34:e3:2c:67:d7:25:db:28:14:3e:7d:78: c0:e4:9d:98:18:83:61:cb:0f:98:b0:0c:d5:eb:91:c0: 4d:c6:9b:6f:29:55:80:de:e6:a8:9f:91:39:73:1d:f4: 97:d0:50:d3:ee:84:22:0b:19:e4:a6:70:75:33:92:be: 4c:64:5b:82:88:dc:a4:cb:95:41:9e:43:70:96:c4:d2: eb:d8:a6:73:3d:98:74:b3:f2:33:ac:c2:94:14:26:d1: df:76:84:4b:90:00:69:70:03:92:c0:8a:25:c5:7e:c1: d0:b5:f1:55:f2:6c:c2:e7:1f:01:93:57:9d:40:2c:aa: cd:97:88:ec:d3:c7:52:41:1f:2f:8d:75:53:08:7a:c9: 23:26:1e:ec:26:c2:ed:7b:4d:1f:cd:b2:2c:5a:39:be: 8f:1c:8a:a8:8f:c9:d2:7b:97:8d:f2:cf:f2:31:54:bc: 5b:d4:23:31:bf:db:02:e0:6e:30:43:60:f8:42:7b:d3: 35:8b:f6:78:9f:2b:d8:e8:fb:a3:d6:74:f4:1c:2f:d9: 3e:2d:a6:ca:a0:35:fd:73:0e:01:7f:fa:5d:5b:04:cf: d3:8a:57:7f:22:26:7f:5c:54:56:44:d0:b3:f7:e3:f2: 81:ce:6c:a4:8f:88:dd:d7:e9:60:13:33:13:1b:d7:03 Fingerprint (SHA-256): BA:FE:94:DB:82:43:DB:40:5B:F7:FE:EA:A3:C6:41:A8:BE:FB:A9:46:8C:2E:5D:30:EB:18:09:6E:AB:AB:A0:8E Fingerprint (SHA1): C6:93:74:B3:11:6A:D6:3C:71:21:3E:79:FB:34:96:AF:D1:09:20:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonRep EE,O=NonRep,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #171: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #172: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonRepCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #173: IPsec: Verifying certificate(s) NonRepCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164943 (0x3caff6cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:51:15 2023 Not After : Wed Oct 18 16:51:15 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:9e:c1:a7:a4:60:f9:b0:60:49:cf:f1:26:f7:67:7c: 04:76:55:16:b4:c0:27:2c:bf:03:c9:7d:e8:c4:99:74: e7:4b:35:1c:9b:2d:86:22:1e:44:50:8b:80:92:14:91: 14:f4:62:d2:1c:39:5e:50:73:fb:38:fe:ec:2d:4a:0c: 76:5a:63:a1:9b:b2:09:a8:44:2b:dc:f1:d0:0d:c5:f4: d0:e7:c8:cd:65:0f:f5:94:41:32:61:21:c4:03:09:e5: 50:0d:78:d9:0c:56:e0:dd:cc:24:23:27:66:46:98:f3: f0:df:0f:90:c6:2f:3a:2b:db:68:f2:24:dc:af:98:bb: 15:d9:4d:d2:19:0b:05:83:b8:d7:11:43:59:a7:69:42: 41:58:ca:12:7a:60:97:38:3b:f2:35:cd:36:c5:e4:d7: a7:25:c7:dc:8f:89:ce:10:5c:fa:c7:2f:8f:bf:9e:69: b2:88:98:d1:54:be:d1:95:7a:d9:ec:80:d1:0d:05:dc: 07:3b:7a:a2:a8:99:8f:06:19:a2:57:5f:03:bf:b5:48: 84:64:2f:2b:6b:a6:c4:26:45:12:96:de:08:9b:71:ce: 06:c8:79:a2:14:63:e3:11:27:ae:b5:3e:0b:65:b0:00: b0:5e:2e:af:f0:7b:58:d8:80:12:3d:7b:53:6b:9d:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:4f:09:bc:34:e3:2c:67:d7:25:db:28:14:3e:7d:78: c0:e4:9d:98:18:83:61:cb:0f:98:b0:0c:d5:eb:91:c0: 4d:c6:9b:6f:29:55:80:de:e6:a8:9f:91:39:73:1d:f4: 97:d0:50:d3:ee:84:22:0b:19:e4:a6:70:75:33:92:be: 4c:64:5b:82:88:dc:a4:cb:95:41:9e:43:70:96:c4:d2: eb:d8:a6:73:3d:98:74:b3:f2:33:ac:c2:94:14:26:d1: df:76:84:4b:90:00:69:70:03:92:c0:8a:25:c5:7e:c1: d0:b5:f1:55:f2:6c:c2:e7:1f:01:93:57:9d:40:2c:aa: cd:97:88:ec:d3:c7:52:41:1f:2f:8d:75:53:08:7a:c9: 23:26:1e:ec:26:c2:ed:7b:4d:1f:cd:b2:2c:5a:39:be: 8f:1c:8a:a8:8f:c9:d2:7b:97:8d:f2:cf:f2:31:54:bc: 5b:d4:23:31:bf:db:02:e0:6e:30:43:60:f8:42:7b:d3: 35:8b:f6:78:9f:2b:d8:e8:fb:a3:d6:74:f4:1c:2f:d9: 3e:2d:a6:ca:a0:35:fd:73:0e:01:7f:fa:5d:5b:04:cf: d3:8a:57:7f:22:26:7f:5c:54:56:44:d0:b3:f7:e3:f2: 81:ce:6c:a4:8f:88:dd:d7:e9:60:13:33:13:1b:d7:03 Fingerprint (SHA-256): BA:FE:94:DB:82:43:DB:40:5B:F7:FE:EA:A3:C6:41:A8:BE:FB:A9:46:8C:2E:5D:30:EB:18:09:6E:AB:AB:A0:8E Fingerprint (SHA1): C6:93:74:B3:11:6A:D6:3C:71:21:3E:79:FB:34:96:AF:D1:09:20:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=DigSigNonRepAndExtra EE,O=DigSigNonRepAndExtra,C=U S" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #174: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #175: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 DigSigNonRepAndExtraCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #176: IPsec: Verifying certificate(s) DigSigNonRepAndExtraCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #177: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #178: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NoMatchCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NoMatch EE,O=NoMatch,C=US : ERROR -8102: Certificate key usage inadequate for attempted operation. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #179: IPsec: Verifying certificate(s) NoMatchCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #180: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #181: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonIPSECEKUCA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=NonIPSECEKU EE,O=NonIPSECEKU,C=US : ERROR -8101: Certificate type not approved for application. [unknown usage]. Returned value is 1, expected result is fail chains.sh: #182: IPsec: Verifying certificate(s) NonIPSECEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164943 (0x3caff6cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:51:15 2023 Not After : Wed Oct 18 16:51:15 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:9e:c1:a7:a4:60:f9:b0:60:49:cf:f1:26:f7:67:7c: 04:76:55:16:b4:c0:27:2c:bf:03:c9:7d:e8:c4:99:74: e7:4b:35:1c:9b:2d:86:22:1e:44:50:8b:80:92:14:91: 14:f4:62:d2:1c:39:5e:50:73:fb:38:fe:ec:2d:4a:0c: 76:5a:63:a1:9b:b2:09:a8:44:2b:dc:f1:d0:0d:c5:f4: d0:e7:c8:cd:65:0f:f5:94:41:32:61:21:c4:03:09:e5: 50:0d:78:d9:0c:56:e0:dd:cc:24:23:27:66:46:98:f3: f0:df:0f:90:c6:2f:3a:2b:db:68:f2:24:dc:af:98:bb: 15:d9:4d:d2:19:0b:05:83:b8:d7:11:43:59:a7:69:42: 41:58:ca:12:7a:60:97:38:3b:f2:35:cd:36:c5:e4:d7: a7:25:c7:dc:8f:89:ce:10:5c:fa:c7:2f:8f:bf:9e:69: b2:88:98:d1:54:be:d1:95:7a:d9:ec:80:d1:0d:05:dc: 07:3b:7a:a2:a8:99:8f:06:19:a2:57:5f:03:bf:b5:48: 84:64:2f:2b:6b:a6:c4:26:45:12:96:de:08:9b:71:ce: 06:c8:79:a2:14:63:e3:11:27:ae:b5:3e:0b:65:b0:00: b0:5e:2e:af:f0:7b:58:d8:80:12:3d:7b:53:6b:9d:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:4f:09:bc:34:e3:2c:67:d7:25:db:28:14:3e:7d:78: c0:e4:9d:98:18:83:61:cb:0f:98:b0:0c:d5:eb:91:c0: 4d:c6:9b:6f:29:55:80:de:e6:a8:9f:91:39:73:1d:f4: 97:d0:50:d3:ee:84:22:0b:19:e4:a6:70:75:33:92:be: 4c:64:5b:82:88:dc:a4:cb:95:41:9e:43:70:96:c4:d2: eb:d8:a6:73:3d:98:74:b3:f2:33:ac:c2:94:14:26:d1: df:76:84:4b:90:00:69:70:03:92:c0:8a:25:c5:7e:c1: d0:b5:f1:55:f2:6c:c2:e7:1f:01:93:57:9d:40:2c:aa: cd:97:88:ec:d3:c7:52:41:1f:2f:8d:75:53:08:7a:c9: 23:26:1e:ec:26:c2:ed:7b:4d:1f:cd:b2:2c:5a:39:be: 8f:1c:8a:a8:8f:c9:d2:7b:97:8d:f2:cf:f2:31:54:bc: 5b:d4:23:31:bf:db:02:e0:6e:30:43:60:f8:42:7b:d3: 35:8b:f6:78:9f:2b:d8:e8:fb:a3:d6:74:f4:1c:2f:d9: 3e:2d:a6:ca:a0:35:fd:73:0e:01:7f:fa:5d:5b:04:cf: d3:8a:57:7f:22:26:7f:5c:54:56:44:d0:b3:f7:e3:f2: 81:ce:6c:a4:8f:88:dd:d7:e9:60:13:33:13:1b:d7:03 Fingerprint (SHA-256): BA:FE:94:DB:82:43:DB:40:5B:F7:FE:EA:A3:C6:41:A8:BE:FB:A9:46:8C:2E:5D:30:EB:18:09:6E:AB:AB:A0:8E Fingerprint (SHA1): C6:93:74:B3:11:6A:D6:3C:71:21:3E:79:FB:34:96:AF:D1:09:20:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=NonCriticalServerAuthEKU EE,O=NonCriticalServerAut hEKU,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #183: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #184: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 NonCriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #185: IPsec: Verifying certificate(s) NonCriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164943 (0x3caff6cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:51:15 2023 Not After : Wed Oct 18 16:51:15 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:9e:c1:a7:a4:60:f9:b0:60:49:cf:f1:26:f7:67:7c: 04:76:55:16:b4:c0:27:2c:bf:03:c9:7d:e8:c4:99:74: e7:4b:35:1c:9b:2d:86:22:1e:44:50:8b:80:92:14:91: 14:f4:62:d2:1c:39:5e:50:73:fb:38:fe:ec:2d:4a:0c: 76:5a:63:a1:9b:b2:09:a8:44:2b:dc:f1:d0:0d:c5:f4: d0:e7:c8:cd:65:0f:f5:94:41:32:61:21:c4:03:09:e5: 50:0d:78:d9:0c:56:e0:dd:cc:24:23:27:66:46:98:f3: f0:df:0f:90:c6:2f:3a:2b:db:68:f2:24:dc:af:98:bb: 15:d9:4d:d2:19:0b:05:83:b8:d7:11:43:59:a7:69:42: 41:58:ca:12:7a:60:97:38:3b:f2:35:cd:36:c5:e4:d7: a7:25:c7:dc:8f:89:ce:10:5c:fa:c7:2f:8f:bf:9e:69: b2:88:98:d1:54:be:d1:95:7a:d9:ec:80:d1:0d:05:dc: 07:3b:7a:a2:a8:99:8f:06:19:a2:57:5f:03:bf:b5:48: 84:64:2f:2b:6b:a6:c4:26:45:12:96:de:08:9b:71:ce: 06:c8:79:a2:14:63:e3:11:27:ae:b5:3e:0b:65:b0:00: b0:5e:2e:af:f0:7b:58:d8:80:12:3d:7b:53:6b:9d:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:4f:09:bc:34:e3:2c:67:d7:25:db:28:14:3e:7d:78: c0:e4:9d:98:18:83:61:cb:0f:98:b0:0c:d5:eb:91:c0: 4d:c6:9b:6f:29:55:80:de:e6:a8:9f:91:39:73:1d:f4: 97:d0:50:d3:ee:84:22:0b:19:e4:a6:70:75:33:92:be: 4c:64:5b:82:88:dc:a4:cb:95:41:9e:43:70:96:c4:d2: eb:d8:a6:73:3d:98:74:b3:f2:33:ac:c2:94:14:26:d1: df:76:84:4b:90:00:69:70:03:92:c0:8a:25:c5:7e:c1: d0:b5:f1:55:f2:6c:c2:e7:1f:01:93:57:9d:40:2c:aa: cd:97:88:ec:d3:c7:52:41:1f:2f:8d:75:53:08:7a:c9: 23:26:1e:ec:26:c2:ed:7b:4d:1f:cd:b2:2c:5a:39:be: 8f:1c:8a:a8:8f:c9:d2:7b:97:8d:f2:cf:f2:31:54:bc: 5b:d4:23:31:bf:db:02:e0:6e:30:43:60:f8:42:7b:d3: 35:8b:f6:78:9f:2b:d8:e8:fb:a3:d6:74:f4:1c:2f:d9: 3e:2d:a6:ca:a0:35:fd:73:0e:01:7f:fa:5d:5b:04:cf: d3:8a:57:7f:22:26:7f:5c:54:56:44:d0:b3:f7:e3:f2: 81:ce:6c:a4:8f:88:dd:d7:e9:60:13:33:13:1b:d7:03 Fingerprint (SHA-256): BA:FE:94:DB:82:43:DB:40:5B:F7:FE:EA:A3:C6:41:A8:BE:FB:A9:46:8C:2E:5D:30:EB:18:09:6E:AB:AB:A0:8E Fingerprint (SHA1): C6:93:74:B3:11:6A:D6:3C:71:21:3E:79:FB:34:96:AF:D1:09:20:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=CriticalServerAuthEKU EE,O=CriticalServerAuthEKU,C =US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #186: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #187: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 CriticalServerAuthEKUCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #188: IPsec: Verifying certificate(s) CriticalServerAuthEKUCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKECA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164943 (0x3caff6cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:51:15 2023 Not After : Wed Oct 18 16:51:15 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:9e:c1:a7:a4:60:f9:b0:60:49:cf:f1:26:f7:67:7c: 04:76:55:16:b4:c0:27:2c:bf:03:c9:7d:e8:c4:99:74: e7:4b:35:1c:9b:2d:86:22:1e:44:50:8b:80:92:14:91: 14:f4:62:d2:1c:39:5e:50:73:fb:38:fe:ec:2d:4a:0c: 76:5a:63:a1:9b:b2:09:a8:44:2b:dc:f1:d0:0d:c5:f4: d0:e7:c8:cd:65:0f:f5:94:41:32:61:21:c4:03:09:e5: 50:0d:78:d9:0c:56:e0:dd:cc:24:23:27:66:46:98:f3: f0:df:0f:90:c6:2f:3a:2b:db:68:f2:24:dc:af:98:bb: 15:d9:4d:d2:19:0b:05:83:b8:d7:11:43:59:a7:69:42: 41:58:ca:12:7a:60:97:38:3b:f2:35:cd:36:c5:e4:d7: a7:25:c7:dc:8f:89:ce:10:5c:fa:c7:2f:8f:bf:9e:69: b2:88:98:d1:54:be:d1:95:7a:d9:ec:80:d1:0d:05:dc: 07:3b:7a:a2:a8:99:8f:06:19:a2:57:5f:03:bf:b5:48: 84:64:2f:2b:6b:a6:c4:26:45:12:96:de:08:9b:71:ce: 06:c8:79:a2:14:63:e3:11:27:ae:b5:3e:0b:65:b0:00: b0:5e:2e:af:f0:7b:58:d8:80:12:3d:7b:53:6b:9d:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:4f:09:bc:34:e3:2c:67:d7:25:db:28:14:3e:7d:78: c0:e4:9d:98:18:83:61:cb:0f:98:b0:0c:d5:eb:91:c0: 4d:c6:9b:6f:29:55:80:de:e6:a8:9f:91:39:73:1d:f4: 97:d0:50:d3:ee:84:22:0b:19:e4:a6:70:75:33:92:be: 4c:64:5b:82:88:dc:a4:cb:95:41:9e:43:70:96:c4:d2: eb:d8:a6:73:3d:98:74:b3:f2:33:ac:c2:94:14:26:d1: df:76:84:4b:90:00:69:70:03:92:c0:8a:25:c5:7e:c1: d0:b5:f1:55:f2:6c:c2:e7:1f:01:93:57:9d:40:2c:aa: cd:97:88:ec:d3:c7:52:41:1f:2f:8d:75:53:08:7a:c9: 23:26:1e:ec:26:c2:ed:7b:4d:1f:cd:b2:2c:5a:39:be: 8f:1c:8a:a8:8f:c9:d2:7b:97:8d:f2:cf:f2:31:54:bc: 5b:d4:23:31:bf:db:02:e0:6e:30:43:60:f8:42:7b:d3: 35:8b:f6:78:9f:2b:d8:e8:fb:a3:d6:74:f4:1c:2f:d9: 3e:2d:a6:ca:a0:35:fd:73:0e:01:7f:fa:5d:5b:04:cf: d3:8a:57:7f:22:26:7f:5c:54:56:44:d0:b3:f7:e3:f2: 81:ce:6c:a4:8f:88:dd:d7:e9:60:13:33:13:1b:d7:03 Fingerprint (SHA-256): BA:FE:94:DB:82:43:DB:40:5B:F7:FE:EA:A3:C6:41:A8:BE:FB:A9:46:8C:2E:5D:30:EB:18:09:6E:AB:AB:A0:8E Fingerprint (SHA1): C6:93:74:B3:11:6A:D6:3C:71:21:3E:79:FB:34:96:AF:D1:09:20:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKE EE,O=EKUIPsecIKE,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #189: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #190: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKECA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #191: IPsec: Verifying certificate(s) EKUIPsecIKECA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164943 (0x3caff6cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:51:15 2023 Not After : Wed Oct 18 16:51:15 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:9e:c1:a7:a4:60:f9:b0:60:49:cf:f1:26:f7:67:7c: 04:76:55:16:b4:c0:27:2c:bf:03:c9:7d:e8:c4:99:74: e7:4b:35:1c:9b:2d:86:22:1e:44:50:8b:80:92:14:91: 14:f4:62:d2:1c:39:5e:50:73:fb:38:fe:ec:2d:4a:0c: 76:5a:63:a1:9b:b2:09:a8:44:2b:dc:f1:d0:0d:c5:f4: d0:e7:c8:cd:65:0f:f5:94:41:32:61:21:c4:03:09:e5: 50:0d:78:d9:0c:56:e0:dd:cc:24:23:27:66:46:98:f3: f0:df:0f:90:c6:2f:3a:2b:db:68:f2:24:dc:af:98:bb: 15:d9:4d:d2:19:0b:05:83:b8:d7:11:43:59:a7:69:42: 41:58:ca:12:7a:60:97:38:3b:f2:35:cd:36:c5:e4:d7: a7:25:c7:dc:8f:89:ce:10:5c:fa:c7:2f:8f:bf:9e:69: b2:88:98:d1:54:be:d1:95:7a:d9:ec:80:d1:0d:05:dc: 07:3b:7a:a2:a8:99:8f:06:19:a2:57:5f:03:bf:b5:48: 84:64:2f:2b:6b:a6:c4:26:45:12:96:de:08:9b:71:ce: 06:c8:79:a2:14:63:e3:11:27:ae:b5:3e:0b:65:b0:00: b0:5e:2e:af:f0:7b:58:d8:80:12:3d:7b:53:6b:9d:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:4f:09:bc:34:e3:2c:67:d7:25:db:28:14:3e:7d:78: c0:e4:9d:98:18:83:61:cb:0f:98:b0:0c:d5:eb:91:c0: 4d:c6:9b:6f:29:55:80:de:e6:a8:9f:91:39:73:1d:f4: 97:d0:50:d3:ee:84:22:0b:19:e4:a6:70:75:33:92:be: 4c:64:5b:82:88:dc:a4:cb:95:41:9e:43:70:96:c4:d2: eb:d8:a6:73:3d:98:74:b3:f2:33:ac:c2:94:14:26:d1: df:76:84:4b:90:00:69:70:03:92:c0:8a:25:c5:7e:c1: d0:b5:f1:55:f2:6c:c2:e7:1f:01:93:57:9d:40:2c:aa: cd:97:88:ec:d3:c7:52:41:1f:2f:8d:75:53:08:7a:c9: 23:26:1e:ec:26:c2:ed:7b:4d:1f:cd:b2:2c:5a:39:be: 8f:1c:8a:a8:8f:c9:d2:7b:97:8d:f2:cf:f2:31:54:bc: 5b:d4:23:31:bf:db:02:e0:6e:30:43:60:f8:42:7b:d3: 35:8b:f6:78:9f:2b:d8:e8:fb:a3:d6:74:f4:1c:2f:d9: 3e:2d:a6:ca:a0:35:fd:73:0e:01:7f:fa:5d:5b:04:cf: d3:8a:57:7f:22:26:7f:5c:54:56:44:d0:b3:f7:e3:f2: 81:ce:6c:a4:8f:88:dd:d7:e9:60:13:33:13:1b:d7:03 Fingerprint (SHA-256): BA:FE:94:DB:82:43:DB:40:5B:F7:FE:EA:A3:C6:41:A8:BE:FB:A9:46:8C:2E:5D:30:EB:18:09:6E:AB:AB:A0:8E Fingerprint (SHA1): C6:93:74:B3:11:6A:D6:3C:71:21:3E:79:FB:34:96:AF:D1:09:20:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEEnd EE,O=EKUIPsecIKEEnd,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #192: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #193: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEEndCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #194: IPsec: Verifying certificate(s) EKUIPsecIKEEndCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164943 (0x3caff6cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:51:15 2023 Not After : Wed Oct 18 16:51:15 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:9e:c1:a7:a4:60:f9:b0:60:49:cf:f1:26:f7:67:7c: 04:76:55:16:b4:c0:27:2c:bf:03:c9:7d:e8:c4:99:74: e7:4b:35:1c:9b:2d:86:22:1e:44:50:8b:80:92:14:91: 14:f4:62:d2:1c:39:5e:50:73:fb:38:fe:ec:2d:4a:0c: 76:5a:63:a1:9b:b2:09:a8:44:2b:dc:f1:d0:0d:c5:f4: d0:e7:c8:cd:65:0f:f5:94:41:32:61:21:c4:03:09:e5: 50:0d:78:d9:0c:56:e0:dd:cc:24:23:27:66:46:98:f3: f0:df:0f:90:c6:2f:3a:2b:db:68:f2:24:dc:af:98:bb: 15:d9:4d:d2:19:0b:05:83:b8:d7:11:43:59:a7:69:42: 41:58:ca:12:7a:60:97:38:3b:f2:35:cd:36:c5:e4:d7: a7:25:c7:dc:8f:89:ce:10:5c:fa:c7:2f:8f:bf:9e:69: b2:88:98:d1:54:be:d1:95:7a:d9:ec:80:d1:0d:05:dc: 07:3b:7a:a2:a8:99:8f:06:19:a2:57:5f:03:bf:b5:48: 84:64:2f:2b:6b:a6:c4:26:45:12:96:de:08:9b:71:ce: 06:c8:79:a2:14:63:e3:11:27:ae:b5:3e:0b:65:b0:00: b0:5e:2e:af:f0:7b:58:d8:80:12:3d:7b:53:6b:9d:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:4f:09:bc:34:e3:2c:67:d7:25:db:28:14:3e:7d:78: c0:e4:9d:98:18:83:61:cb:0f:98:b0:0c:d5:eb:91:c0: 4d:c6:9b:6f:29:55:80:de:e6:a8:9f:91:39:73:1d:f4: 97:d0:50:d3:ee:84:22:0b:19:e4:a6:70:75:33:92:be: 4c:64:5b:82:88:dc:a4:cb:95:41:9e:43:70:96:c4:d2: eb:d8:a6:73:3d:98:74:b3:f2:33:ac:c2:94:14:26:d1: df:76:84:4b:90:00:69:70:03:92:c0:8a:25:c5:7e:c1: d0:b5:f1:55:f2:6c:c2:e7:1f:01:93:57:9d:40:2c:aa: cd:97:88:ec:d3:c7:52:41:1f:2f:8d:75:53:08:7a:c9: 23:26:1e:ec:26:c2:ed:7b:4d:1f:cd:b2:2c:5a:39:be: 8f:1c:8a:a8:8f:c9:d2:7b:97:8d:f2:cf:f2:31:54:bc: 5b:d4:23:31:bf:db:02:e0:6e:30:43:60:f8:42:7b:d3: 35:8b:f6:78:9f:2b:d8:e8:fb:a3:d6:74:f4:1c:2f:d9: 3e:2d:a6:ca:a0:35:fd:73:0e:01:7f:fa:5d:5b:04:cf: d3:8a:57:7f:22:26:7f:5c:54:56:44:d0:b3:f7:e3:f2: 81:ce:6c:a4:8f:88:dd:d7:e9:60:13:33:13:1b:d7:03 Fingerprint (SHA-256): BA:FE:94:DB:82:43:DB:40:5B:F7:FE:EA:A3:C6:41:A8:BE:FB:A9:46:8C:2E:5D:30:EB:18:09:6E:AB:AB:A0:8E Fingerprint (SHA1): C6:93:74:B3:11:6A:D6:3C:71:21:3E:79:FB:34:96:AF:D1:09:20:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecIKEIntermediate EE,O=EKUIPsecIKEIntermedia te,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #195: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #196: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecIKEIntermediateCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #197: IPsec: Verifying certificate(s) EKUIPsecIKEIntermediateCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUAnyCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164943 (0x3caff6cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:51:15 2023 Not After : Wed Oct 18 16:51:15 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:9e:c1:a7:a4:60:f9:b0:60:49:cf:f1:26:f7:67:7c: 04:76:55:16:b4:c0:27:2c:bf:03:c9:7d:e8:c4:99:74: e7:4b:35:1c:9b:2d:86:22:1e:44:50:8b:80:92:14:91: 14:f4:62:d2:1c:39:5e:50:73:fb:38:fe:ec:2d:4a:0c: 76:5a:63:a1:9b:b2:09:a8:44:2b:dc:f1:d0:0d:c5:f4: d0:e7:c8:cd:65:0f:f5:94:41:32:61:21:c4:03:09:e5: 50:0d:78:d9:0c:56:e0:dd:cc:24:23:27:66:46:98:f3: f0:df:0f:90:c6:2f:3a:2b:db:68:f2:24:dc:af:98:bb: 15:d9:4d:d2:19:0b:05:83:b8:d7:11:43:59:a7:69:42: 41:58:ca:12:7a:60:97:38:3b:f2:35:cd:36:c5:e4:d7: a7:25:c7:dc:8f:89:ce:10:5c:fa:c7:2f:8f:bf:9e:69: b2:88:98:d1:54:be:d1:95:7a:d9:ec:80:d1:0d:05:dc: 07:3b:7a:a2:a8:99:8f:06:19:a2:57:5f:03:bf:b5:48: 84:64:2f:2b:6b:a6:c4:26:45:12:96:de:08:9b:71:ce: 06:c8:79:a2:14:63:e3:11:27:ae:b5:3e:0b:65:b0:00: b0:5e:2e:af:f0:7b:58:d8:80:12:3d:7b:53:6b:9d:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:4f:09:bc:34:e3:2c:67:d7:25:db:28:14:3e:7d:78: c0:e4:9d:98:18:83:61:cb:0f:98:b0:0c:d5:eb:91:c0: 4d:c6:9b:6f:29:55:80:de:e6:a8:9f:91:39:73:1d:f4: 97:d0:50:d3:ee:84:22:0b:19:e4:a6:70:75:33:92:be: 4c:64:5b:82:88:dc:a4:cb:95:41:9e:43:70:96:c4:d2: eb:d8:a6:73:3d:98:74:b3:f2:33:ac:c2:94:14:26:d1: df:76:84:4b:90:00:69:70:03:92:c0:8a:25:c5:7e:c1: d0:b5:f1:55:f2:6c:c2:e7:1f:01:93:57:9d:40:2c:aa: cd:97:88:ec:d3:c7:52:41:1f:2f:8d:75:53:08:7a:c9: 23:26:1e:ec:26:c2:ed:7b:4d:1f:cd:b2:2c:5a:39:be: 8f:1c:8a:a8:8f:c9:d2:7b:97:8d:f2:cf:f2:31:54:bc: 5b:d4:23:31:bf:db:02:e0:6e:30:43:60:f8:42:7b:d3: 35:8b:f6:78:9f:2b:d8:e8:fb:a3:d6:74:f4:1c:2f:d9: 3e:2d:a6:ca:a0:35:fd:73:0e:01:7f:fa:5d:5b:04:cf: d3:8a:57:7f:22:26:7f:5c:54:56:44:d0:b3:f7:e3:f2: 81:ce:6c:a4:8f:88:dd:d7:e9:60:13:33:13:1b:d7:03 Fingerprint (SHA-256): BA:FE:94:DB:82:43:DB:40:5B:F7:FE:EA:A3:C6:41:A8:BE:FB:A9:46:8C:2E:5D:30:EB:18:09:6E:AB:AB:A0:8E Fingerprint (SHA1): C6:93:74:B3:11:6A:D6:3C:71:21:3E:79:FB:34:96:AF:D1:09:20:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUAny EE,O=EKUAny,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #198: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #199: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUAnyCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #200: IPsec: Verifying certificate(s) EKUAnyCA1.der with flags -d AllDB -p -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUEmailCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164943 (0x3caff6cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:51:15 2023 Not After : Wed Oct 18 16:51:15 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:9e:c1:a7:a4:60:f9:b0:60:49:cf:f1:26:f7:67:7c: 04:76:55:16:b4:c0:27:2c:bf:03:c9:7d:e8:c4:99:74: e7:4b:35:1c:9b:2d:86:22:1e:44:50:8b:80:92:14:91: 14:f4:62:d2:1c:39:5e:50:73:fb:38:fe:ec:2d:4a:0c: 76:5a:63:a1:9b:b2:09:a8:44:2b:dc:f1:d0:0d:c5:f4: d0:e7:c8:cd:65:0f:f5:94:41:32:61:21:c4:03:09:e5: 50:0d:78:d9:0c:56:e0:dd:cc:24:23:27:66:46:98:f3: f0:df:0f:90:c6:2f:3a:2b:db:68:f2:24:dc:af:98:bb: 15:d9:4d:d2:19:0b:05:83:b8:d7:11:43:59:a7:69:42: 41:58:ca:12:7a:60:97:38:3b:f2:35:cd:36:c5:e4:d7: a7:25:c7:dc:8f:89:ce:10:5c:fa:c7:2f:8f:bf:9e:69: b2:88:98:d1:54:be:d1:95:7a:d9:ec:80:d1:0d:05:dc: 07:3b:7a:a2:a8:99:8f:06:19:a2:57:5f:03:bf:b5:48: 84:64:2f:2b:6b:a6:c4:26:45:12:96:de:08:9b:71:ce: 06:c8:79:a2:14:63:e3:11:27:ae:b5:3e:0b:65:b0:00: b0:5e:2e:af:f0:7b:58:d8:80:12:3d:7b:53:6b:9d:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:4f:09:bc:34:e3:2c:67:d7:25:db:28:14:3e:7d:78: c0:e4:9d:98:18:83:61:cb:0f:98:b0:0c:d5:eb:91:c0: 4d:c6:9b:6f:29:55:80:de:e6:a8:9f:91:39:73:1d:f4: 97:d0:50:d3:ee:84:22:0b:19:e4:a6:70:75:33:92:be: 4c:64:5b:82:88:dc:a4:cb:95:41:9e:43:70:96:c4:d2: eb:d8:a6:73:3d:98:74:b3:f2:33:ac:c2:94:14:26:d1: df:76:84:4b:90:00:69:70:03:92:c0:8a:25:c5:7e:c1: d0:b5:f1:55:f2:6c:c2:e7:1f:01:93:57:9d:40:2c:aa: cd:97:88:ec:d3:c7:52:41:1f:2f:8d:75:53:08:7a:c9: 23:26:1e:ec:26:c2:ed:7b:4d:1f:cd:b2:2c:5a:39:be: 8f:1c:8a:a8:8f:c9:d2:7b:97:8d:f2:cf:f2:31:54:bc: 5b:d4:23:31:bf:db:02:e0:6e:30:43:60:f8:42:7b:d3: 35:8b:f6:78:9f:2b:d8:e8:fb:a3:d6:74:f4:1c:2f:d9: 3e:2d:a6:ca:a0:35:fd:73:0e:01:7f:fa:5d:5b:04:cf: d3:8a:57:7f:22:26:7f:5c:54:56:44:d0:b3:f7:e3:f2: 81:ce:6c:a4:8f:88:dd:d7:e9:60:13:33:13:1b:d7:03 Fingerprint (SHA-256): BA:FE:94:DB:82:43:DB:40:5B:F7:FE:EA:A3:C6:41:A8:BE:FB:A9:46:8C:2E:5D:30:EB:18:09:6E:AB:AB:A0:8E Fingerprint (SHA1): C6:93:74:B3:11:6A:D6:3C:71:21:3E:79:FB:34:96:AF:D1:09:20:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUEmail EE,O=EKUEmail,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #201: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #202: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUEmailCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #203: IPsec: Verifying certificate(s) EKUEmailCA1.der with flags -d AllDB -p -u 12 - PASSED httpserv starting at Wed Oct 18 16:52:09 UTC 2023 httpserv -D -p 10007 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O get -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.17687 & trying to connect to httpserv at Wed Oct 18 16:52:09 UTC 2023 tstclnt -4 -p 10007 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:10007 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 10554 >/dev/null 2>/dev/null httpserv with PID 10554 found at Wed Oct 18 16:52:09 UTC 2023 httpserv with PID 10554 started at Wed Oct 18 16:52:09 UTC 2023 chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 vfychain -d AllDB -pp -vv -u 12 EKUIPsecUserCA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164943 (0x3caff6cf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:51:15 2023 Not After : Wed Oct 18 16:51:15 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:9e:c1:a7:a4:60:f9:b0:60:49:cf:f1:26:f7:67:7c: 04:76:55:16:b4:c0:27:2c:bf:03:c9:7d:e8:c4:99:74: e7:4b:35:1c:9b:2d:86:22:1e:44:50:8b:80:92:14:91: 14:f4:62:d2:1c:39:5e:50:73:fb:38:fe:ec:2d:4a:0c: 76:5a:63:a1:9b:b2:09:a8:44:2b:dc:f1:d0:0d:c5:f4: d0:e7:c8:cd:65:0f:f5:94:41:32:61:21:c4:03:09:e5: 50:0d:78:d9:0c:56:e0:dd:cc:24:23:27:66:46:98:f3: f0:df:0f:90:c6:2f:3a:2b:db:68:f2:24:dc:af:98:bb: 15:d9:4d:d2:19:0b:05:83:b8:d7:11:43:59:a7:69:42: 41:58:ca:12:7a:60:97:38:3b:f2:35:cd:36:c5:e4:d7: a7:25:c7:dc:8f:89:ce:10:5c:fa:c7:2f:8f:bf:9e:69: b2:88:98:d1:54:be:d1:95:7a:d9:ec:80:d1:0d:05:dc: 07:3b:7a:a2:a8:99:8f:06:19:a2:57:5f:03:bf:b5:48: 84:64:2f:2b:6b:a6:c4:26:45:12:96:de:08:9b:71:ce: 06:c8:79:a2:14:63:e3:11:27:ae:b5:3e:0b:65:b0:00: b0:5e:2e:af:f0:7b:58:d8:80:12:3d:7b:53:6b:9d:17 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:4f:09:bc:34:e3:2c:67:d7:25:db:28:14:3e:7d:78: c0:e4:9d:98:18:83:61:cb:0f:98:b0:0c:d5:eb:91:c0: 4d:c6:9b:6f:29:55:80:de:e6:a8:9f:91:39:73:1d:f4: 97:d0:50:d3:ee:84:22:0b:19:e4:a6:70:75:33:92:be: 4c:64:5b:82:88:dc:a4:cb:95:41:9e:43:70:96:c4:d2: eb:d8:a6:73:3d:98:74:b3:f2:33:ac:c2:94:14:26:d1: df:76:84:4b:90:00:69:70:03:92:c0:8a:25:c5:7e:c1: d0:b5:f1:55:f2:6c:c2:e7:1f:01:93:57:9d:40:2c:aa: cd:97:88:ec:d3:c7:52:41:1f:2f:8d:75:53:08:7a:c9: 23:26:1e:ec:26:c2:ed:7b:4d:1f:cd:b2:2c:5a:39:be: 8f:1c:8a:a8:8f:c9:d2:7b:97:8d:f2:cf:f2:31:54:bc: 5b:d4:23:31:bf:db:02:e0:6e:30:43:60:f8:42:7b:d3: 35:8b:f6:78:9f:2b:d8:e8:fb:a3:d6:74:f4:1c:2f:d9: 3e:2d:a6:ca:a0:35:fd:73:0e:01:7f:fa:5d:5b:04:cf: d3:8a:57:7f:22:26:7f:5c:54:56:44:d0:b3:f7:e3:f2: 81:ce:6c:a4:8f:88:dd:d7:e9:60:13:33:13:1b:d7:03 Fingerprint (SHA-256): BA:FE:94:DB:82:43:DB:40:5B:F7:FE:EA:A3:C6:41:A8:BE:FB:A9:46:8C:2E:5D:30:EB:18:09:6E:AB:AB:A0:8E Fingerprint (SHA1): C6:93:74:B3:11:6A:D6:3C:71:21:3E:79:FB:34:96:AF:D1:09:20:51 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=EKUIPsecUser EE,O=EKUIPsecUser,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #204: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -pp -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 vfychain -d AllDB -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #205: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -u 12 - PASSED chains.sh: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 vfychain -d AllDB -p -vv -u 12 EKUIPsecUserCA1.der Chain is good! Returned value is 0, expected result is pass chains.sh: #206: Verifying certificate(s) EKUIPsecUserCA1.der with flags -d AllDB -p -u 12 - PASSED tstclnt -4 -h localhost.localdomain -p 10007 -q -t 20 chains.sh: #207: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164942 (0x3caff6ce) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Wed Oct 18 16:49:43 2023 Not After : Wed Oct 18 16:49:43 2073 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:93:f4:80:31:96:75:91:a0:5e:c0:83:0c:96:f4:5e: c8:88:b1:72:f8:79:98:4f:c0:15:a0:da:56:54:3e:1e: 43:86:14:13:16:1f:07:09:1f:6f:4e:22:2e:9a:d2:48: c3:ed:c6:41:65:29:57:b7:ad:7c:32:a5:87:98:c5:ef: dd:e2:a9:c3:73:88:f2:f8:1d:a9:80:3f:45:24:05:0e: 16:41:b5:9f:4c:ed:3e:a6:af:59:93:7b:db:30:e2:23: 3b:04:9e:d6:4e:10:36:6a:59:19:9c:1e:25:4d:1b:1b: b7:ef:4d:b8:bb:7c:ef:2f:75:c7:23:27:28:c7:b6:40: 23:ed:d3:80:a7:97:89:3f:6e:1d:69:74:86:46:24:35: 63:52:8f:1b:bd:98:c7:90:9a:9f:f6:46:dd:a0:b2:01: c1:c7:78:6b:49:c3:90:c7:de:24:9c:11:25:42:8e:3b: aa:8b:25:68:9e:fb:42:fe:c2:cd:c3:11:1a:3e:6a:d2: 6b:16:62:ab:c9:9f:d0:bb:9e:6e:34:79:5a:c9:c9:06: fb:56:80:8a:59:2d:38:0c:a2:a1:5c:f2:24:1f:51:ff: 5c:b9:80:bf:6d:71:e7:ef:15:d3:6d:fa:d3:5c:0f:31: 55:91:18:6f:53:26:d8:c9:9a:84:58:b1:e4:51:a9:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:7f:69:d9:5f:13:0d:82:3d:1f:05:e0:4b:4b:f4:f1: bd:3a:ab:96:ee:15:b4:d0:35:40:1d:26:aa:f0:9d:e1: 87:2f:ee:80:53:e1:b9:95:1b:10:04:65:05:58:51:9d: 3e:62:9d:19:11:21:77:be:41:ea:e3:3f:50:6a:e5:c1: e8:d2:ee:cf:dd:0e:1c:7f:f4:fa:46:02:87:d5:c7:bb: e7:95:7a:33:ac:2a:71:c4:27:5a:41:f7:96:fa:75:01: 6c:15:fa:11:00:cc:53:2d:3b:df:d0:25:06:3b:aa:67: 7a:e5:ea:70:2c:e1:c8:9c:35:f4:d5:4e:a3:15:07:01: 06:36:35:4f:36:65:e6:13:a3:70:0a:c7:b4:72:9e:bc: 60:8c:86:a5:5a:2a:69:01:20:dd:14:c2:0e:e3:4a:d3: a8:51:67:42:7a:af:12:9e:e0:be:3d:b5:70:cb:cd:92: fe:43:56:38:70:85:08:91:a3:03:13:4e:2c:0c:a0:a0: b1:a1:da:88:fb:b9:5a:40:d0:7a:e9:b9:21:d2:c5:08: 85:69:63:c7:7d:64:45:52:26:e0:ea:01:45:8b:f3:34: 42:ec:49:2b:8d:e7:6e:03:db:20:90:82:28:ef:f9:e9: cf:11:c7:ce:04:3c:f4:22:cf:aa:10:75:4c:93:2c:32 Fingerprint (SHA-256): 1E:67:11:AC:0D:FD:40:00:B0:F1:6D:B3:E9:33:B5:8E:EA:BB:B4:8C:F1:B8:BD:B4:8B:6F:DB:72:18:91:D6:AA Fingerprint (SHA1): 0C:FF:00:DF:A7:4B:89:23:2A:AE:C2:9E:2E:7A:CB:C0:CE:5A:06:99 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #208: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #209: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #210: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 10554 at Wed Oct 18 16:52:11 UTC 2023 kill -USR1 10554 httpserv: normal termination httpserv -b -p 10007 2>/dev/null; httpserv with PID 10554 killed at Wed Oct 18 16:52:11 UTC 2023 httpserv starting at Wed Oct 18 16:52:11 UTC 2023 httpserv -D -p 10007 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O post -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.17687 & trying to connect to httpserv at Wed Oct 18 16:52:11 UTC 2023 tstclnt -4 -p 10007 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:10007 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 10755 >/dev/null 2>/dev/null httpserv with PID 10755 found at Wed Oct 18 16:52:11 UTC 2023 httpserv with PID 10755 started at Wed Oct 18 16:52:11 UTC 2023 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #211: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. OCSPEE12OCSPCA1 : ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #212: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #213: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED tstclnt -4 -h localhost.localdomain -p 10007 -q -t 20 chains.sh: #214: Test that OCSP server is reachable - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164942 (0x3caff6ce) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Validity: Not Before: Wed Oct 18 16:49:43 2023 Not After : Wed Oct 18 16:49:43 2073 Subject: "CN=OCSPRoot ROOT CA,O=OCSPRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:93:f4:80:31:96:75:91:a0:5e:c0:83:0c:96:f4:5e: c8:88:b1:72:f8:79:98:4f:c0:15:a0:da:56:54:3e:1e: 43:86:14:13:16:1f:07:09:1f:6f:4e:22:2e:9a:d2:48: c3:ed:c6:41:65:29:57:b7:ad:7c:32:a5:87:98:c5:ef: dd:e2:a9:c3:73:88:f2:f8:1d:a9:80:3f:45:24:05:0e: 16:41:b5:9f:4c:ed:3e:a6:af:59:93:7b:db:30:e2:23: 3b:04:9e:d6:4e:10:36:6a:59:19:9c:1e:25:4d:1b:1b: b7:ef:4d:b8:bb:7c:ef:2f:75:c7:23:27:28:c7:b6:40: 23:ed:d3:80:a7:97:89:3f:6e:1d:69:74:86:46:24:35: 63:52:8f:1b:bd:98:c7:90:9a:9f:f6:46:dd:a0:b2:01: c1:c7:78:6b:49:c3:90:c7:de:24:9c:11:25:42:8e:3b: aa:8b:25:68:9e:fb:42:fe:c2:cd:c3:11:1a:3e:6a:d2: 6b:16:62:ab:c9:9f:d0:bb:9e:6e:34:79:5a:c9:c9:06: fb:56:80:8a:59:2d:38:0c:a2:a1:5c:f2:24:1f:51:ff: 5c:b9:80:bf:6d:71:e7:ef:15:d3:6d:fa:d3:5c:0f:31: 55:91:18:6f:53:26:d8:c9:9a:84:58:b1:e4:51:a9:9d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 03:7f:69:d9:5f:13:0d:82:3d:1f:05:e0:4b:4b:f4:f1: bd:3a:ab:96:ee:15:b4:d0:35:40:1d:26:aa:f0:9d:e1: 87:2f:ee:80:53:e1:b9:95:1b:10:04:65:05:58:51:9d: 3e:62:9d:19:11:21:77:be:41:ea:e3:3f:50:6a:e5:c1: e8:d2:ee:cf:dd:0e:1c:7f:f4:fa:46:02:87:d5:c7:bb: e7:95:7a:33:ac:2a:71:c4:27:5a:41:f7:96:fa:75:01: 6c:15:fa:11:00:cc:53:2d:3b:df:d0:25:06:3b:aa:67: 7a:e5:ea:70:2c:e1:c8:9c:35:f4:d5:4e:a3:15:07:01: 06:36:35:4f:36:65:e6:13:a3:70:0a:c7:b4:72:9e:bc: 60:8c:86:a5:5a:2a:69:01:20:dd:14:c2:0e:e3:4a:d3: a8:51:67:42:7a:af:12:9e:e0:be:3d:b5:70:cb:cd:92: fe:43:56:38:70:85:08:91:a3:03:13:4e:2c:0c:a0:a0: b1:a1:da:88:fb:b9:5a:40:d0:7a:e9:b9:21:d2:c5:08: 85:69:63:c7:7d:64:45:52:26:e0:ea:01:45:8b:f3:34: 42:ec:49:2b:8d:e7:6e:03:db:20:90:82:28:ef:f9:e9: cf:11:c7:ce:04:3c:f4:22:cf:aa:10:75:4c:93:2c:32 Fingerprint (SHA-256): 1E:67:11:AC:0D:FD:40:00:B0:F1:6D:B3:E9:33:B5:8E:EA:BB:B4:8C:F1:B8:BD:B4:8B:6F:DB:72:18:91:D6:AA Fingerprint (SHA1): 0C:FF:00:DF:A7:4B:89:23:2A:AE:C2:9E:2E:7A:CB:C0:CE:5A:06:99 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSPEE11 EE,O=OCSPEE11,C=US" Certificate 2 Subject: "CN=OCSPCA1 Intermediate,O=OCSPCA1,C=US" Returned value is 0, expected result is pass chains.sh: #215: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #216: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -p -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE11OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is good! Returned value is 0, expected result is pass chains.sh: #217: Method: Verifying certificate(s) OCSPEE11OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -p -g leaf -h requireFreshInfo -m ocsp - PASSED trying to kill httpserv with PID 10755 at Wed Oct 18 16:52:13 UTC 2023 kill -USR1 10755 httpserv: normal termination httpserv -b -p 10007 2>/dev/null; httpserv with PID 10755 killed at Wed Oct 18 16:52:13 UTC 2023 httpserv starting at Wed Oct 18 16:52:13 UTC 2023 httpserv -D -p 10007 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O random -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.17687 & trying to connect to httpserv at Wed Oct 18 16:52:13 UTC 2023 tstclnt -4 -p 10007 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:10007 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 10974 >/dev/null 2>/dev/null httpserv with PID 10974 found at Wed Oct 18 16:52:13 UTC 2023 httpserv with PID 10974 started at Wed Oct 18 16:52:13 UTC 2023 chains.sh: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp vfychain -d ../OCSPD/ClientDB -pp -vv -g leaf -h requireFreshInfo -m ocsp ../OCSPD/OCSPEE12OCSPCA1.der ../OCSPD/OCSPCA1OCSPRoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. OCSPRoot [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #218: Verifying certificate(s) OCSPEE12OCSPCA1.cert OCSPCA1OCSPRoot.cert with flags -d ../OCSPD/ClientDB -pp -g leaf -h requireFreshInfo -m ocsp - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #219: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018164959 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #220: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #221: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #222: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018164960 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #223: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #224: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #225: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #226: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018164961 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #227: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #228: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018164962 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #229: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #230: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #231: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #232: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #233: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1018164963 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #234: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #235: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #236: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #237: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #238: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164960 (0x3caff6e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 16:52:20 2023 Not After : Wed Oct 18 16:52:20 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:69:f0:66:c1:60:32:d1:6c:ac:4b:95:b4:20:a0:ea: 6a:4b:d8:6d:17:6a:fb:66:f1:54:11:24:03:e6:15:1e: 67:d6:02:f4:db:3c:cd:b6:db:3f:07:a2:db:63:32:68: 2d:44:2e:4e:5d:00:80:8e:79:2f:e7:39:12:42:b2:41: c0:25:e9:00:8b:87:7f:45:0d:fb:44:08:26:e6:26:36: 72:06:89:7a:e3:99:49:15:31:45:2b:46:9e:a8:18:04: 08:96:48:ab:e2:0a:ad:4e:a1:af:82:11:cf:8b:df:a0: 0c:9f:8d:82:f0:61:4a:4f:bd:4b:b2:aa:9d:b9:9c:2f: 4f:0e:84:81:c5:0d:f9:bb:58:ac:79:cd:35:8e:8e:85: 68:da:06:e7:04:6e:d5:ce:41:75:ec:3f:07:0d:68:af: b1:5a:76:c7:c4:fb:ab:d5:3e:c2:6b:74:60:73:3a:b4: 12:29:e2:3a:18:f8:64:b2:9a:78:4a:7a:b3:64:4e:51: b4:14:fe:94:70:db:95:ad:74:d8:c2:0b:3a:d9:37:64: 7b:dd:e3:5b:f2:19:f3:5c:88:6a:0a:31:c3:eb:3a:72: 8f:8b:64:e5:84:24:07:01:fb:e7:c3:6c:7a:da:3b:42: 53:f5:7b:c1:56:b8:8f:54:a5:fb:de:c7:bd:c7:ff:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:2c:ad:f5:f9:78:23:03:84:bc:c6:0b:56:73:09:0b: 29:48:cc:14:93:fe:13:5c:71:41:22:b2:5b:88:be:55: b6:4b:92:77:20:8d:02:dc:a4:62:ab:c9:1f:35:47:d8: 49:de:13:e0:58:48:89:09:9d:67:2c:b5:38:54:4d:66: 91:9b:7d:cc:4b:d5:d8:65:05:ad:3c:c6:1c:15:57:ef: 04:3e:8b:25:3f:ae:a7:5f:62:31:99:00:17:26:12:f8: 27:65:d7:8a:01:1f:cd:5a:23:4a:ac:83:31:7d:2b:58: e8:96:34:1d:d3:4f:c0:0c:b3:80:18:5e:f5:20:50:e4: ba:5f:15:b4:72:1b:e1:24:8c:6c:ae:c8:60:d5:bb:c4: 52:9c:c8:d0:1a:aa:df:66:f3:83:37:11:a3:4e:3b:d2: e4:32:da:fd:e4:71:6e:b9:ae:8f:35:66:b2:71:4f:83: 71:98:46:44:61:c1:6a:e4:e4:49:34:a1:83:a7:c4:19: a8:6e:c1:3f:a2:6f:f0:c2:d5:41:1d:3a:82:11:0c:00: ba:0b:81:11:02:be:b1:6f:4a:e0:bc:b7:69:cb:ae:c1: 12:e8:c6:c1:10:10:7b:1c:1d:20:24:95:6a:08:40:cc: d6:03:c1:a1:64:a9:02:e3:3f:e9:a4:bb:98:ac:b2:a0 Fingerprint (SHA-256): 57:96:7B:CD:60:1D:01:27:96:A7:76:03:A1:BC:83:80:33:2A:00:6D:67:E3:A0:15:A0:99:66:9F:DC:2E:99:29 Fingerprint (SHA1): 0C:1B:97:5D:54:AB:DE:16:BB:43:03:CE:BD:A9:B7:91:93:2F:CF:F4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #239: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164959 (0x3caff6df) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 16:52:16 2023 Not After : Wed Oct 18 16:52:16 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:ff:d6:1d:51:0c:bc:f7:ef:d9:87:eb:d1:6e:94:ef: 43:b3:32:d7:2a:77:e5:d1:99:09:24:01:92:4f:0e:c7: 35:67:00:cc:b9:b5:7c:70:d9:84:c8:42:92:7e:d8:c2: 3e:1c:6b:bf:b8:84:7e:be:01:d6:c7:1a:f0:70:7d:c6: ca:43:ce:f2:c8:e8:04:85:a7:5d:ed:97:8b:57:43:f8: 1b:51:3a:1e:bf:02:c2:90:be:73:aa:37:73:ca:99:81: 6c:e9:59:73:bd:9e:d9:de:eb:8e:c8:c6:0c:19:4a:be: ed:75:b2:3a:34:e4:e6:28:5f:6a:cd:c3:06:ae:2d:eb: b7:64:4c:30:26:35:cf:a2:e7:64:69:b7:92:52:00:0f: 60:4a:f3:2b:da:41:6c:02:47:9e:42:02:7e:c3:44:4d: 13:aa:bb:9b:10:07:e8:80:37:d4:4d:a3:a0:a8:13:dd: a0:9c:a9:d2:d1:8b:3a:79:d2:b2:d9:6b:0b:09:bf:91: 23:3d:ba:d3:83:de:28:8e:65:6a:be:9c:84:08:33:86: 0a:49:7d:e9:8b:1b:bc:ca:2f:f4:63:45:bc:ee:44:fe: 4e:9f:7b:2b:57:6b:56:83:d5:7e:e3:64:d1:34:ca:cc: d6:1f:86:b3:4a:56:d2:a1:bd:67:33:d9:0b:7a:c2:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3b:54:ba:d1:d9:43:55:9b:11:bf:e0:86:20:ca:c5:16: cd:e4:75:f8:2c:66:14:08:60:97:d1:fc:bb:82:d6:cd: 71:b3:4c:89:57:e0:56:fe:f7:53:ba:5d:f8:5e:ab:0d: cd:64:ec:67:64:ce:55:50:94:c1:5b:ec:f3:41:46:75: 9a:57:93:7b:d6:97:d6:81:ec:b0:39:53:24:ce:09:c9: 67:3e:28:76:9a:59:0f:5f:6c:fb:aa:06:c2:5b:99:09: c9:ac:22:ee:a5:bf:8f:3e:5d:6c:5b:01:50:bc:93:00: 08:1d:98:25:6e:94:1b:c3:d9:bf:51:4d:24:0c:c7:0a: 4c:83:02:6b:88:f4:8e:f8:04:f6:f7:14:e5:59:76:f5: d7:ea:99:00:ae:55:f3:d8:0c:b2:31:95:23:2e:0c:e2: cb:0c:c6:02:2c:71:52:d6:1f:e7:04:40:af:0b:7b:b2: 02:1b:b6:93:4f:b9:48:b5:23:fa:67:30:e1:46:e9:39: e3:e9:89:77:0e:b0:08:1b:a4:0e:e6:d2:d0:03:53:ab: 23:84:d2:28:01:50:4e:1e:1c:bb:fd:5c:e6:2a:78:dd: 21:f3:de:f8:77:63:33:14:f5:70:bd:6b:3b:29:cf:87: 2f:c2:18:cc:17:41:97:1f:c0:e4:5b:3b:45:f1:99:fc Fingerprint (SHA-256): 54:62:EB:00:6F:91:7B:F7:7A:CE:9F:14:86:93:64:AA:95:F0:23:76:65:A3:CF:EF:81:D8:66:ED:59:04:91:D8 Fingerprint (SHA1): 8D:82:63:BD:06:82:B7:A4:7F:0A:F6:05:E6:30:09:DA:63:11:E0:2A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #240: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #241: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #242: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #243: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164959 (0x3caff6df) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 16:52:16 2023 Not After : Wed Oct 18 16:52:16 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:ff:d6:1d:51:0c:bc:f7:ef:d9:87:eb:d1:6e:94:ef: 43:b3:32:d7:2a:77:e5:d1:99:09:24:01:92:4f:0e:c7: 35:67:00:cc:b9:b5:7c:70:d9:84:c8:42:92:7e:d8:c2: 3e:1c:6b:bf:b8:84:7e:be:01:d6:c7:1a:f0:70:7d:c6: ca:43:ce:f2:c8:e8:04:85:a7:5d:ed:97:8b:57:43:f8: 1b:51:3a:1e:bf:02:c2:90:be:73:aa:37:73:ca:99:81: 6c:e9:59:73:bd:9e:d9:de:eb:8e:c8:c6:0c:19:4a:be: ed:75:b2:3a:34:e4:e6:28:5f:6a:cd:c3:06:ae:2d:eb: b7:64:4c:30:26:35:cf:a2:e7:64:69:b7:92:52:00:0f: 60:4a:f3:2b:da:41:6c:02:47:9e:42:02:7e:c3:44:4d: 13:aa:bb:9b:10:07:e8:80:37:d4:4d:a3:a0:a8:13:dd: a0:9c:a9:d2:d1:8b:3a:79:d2:b2:d9:6b:0b:09:bf:91: 23:3d:ba:d3:83:de:28:8e:65:6a:be:9c:84:08:33:86: 0a:49:7d:e9:8b:1b:bc:ca:2f:f4:63:45:bc:ee:44:fe: 4e:9f:7b:2b:57:6b:56:83:d5:7e:e3:64:d1:34:ca:cc: d6:1f:86:b3:4a:56:d2:a1:bd:67:33:d9:0b:7a:c2:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3b:54:ba:d1:d9:43:55:9b:11:bf:e0:86:20:ca:c5:16: cd:e4:75:f8:2c:66:14:08:60:97:d1:fc:bb:82:d6:cd: 71:b3:4c:89:57:e0:56:fe:f7:53:ba:5d:f8:5e:ab:0d: cd:64:ec:67:64:ce:55:50:94:c1:5b:ec:f3:41:46:75: 9a:57:93:7b:d6:97:d6:81:ec:b0:39:53:24:ce:09:c9: 67:3e:28:76:9a:59:0f:5f:6c:fb:aa:06:c2:5b:99:09: c9:ac:22:ee:a5:bf:8f:3e:5d:6c:5b:01:50:bc:93:00: 08:1d:98:25:6e:94:1b:c3:d9:bf:51:4d:24:0c:c7:0a: 4c:83:02:6b:88:f4:8e:f8:04:f6:f7:14:e5:59:76:f5: d7:ea:99:00:ae:55:f3:d8:0c:b2:31:95:23:2e:0c:e2: cb:0c:c6:02:2c:71:52:d6:1f:e7:04:40:af:0b:7b:b2: 02:1b:b6:93:4f:b9:48:b5:23:fa:67:30:e1:46:e9:39: e3:e9:89:77:0e:b0:08:1b:a4:0e:e6:d2:d0:03:53:ab: 23:84:d2:28:01:50:4e:1e:1c:bb:fd:5c:e6:2a:78:dd: 21:f3:de:f8:77:63:33:14:f5:70:bd:6b:3b:29:cf:87: 2f:c2:18:cc:17:41:97:1f:c0:e4:5b:3b:45:f1:99:fc Fingerprint (SHA-256): 54:62:EB:00:6F:91:7B:F7:7A:CE:9F:14:86:93:64:AA:95:F0:23:76:65:A3:CF:EF:81:D8:66:ED:59:04:91:D8 Fingerprint (SHA1): 8D:82:63:BD:06:82:B7:A4:7F:0A:F6:05:E6:30:09:DA:63:11:E0:2A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #244: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164960 (0x3caff6e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 16:52:20 2023 Not After : Wed Oct 18 16:52:20 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:69:f0:66:c1:60:32:d1:6c:ac:4b:95:b4:20:a0:ea: 6a:4b:d8:6d:17:6a:fb:66:f1:54:11:24:03:e6:15:1e: 67:d6:02:f4:db:3c:cd:b6:db:3f:07:a2:db:63:32:68: 2d:44:2e:4e:5d:00:80:8e:79:2f:e7:39:12:42:b2:41: c0:25:e9:00:8b:87:7f:45:0d:fb:44:08:26:e6:26:36: 72:06:89:7a:e3:99:49:15:31:45:2b:46:9e:a8:18:04: 08:96:48:ab:e2:0a:ad:4e:a1:af:82:11:cf:8b:df:a0: 0c:9f:8d:82:f0:61:4a:4f:bd:4b:b2:aa:9d:b9:9c:2f: 4f:0e:84:81:c5:0d:f9:bb:58:ac:79:cd:35:8e:8e:85: 68:da:06:e7:04:6e:d5:ce:41:75:ec:3f:07:0d:68:af: b1:5a:76:c7:c4:fb:ab:d5:3e:c2:6b:74:60:73:3a:b4: 12:29:e2:3a:18:f8:64:b2:9a:78:4a:7a:b3:64:4e:51: b4:14:fe:94:70:db:95:ad:74:d8:c2:0b:3a:d9:37:64: 7b:dd:e3:5b:f2:19:f3:5c:88:6a:0a:31:c3:eb:3a:72: 8f:8b:64:e5:84:24:07:01:fb:e7:c3:6c:7a:da:3b:42: 53:f5:7b:c1:56:b8:8f:54:a5:fb:de:c7:bd:c7:ff:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:2c:ad:f5:f9:78:23:03:84:bc:c6:0b:56:73:09:0b: 29:48:cc:14:93:fe:13:5c:71:41:22:b2:5b:88:be:55: b6:4b:92:77:20:8d:02:dc:a4:62:ab:c9:1f:35:47:d8: 49:de:13:e0:58:48:89:09:9d:67:2c:b5:38:54:4d:66: 91:9b:7d:cc:4b:d5:d8:65:05:ad:3c:c6:1c:15:57:ef: 04:3e:8b:25:3f:ae:a7:5f:62:31:99:00:17:26:12:f8: 27:65:d7:8a:01:1f:cd:5a:23:4a:ac:83:31:7d:2b:58: e8:96:34:1d:d3:4f:c0:0c:b3:80:18:5e:f5:20:50:e4: ba:5f:15:b4:72:1b:e1:24:8c:6c:ae:c8:60:d5:bb:c4: 52:9c:c8:d0:1a:aa:df:66:f3:83:37:11:a3:4e:3b:d2: e4:32:da:fd:e4:71:6e:b9:ae:8f:35:66:b2:71:4f:83: 71:98:46:44:61:c1:6a:e4:e4:49:34:a1:83:a7:c4:19: a8:6e:c1:3f:a2:6f:f0:c2:d5:41:1d:3a:82:11:0c:00: ba:0b:81:11:02:be:b1:6f:4a:e0:bc:b7:69:cb:ae:c1: 12:e8:c6:c1:10:10:7b:1c:1d:20:24:95:6a:08:40:cc: d6:03:c1:a1:64:a9:02:e3:3f:e9:a4:bb:98:ac:b2:a0 Fingerprint (SHA-256): 57:96:7B:CD:60:1D:01:27:96:A7:76:03:A1:BC:83:80:33:2A:00:6D:67:E3:A0:15:A0:99:66:9F:DC:2E:99:29 Fingerprint (SHA1): 0C:1B:97:5D:54:AB:DE:16:BB:43:03:CE:BD:A9:B7:91:93:2F:CF:F4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #245: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #246: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #247: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #248: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #249: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #250: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164960 (0x3caff6e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 16:52:20 2023 Not After : Wed Oct 18 16:52:20 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:69:f0:66:c1:60:32:d1:6c:ac:4b:95:b4:20:a0:ea: 6a:4b:d8:6d:17:6a:fb:66:f1:54:11:24:03:e6:15:1e: 67:d6:02:f4:db:3c:cd:b6:db:3f:07:a2:db:63:32:68: 2d:44:2e:4e:5d:00:80:8e:79:2f:e7:39:12:42:b2:41: c0:25:e9:00:8b:87:7f:45:0d:fb:44:08:26:e6:26:36: 72:06:89:7a:e3:99:49:15:31:45:2b:46:9e:a8:18:04: 08:96:48:ab:e2:0a:ad:4e:a1:af:82:11:cf:8b:df:a0: 0c:9f:8d:82:f0:61:4a:4f:bd:4b:b2:aa:9d:b9:9c:2f: 4f:0e:84:81:c5:0d:f9:bb:58:ac:79:cd:35:8e:8e:85: 68:da:06:e7:04:6e:d5:ce:41:75:ec:3f:07:0d:68:af: b1:5a:76:c7:c4:fb:ab:d5:3e:c2:6b:74:60:73:3a:b4: 12:29:e2:3a:18:f8:64:b2:9a:78:4a:7a:b3:64:4e:51: b4:14:fe:94:70:db:95:ad:74:d8:c2:0b:3a:d9:37:64: 7b:dd:e3:5b:f2:19:f3:5c:88:6a:0a:31:c3:eb:3a:72: 8f:8b:64:e5:84:24:07:01:fb:e7:c3:6c:7a:da:3b:42: 53:f5:7b:c1:56:b8:8f:54:a5:fb:de:c7:bd:c7:ff:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:2c:ad:f5:f9:78:23:03:84:bc:c6:0b:56:73:09:0b: 29:48:cc:14:93:fe:13:5c:71:41:22:b2:5b:88:be:55: b6:4b:92:77:20:8d:02:dc:a4:62:ab:c9:1f:35:47:d8: 49:de:13:e0:58:48:89:09:9d:67:2c:b5:38:54:4d:66: 91:9b:7d:cc:4b:d5:d8:65:05:ad:3c:c6:1c:15:57:ef: 04:3e:8b:25:3f:ae:a7:5f:62:31:99:00:17:26:12:f8: 27:65:d7:8a:01:1f:cd:5a:23:4a:ac:83:31:7d:2b:58: e8:96:34:1d:d3:4f:c0:0c:b3:80:18:5e:f5:20:50:e4: ba:5f:15:b4:72:1b:e1:24:8c:6c:ae:c8:60:d5:bb:c4: 52:9c:c8:d0:1a:aa:df:66:f3:83:37:11:a3:4e:3b:d2: e4:32:da:fd:e4:71:6e:b9:ae:8f:35:66:b2:71:4f:83: 71:98:46:44:61:c1:6a:e4:e4:49:34:a1:83:a7:c4:19: a8:6e:c1:3f:a2:6f:f0:c2:d5:41:1d:3a:82:11:0c:00: ba:0b:81:11:02:be:b1:6f:4a:e0:bc:b7:69:cb:ae:c1: 12:e8:c6:c1:10:10:7b:1c:1d:20:24:95:6a:08:40:cc: d6:03:c1:a1:64:a9:02:e3:3f:e9:a4:bb:98:ac:b2:a0 Fingerprint (SHA-256): 57:96:7B:CD:60:1D:01:27:96:A7:76:03:A1:BC:83:80:33:2A:00:6D:67:E3:A0:15:A0:99:66:9F:DC:2E:99:29 Fingerprint (SHA1): 0C:1B:97:5D:54:AB:DE:16:BB:43:03:CE:BD:A9:B7:91:93:2F:CF:F4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #251: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164960 (0x3caff6e0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 16:52:20 2023 Not After : Wed Oct 18 16:52:20 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:69:f0:66:c1:60:32:d1:6c:ac:4b:95:b4:20:a0:ea: 6a:4b:d8:6d:17:6a:fb:66:f1:54:11:24:03:e6:15:1e: 67:d6:02:f4:db:3c:cd:b6:db:3f:07:a2:db:63:32:68: 2d:44:2e:4e:5d:00:80:8e:79:2f:e7:39:12:42:b2:41: c0:25:e9:00:8b:87:7f:45:0d:fb:44:08:26:e6:26:36: 72:06:89:7a:e3:99:49:15:31:45:2b:46:9e:a8:18:04: 08:96:48:ab:e2:0a:ad:4e:a1:af:82:11:cf:8b:df:a0: 0c:9f:8d:82:f0:61:4a:4f:bd:4b:b2:aa:9d:b9:9c:2f: 4f:0e:84:81:c5:0d:f9:bb:58:ac:79:cd:35:8e:8e:85: 68:da:06:e7:04:6e:d5:ce:41:75:ec:3f:07:0d:68:af: b1:5a:76:c7:c4:fb:ab:d5:3e:c2:6b:74:60:73:3a:b4: 12:29:e2:3a:18:f8:64:b2:9a:78:4a:7a:b3:64:4e:51: b4:14:fe:94:70:db:95:ad:74:d8:c2:0b:3a:d9:37:64: 7b:dd:e3:5b:f2:19:f3:5c:88:6a:0a:31:c3:eb:3a:72: 8f:8b:64:e5:84:24:07:01:fb:e7:c3:6c:7a:da:3b:42: 53:f5:7b:c1:56:b8:8f:54:a5:fb:de:c7:bd:c7:ff:5b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 30:2c:ad:f5:f9:78:23:03:84:bc:c6:0b:56:73:09:0b: 29:48:cc:14:93:fe:13:5c:71:41:22:b2:5b:88:be:55: b6:4b:92:77:20:8d:02:dc:a4:62:ab:c9:1f:35:47:d8: 49:de:13:e0:58:48:89:09:9d:67:2c:b5:38:54:4d:66: 91:9b:7d:cc:4b:d5:d8:65:05:ad:3c:c6:1c:15:57:ef: 04:3e:8b:25:3f:ae:a7:5f:62:31:99:00:17:26:12:f8: 27:65:d7:8a:01:1f:cd:5a:23:4a:ac:83:31:7d:2b:58: e8:96:34:1d:d3:4f:c0:0c:b3:80:18:5e:f5:20:50:e4: ba:5f:15:b4:72:1b:e1:24:8c:6c:ae:c8:60:d5:bb:c4: 52:9c:c8:d0:1a:aa:df:66:f3:83:37:11:a3:4e:3b:d2: e4:32:da:fd:e4:71:6e:b9:ae:8f:35:66:b2:71:4f:83: 71:98:46:44:61:c1:6a:e4:e4:49:34:a1:83:a7:c4:19: a8:6e:c1:3f:a2:6f:f0:c2:d5:41:1d:3a:82:11:0c:00: ba:0b:81:11:02:be:b1:6f:4a:e0:bc:b7:69:cb:ae:c1: 12:e8:c6:c1:10:10:7b:1c:1d:20:24:95:6a:08:40:cc: d6:03:c1:a1:64:a9:02:e3:3f:e9:a4:bb:98:ac:b2:a0 Fingerprint (SHA-256): 57:96:7B:CD:60:1D:01:27:96:A7:76:03:A1:BC:83:80:33:2A:00:6D:67:E3:A0:15:A0:99:66:9F:DC:2E:99:29 Fingerprint (SHA1): 0C:1B:97:5D:54:AB:DE:16:BB:43:03:CE:BD:A9:B7:91:93:2F:CF:F4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #252: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #253: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #254: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #255: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #256: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #257: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164959 (0x3caff6df) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 16:52:16 2023 Not After : Wed Oct 18 16:52:16 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:ff:d6:1d:51:0c:bc:f7:ef:d9:87:eb:d1:6e:94:ef: 43:b3:32:d7:2a:77:e5:d1:99:09:24:01:92:4f:0e:c7: 35:67:00:cc:b9:b5:7c:70:d9:84:c8:42:92:7e:d8:c2: 3e:1c:6b:bf:b8:84:7e:be:01:d6:c7:1a:f0:70:7d:c6: ca:43:ce:f2:c8:e8:04:85:a7:5d:ed:97:8b:57:43:f8: 1b:51:3a:1e:bf:02:c2:90:be:73:aa:37:73:ca:99:81: 6c:e9:59:73:bd:9e:d9:de:eb:8e:c8:c6:0c:19:4a:be: ed:75:b2:3a:34:e4:e6:28:5f:6a:cd:c3:06:ae:2d:eb: b7:64:4c:30:26:35:cf:a2:e7:64:69:b7:92:52:00:0f: 60:4a:f3:2b:da:41:6c:02:47:9e:42:02:7e:c3:44:4d: 13:aa:bb:9b:10:07:e8:80:37:d4:4d:a3:a0:a8:13:dd: a0:9c:a9:d2:d1:8b:3a:79:d2:b2:d9:6b:0b:09:bf:91: 23:3d:ba:d3:83:de:28:8e:65:6a:be:9c:84:08:33:86: 0a:49:7d:e9:8b:1b:bc:ca:2f:f4:63:45:bc:ee:44:fe: 4e:9f:7b:2b:57:6b:56:83:d5:7e:e3:64:d1:34:ca:cc: d6:1f:86:b3:4a:56:d2:a1:bd:67:33:d9:0b:7a:c2:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3b:54:ba:d1:d9:43:55:9b:11:bf:e0:86:20:ca:c5:16: cd:e4:75:f8:2c:66:14:08:60:97:d1:fc:bb:82:d6:cd: 71:b3:4c:89:57:e0:56:fe:f7:53:ba:5d:f8:5e:ab:0d: cd:64:ec:67:64:ce:55:50:94:c1:5b:ec:f3:41:46:75: 9a:57:93:7b:d6:97:d6:81:ec:b0:39:53:24:ce:09:c9: 67:3e:28:76:9a:59:0f:5f:6c:fb:aa:06:c2:5b:99:09: c9:ac:22:ee:a5:bf:8f:3e:5d:6c:5b:01:50:bc:93:00: 08:1d:98:25:6e:94:1b:c3:d9:bf:51:4d:24:0c:c7:0a: 4c:83:02:6b:88:f4:8e:f8:04:f6:f7:14:e5:59:76:f5: d7:ea:99:00:ae:55:f3:d8:0c:b2:31:95:23:2e:0c:e2: cb:0c:c6:02:2c:71:52:d6:1f:e7:04:40:af:0b:7b:b2: 02:1b:b6:93:4f:b9:48:b5:23:fa:67:30:e1:46:e9:39: e3:e9:89:77:0e:b0:08:1b:a4:0e:e6:d2:d0:03:53:ab: 23:84:d2:28:01:50:4e:1e:1c:bb:fd:5c:e6:2a:78:dd: 21:f3:de:f8:77:63:33:14:f5:70:bd:6b:3b:29:cf:87: 2f:c2:18:cc:17:41:97:1f:c0:e4:5b:3b:45:f1:99:fc Fingerprint (SHA-256): 54:62:EB:00:6F:91:7B:F7:7A:CE:9F:14:86:93:64:AA:95:F0:23:76:65:A3:CF:EF:81:D8:66:ED:59:04:91:D8 Fingerprint (SHA1): 8D:82:63:BD:06:82:B7:A4:7F:0A:F6:05:E6:30:09:DA:63:11:E0:2A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #258: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164959 (0x3caff6df) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 16:52:16 2023 Not After : Wed Oct 18 16:52:16 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:ff:d6:1d:51:0c:bc:f7:ef:d9:87:eb:d1:6e:94:ef: 43:b3:32:d7:2a:77:e5:d1:99:09:24:01:92:4f:0e:c7: 35:67:00:cc:b9:b5:7c:70:d9:84:c8:42:92:7e:d8:c2: 3e:1c:6b:bf:b8:84:7e:be:01:d6:c7:1a:f0:70:7d:c6: ca:43:ce:f2:c8:e8:04:85:a7:5d:ed:97:8b:57:43:f8: 1b:51:3a:1e:bf:02:c2:90:be:73:aa:37:73:ca:99:81: 6c:e9:59:73:bd:9e:d9:de:eb:8e:c8:c6:0c:19:4a:be: ed:75:b2:3a:34:e4:e6:28:5f:6a:cd:c3:06:ae:2d:eb: b7:64:4c:30:26:35:cf:a2:e7:64:69:b7:92:52:00:0f: 60:4a:f3:2b:da:41:6c:02:47:9e:42:02:7e:c3:44:4d: 13:aa:bb:9b:10:07:e8:80:37:d4:4d:a3:a0:a8:13:dd: a0:9c:a9:d2:d1:8b:3a:79:d2:b2:d9:6b:0b:09:bf:91: 23:3d:ba:d3:83:de:28:8e:65:6a:be:9c:84:08:33:86: 0a:49:7d:e9:8b:1b:bc:ca:2f:f4:63:45:bc:ee:44:fe: 4e:9f:7b:2b:57:6b:56:83:d5:7e:e3:64:d1:34:ca:cc: d6:1f:86:b3:4a:56:d2:a1:bd:67:33:d9:0b:7a:c2:6b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3b:54:ba:d1:d9:43:55:9b:11:bf:e0:86:20:ca:c5:16: cd:e4:75:f8:2c:66:14:08:60:97:d1:fc:bb:82:d6:cd: 71:b3:4c:89:57:e0:56:fe:f7:53:ba:5d:f8:5e:ab:0d: cd:64:ec:67:64:ce:55:50:94:c1:5b:ec:f3:41:46:75: 9a:57:93:7b:d6:97:d6:81:ec:b0:39:53:24:ce:09:c9: 67:3e:28:76:9a:59:0f:5f:6c:fb:aa:06:c2:5b:99:09: c9:ac:22:ee:a5:bf:8f:3e:5d:6c:5b:01:50:bc:93:00: 08:1d:98:25:6e:94:1b:c3:d9:bf:51:4d:24:0c:c7:0a: 4c:83:02:6b:88:f4:8e:f8:04:f6:f7:14:e5:59:76:f5: d7:ea:99:00:ae:55:f3:d8:0c:b2:31:95:23:2e:0c:e2: cb:0c:c6:02:2c:71:52:d6:1f:e7:04:40:af:0b:7b:b2: 02:1b:b6:93:4f:b9:48:b5:23:fa:67:30:e1:46:e9:39: e3:e9:89:77:0e:b0:08:1b:a4:0e:e6:d2:d0:03:53:ab: 23:84:d2:28:01:50:4e:1e:1c:bb:fd:5c:e6:2a:78:dd: 21:f3:de:f8:77:63:33:14:f5:70:bd:6b:3b:29:cf:87: 2f:c2:18:cc:17:41:97:1f:c0:e4:5b:3b:45:f1:99:fc Fingerprint (SHA-256): 54:62:EB:00:6F:91:7B:F7:7A:CE:9F:14:86:93:64:AA:95:F0:23:76:65:A3:CF:EF:81:D8:66:ED:59:04:91:D8 Fingerprint (SHA1): 8D:82:63:BD:06:82:B7:A4:7F:0A:F6:05:E6:30:09:DA:63:11:E0:2A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #259: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #260: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018164964 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #261: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #262: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #263: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018164965 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #264: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #265: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #266: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018164966 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #267: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #268: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #269: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018164967 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #270: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #271: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #272: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018164968 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #273: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #274: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #275: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018164969 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #276: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #277: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #278: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018164970 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #279: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #280: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #281: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018164971 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #282: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #283: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #284: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018164972 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #285: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #286: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #287: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #288: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1018164973 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #289: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #290: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1018164974 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #291: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #292: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1018164975 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #293: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #294: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #295: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #296: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #297: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1018164976 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #298: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #299: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1018164977 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #300: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #301: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1018164978 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #302: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #303: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #304: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #305: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #306: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1018164979 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #307: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #308: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1018164980 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #309: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #310: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1018164981 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #311: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #312: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #313: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #314: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #315: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1018164982 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #316: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #317: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1018164983 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #318: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #319: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1018164984 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #320: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #321: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #322: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #323: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #324: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1018164985 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #325: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #326: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #327: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #328: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018164986 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #329: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #330: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164964 (0x3caff6e4) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Wed Oct 18 16:52:35 2023 Not After : Wed Oct 18 16:52:35 2073 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:a0:8c:b8:5a:ea:52:72:3c:9e:e0:21:c0:dd:2d:e4: 65:8a:db:47:3b:bb:a6:1b:2a:fd:fc:23:60:ad:60:36: f5:cb:45:86:3e:61:96:fe:7e:91:2e:8a:c9:ec:c2:e9: 0c:cd:88:9b:ff:c7:f1:17:3a:02:29:7f:41:fe:14:fb: 65:06:cb:99:55:5d:46:80:e5:58:81:49:a2:5d:47:9c: 19:72:56:8e:92:2b:7a:cb:02:b6:15:6d:06:98:bd:27: d6:02:da:6c:7a:ec:25:8c:69:4b:64:87:d2:65:9d:f2: 6b:af:a0:be:a5:81:e8:5c:7b:68:14:d1:76:34:b6:42: b9:fd:ed:97:f1:d7:7c:20:23:f2:41:b2:b9:b4:35:d4: e7:2e:02:e0:87:83:96:82:ca:e5:00:64:0c:07:53:e0: 6a:3b:2a:b5:b4:37:56:3d:bd:82:8c:e3:07:15:79:31: 49:f7:18:d2:cf:a7:e1:00:05:99:98:bf:dc:d3:b4:1d: 08:ec:dc:62:84:f3:d3:57:80:16:b2:95:26:a7:2a:ac: 19:29:9c:3c:13:c9:a3:74:ea:34:d0:7f:5c:85:b5:18: 41:99:72:38:7f:30:9f:7e:a6:6a:21:9a:d7:11:49:82: f3:29:36:6b:dd:3c:72:d8:1a:cd:8d:17:a4:fb:92:9b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 75:b9:e0:5a:c8:c4:2a:70:dc:52:47:e8:69:f1:34:83: 99:c8:54:cc:f7:b0:33:2d:73:12:97:b9:c7:64:d6:34: 73:ad:cd:70:85:d1:39:05:4d:64:f6:c4:88:c9:d6:8b: 32:ac:c5:33:4a:3c:bc:3d:48:a6:80:36:b4:58:49:94: e0:64:d2:00:f9:c6:5d:1a:87:96:30:07:ef:60:cc:a7: 1f:c7:e1:38:25:49:3c:f1:77:15:7f:06:0e:ad:c6:c1: 04:b7:70:93:97:ed:56:5a:8c:dc:e9:87:4f:42:aa:22: 67:2f:e9:59:9d:a9:3c:e0:56:52:40:d7:a8:79:1b:af: 52:be:99:41:84:6c:77:2c:3a:24:86:0f:e7:06:25:aa: a2:66:ff:be:aa:42:2c:ac:aa:13:e1:17:9a:61:19:bc: b3:cb:fc:02:15:e3:fe:ff:38:c1:38:aa:c0:1c:c7:5e: b0:ca:83:86:42:92:33:a6:b6:1c:d6:a9:09:09:3e:23: 86:c2:2d:0b:7f:84:16:07:76:3b:a5:de:fa:60:0d:36: b1:6b:be:39:7f:e5:ef:af:a6:87:52:90:05:35:7d:4c: 13:3c:5a:53:5c:e9:81:3e:cc:fd:66:f9:95:bb:5d:cf: f7:da:b7:86:fd:49:1b:66:b5:5d:da:91:7c:40:a7:81 Fingerprint (SHA-256): 1F:BD:DD:D8:45:30:98:F9:11:7B:58:FF:87:C3:09:41:FA:52:98:0B:8A:DF:A4:EF:C9:B9:A9:60:AB:FC:BE:8F Fingerprint (SHA1): 00:CD:82:44:F0:C9:8C:D2:97:E7:80:26:B9:F9:8D:3D:BE:88:B2:50 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #331: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164965 (0x3caff6e5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Wed Oct 18 16:52:39 2023 Not After : Wed Oct 18 16:52:39 2073 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:77:6f:2c:54:14:aa:cb:bc:dd:9a:b0:b1:29:a4:ec: ac:4f:37:2a:85:0f:f6:18:2a:34:74:88:6c:96:09:50: e7:f9:98:24:00:49:44:09:a0:5d:c5:33:9e:70:53:97: 9d:ec:32:e4:e2:2d:33:1d:ca:f5:f3:5f:cb:a6:2b:cb: ec:ae:bf:5d:64:f8:d8:d2:0b:1b:65:50:62:00:fb:f6: e3:e4:c0:11:e2:cd:55:9a:92:1c:66:3d:db:4d:51:cd: 32:6a:07:0a:26:84:5d:08:b5:4b:2b:17:21:76:84:8f: f0:26:e0:c5:c5:8f:42:7e:df:9b:e5:ae:67:8e:f1:3b: e1:93:aa:fe:9c:ca:fd:5a:8c:35:df:14:dd:16:db:4f: cc:7f:a5:ff:58:f7:b8:f6:a2:50:73:4e:a5:e6:35:d9: 05:99:11:ef:60:1a:83:66:2b:c9:29:5e:84:14:30:43: 6d:d9:10:52:47:32:d2:78:ae:9f:1e:79:9c:d3:df:12: 1b:b9:0d:ca:36:06:ea:43:08:8a:e3:80:6e:5a:e8:72: 5d:18:87:d7:dc:e7:80:51:a5:ca:79:66:41:de:28:ee: cb:29:44:4c:e9:2d:c1:a3:a7:ed:d6:07:89:a8:0e:40: d3:f2:1a:9a:20:1c:dd:d4:7b:57:fe:d2:13:a9:67:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9a:db:16:86:23:2f:7b:1b:a0:92:52:b9:2a:ea:c9:82: 77:35:7a:5e:57:f9:fc:c6:e3:29:9f:22:92:76:a3:88: dd:28:bb:e5:e6:ac:9d:6f:41:e8:39:03:fc:63:fa:50: 76:f2:1d:9e:63:f9:50:32:6e:14:34:16:fe:fd:8e:3a: 86:28:8b:5a:9c:8e:9d:c4:7f:52:f4:99:6c:aa:aa:b8: f7:0e:ae:90:01:fd:8a:95:07:2c:ab:f4:5d:2b:c5:31: 92:38:68:39:27:18:b2:f5:df:33:d1:23:8e:24:88:7d: 6d:f1:69:92:36:28:85:f4:cd:ec:64:d9:b6:a2:bf:c6: c7:b2:52:2b:ff:15:4b:2f:77:52:68:74:d0:37:b6:f1: 3b:87:2e:45:fc:84:2b:ce:3b:32:bc:ca:64:db:6d:b0: 0e:54:19:63:5a:29:68:96:35:9c:e1:3f:95:bc:bb:2c: 61:00:f4:7d:03:4c:f0:3c:fc:d8:25:91:8a:4b:9f:eb: 88:84:66:b6:96:52:b8:80:37:75:83:9c:11:88:0f:fc: 2c:39:0c:f1:be:31:b0:2f:ed:7f:ef:3b:33:0a:0b:77: ef:74:f0:c5:23:46:c0:10:78:83:57:4e:15:06:44:2e: db:63:b7:ca:d2:95:18:58:41:ec:a9:de:3d:d7:02:d2 Fingerprint (SHA-256): CF:8A:B7:51:D8:41:53:3E:90:4D:94:9B:5D:CE:0D:D8:20:CA:F2:0B:EE:AB:1C:EC:8B:83:48:DE:06:C4:54:46 Fingerprint (SHA1): B0:2B:37:26:96:CF:79:65:A0:D5:4F:9C:18:51:FA:A1:43:DB:69:9A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #332: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164966 (0x3caff6e6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Wed Oct 18 16:52:42 2023 Not After : Wed Oct 18 16:52:42 2073 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b6:94:55:26:fa:ce:2c:93:48:79:6f:a5:22:fc:db:f5: e6:2f:48:53:3e:22:c6:61:4d:8b:12:4f:58:6f:f8:12: f9:99:3c:f8:ca:d8:a7:30:1f:a6:d6:f1:77:45:28:ee: 20:b3:db:b7:e4:4b:7c:a5:2b:ad:4e:ea:2a:2a:f2:20: 1d:02:0b:68:04:45:c6:ac:a7:99:d3:79:ad:b8:57:f3: cd:86:84:17:39:de:73:d3:4c:4c:36:66:24:70:da:dc: 72:08:15:99:82:f6:62:d2:cc:02:61:da:47:1d:35:be: 02:51:0b:2f:70:15:b1:ca:1e:15:9e:82:d1:12:24:86: d5:b4:d7:1e:a5:56:d1:48:bf:41:b5:8b:97:40:2c:a8: 8f:11:ad:ef:83:99:ed:53:8a:68:e6:23:c0:61:94:21: e1:5d:fa:26:1a:ce:73:14:76:fe:59:b7:83:44:6c:f9: 06:fd:79:ae:8a:d8:c3:a8:8d:72:dc:7d:bf:1d:e6:b3: 40:45:e4:94:42:92:7d:bb:2c:11:80:7b:a9:f6:9b:ef: 48:98:c3:fd:12:6b:d3:19:2c:08:ea:9d:c4:ab:85:51: 3e:2e:5d:8d:b5:e6:7a:a8:c1:f7:34:53:e7:37:7e:da: d3:c8:51:42:0f:9d:b6:e8:36:4e:df:01:cd:d4:d8:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 90:7b:2d:2d:2e:e1:db:1a:46:83:77:69:7a:ae:da:bf: 02:95:1d:c8:94:ab:c1:39:4d:ef:19:1c:e7:c7:81:00: a9:b5:1d:64:46:5b:4a:b3:cb:c1:22:af:23:0a:7f:2b: ad:7c:e6:45:b5:bb:71:cb:15:71:cb:7a:89:74:e1:8e: 76:83:ef:40:b8:e5:b9:27:8c:cf:98:77:64:44:59:e3: 8b:1c:8a:bf:e6:62:38:36:ce:3c:63:1b:ff:49:7f:37: 6c:dd:dc:55:39:5f:94:d5:55:00:39:d6:c1:a1:69:7d: 6c:a8:c2:d7:a7:09:bf:4f:2f:4b:f3:12:59:7e:2c:43: 7d:45:73:44:0c:98:6a:6e:a4:4b:71:d1:76:e5:b0:65: 33:9e:91:2c:ee:96:3f:75:0b:9d:45:b3:e7:56:99:7d: c4:1e:bd:26:89:1a:d1:ff:c2:05:60:7d:e2:dd:c7:57: a0:c6:6f:eb:35:36:aa:e4:08:44:49:8c:3c:a7:7c:8c: 05:91:55:d1:7e:6c:c6:9e:47:af:1e:61:c2:f3:2d:61: 74:14:a0:41:09:53:c9:85:b2:3a:52:a3:af:60:3f:9b: fd:c4:02:d4:16:e5:df:51:64:a4:e1:e5:55:82:73:68: 68:8a:95:1c:ba:29:5e:d0:53:a2:be:fd:c9:77:d4:26 Fingerprint (SHA-256): 09:93:26:A9:60:E9:53:83:A3:FA:17:24:C9:91:14:4D:15:B2:60:4E:81:1A:5F:7D:68:0C:F1:BE:6E:47:8B:DF Fingerprint (SHA1): AC:87:2B:81:E0:27:08:81:8E:81:14:ED:86:7E:F7:77:94:EE:A6:A6 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #333: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164967 (0x3caff6e7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Wed Oct 18 16:52:45 2023 Not After : Wed Oct 18 16:52:45 2073 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:d1:24:ae:14:4b:81:cb:f0:70:d5:51:65:60:79:a9: 09:0c:ea:d9:71:6c:69:3b:ad:6d:b0:b8:68:44:df:d2: e9:b8:28:0a:00:d7:43:29:74:db:53:4b:86:9b:4d:22: 16:d8:71:e7:c8:92:1e:e8:1a:62:fa:d2:a3:66:35:ec: 35:ef:39:57:32:c7:d8:c4:73:fa:68:94:d1:9b:ae:bd: 01:4f:d0:a8:ab:2d:95:8b:db:5f:ef:ac:66:e4:d5:cd: b8:8d:61:11:22:ac:b6:a2:72:8d:8b:bd:dc:66:16:5b: 5a:de:db:ac:bb:82:83:5b:ae:47:8f:2b:c9:a1:76:f7: f9:5d:91:a6:60:0e:99:01:f5:50:5c:e5:27:ae:52:d8: 4d:52:cb:7b:ce:50:1b:25:bd:92:bf:ab:b2:fa:44:5f: ab:89:a1:47:4a:6d:13:d8:b5:e4:6c:61:56:78:dd:5e: be:36:d0:8a:3f:52:fc:a8:ee:ed:2d:b3:4b:7d:86:6c: 8e:1c:17:0a:af:07:4f:f3:85:3a:6c:eb:70:84:a5:f6: 4e:6a:11:3a:f3:0c:ce:0e:11:cb:50:af:cb:26:80:de: 2a:fe:00:50:8f:b8:5e:bf:fe:ab:69:c0:87:a0:e0:77: 42:4d:0d:ce:3e:87:2b:6f:bf:3b:66:cf:77:e4:68:e5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 61:97:90:59:e4:2e:99:6d:1f:b7:21:ea:f7:70:52:fc: 54:61:0d:4f:35:1c:f3:14:41:9a:e7:28:2d:a4:ca:d4: b2:dc:5f:40:41:22:bb:43:b6:56:6c:e8:00:39:27:17: 4c:68:b4:5a:f8:32:39:a2:32:6b:33:15:07:d5:f6:93: 00:b8:b4:85:a1:0a:03:79:75:5b:8d:7a:7f:a9:b6:0b: 0f:ec:5f:4e:ed:1c:97:e4:9d:b8:4b:9f:6b:2e:2a:e3: dc:6d:ea:66:6b:4a:38:e9:d1:c1:6c:7f:1b:34:fb:74: 69:5a:71:c4:9f:2a:88:2d:c4:e9:d8:62:48:55:a4:59: 9b:dc:d9:1f:f3:a5:d6:91:0e:31:53:25:38:fd:15:20: de:38:b3:4b:e2:58:5a:c8:07:98:d1:e1:92:b2:49:a5: 95:00:61:4c:81:c9:e7:e9:f7:87:3e:78:5c:59:94:0f: 84:c0:c1:7e:a2:83:2d:48:bd:49:bb:f0:4a:7e:77:2f: 55:31:54:9d:e7:24:1b:c0:ec:cc:d1:b8:60:27:53:ee: 6b:42:4a:e8:a5:49:74:92:73:08:22:94:47:2f:9b:df: 86:78:c1:71:72:96:e2:41:01:f4:6a:e4:ed:91:f3:c2: 17:ad:76:b6:e8:3b:38:e5:b4:c2:a1:eb:67:d9:ef:bb Fingerprint (SHA-256): 48:C0:72:56:29:53:43:94:E4:B7:5A:48:0A:28:F6:CB:75:E6:85:E5:9E:0C:AA:E0:19:7F:0C:70:A7:66:1A:92 Fingerprint (SHA1): D7:DB:EF:EB:78:BD:87:5C:62:12:A0:A6:0B:18:C0:B5:D3:B1:88:F7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #334: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164968 (0x3caff6e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Wed Oct 18 16:52:48 2023 Not After : Wed Oct 18 16:52:48 2073 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 98:a9:ac:19:e0:6a:9b:70:93:81:89:f7:67:dc:6e:b7: da:1b:32:41:28:ba:37:5f:65:d6:a3:46:cb:69:e6:6e: c7:b9:cd:52:e4:5a:a2:7f:30:11:60:8e:99:38:1d:38: d6:f1:30:e2:93:06:cb:cf:27:01:0c:b2:ae:f4:9e:c3: 14:62:a6:39:d5:d2:e2:20:0d:ed:cc:d8:c0:3f:6b:03: 7d:3d:5f:37:40:55:a9:0f:9a:71:ee:0c:34:ba:00:a8: 0a:66:88:de:fc:5e:06:d9:60:5b:f4:12:31:cb:21:32: 0b:61:5a:fb:b6:9f:2a:55:e3:b6:ed:54:0e:7d:4a:c6: df:be:8e:28:da:37:a6:8c:54:47:32:cc:a6:3f:f5:c8: d2:6f:fc:72:9d:00:7d:2a:54:9f:1e:aa:cf:e4:fd:86: 96:f6:ba:1d:7c:76:ef:56:01:fe:1e:f0:3f:7e:fc:5a: bf:ab:92:8f:de:de:d0:f9:b2:c1:85:3b:3d:aa:97:2b: f6:ca:13:de:07:af:82:42:5c:d9:8a:34:5e:1b:da:a8: 64:41:b6:98:aa:ff:e4:87:9c:b3:db:a9:cd:a7:b0:a4: 4a:3f:32:b5:0f:c2:77:f7:b4:20:14:39:95:68:0a:16: a4:0b:69:7f:85:99:50:cd:5b:e5:45:2e:fe:fc:95:e9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:e6:43:da:fe:93:30:9c:51:c5:94:b2:7e:f5:44:44: 10:e7:ba:33:19:67:c8:62:c1:e2:e4:98:d1:0d:b2:be: ce:41:1c:14:12:e0:4b:75:29:ed:98:51:bc:c5:67:df: 6a:20:3d:92:52:36:35:bc:e2:96:e2:a3:38:91:6d:57: ac:64:c1:e8:55:9a:44:d3:06:c5:dd:9b:ac:b0:84:16: b8:7c:16:14:70:b8:06:47:df:90:1a:2a:2b:d9:94:65: 7a:ef:db:57:30:d0:cd:87:23:6c:9f:44:4b:04:d8:be: 01:6f:d1:f3:12:42:ea:98:e3:0e:dd:9c:9a:00:cd:6b: 23:f0:08:dc:20:24:33:c2:fa:5d:dc:29:5d:ec:e3:51: e3:68:57:d8:bb:3a:51:04:48:67:78:2b:9b:d3:60:0e: cc:96:b9:1c:fa:4a:cc:e1:74:97:f3:30:7a:ad:f2:c7: 7c:bb:6b:27:ec:6a:d2:87:10:d5:4d:f3:af:52:01:30: 80:1e:0d:23:69:9c:a2:25:23:a8:08:e3:16:de:65:e5: 84:8d:d2:a5:b2:dd:38:7e:6b:de:d1:e0:a8:56:19:96: 33:36:c6:b0:49:35:ae:bf:36:17:84:cb:e0:fb:ec:85: e5:12:6a:d1:b9:e4:58:1e:ab:8d:be:61:01:ce:08:34 Fingerprint (SHA-256): 68:FC:69:F5:24:F8:DA:D5:AF:49:63:BD:A6:7D:E0:2D:8F:6B:79:6A:5C:6A:85:E8:D5:A5:EF:FB:FC:75:C6:BC Fingerprint (SHA1): 86:F6:8A:35:75:EC:63:50:AA:37:06:31:7F:4A:D9:7C:F1:AE:30:35 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #335: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164969 (0x3caff6e9) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Wed Oct 18 16:52:51 2023 Not After : Wed Oct 18 16:52:51 2073 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:74:fe:79:5e:56:dd:a8:d1:2d:04:0b:9f:96:b3:6b: 29:bf:af:04:df:96:7e:5f:32:00:35:0d:29:a4:a4:53: 99:25:9b:0b:1d:43:fb:af:4b:44:a6:9a:4c:c0:f2:b6: d7:53:84:e0:b9:72:8f:69:46:ba:73:7c:57:71:5e:e6: 8b:b5:08:63:66:25:05:1f:b6:84:97:5d:6f:2c:c0:85: 57:49:a9:93:a7:cb:db:6e:a5:40:de:85:62:e9:76:58: 5e:ce:68:5e:e0:04:ca:57:03:39:ef:b3:98:42:52:59: 28:76:1f:aa:38:ea:54:c3:fa:48:eb:81:f6:66:46:86: c8:28:02:0b:25:82:f1:ec:c4:d0:f9:b1:f0:a2:11:da: 44:34:59:98:f5:ea:02:a5:d0:f4:a2:87:1b:8a:b8:5a: ae:55:93:09:41:0d:9f:c0:d1:4e:e9:b2:1e:e7:8d:e7: f7:e8:3f:02:e3:ec:92:cb:4e:fc:ec:06:1a:a8:f1:b4: 5c:47:79:cd:b6:fd:d2:7d:a0:7c:29:b1:0d:a2:f6:29: fb:e4:0e:96:23:c5:d4:9b:76:fb:7c:aa:1e:78:a7:25: 14:52:8f:0c:50:6b:ca:ef:07:4d:2b:5b:ce:3c:8e:86: 5e:3f:4c:a0:7d:6e:f9:83:e3:98:06:b7:55:c8:eb:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 48:e2:2a:38:6a:eb:19:30:62:a7:39:74:77:95:41:b4: 78:a4:71:c0:68:6b:db:1b:48:8f:31:20:17:08:ae:ee: dd:aa:d5:ec:40:9b:d9:eb:9d:f9:31:9f:53:7d:65:09: 3f:47:6f:e1:ca:06:4f:e5:a3:60:41:57:52:1b:d7:56: 1b:2e:b1:e0:73:d6:a2:d7:35:6a:06:3a:f1:11:8a:ed: d2:86:41:99:34:4b:ef:05:6c:45:25:4c:ce:6b:97:9d: 8c:ea:cf:e8:d6:97:79:7c:05:93:de:d2:bf:8f:86:8a: 91:18:b4:4e:01:3e:01:76:6c:02:0a:df:be:aa:32:ab: 3a:56:d4:ff:d0:6d:b4:3f:32:3b:9e:9a:95:ff:12:5d: 39:a9:a7:15:ba:d2:90:3c:80:88:ff:d0:3b:d6:95:92: ec:90:f2:d6:2b:41:ff:3c:10:a1:32:7d:68:64:f7:4d: a9:ac:ee:28:37:9c:5b:9d:b2:a4:22:e1:77:fd:f0:ad: 04:ac:76:0e:c7:71:4a:8b:38:24:b3:45:ea:83:31:b4: 45:01:c5:fb:3e:79:ff:39:b9:3e:4e:b1:82:b0:33:4b: f6:c9:21:69:13:5c:3d:c9:c7:e3:b1:63:19:83:cf:23: 2f:3b:a5:6b:3b:47:7b:64:bc:04:0e:2c:51:4d:2d:a0 Fingerprint (SHA-256): B3:CF:05:2D:12:CE:BA:A3:E6:36:78:E4:EC:58:F2:75:E2:FE:68:12:42:E2:14:AD:4F:4D:5F:04:9E:2D:21:7D Fingerprint (SHA1): 0F:0E:08:59:91:9E:2F:B8:9D:25:C8:A0:62:B1:A9:57:60:23:E5:3B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #336: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164970 (0x3caff6ea) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Wed Oct 18 16:52:55 2023 Not After : Wed Oct 18 16:52:55 2073 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:65:8c:60:93:00:5f:5a:70:1f:28:42:4e:2f:51:db: a2:31:87:7b:c9:99:ae:02:54:d6:eb:4f:17:d7:a6:de: 11:ac:e3:84:9f:9a:04:cc:59:c2:15:7d:35:74:96:c2: 2f:38:fb:50:e2:15:99:8a:3a:38:09:d8:e2:bd:91:75: 10:4a:27:f5:5b:d7:1d:d3:d2:95:07:6e:d2:68:72:e7: 6b:4b:9a:4a:62:e6:14:af:73:e7:b5:a5:7a:26:8f:c5: 23:bd:31:72:d3:09:84:e9:19:ff:67:a5:cc:5c:94:ca: 45:b1:c7:bb:d0:d0:fc:67:e6:48:ac:51:e5:9f:27:d0: 51:c0:5a:f2:b6:4b:97:c1:7e:43:28:d4:9d:3b:49:0c: a5:25:31:a2:10:96:48:29:c0:3c:ba:56:5a:8a:8c:6d: d4:45:ce:50:ef:43:1d:c5:b2:cd:0a:39:23:6e:3f:38: e4:f0:a8:45:7e:9f:c1:54:16:e5:c4:f9:64:7b:f4:40: db:82:12:ba:ff:40:0c:f6:73:32:a9:4b:c1:46:2f:6c: fa:90:15:b6:51:3e:9d:97:a4:4a:dc:92:c0:9a:54:bc: b5:dd:12:22:87:33:f7:33:69:70:23:11:b5:35:a6:6a: 16:16:b6:d9:bd:08:25:1e:54:a2:e1:9b:80:6e:95:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 58:09:8e:df:94:b7:34:18:41:7f:47:be:dd:0d:ee:05: 00:11:33:de:f7:3f:b1:b1:43:7e:e4:a8:50:14:71:1a: 51:5d:bc:70:1c:6a:1c:45:5b:e9:4a:91:51:6f:20:d1: 55:cc:3f:ce:5c:05:19:62:fd:80:51:ba:4a:28:8c:6b: 0e:1b:c4:61:07:eb:33:9f:cd:f5:87:bb:a2:41:3a:90: e1:8d:0d:85:01:30:93:e4:91:b8:07:be:91:e2:f3:e0: 2c:31:0b:77:93:8c:f7:71:98:f1:25:40:7c:db:4b:99: c9:07:0b:af:d8:bf:50:bb:04:71:de:4c:25:f1:4f:2f: 09:ab:a6:a7:9e:b9:08:6d:52:61:45:bf:68:80:89:56: d3:57:70:25:17:85:af:54:fe:eb:8a:ee:04:20:2c:43: a6:88:97:b4:70:26:a3:45:91:f9:3b:20:90:1c:e7:39: c5:66:af:6d:cf:a5:5e:25:09:08:68:8c:9f:f2:c0:6a: 6b:9c:e2:13:70:ff:16:d1:53:be:18:c8:b8:28:17:5a: f2:8d:83:90:87:02:83:cb:53:ca:a7:e0:b4:5e:4f:c5: 05:c1:d8:85:b6:92:80:73:80:74:3f:7e:0c:d7:28:ee: 25:43:f0:be:60:b5:b4:8d:b8:06:da:e2:e9:7c:e8:fd Fingerprint (SHA-256): DB:F1:1E:15:94:FE:0A:C0:B9:3C:FC:6E:0C:2B:6C:16:55:D9:D4:33:E7:49:4F:B1:8F:1A:17:A2:7A:22:6F:D1 Fingerprint (SHA1): EC:AB:D9:F9:0C:0B:BA:58:31:89:A4:47:20:D8:8F:C7:B9:32:6D:0B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #337: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164971 (0x3caff6eb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Wed Oct 18 16:52:58 2023 Not After : Wed Oct 18 16:52:58 2073 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b9:ed:0e:f8:a8:8b:92:04:e2:91:da:56:41:a6:e7:35: da:d8:57:07:1f:24:fd:fa:ef:40:b5:9b:9c:33:d5:ec: 9b:b0:d8:51:60:59:8e:75:61:41:6f:37:b9:e9:8b:97: 09:b2:c1:d7:df:c1:0d:48:19:f7:83:98:f8:21:f3:80: f7:03:f0:73:68:d9:01:9b:18:3f:70:73:b1:a0:11:b4: dd:e9:5b:3d:bf:29:3e:6f:fe:28:27:e9:82:aa:0d:90: 24:a7:5e:75:eb:bd:0c:8c:06:f9:b3:20:a4:fc:ef:be: fe:d7:5d:7a:e1:f1:91:88:9f:b4:d8:9f:90:ba:7c:bd: 48:fe:55:b1:55:92:ac:2c:7f:7d:ba:6b:62:86:66:93: cd:7e:e3:1f:6a:5d:a9:a1:4b:5b:c2:22:04:87:bf:ec: ca:c4:37:b1:26:29:ab:4c:6e:b7:0d:91:8d:d5:d9:eb: d5:84:7f:ae:79:3d:f9:54:e1:9c:1b:bc:87:55:0e:aa: 75:2b:1b:a3:ab:bf:db:8a:4d:13:5b:ac:c8:85:50:3d: a6:22:35:83:04:df:0f:2f:1c:29:89:50:fd:af:fa:52: 61:b7:5f:eb:85:9e:3f:67:e2:16:4e:5c:18:2d:f7:7d: b3:da:bd:2b:53:b1:9c:a5:a5:82:5a:a8:c1:54:41:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:17:03:e9:1b:51:8b:2c:af:f2:97:4c:f7:27:37:3b: 5e:66:68:16:59:4d:c7:7a:81:05:7e:0f:f1:da:4d:39: 5e:9e:01:78:92:16:78:08:8f:01:36:ae:15:71:bb:4a: 0f:72:8c:f5:3a:1a:c8:4c:36:17:e5:37:34:48:f6:df: d9:5d:fe:96:52:53:f8:9e:c3:1f:eb:7b:ed:a0:3e:2b: 19:6e:25:e9:12:40:ef:43:70:b1:45:fe:96:70:48:77: b7:7f:4a:e4:3a:f5:41:d4:77:fd:52:f0:fc:86:b6:e6: 1b:a0:0b:b2:7b:1b:a6:89:17:6e:3a:b6:c4:71:36:0f: cf:2e:69:ff:05:25:17:ba:7b:99:fa:1d:f4:27:22:7c: a8:a3:26:84:2a:62:0e:f2:eb:31:58:47:db:34:a9:fb: a8:c5:73:c2:dd:7d:04:bd:c1:0e:1b:c9:10:c7:e1:6d: b5:bb:2a:8c:f5:be:ec:53:5b:40:16:1c:af:a1:3a:54: 13:40:ae:24:ee:c2:27:20:6e:a9:00:68:91:a0:29:9b: 1a:71:ec:f7:06:91:ff:32:df:4c:52:f2:f7:d0:af:f0: 11:7b:e9:07:b0:38:02:88:5b:5c:26:4c:44:ff:58:1e: 8c:ee:f1:c4:36:51:63:8e:93:35:89:5d:1c:7f:0b:fc Fingerprint (SHA-256): 55:19:9B:3D:0C:09:8B:7A:FA:3E:20:85:80:B6:6B:7C:8E:4F:E5:9B:B6:98:C9:C2:18:FD:CC:E3:80:87:2B:BB Fingerprint (SHA1): 0A:83:CD:0E:7B:F8:57:2B:34:9B:98:ED:5C:6B:9C:20:60:C7:E2:83 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #338: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164972 (0x3caff6ec) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Wed Oct 18 16:53:01 2023 Not After : Wed Oct 18 16:53:01 2073 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:1f:b7:46:3f:17:8c:fa:92:a5:9f:4c:c1:b5:5e:7e: 3d:7e:3a:ff:f6:4a:c4:52:3c:85:36:34:58:f8:91:76: 3b:05:09:77:85:f4:28:25:62:7a:48:29:09:5e:a3:16: d4:cc:84:e0:31:00:0b:66:e8:95:6f:78:ed:bb:45:57: 76:8a:79:7e:a8:0e:0e:38:5b:a9:4b:73:12:5d:30:64: 73:c1:5c:f3:ea:33:0b:7e:99:57:40:f3:f9:46:0a:7a: db:c1:d5:27:a9:a5:f7:5a:56:10:77:2b:77:fe:97:81: b2:90:9d:11:74:c3:af:1f:c6:ab:0e:7a:7f:45:93:b1: c0:72:98:af:e0:80:01:cb:59:8f:ef:59:19:4a:a0:1e: 37:16:fa:18:6c:82:52:c8:2e:ec:9c:03:37:c2:f2:f0: ff:94:bc:b1:25:ee:e8:f6:4c:68:85:d2:9c:84:99:59: da:1c:de:1c:ce:0e:96:4b:53:67:6e:4b:0e:50:b3:f3: 1c:78:e7:97:7d:3c:14:b6:e2:6c:8e:93:ad:5f:90:ba: 5b:de:c3:3b:0c:1e:69:d8:da:c5:10:0a:00:18:46:d1: 10:75:2f:dd:52:34:70:55:d7:31:54:2e:07:b6:53:b6: 2d:40:55:7a:0b:02:d0:89:67:19:4c:0f:8e:2d:0d:2b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 54:10:ca:b1:8a:d7:31:9d:a5:25:91:81:86:8f:1a:f1: 0e:39:b9:d3:a6:31:bf:0d:74:94:89:09:59:06:eb:0a: ae:bb:d0:6c:e4:e6:f5:8b:63:31:13:1b:57:a1:35:6b: f7:ce:f2:09:f2:e8:e7:d1:15:e5:c2:dc:3e:d2:b4:f6: 21:41:9f:1a:69:2f:7d:5e:ee:bd:a2:02:8c:16:3a:63: c4:4d:86:b3:41:de:f7:d8:b3:c1:9f:ce:ba:37:df:ea: ef:d7:03:16:eb:f4:44:d3:46:a6:58:00:ba:aa:31:02: 2f:14:d1:2c:71:20:fd:0c:29:d7:27:57:16:f0:fb:9e: 36:2a:00:43:dd:67:fc:b4:d5:d9:ed:87:ac:fa:6c:3a: 14:2e:36:b3:65:81:e1:57:9e:af:42:0b:32:ef:2a:8f: 2a:2f:f0:15:79:64:e7:4c:71:cf:d4:bc:12:7e:98:77: ac:04:44:0b:1a:ae:09:43:3f:84:d4:06:21:c2:3a:b7: 29:3b:38:26:62:fa:0c:4f:28:21:05:87:d2:5a:8c:7c: a1:c1:0a:89:14:e5:9a:86:25:5b:e4:d5:72:33:40:5d: c9:20:d7:67:96:53:b7:12:49:c1:7c:73:17:ee:63:bb: 04:37:b5:5a:78:b3:48:04:d5:cf:88:1c:33:fe:d1:f2 Fingerprint (SHA-256): 73:5C:E6:29:5A:ED:E1:DE:DD:34:1D:D6:E4:36:8B:2C:57:B7:9E:DB:62:78:D2:A5:12:47:2A:00:AC:1A:5D:6B Fingerprint (SHA1): CF:1E:3A:AE:AD:E0:18:66:04:AB:3D:32:F8:11:74:59:47:8C:FB:CB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #339: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #340: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018164987 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #341: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #342: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #343: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #344: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018164988 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #345: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #346: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #347: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #348: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018164989 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #349: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #350: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #351: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #352: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018164990 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #353: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #354: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #355: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164987 (0x3caff6fb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:53:32 2023 Not After : Wed Oct 18 16:53:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:07:5a:2d:76:90:21:30:f5:d1:a5:1b:12:ce:e6:ec: 18:e7:60:99:ad:34:aa:9a:c7:77:e8:a0:19:4e:11:98: bc:70:8c:4c:f3:9c:04:98:62:4d:d9:a2:32:3d:38:8f: 00:10:c1:4b:50:9e:2b:24:cf:ae:c7:8c:5a:16:7f:52: 10:c4:e3:e4:26:20:59:c1:65:f4:35:77:6e:51:14:9b: 07:d7:cc:ad:4d:bf:11:b8:5a:b4:18:d5:4d:8d:8a:1d: e3:08:bc:0e:20:5e:3a:60:ca:91:30:64:e3:37:10:fd: 05:61:d1:7e:28:c4:58:a5:f5:90:10:75:8f:3c:8a:96: 17:f9:3d:db:1a:93:52:be:fe:4d:71:68:c3:bc:48:c1: fc:0b:ef:6c:75:74:f6:0e:97:84:2a:6f:2d:46:7c:c3: d1:38:43:67:b5:40:df:53:4c:ef:1d:32:f2:2e:80:70: 11:ba:48:5d:d4:8d:33:d7:5a:97:3e:d6:22:5e:5c:48: 8d:e1:a1:e1:d6:14:6e:67:5b:f3:72:52:7a:d2:6d:cb: 4d:e2:f8:69:a9:f5:5d:77:8b:5a:a4:8e:3d:89:72:62: 1d:d8:56:12:f3:0d:87:28:33:b0:45:75:ae:9c:fa:1c: ff:ce:95:28:3a:24:24:1f:ef:e1:2d:66:a2:6b:7b:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:65:1f:16:e3:70:44:d8:f1:23:f9:98:8f:5f:45:36: b5:7f:f6:78:f2:4c:5d:15:ca:c2:b8:fb:5d:07:c7:62: 7a:fd:70:5a:23:a4:8d:67:27:be:04:f7:12:b9:9f:33: 51:07:c0:39:0f:d0:5e:5b:e1:97:69:ed:a6:35:4d:92: 30:40:60:4b:32:a9:63:84:a4:81:0e:1e:93:50:ac:17: 59:2d:a5:2c:24:61:f5:1c:58:9a:23:3a:63:11:68:7c: f6:12:65:f7:35:5a:25:4e:f9:4b:ad:e4:73:55:45:82: cc:8d:10:d2:58:eb:81:56:cd:42:18:db:ee:2a:ea:11: 37:57:2a:87:67:c5:67:8e:0f:3d:28:32:05:64:a7:8e: be:2b:8f:53:12:ed:3c:4b:18:0c:41:72:6b:e0:f2:4b: 14:05:cd:ea:e9:d4:9a:e2:8b:f7:67:a5:c7:cf:e0:04: 75:f2:56:f1:43:c9:3f:9b:22:24:d8:42:3c:2c:9c:7b: 88:e4:49:ef:b9:7c:9a:64:65:af:aa:11:27:7b:27:05: df:25:c4:a7:28:02:84:72:d3:29:3d:43:98:17:f2:8c: 66:09:9f:3e:e6:53:f8:23:b9:84:24:2e:8c:c6:43:a6: 2b:5b:a0:ab:72:80:0b:cb:9f:be:e6:2c:49:c5:3b:24 Fingerprint (SHA-256): AC:7B:20:8D:AB:65:0A:42:02:AA:28:98:78:C1:C3:25:F8:F1:42:8D:CA:91:4A:7B:97:08:A7:8E:71:03:64:0A Fingerprint (SHA1): D6:8F:41:EA:C1:66:53:68:D8:D9:1C:49:F4:AA:B4:78:AA:16:6B:40 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #356: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #357: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164988 (0x3caff6fc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:53:36 2023 Not After : Wed Oct 18 16:53:36 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:66:a5:31:1f:3a:96:20:15:98:1e:2c:1f:62:41:a1: 6f:57:a7:2d:45:fc:1e:02:b5:9b:78:db:8e:e4:12:30: b0:84:41:28:6e:7e:a7:59:b3:e6:86:32:e1:4e:4d:76: f2:51:2f:b0:38:ae:13:b7:98:e6:a1:ac:65:12:f8:a8: 91:53:13:bd:90:86:9c:03:01:26:7c:a3:68:c1:c7:ce: bd:2a:8a:a2:f1:5f:dd:b6:49:63:ce:40:3c:be:00:5c: 36:da:b9:a3:a0:d9:40:cd:1b:29:e7:f9:19:e8:6c:a4: 5f:d9:41:58:72:32:48:c9:5b:f0:b5:9b:8f:5e:35:c9: 4b:39:e4:05:a1:00:ed:e4:ff:aa:d7:32:c2:00:a9:c5: 5d:44:01:b6:95:16:fb:18:ef:a2:26:a9:a8:02:d7:5c: f9:65:cd:cc:13:df:e4:3f:ad:ea:60:c5:89:d5:8a:7d: fb:74:14:b7:9d:15:55:b0:ff:d6:1d:9f:f0:92:d8:9a: f3:cd:cb:56:9b:f9:99:54:ab:be:0c:12:cd:6b:a1:d2: 06:76:5b:27:61:5b:64:2a:1f:fe:2f:bc:f7:ce:ae:6d: 25:24:4d:a6:1d:50:68:45:d5:5a:9b:36:f5:86:fa:02: 68:56:78:0c:55:99:48:85:27:9f:49:47:ee:b7:ee:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:29:0a:f5:0c:7a:cc:0c:cd:aa:cb:eb:0d:e1:82:14: a1:86:cb:19:20:5d:05:9e:8b:53:9b:b5:91:c3:40:10: 56:d5:5c:2f:81:59:27:0f:7a:f6:12:e3:20:c1:db:82: ac:40:5c:01:8c:f6:37:74:14:0e:ec:6d:b6:17:33:39: 97:95:c2:04:05:06:fe:8d:0d:b1:7a:34:08:69:a4:66: 12:c2:79:13:7b:06:ef:2e:fd:d3:c4:57:64:72:e8:c1: 5f:dd:a1:cf:e5:ad:ff:e4:26:ed:2f:bb:10:af:ce:61: b5:d9:3d:9a:65:14:c9:c3:75:67:36:49:3b:61:3b:cd: 65:0e:b9:63:f5:70:00:c6:b4:d1:b1:52:9b:d1:6b:ab: 41:21:75:89:bd:d3:4e:b6:6c:e8:a1:3a:71:93:e7:30: 34:74:a5:3b:d4:b6:39:24:96:90:77:21:45:b2:4a:be: be:69:eb:df:8f:77:68:fc:7f:20:bf:e2:59:69:ca:06: 2c:c4:d7:bc:6d:88:0f:06:00:35:f3:6a:73:01:f8:6a: 16:58:71:be:1b:f9:1b:3e:52:c6:44:f2:a5:12:36:f1: 31:2a:e5:78:84:67:88:19:c6:54:16:9f:03:33:64:17: 2f:e6:ac:70:5c:92:00:a0:98:e1:3a:a7:46:00:7d:ea Fingerprint (SHA-256): 14:75:A3:18:8C:48:43:70:E5:44:A0:A7:41:BB:EA:8B:6F:52:CE:10:9D:29:7F:46:1A:7B:51:3B:FA:29:04:44 Fingerprint (SHA1): C2:2F:35:E7:9F:69:AB:EB:2F:C6:C9:31:B2:33:6A:75:8C:A6:D6:6A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #358: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #359: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164989 (0x3caff6fd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 16:53:39 2023 Not After : Wed Oct 18 16:53:39 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:3a:dd:ae:75:6f:b5:07:19:54:de:f5:80:d6:fc:3d: ac:e6:c6:93:93:6d:01:f2:36:b9:8d:72:ed:12:cf:d5: 3f:bd:e5:9d:2e:a8:1c:48:5b:14:59:fb:1a:52:86:2b: d2:23:65:08:5c:c8:e8:72:72:2c:62:24:7b:d9:16:61: 3a:2d:84:d4:7e:dc:0d:0c:7c:df:1b:a2:e1:0c:a6:5f: fa:a4:f6:e1:86:67:5a:c8:5f:27:39:e0:41:b3:d7:3f: 16:de:70:38:09:64:ef:75:67:23:77:83:c0:42:62:e0: 87:42:2d:3d:a1:91:df:10:44:71:b6:09:97:c2:0e:58: 01:fe:b0:db:a6:0a:6c:21:b6:7c:a9:57:16:a4:53:67: 68:fb:55:1c:19:6e:8f:25:6d:6a:97:a5:bd:31:e9:0c: 3a:94:e1:96:2c:bc:55:64:e3:1a:86:d1:e5:7a:17:0e: 96:7e:fa:ec:ff:42:9e:07:f6:c8:26:cd:40:48:53:73: 1d:c3:72:de:0e:ab:44:90:15:17:38:31:68:25:a8:fa: 82:34:98:72:74:cc:55:27:7e:a3:6c:61:d7:4e:4f:f5: 44:e6:fa:88:34:95:76:00:24:3a:74:e6:e0:f7:3c:18: 46:2b:7d:c7:76:6f:84:85:86:2a:a5:37:76:58:ff:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:52:af:14:41:3c:e4:c6:a8:b9:be:0f:96:63:ef:f9: 13:dd:c9:30:70:f1:7c:27:99:bf:11:90:9e:fe:e9:6a: 9b:c4:a0:57:2b:e8:92:3b:37:cd:c5:aa:36:4e:d6:da: 3f:5e:68:0b:90:ff:a9:7d:77:79:84:3f:82:57:81:08: b6:64:e5:1d:16:e9:fd:ca:88:82:64:5f:7c:f2:4d:b4: 82:f7:3d:8e:36:d2:4b:b3:35:07:58:15:9e:04:8f:b1: 7b:36:9e:bf:c2:c3:75:73:82:97:21:b2:4c:e2:6c:69: ae:80:8f:37:aa:d1:b4:f7:36:1f:97:03:f4:18:aa:f4: 37:eb:6d:d6:7c:ea:47:7c:4f:53:45:5b:1f:d8:c3:be: 91:cd:16:ea:ac:19:90:73:69:66:3b:03:0e:f2:34:99: 02:74:25:6a:8f:3d:55:42:6d:d8:45:72:97:84:57:f4: 07:76:3b:65:d9:18:bd:02:86:8c:8f:3b:ef:b5:a2:6f: 8f:3f:3c:f8:1a:15:8d:85:6a:82:f4:02:6e:02:22:14: 14:96:f8:30:c0:cc:f8:4b:74:b4:f8:11:01:5a:4f:eb: 6d:15:0f:aa:9a:82:ba:31:da:35:b1:ef:56:bb:49:d8: a9:7f:05:7d:21:23:f2:d5:00:37:cc:5f:44:99:88:77 Fingerprint (SHA-256): 7B:EF:3D:94:81:C1:E2:B4:C5:7A:60:37:C1:CB:C4:B5:62:96:DB:90:0E:4C:67:63:F7:29:58:79:05:E1:5E:07 Fingerprint (SHA1): B4:29:27:38:6B:7C:9C:41:D0:50:D1:F6:B6:C2:04:08:57:92:54:29 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #360: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #361: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #362: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #363: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #364: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164987 (0x3caff6fb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:53:32 2023 Not After : Wed Oct 18 16:53:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bc:07:5a:2d:76:90:21:30:f5:d1:a5:1b:12:ce:e6:ec: 18:e7:60:99:ad:34:aa:9a:c7:77:e8:a0:19:4e:11:98: bc:70:8c:4c:f3:9c:04:98:62:4d:d9:a2:32:3d:38:8f: 00:10:c1:4b:50:9e:2b:24:cf:ae:c7:8c:5a:16:7f:52: 10:c4:e3:e4:26:20:59:c1:65:f4:35:77:6e:51:14:9b: 07:d7:cc:ad:4d:bf:11:b8:5a:b4:18:d5:4d:8d:8a:1d: e3:08:bc:0e:20:5e:3a:60:ca:91:30:64:e3:37:10:fd: 05:61:d1:7e:28:c4:58:a5:f5:90:10:75:8f:3c:8a:96: 17:f9:3d:db:1a:93:52:be:fe:4d:71:68:c3:bc:48:c1: fc:0b:ef:6c:75:74:f6:0e:97:84:2a:6f:2d:46:7c:c3: d1:38:43:67:b5:40:df:53:4c:ef:1d:32:f2:2e:80:70: 11:ba:48:5d:d4:8d:33:d7:5a:97:3e:d6:22:5e:5c:48: 8d:e1:a1:e1:d6:14:6e:67:5b:f3:72:52:7a:d2:6d:cb: 4d:e2:f8:69:a9:f5:5d:77:8b:5a:a4:8e:3d:89:72:62: 1d:d8:56:12:f3:0d:87:28:33:b0:45:75:ae:9c:fa:1c: ff:ce:95:28:3a:24:24:1f:ef:e1:2d:66:a2:6b:7b:33 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:65:1f:16:e3:70:44:d8:f1:23:f9:98:8f:5f:45:36: b5:7f:f6:78:f2:4c:5d:15:ca:c2:b8:fb:5d:07:c7:62: 7a:fd:70:5a:23:a4:8d:67:27:be:04:f7:12:b9:9f:33: 51:07:c0:39:0f:d0:5e:5b:e1:97:69:ed:a6:35:4d:92: 30:40:60:4b:32:a9:63:84:a4:81:0e:1e:93:50:ac:17: 59:2d:a5:2c:24:61:f5:1c:58:9a:23:3a:63:11:68:7c: f6:12:65:f7:35:5a:25:4e:f9:4b:ad:e4:73:55:45:82: cc:8d:10:d2:58:eb:81:56:cd:42:18:db:ee:2a:ea:11: 37:57:2a:87:67:c5:67:8e:0f:3d:28:32:05:64:a7:8e: be:2b:8f:53:12:ed:3c:4b:18:0c:41:72:6b:e0:f2:4b: 14:05:cd:ea:e9:d4:9a:e2:8b:f7:67:a5:c7:cf:e0:04: 75:f2:56:f1:43:c9:3f:9b:22:24:d8:42:3c:2c:9c:7b: 88:e4:49:ef:b9:7c:9a:64:65:af:aa:11:27:7b:27:05: df:25:c4:a7:28:02:84:72:d3:29:3d:43:98:17:f2:8c: 66:09:9f:3e:e6:53:f8:23:b9:84:24:2e:8c:c6:43:a6: 2b:5b:a0:ab:72:80:0b:cb:9f:be:e6:2c:49:c5:3b:24 Fingerprint (SHA-256): AC:7B:20:8D:AB:65:0A:42:02:AA:28:98:78:C1:C3:25:F8:F1:42:8D:CA:91:4A:7B:97:08:A7:8E:71:03:64:0A Fingerprint (SHA1): D6:8F:41:EA:C1:66:53:68:D8:D9:1C:49:F4:AA:B4:78:AA:16:6B:40 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #365: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #366: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164988 (0x3caff6fc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:53:36 2023 Not After : Wed Oct 18 16:53:36 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d5:66:a5:31:1f:3a:96:20:15:98:1e:2c:1f:62:41:a1: 6f:57:a7:2d:45:fc:1e:02:b5:9b:78:db:8e:e4:12:30: b0:84:41:28:6e:7e:a7:59:b3:e6:86:32:e1:4e:4d:76: f2:51:2f:b0:38:ae:13:b7:98:e6:a1:ac:65:12:f8:a8: 91:53:13:bd:90:86:9c:03:01:26:7c:a3:68:c1:c7:ce: bd:2a:8a:a2:f1:5f:dd:b6:49:63:ce:40:3c:be:00:5c: 36:da:b9:a3:a0:d9:40:cd:1b:29:e7:f9:19:e8:6c:a4: 5f:d9:41:58:72:32:48:c9:5b:f0:b5:9b:8f:5e:35:c9: 4b:39:e4:05:a1:00:ed:e4:ff:aa:d7:32:c2:00:a9:c5: 5d:44:01:b6:95:16:fb:18:ef:a2:26:a9:a8:02:d7:5c: f9:65:cd:cc:13:df:e4:3f:ad:ea:60:c5:89:d5:8a:7d: fb:74:14:b7:9d:15:55:b0:ff:d6:1d:9f:f0:92:d8:9a: f3:cd:cb:56:9b:f9:99:54:ab:be:0c:12:cd:6b:a1:d2: 06:76:5b:27:61:5b:64:2a:1f:fe:2f:bc:f7:ce:ae:6d: 25:24:4d:a6:1d:50:68:45:d5:5a:9b:36:f5:86:fa:02: 68:56:78:0c:55:99:48:85:27:9f:49:47:ee:b7:ee:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a7:29:0a:f5:0c:7a:cc:0c:cd:aa:cb:eb:0d:e1:82:14: a1:86:cb:19:20:5d:05:9e:8b:53:9b:b5:91:c3:40:10: 56:d5:5c:2f:81:59:27:0f:7a:f6:12:e3:20:c1:db:82: ac:40:5c:01:8c:f6:37:74:14:0e:ec:6d:b6:17:33:39: 97:95:c2:04:05:06:fe:8d:0d:b1:7a:34:08:69:a4:66: 12:c2:79:13:7b:06:ef:2e:fd:d3:c4:57:64:72:e8:c1: 5f:dd:a1:cf:e5:ad:ff:e4:26:ed:2f:bb:10:af:ce:61: b5:d9:3d:9a:65:14:c9:c3:75:67:36:49:3b:61:3b:cd: 65:0e:b9:63:f5:70:00:c6:b4:d1:b1:52:9b:d1:6b:ab: 41:21:75:89:bd:d3:4e:b6:6c:e8:a1:3a:71:93:e7:30: 34:74:a5:3b:d4:b6:39:24:96:90:77:21:45:b2:4a:be: be:69:eb:df:8f:77:68:fc:7f:20:bf:e2:59:69:ca:06: 2c:c4:d7:bc:6d:88:0f:06:00:35:f3:6a:73:01:f8:6a: 16:58:71:be:1b:f9:1b:3e:52:c6:44:f2:a5:12:36:f1: 31:2a:e5:78:84:67:88:19:c6:54:16:9f:03:33:64:17: 2f:e6:ac:70:5c:92:00:a0:98:e1:3a:a7:46:00:7d:ea Fingerprint (SHA-256): 14:75:A3:18:8C:48:43:70:E5:44:A0:A7:41:BB:EA:8B:6F:52:CE:10:9D:29:7F:46:1A:7B:51:3B:FA:29:04:44 Fingerprint (SHA1): C2:2F:35:E7:9F:69:AB:EB:2F:C6:C9:31:B2:33:6A:75:8C:A6:D6:6A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #367: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #368: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164989 (0x3caff6fd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 16:53:39 2023 Not After : Wed Oct 18 16:53:39 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ea:3a:dd:ae:75:6f:b5:07:19:54:de:f5:80:d6:fc:3d: ac:e6:c6:93:93:6d:01:f2:36:b9:8d:72:ed:12:cf:d5: 3f:bd:e5:9d:2e:a8:1c:48:5b:14:59:fb:1a:52:86:2b: d2:23:65:08:5c:c8:e8:72:72:2c:62:24:7b:d9:16:61: 3a:2d:84:d4:7e:dc:0d:0c:7c:df:1b:a2:e1:0c:a6:5f: fa:a4:f6:e1:86:67:5a:c8:5f:27:39:e0:41:b3:d7:3f: 16:de:70:38:09:64:ef:75:67:23:77:83:c0:42:62:e0: 87:42:2d:3d:a1:91:df:10:44:71:b6:09:97:c2:0e:58: 01:fe:b0:db:a6:0a:6c:21:b6:7c:a9:57:16:a4:53:67: 68:fb:55:1c:19:6e:8f:25:6d:6a:97:a5:bd:31:e9:0c: 3a:94:e1:96:2c:bc:55:64:e3:1a:86:d1:e5:7a:17:0e: 96:7e:fa:ec:ff:42:9e:07:f6:c8:26:cd:40:48:53:73: 1d:c3:72:de:0e:ab:44:90:15:17:38:31:68:25:a8:fa: 82:34:98:72:74:cc:55:27:7e:a3:6c:61:d7:4e:4f:f5: 44:e6:fa:88:34:95:76:00:24:3a:74:e6:e0:f7:3c:18: 46:2b:7d:c7:76:6f:84:85:86:2a:a5:37:76:58:ff:19 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8c:52:af:14:41:3c:e4:c6:a8:b9:be:0f:96:63:ef:f9: 13:dd:c9:30:70:f1:7c:27:99:bf:11:90:9e:fe:e9:6a: 9b:c4:a0:57:2b:e8:92:3b:37:cd:c5:aa:36:4e:d6:da: 3f:5e:68:0b:90:ff:a9:7d:77:79:84:3f:82:57:81:08: b6:64:e5:1d:16:e9:fd:ca:88:82:64:5f:7c:f2:4d:b4: 82:f7:3d:8e:36:d2:4b:b3:35:07:58:15:9e:04:8f:b1: 7b:36:9e:bf:c2:c3:75:73:82:97:21:b2:4c:e2:6c:69: ae:80:8f:37:aa:d1:b4:f7:36:1f:97:03:f4:18:aa:f4: 37:eb:6d:d6:7c:ea:47:7c:4f:53:45:5b:1f:d8:c3:be: 91:cd:16:ea:ac:19:90:73:69:66:3b:03:0e:f2:34:99: 02:74:25:6a:8f:3d:55:42:6d:d8:45:72:97:84:57:f4: 07:76:3b:65:d9:18:bd:02:86:8c:8f:3b:ef:b5:a2:6f: 8f:3f:3c:f8:1a:15:8d:85:6a:82:f4:02:6e:02:22:14: 14:96:f8:30:c0:cc:f8:4b:74:b4:f8:11:01:5a:4f:eb: 6d:15:0f:aa:9a:82:ba:31:da:35:b1:ef:56:bb:49:d8: a9:7f:05:7d:21:23:f2:d5:00:37:cc:5f:44:99:88:77 Fingerprint (SHA-256): 7B:EF:3D:94:81:C1:E2:B4:C5:7A:60:37:C1:CB:C4:B5:62:96:DB:90:0E:4C:67:63:F7:29:58:79:05:E1:5E:07 Fingerprint (SHA1): B4:29:27:38:6B:7C:9C:41:D0:50:D1:F6:B6:C2:04:08:57:92:54:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #369: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #370: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #371: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018164991 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #372: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #373: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #374: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #375: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018164992 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #376: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #377: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #378: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #379: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018164993 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #380: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #381: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #382: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #383: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018164994 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #384: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #385: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #386: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #387: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018164995 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #388: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #389: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #390: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164991 (0x3caff6ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:53:48 2023 Not After : Wed Oct 18 16:53:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:ef:87:2a:29:4f:37:9c:f0:95:f9:31:34:60:43:4b: fa:1f:ee:b4:56:7f:bb:b9:3e:6c:07:cc:7e:f0:1e:0c: 2d:f2:18:b4:d9:83:6c:54:75:d1:9e:6f:ab:b0:ec:2a: 7b:cb:ec:88:c6:74:a5:42:3c:56:ac:97:e9:c2:89:1d: e1:30:80:dc:22:14:c2:88:18:92:bf:67:56:7d:81:3b: 07:53:30:87:3e:7d:8c:52:35:6f:be:db:b9:80:36:e4: d5:a5:2f:87:42:d2:a6:55:96:ba:e1:1a:03:50:f3:cb: 27:0a:e3:df:7d:59:dd:e4:72:b1:7b:42:36:00:ae:f5: f8:ae:89:4e:89:88:45:0b:18:27:71:3d:97:88:67:a0: da:07:4f:96:2a:2b:59:36:05:c2:dc:a0:81:18:60:69: 5a:33:11:b2:f8:06:f0:7b:8e:eb:5c:ae:21:3c:25:4c: ba:20:22:04:5d:43:5a:18:1f:72:69:7b:a3:67:34:b2: ef:b2:16:3b:67:98:fe:b0:ce:9a:1b:d8:e0:d2:80:47: 6a:d7:82:ba:31:6f:c9:d5:52:d8:2f:71:56:ea:38:8b: ab:7b:2d:20:45:99:10:50:59:3e:bd:be:9d:a7:42:bd: 9b:c8:3a:8c:54:d8:af:62:f4:7a:5b:fa:72:9a:94:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:6c:e4:56:91:c5:7b:f2:c6:d8:02:0c:55:9f:19:30: e7:b8:ea:3a:06:4b:4b:7b:e7:bf:ed:d9:c6:c4:89:35: 9b:78:d4:3d:b0:a9:01:9a:3c:c1:58:b2:75:06:ba:c7: d3:e0:6e:38:49:30:48:f6:83:39:ea:45:b9:1c:5a:64: 6a:d5:53:5e:24:c6:79:28:cb:c0:05:e7:be:b6:3a:ac: e1:b6:64:b2:55:a9:73:58:91:e9:a2:61:1a:b4:78:a8: 21:7b:da:79:8c:fe:8f:33:32:79:e6:e3:3e:75:8d:45: a3:f4:ae:c3:75:d1:c6:55:c0:d7:52:bd:ec:01:6b:29: 9d:01:d1:fd:a8:b6:4b:c0:98:03:7b:db:bb:f0:5d:08: 42:4c:dc:e8:c0:3a:1a:5b:25:1a:44:67:f6:58:9e:be: 1c:0b:c4:1f:26:1f:1e:57:3c:17:18:88:c9:f9:76:62: 6a:be:d7:ea:d1:b7:39:5c:c8:91:ad:4b:8d:41:f6:df: ce:76:92:fa:62:c5:88:b0:37:7d:70:af:25:0e:f3:59: 7f:91:cd:fe:56:6f:0c:e0:1f:44:e4:c0:cd:d8:ed:00: 73:2d:3c:ae:d4:42:24:03:77:13:86:9c:60:4f:11:2a: 1b:36:d1:1f:e7:dd:9e:c8:ab:d8:e0:73:e1:de:76:59 Fingerprint (SHA-256): EE:83:AF:FF:E7:74:22:BD:82:36:6D:8D:36:D3:EB:A0:EB:52:4B:BC:DE:92:8F:68:47:B1:2D:CE:D6:D6:61:27 Fingerprint (SHA1): 5F:B5:9C:61:62:C5:1B:D3:1B:CB:A8:D4:3A:CC:B0:38:43:B9:11:78 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #391: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #392: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164992 (0x3caff700) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:53:50 2023 Not After : Wed Oct 18 16:53:50 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:db:e9:c2:43:8f:b9:05:ab:d4:dd:c5:56:56:d4:39: 56:95:63:54:8d:ea:08:66:34:ab:6e:b3:40:19:f2:5a: d3:48:45:f7:57:ba:53:5f:92:eb:81:fa:30:9f:89:e0: 04:e2:5c:e8:74:5d:ad:15:1e:d3:8f:ea:72:86:ef:ef: 3d:60:a2:09:0f:3c:a5:e7:65:0f:c5:9d:8e:db:ac:7c: 2c:90:3f:34:6c:f5:47:0e:7b:e9:d7:e8:ce:53:2f:56: 7a:59:28:d1:48:c5:47:b8:0a:aa:2b:27:a6:98:6a:6f: ff:e7:a5:01:8c:0f:e7:16:e2:94:47:00:8e:d8:b6:23: 84:9e:8b:a5:04:c9:49:ef:e8:5e:3b:96:09:07:a3:cf: 39:08:d7:51:33:92:08:39:24:20:b4:93:1c:9a:c4:a5: c6:2f:47:d2:db:f1:6e:75:00:8d:b5:bc:4a:28:c8:eb: 31:ef:10:ca:0a:30:ae:30:0f:6b:37:38:20:2a:9d:74: bc:7e:06:da:aa:b4:e5:e2:f7:a1:38:98:6a:93:52:13: de:b6:b3:54:2c:67:2b:27:8a:af:a6:24:cd:d3:ef:7c: 12:de:af:7c:ec:df:14:04:a7:1e:75:61:e5:6b:94:7f: ac:51:b8:c6:ed:68:2e:fb:ad:d5:da:b4:de:4c:71:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:1c:17:1e:c7:5a:3f:53:3a:83:35:f3:66:83:97:8e: 5f:74:3c:01:03:48:bc:9a:0f:d3:95:51:6c:f0:77:91: 81:19:74:70:6a:99:cf:6d:9d:5a:0f:80:83:76:d3:bb: 3c:b4:dc:ec:d7:56:28:7e:a6:b8:75:8a:2e:3d:28:b1: 8d:74:18:0b:be:d6:d3:16:bc:2c:70:eb:64:df:a1:1c: 03:01:ea:5d:87:44:65:4e:b3:f3:22:a9:fc:87:b4:f6: 46:c0:f0:bf:a3:e5:83:8b:a4:c1:9a:6e:52:91:3c:7e: 64:22:26:6f:de:24:31:dd:c9:84:19:47:3f:e3:3e:5d: 25:9d:fd:5b:f5:6f:c7:9d:7c:54:5c:1a:62:76:88:6b: 4a:05:37:c4:f1:6b:6d:8a:9b:30:48:31:63:24:f7:73: 71:0e:2f:af:4c:1a:54:71:ac:9c:12:44:95:67:cc:57: 6f:b7:e4:87:e3:d6:de:25:85:d4:1e:61:7b:09:5c:76: da:03:c2:61:4f:8d:bd:19:97:e0:b1:77:21:fe:e2:51: 50:20:48:e8:c4:96:fe:bd:7f:51:eb:94:b6:ed:f7:f4: ca:8a:c8:d8:47:e7:e6:53:28:fa:65:b2:c1:9f:22:a8: 75:30:84:51:be:54:4e:d5:62:43:1b:9e:7f:ac:05:ff Fingerprint (SHA-256): 38:56:B4:2E:8D:73:2B:F6:B5:69:E5:64:A7:E5:45:98:2F:32:F4:BC:D0:2C:F1:C2:0A:13:54:EA:1E:E7:0F:6C Fingerprint (SHA1): 03:EE:99:1A:C7:A9:8A:86:47:E6:6F:66:DC:FC:CE:84:FB:9B:4D:2F Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #393: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #394: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164993 (0x3caff701) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 16:53:54 2023 Not After : Wed Oct 18 16:53:54 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:ed:04:89:cd:44:27:f2:4b:bd:93:ba:2a:ff:9c:f2: 55:37:86:5f:5a:ae:9b:66:9a:47:69:1c:cd:b7:1e:bb: 91:32:c7:4b:57:f5:14:a6:f6:39:6a:b2:24:12:67:e2: 77:7b:76:5c:8f:c7:68:6f:9e:f4:f3:df:d7:8b:b6:ec: 8a:c8:5a:59:ab:06:32:40:ca:3a:fb:56:e5:5f:0b:cc: bc:24:e5:1e:a8:05:e5:ea:0d:00:02:65:78:45:34:64: b4:12:b3:b7:84:aa:d9:ac:55:25:a3:2d:d6:db:10:0c: 1f:84:33:24:b6:2b:f2:b6:b8:db:ce:66:bb:ab:be:d1: eb:67:2c:59:8d:b5:21:a5:7b:c5:74:5a:a6:cd:14:b2: 91:7b:48:48:96:49:8f:12:00:d4:27:e3:a4:b6:af:c5: 67:ad:fa:e9:74:90:a0:b3:e8:1b:48:ec:ef:be:1a:88: 13:dd:cc:c2:a6:f3:be:24:33:68:05:5e:92:5c:0e:ae: 50:8e:5e:e0:21:3f:dd:a6:ba:73:6b:45:a5:37:75:21: 2f:5a:b5:64:13:ca:da:ee:8e:39:84:c1:c5:06:82:ec: 7e:a8:30:14:e9:26:7e:40:0c:69:a6:83:19:c5:93:64: ca:e4:2f:51:9e:e9:2f:10:f4:8d:2d:f3:0c:44:7f:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:6a:9e:f4:dc:2c:90:6a:68:9f:11:bc:ed:de:97:25: 82:98:08:46:79:8f:ae:f1:7c:b4:d5:50:29:85:8e:42: b0:90:79:70:f4:aa:bd:7f:8d:d1:6c:a9:b3:60:7d:a0: 1d:10:11:59:71:96:9d:82:0b:c8:b2:46:e7:ed:88:98: 02:82:3d:80:e0:10:ed:6a:01:fd:9b:45:77:57:5c:ec: 43:1b:26:1d:9d:eb:d3:a5:2b:a6:b3:4e:13:32:9f:6a: 58:5d:81:a5:13:5a:f5:3f:35:eb:63:06:34:b4:8b:aa: 1d:72:e4:9e:61:a1:c5:0a:55:98:b6:d9:bf:7e:97:31: c9:52:e3:a1:f1:f5:93:90:1c:f8:64:eb:aa:2b:f7:28: 30:41:3d:c7:4b:92:12:17:16:08:4e:5b:c5:90:90:18: 4d:e0:5b:e3:85:47:f1:35:6a:55:86:f2:d6:fa:d2:7e: 8c:a5:7f:cb:ae:f5:12:9b:5a:a4:19:98:fb:61:7c:17: 5f:35:74:c8:2c:fa:28:1e:24:a1:de:a2:94:6e:6f:60: 33:06:1f:c9:92:db:52:16:bf:2d:41:93:3f:36:af:23: 80:de:43:37:d1:65:1b:0d:05:4f:d0:85:f6:ab:f0:b7: 21:ba:a4:3d:0f:62:4b:21:61:32:2c:bb:57:0f:e8:c1 Fingerprint (SHA-256): 6F:15:96:3D:ED:7B:21:EC:32:3A:F0:8E:E4:BA:C7:96:C6:09:4E:6D:2E:36:43:39:C5:76:28:28:18:E4:AB:6D Fingerprint (SHA1): C7:BC:91:9B:44:AD:E6:3A:E7:66:63:91:47:4D:AE:42:C7:93:DC:A1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #395: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #396: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #397: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #398: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #399: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164991 (0x3caff6ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:53:48 2023 Not After : Wed Oct 18 16:53:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:ef:87:2a:29:4f:37:9c:f0:95:f9:31:34:60:43:4b: fa:1f:ee:b4:56:7f:bb:b9:3e:6c:07:cc:7e:f0:1e:0c: 2d:f2:18:b4:d9:83:6c:54:75:d1:9e:6f:ab:b0:ec:2a: 7b:cb:ec:88:c6:74:a5:42:3c:56:ac:97:e9:c2:89:1d: e1:30:80:dc:22:14:c2:88:18:92:bf:67:56:7d:81:3b: 07:53:30:87:3e:7d:8c:52:35:6f:be:db:b9:80:36:e4: d5:a5:2f:87:42:d2:a6:55:96:ba:e1:1a:03:50:f3:cb: 27:0a:e3:df:7d:59:dd:e4:72:b1:7b:42:36:00:ae:f5: f8:ae:89:4e:89:88:45:0b:18:27:71:3d:97:88:67:a0: da:07:4f:96:2a:2b:59:36:05:c2:dc:a0:81:18:60:69: 5a:33:11:b2:f8:06:f0:7b:8e:eb:5c:ae:21:3c:25:4c: ba:20:22:04:5d:43:5a:18:1f:72:69:7b:a3:67:34:b2: ef:b2:16:3b:67:98:fe:b0:ce:9a:1b:d8:e0:d2:80:47: 6a:d7:82:ba:31:6f:c9:d5:52:d8:2f:71:56:ea:38:8b: ab:7b:2d:20:45:99:10:50:59:3e:bd:be:9d:a7:42:bd: 9b:c8:3a:8c:54:d8:af:62:f4:7a:5b:fa:72:9a:94:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:6c:e4:56:91:c5:7b:f2:c6:d8:02:0c:55:9f:19:30: e7:b8:ea:3a:06:4b:4b:7b:e7:bf:ed:d9:c6:c4:89:35: 9b:78:d4:3d:b0:a9:01:9a:3c:c1:58:b2:75:06:ba:c7: d3:e0:6e:38:49:30:48:f6:83:39:ea:45:b9:1c:5a:64: 6a:d5:53:5e:24:c6:79:28:cb:c0:05:e7:be:b6:3a:ac: e1:b6:64:b2:55:a9:73:58:91:e9:a2:61:1a:b4:78:a8: 21:7b:da:79:8c:fe:8f:33:32:79:e6:e3:3e:75:8d:45: a3:f4:ae:c3:75:d1:c6:55:c0:d7:52:bd:ec:01:6b:29: 9d:01:d1:fd:a8:b6:4b:c0:98:03:7b:db:bb:f0:5d:08: 42:4c:dc:e8:c0:3a:1a:5b:25:1a:44:67:f6:58:9e:be: 1c:0b:c4:1f:26:1f:1e:57:3c:17:18:88:c9:f9:76:62: 6a:be:d7:ea:d1:b7:39:5c:c8:91:ad:4b:8d:41:f6:df: ce:76:92:fa:62:c5:88:b0:37:7d:70:af:25:0e:f3:59: 7f:91:cd:fe:56:6f:0c:e0:1f:44:e4:c0:cd:d8:ed:00: 73:2d:3c:ae:d4:42:24:03:77:13:86:9c:60:4f:11:2a: 1b:36:d1:1f:e7:dd:9e:c8:ab:d8:e0:73:e1:de:76:59 Fingerprint (SHA-256): EE:83:AF:FF:E7:74:22:BD:82:36:6D:8D:36:D3:EB:A0:EB:52:4B:BC:DE:92:8F:68:47:B1:2D:CE:D6:D6:61:27 Fingerprint (SHA1): 5F:B5:9C:61:62:C5:1B:D3:1B:CB:A8:D4:3A:CC:B0:38:43:B9:11:78 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #400: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #401: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164992 (0x3caff700) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:53:50 2023 Not After : Wed Oct 18 16:53:50 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:db:e9:c2:43:8f:b9:05:ab:d4:dd:c5:56:56:d4:39: 56:95:63:54:8d:ea:08:66:34:ab:6e:b3:40:19:f2:5a: d3:48:45:f7:57:ba:53:5f:92:eb:81:fa:30:9f:89:e0: 04:e2:5c:e8:74:5d:ad:15:1e:d3:8f:ea:72:86:ef:ef: 3d:60:a2:09:0f:3c:a5:e7:65:0f:c5:9d:8e:db:ac:7c: 2c:90:3f:34:6c:f5:47:0e:7b:e9:d7:e8:ce:53:2f:56: 7a:59:28:d1:48:c5:47:b8:0a:aa:2b:27:a6:98:6a:6f: ff:e7:a5:01:8c:0f:e7:16:e2:94:47:00:8e:d8:b6:23: 84:9e:8b:a5:04:c9:49:ef:e8:5e:3b:96:09:07:a3:cf: 39:08:d7:51:33:92:08:39:24:20:b4:93:1c:9a:c4:a5: c6:2f:47:d2:db:f1:6e:75:00:8d:b5:bc:4a:28:c8:eb: 31:ef:10:ca:0a:30:ae:30:0f:6b:37:38:20:2a:9d:74: bc:7e:06:da:aa:b4:e5:e2:f7:a1:38:98:6a:93:52:13: de:b6:b3:54:2c:67:2b:27:8a:af:a6:24:cd:d3:ef:7c: 12:de:af:7c:ec:df:14:04:a7:1e:75:61:e5:6b:94:7f: ac:51:b8:c6:ed:68:2e:fb:ad:d5:da:b4:de:4c:71:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:1c:17:1e:c7:5a:3f:53:3a:83:35:f3:66:83:97:8e: 5f:74:3c:01:03:48:bc:9a:0f:d3:95:51:6c:f0:77:91: 81:19:74:70:6a:99:cf:6d:9d:5a:0f:80:83:76:d3:bb: 3c:b4:dc:ec:d7:56:28:7e:a6:b8:75:8a:2e:3d:28:b1: 8d:74:18:0b:be:d6:d3:16:bc:2c:70:eb:64:df:a1:1c: 03:01:ea:5d:87:44:65:4e:b3:f3:22:a9:fc:87:b4:f6: 46:c0:f0:bf:a3:e5:83:8b:a4:c1:9a:6e:52:91:3c:7e: 64:22:26:6f:de:24:31:dd:c9:84:19:47:3f:e3:3e:5d: 25:9d:fd:5b:f5:6f:c7:9d:7c:54:5c:1a:62:76:88:6b: 4a:05:37:c4:f1:6b:6d:8a:9b:30:48:31:63:24:f7:73: 71:0e:2f:af:4c:1a:54:71:ac:9c:12:44:95:67:cc:57: 6f:b7:e4:87:e3:d6:de:25:85:d4:1e:61:7b:09:5c:76: da:03:c2:61:4f:8d:bd:19:97:e0:b1:77:21:fe:e2:51: 50:20:48:e8:c4:96:fe:bd:7f:51:eb:94:b6:ed:f7:f4: ca:8a:c8:d8:47:e7:e6:53:28:fa:65:b2:c1:9f:22:a8: 75:30:84:51:be:54:4e:d5:62:43:1b:9e:7f:ac:05:ff Fingerprint (SHA-256): 38:56:B4:2E:8D:73:2B:F6:B5:69:E5:64:A7:E5:45:98:2F:32:F4:BC:D0:2C:F1:C2:0A:13:54:EA:1E:E7:0F:6C Fingerprint (SHA1): 03:EE:99:1A:C7:A9:8A:86:47:E6:6F:66:DC:FC:CE:84:FB:9B:4D:2F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #402: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #403: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164993 (0x3caff701) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 16:53:54 2023 Not After : Wed Oct 18 16:53:54 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:ed:04:89:cd:44:27:f2:4b:bd:93:ba:2a:ff:9c:f2: 55:37:86:5f:5a:ae:9b:66:9a:47:69:1c:cd:b7:1e:bb: 91:32:c7:4b:57:f5:14:a6:f6:39:6a:b2:24:12:67:e2: 77:7b:76:5c:8f:c7:68:6f:9e:f4:f3:df:d7:8b:b6:ec: 8a:c8:5a:59:ab:06:32:40:ca:3a:fb:56:e5:5f:0b:cc: bc:24:e5:1e:a8:05:e5:ea:0d:00:02:65:78:45:34:64: b4:12:b3:b7:84:aa:d9:ac:55:25:a3:2d:d6:db:10:0c: 1f:84:33:24:b6:2b:f2:b6:b8:db:ce:66:bb:ab:be:d1: eb:67:2c:59:8d:b5:21:a5:7b:c5:74:5a:a6:cd:14:b2: 91:7b:48:48:96:49:8f:12:00:d4:27:e3:a4:b6:af:c5: 67:ad:fa:e9:74:90:a0:b3:e8:1b:48:ec:ef:be:1a:88: 13:dd:cc:c2:a6:f3:be:24:33:68:05:5e:92:5c:0e:ae: 50:8e:5e:e0:21:3f:dd:a6:ba:73:6b:45:a5:37:75:21: 2f:5a:b5:64:13:ca:da:ee:8e:39:84:c1:c5:06:82:ec: 7e:a8:30:14:e9:26:7e:40:0c:69:a6:83:19:c5:93:64: ca:e4:2f:51:9e:e9:2f:10:f4:8d:2d:f3:0c:44:7f:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:6a:9e:f4:dc:2c:90:6a:68:9f:11:bc:ed:de:97:25: 82:98:08:46:79:8f:ae:f1:7c:b4:d5:50:29:85:8e:42: b0:90:79:70:f4:aa:bd:7f:8d:d1:6c:a9:b3:60:7d:a0: 1d:10:11:59:71:96:9d:82:0b:c8:b2:46:e7:ed:88:98: 02:82:3d:80:e0:10:ed:6a:01:fd:9b:45:77:57:5c:ec: 43:1b:26:1d:9d:eb:d3:a5:2b:a6:b3:4e:13:32:9f:6a: 58:5d:81:a5:13:5a:f5:3f:35:eb:63:06:34:b4:8b:aa: 1d:72:e4:9e:61:a1:c5:0a:55:98:b6:d9:bf:7e:97:31: c9:52:e3:a1:f1:f5:93:90:1c:f8:64:eb:aa:2b:f7:28: 30:41:3d:c7:4b:92:12:17:16:08:4e:5b:c5:90:90:18: 4d:e0:5b:e3:85:47:f1:35:6a:55:86:f2:d6:fa:d2:7e: 8c:a5:7f:cb:ae:f5:12:9b:5a:a4:19:98:fb:61:7c:17: 5f:35:74:c8:2c:fa:28:1e:24:a1:de:a2:94:6e:6f:60: 33:06:1f:c9:92:db:52:16:bf:2d:41:93:3f:36:af:23: 80:de:43:37:d1:65:1b:0d:05:4f:d0:85:f6:ab:f0:b7: 21:ba:a4:3d:0f:62:4b:21:61:32:2c:bb:57:0f:e8:c1 Fingerprint (SHA-256): 6F:15:96:3D:ED:7B:21:EC:32:3A:F0:8E:E4:BA:C7:96:C6:09:4E:6D:2E:36:43:39:C5:76:28:28:18:E4:AB:6D Fingerprint (SHA1): C7:BC:91:9B:44:AD:E6:3A:E7:66:63:91:47:4D:AE:42:C7:93:DC:A1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #404: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #405: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164991 (0x3caff6ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:53:48 2023 Not After : Wed Oct 18 16:53:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:ef:87:2a:29:4f:37:9c:f0:95:f9:31:34:60:43:4b: fa:1f:ee:b4:56:7f:bb:b9:3e:6c:07:cc:7e:f0:1e:0c: 2d:f2:18:b4:d9:83:6c:54:75:d1:9e:6f:ab:b0:ec:2a: 7b:cb:ec:88:c6:74:a5:42:3c:56:ac:97:e9:c2:89:1d: e1:30:80:dc:22:14:c2:88:18:92:bf:67:56:7d:81:3b: 07:53:30:87:3e:7d:8c:52:35:6f:be:db:b9:80:36:e4: d5:a5:2f:87:42:d2:a6:55:96:ba:e1:1a:03:50:f3:cb: 27:0a:e3:df:7d:59:dd:e4:72:b1:7b:42:36:00:ae:f5: f8:ae:89:4e:89:88:45:0b:18:27:71:3d:97:88:67:a0: da:07:4f:96:2a:2b:59:36:05:c2:dc:a0:81:18:60:69: 5a:33:11:b2:f8:06:f0:7b:8e:eb:5c:ae:21:3c:25:4c: ba:20:22:04:5d:43:5a:18:1f:72:69:7b:a3:67:34:b2: ef:b2:16:3b:67:98:fe:b0:ce:9a:1b:d8:e0:d2:80:47: 6a:d7:82:ba:31:6f:c9:d5:52:d8:2f:71:56:ea:38:8b: ab:7b:2d:20:45:99:10:50:59:3e:bd:be:9d:a7:42:bd: 9b:c8:3a:8c:54:d8:af:62:f4:7a:5b:fa:72:9a:94:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:6c:e4:56:91:c5:7b:f2:c6:d8:02:0c:55:9f:19:30: e7:b8:ea:3a:06:4b:4b:7b:e7:bf:ed:d9:c6:c4:89:35: 9b:78:d4:3d:b0:a9:01:9a:3c:c1:58:b2:75:06:ba:c7: d3:e0:6e:38:49:30:48:f6:83:39:ea:45:b9:1c:5a:64: 6a:d5:53:5e:24:c6:79:28:cb:c0:05:e7:be:b6:3a:ac: e1:b6:64:b2:55:a9:73:58:91:e9:a2:61:1a:b4:78:a8: 21:7b:da:79:8c:fe:8f:33:32:79:e6:e3:3e:75:8d:45: a3:f4:ae:c3:75:d1:c6:55:c0:d7:52:bd:ec:01:6b:29: 9d:01:d1:fd:a8:b6:4b:c0:98:03:7b:db:bb:f0:5d:08: 42:4c:dc:e8:c0:3a:1a:5b:25:1a:44:67:f6:58:9e:be: 1c:0b:c4:1f:26:1f:1e:57:3c:17:18:88:c9:f9:76:62: 6a:be:d7:ea:d1:b7:39:5c:c8:91:ad:4b:8d:41:f6:df: ce:76:92:fa:62:c5:88:b0:37:7d:70:af:25:0e:f3:59: 7f:91:cd:fe:56:6f:0c:e0:1f:44:e4:c0:cd:d8:ed:00: 73:2d:3c:ae:d4:42:24:03:77:13:86:9c:60:4f:11:2a: 1b:36:d1:1f:e7:dd:9e:c8:ab:d8:e0:73:e1:de:76:59 Fingerprint (SHA-256): EE:83:AF:FF:E7:74:22:BD:82:36:6D:8D:36:D3:EB:A0:EB:52:4B:BC:DE:92:8F:68:47:B1:2D:CE:D6:D6:61:27 Fingerprint (SHA1): 5F:B5:9C:61:62:C5:1B:D3:1B:CB:A8:D4:3A:CC:B0:38:43:B9:11:78 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #406: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164991 (0x3caff6ff) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:53:48 2023 Not After : Wed Oct 18 16:53:48 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:ef:87:2a:29:4f:37:9c:f0:95:f9:31:34:60:43:4b: fa:1f:ee:b4:56:7f:bb:b9:3e:6c:07:cc:7e:f0:1e:0c: 2d:f2:18:b4:d9:83:6c:54:75:d1:9e:6f:ab:b0:ec:2a: 7b:cb:ec:88:c6:74:a5:42:3c:56:ac:97:e9:c2:89:1d: e1:30:80:dc:22:14:c2:88:18:92:bf:67:56:7d:81:3b: 07:53:30:87:3e:7d:8c:52:35:6f:be:db:b9:80:36:e4: d5:a5:2f:87:42:d2:a6:55:96:ba:e1:1a:03:50:f3:cb: 27:0a:e3:df:7d:59:dd:e4:72:b1:7b:42:36:00:ae:f5: f8:ae:89:4e:89:88:45:0b:18:27:71:3d:97:88:67:a0: da:07:4f:96:2a:2b:59:36:05:c2:dc:a0:81:18:60:69: 5a:33:11:b2:f8:06:f0:7b:8e:eb:5c:ae:21:3c:25:4c: ba:20:22:04:5d:43:5a:18:1f:72:69:7b:a3:67:34:b2: ef:b2:16:3b:67:98:fe:b0:ce:9a:1b:d8:e0:d2:80:47: 6a:d7:82:ba:31:6f:c9:d5:52:d8:2f:71:56:ea:38:8b: ab:7b:2d:20:45:99:10:50:59:3e:bd:be:9d:a7:42:bd: 9b:c8:3a:8c:54:d8:af:62:f4:7a:5b:fa:72:9a:94:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 15:6c:e4:56:91:c5:7b:f2:c6:d8:02:0c:55:9f:19:30: e7:b8:ea:3a:06:4b:4b:7b:e7:bf:ed:d9:c6:c4:89:35: 9b:78:d4:3d:b0:a9:01:9a:3c:c1:58:b2:75:06:ba:c7: d3:e0:6e:38:49:30:48:f6:83:39:ea:45:b9:1c:5a:64: 6a:d5:53:5e:24:c6:79:28:cb:c0:05:e7:be:b6:3a:ac: e1:b6:64:b2:55:a9:73:58:91:e9:a2:61:1a:b4:78:a8: 21:7b:da:79:8c:fe:8f:33:32:79:e6:e3:3e:75:8d:45: a3:f4:ae:c3:75:d1:c6:55:c0:d7:52:bd:ec:01:6b:29: 9d:01:d1:fd:a8:b6:4b:c0:98:03:7b:db:bb:f0:5d:08: 42:4c:dc:e8:c0:3a:1a:5b:25:1a:44:67:f6:58:9e:be: 1c:0b:c4:1f:26:1f:1e:57:3c:17:18:88:c9:f9:76:62: 6a:be:d7:ea:d1:b7:39:5c:c8:91:ad:4b:8d:41:f6:df: ce:76:92:fa:62:c5:88:b0:37:7d:70:af:25:0e:f3:59: 7f:91:cd:fe:56:6f:0c:e0:1f:44:e4:c0:cd:d8:ed:00: 73:2d:3c:ae:d4:42:24:03:77:13:86:9c:60:4f:11:2a: 1b:36:d1:1f:e7:dd:9e:c8:ab:d8:e0:73:e1:de:76:59 Fingerprint (SHA-256): EE:83:AF:FF:E7:74:22:BD:82:36:6D:8D:36:D3:EB:A0:EB:52:4B:BC:DE:92:8F:68:47:B1:2D:CE:D6:D6:61:27 Fingerprint (SHA1): 5F:B5:9C:61:62:C5:1B:D3:1B:CB:A8:D4:3A:CC:B0:38:43:B9:11:78 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #407: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164992 (0x3caff700) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:53:50 2023 Not After : Wed Oct 18 16:53:50 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:db:e9:c2:43:8f:b9:05:ab:d4:dd:c5:56:56:d4:39: 56:95:63:54:8d:ea:08:66:34:ab:6e:b3:40:19:f2:5a: d3:48:45:f7:57:ba:53:5f:92:eb:81:fa:30:9f:89:e0: 04:e2:5c:e8:74:5d:ad:15:1e:d3:8f:ea:72:86:ef:ef: 3d:60:a2:09:0f:3c:a5:e7:65:0f:c5:9d:8e:db:ac:7c: 2c:90:3f:34:6c:f5:47:0e:7b:e9:d7:e8:ce:53:2f:56: 7a:59:28:d1:48:c5:47:b8:0a:aa:2b:27:a6:98:6a:6f: ff:e7:a5:01:8c:0f:e7:16:e2:94:47:00:8e:d8:b6:23: 84:9e:8b:a5:04:c9:49:ef:e8:5e:3b:96:09:07:a3:cf: 39:08:d7:51:33:92:08:39:24:20:b4:93:1c:9a:c4:a5: c6:2f:47:d2:db:f1:6e:75:00:8d:b5:bc:4a:28:c8:eb: 31:ef:10:ca:0a:30:ae:30:0f:6b:37:38:20:2a:9d:74: bc:7e:06:da:aa:b4:e5:e2:f7:a1:38:98:6a:93:52:13: de:b6:b3:54:2c:67:2b:27:8a:af:a6:24:cd:d3:ef:7c: 12:de:af:7c:ec:df:14:04:a7:1e:75:61:e5:6b:94:7f: ac:51:b8:c6:ed:68:2e:fb:ad:d5:da:b4:de:4c:71:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:1c:17:1e:c7:5a:3f:53:3a:83:35:f3:66:83:97:8e: 5f:74:3c:01:03:48:bc:9a:0f:d3:95:51:6c:f0:77:91: 81:19:74:70:6a:99:cf:6d:9d:5a:0f:80:83:76:d3:bb: 3c:b4:dc:ec:d7:56:28:7e:a6:b8:75:8a:2e:3d:28:b1: 8d:74:18:0b:be:d6:d3:16:bc:2c:70:eb:64:df:a1:1c: 03:01:ea:5d:87:44:65:4e:b3:f3:22:a9:fc:87:b4:f6: 46:c0:f0:bf:a3:e5:83:8b:a4:c1:9a:6e:52:91:3c:7e: 64:22:26:6f:de:24:31:dd:c9:84:19:47:3f:e3:3e:5d: 25:9d:fd:5b:f5:6f:c7:9d:7c:54:5c:1a:62:76:88:6b: 4a:05:37:c4:f1:6b:6d:8a:9b:30:48:31:63:24:f7:73: 71:0e:2f:af:4c:1a:54:71:ac:9c:12:44:95:67:cc:57: 6f:b7:e4:87:e3:d6:de:25:85:d4:1e:61:7b:09:5c:76: da:03:c2:61:4f:8d:bd:19:97:e0:b1:77:21:fe:e2:51: 50:20:48:e8:c4:96:fe:bd:7f:51:eb:94:b6:ed:f7:f4: ca:8a:c8:d8:47:e7:e6:53:28:fa:65:b2:c1:9f:22:a8: 75:30:84:51:be:54:4e:d5:62:43:1b:9e:7f:ac:05:ff Fingerprint (SHA-256): 38:56:B4:2E:8D:73:2B:F6:B5:69:E5:64:A7:E5:45:98:2F:32:F4:BC:D0:2C:F1:C2:0A:13:54:EA:1E:E7:0F:6C Fingerprint (SHA1): 03:EE:99:1A:C7:A9:8A:86:47:E6:6F:66:DC:FC:CE:84:FB:9B:4D:2F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #408: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164992 (0x3caff700) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:53:50 2023 Not After : Wed Oct 18 16:53:50 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:db:e9:c2:43:8f:b9:05:ab:d4:dd:c5:56:56:d4:39: 56:95:63:54:8d:ea:08:66:34:ab:6e:b3:40:19:f2:5a: d3:48:45:f7:57:ba:53:5f:92:eb:81:fa:30:9f:89:e0: 04:e2:5c:e8:74:5d:ad:15:1e:d3:8f:ea:72:86:ef:ef: 3d:60:a2:09:0f:3c:a5:e7:65:0f:c5:9d:8e:db:ac:7c: 2c:90:3f:34:6c:f5:47:0e:7b:e9:d7:e8:ce:53:2f:56: 7a:59:28:d1:48:c5:47:b8:0a:aa:2b:27:a6:98:6a:6f: ff:e7:a5:01:8c:0f:e7:16:e2:94:47:00:8e:d8:b6:23: 84:9e:8b:a5:04:c9:49:ef:e8:5e:3b:96:09:07:a3:cf: 39:08:d7:51:33:92:08:39:24:20:b4:93:1c:9a:c4:a5: c6:2f:47:d2:db:f1:6e:75:00:8d:b5:bc:4a:28:c8:eb: 31:ef:10:ca:0a:30:ae:30:0f:6b:37:38:20:2a:9d:74: bc:7e:06:da:aa:b4:e5:e2:f7:a1:38:98:6a:93:52:13: de:b6:b3:54:2c:67:2b:27:8a:af:a6:24:cd:d3:ef:7c: 12:de:af:7c:ec:df:14:04:a7:1e:75:61:e5:6b:94:7f: ac:51:b8:c6:ed:68:2e:fb:ad:d5:da:b4:de:4c:71:35 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:1c:17:1e:c7:5a:3f:53:3a:83:35:f3:66:83:97:8e: 5f:74:3c:01:03:48:bc:9a:0f:d3:95:51:6c:f0:77:91: 81:19:74:70:6a:99:cf:6d:9d:5a:0f:80:83:76:d3:bb: 3c:b4:dc:ec:d7:56:28:7e:a6:b8:75:8a:2e:3d:28:b1: 8d:74:18:0b:be:d6:d3:16:bc:2c:70:eb:64:df:a1:1c: 03:01:ea:5d:87:44:65:4e:b3:f3:22:a9:fc:87:b4:f6: 46:c0:f0:bf:a3:e5:83:8b:a4:c1:9a:6e:52:91:3c:7e: 64:22:26:6f:de:24:31:dd:c9:84:19:47:3f:e3:3e:5d: 25:9d:fd:5b:f5:6f:c7:9d:7c:54:5c:1a:62:76:88:6b: 4a:05:37:c4:f1:6b:6d:8a:9b:30:48:31:63:24:f7:73: 71:0e:2f:af:4c:1a:54:71:ac:9c:12:44:95:67:cc:57: 6f:b7:e4:87:e3:d6:de:25:85:d4:1e:61:7b:09:5c:76: da:03:c2:61:4f:8d:bd:19:97:e0:b1:77:21:fe:e2:51: 50:20:48:e8:c4:96:fe:bd:7f:51:eb:94:b6:ed:f7:f4: ca:8a:c8:d8:47:e7:e6:53:28:fa:65:b2:c1:9f:22:a8: 75:30:84:51:be:54:4e:d5:62:43:1b:9e:7f:ac:05:ff Fingerprint (SHA-256): 38:56:B4:2E:8D:73:2B:F6:B5:69:E5:64:A7:E5:45:98:2F:32:F4:BC:D0:2C:F1:C2:0A:13:54:EA:1E:E7:0F:6C Fingerprint (SHA1): 03:EE:99:1A:C7:A9:8A:86:47:E6:6F:66:DC:FC:CE:84:FB:9B:4D:2F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #409: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164993 (0x3caff701) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 16:53:54 2023 Not After : Wed Oct 18 16:53:54 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:ed:04:89:cd:44:27:f2:4b:bd:93:ba:2a:ff:9c:f2: 55:37:86:5f:5a:ae:9b:66:9a:47:69:1c:cd:b7:1e:bb: 91:32:c7:4b:57:f5:14:a6:f6:39:6a:b2:24:12:67:e2: 77:7b:76:5c:8f:c7:68:6f:9e:f4:f3:df:d7:8b:b6:ec: 8a:c8:5a:59:ab:06:32:40:ca:3a:fb:56:e5:5f:0b:cc: bc:24:e5:1e:a8:05:e5:ea:0d:00:02:65:78:45:34:64: b4:12:b3:b7:84:aa:d9:ac:55:25:a3:2d:d6:db:10:0c: 1f:84:33:24:b6:2b:f2:b6:b8:db:ce:66:bb:ab:be:d1: eb:67:2c:59:8d:b5:21:a5:7b:c5:74:5a:a6:cd:14:b2: 91:7b:48:48:96:49:8f:12:00:d4:27:e3:a4:b6:af:c5: 67:ad:fa:e9:74:90:a0:b3:e8:1b:48:ec:ef:be:1a:88: 13:dd:cc:c2:a6:f3:be:24:33:68:05:5e:92:5c:0e:ae: 50:8e:5e:e0:21:3f:dd:a6:ba:73:6b:45:a5:37:75:21: 2f:5a:b5:64:13:ca:da:ee:8e:39:84:c1:c5:06:82:ec: 7e:a8:30:14:e9:26:7e:40:0c:69:a6:83:19:c5:93:64: ca:e4:2f:51:9e:e9:2f:10:f4:8d:2d:f3:0c:44:7f:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:6a:9e:f4:dc:2c:90:6a:68:9f:11:bc:ed:de:97:25: 82:98:08:46:79:8f:ae:f1:7c:b4:d5:50:29:85:8e:42: b0:90:79:70:f4:aa:bd:7f:8d:d1:6c:a9:b3:60:7d:a0: 1d:10:11:59:71:96:9d:82:0b:c8:b2:46:e7:ed:88:98: 02:82:3d:80:e0:10:ed:6a:01:fd:9b:45:77:57:5c:ec: 43:1b:26:1d:9d:eb:d3:a5:2b:a6:b3:4e:13:32:9f:6a: 58:5d:81:a5:13:5a:f5:3f:35:eb:63:06:34:b4:8b:aa: 1d:72:e4:9e:61:a1:c5:0a:55:98:b6:d9:bf:7e:97:31: c9:52:e3:a1:f1:f5:93:90:1c:f8:64:eb:aa:2b:f7:28: 30:41:3d:c7:4b:92:12:17:16:08:4e:5b:c5:90:90:18: 4d:e0:5b:e3:85:47:f1:35:6a:55:86:f2:d6:fa:d2:7e: 8c:a5:7f:cb:ae:f5:12:9b:5a:a4:19:98:fb:61:7c:17: 5f:35:74:c8:2c:fa:28:1e:24:a1:de:a2:94:6e:6f:60: 33:06:1f:c9:92:db:52:16:bf:2d:41:93:3f:36:af:23: 80:de:43:37:d1:65:1b:0d:05:4f:d0:85:f6:ab:f0:b7: 21:ba:a4:3d:0f:62:4b:21:61:32:2c:bb:57:0f:e8:c1 Fingerprint (SHA-256): 6F:15:96:3D:ED:7B:21:EC:32:3A:F0:8E:E4:BA:C7:96:C6:09:4E:6D:2E:36:43:39:C5:76:28:28:18:E4:AB:6D Fingerprint (SHA1): C7:BC:91:9B:44:AD:E6:3A:E7:66:63:91:47:4D:AE:42:C7:93:DC:A1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #410: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164993 (0x3caff701) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 16:53:54 2023 Not After : Wed Oct 18 16:53:54 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:ed:04:89:cd:44:27:f2:4b:bd:93:ba:2a:ff:9c:f2: 55:37:86:5f:5a:ae:9b:66:9a:47:69:1c:cd:b7:1e:bb: 91:32:c7:4b:57:f5:14:a6:f6:39:6a:b2:24:12:67:e2: 77:7b:76:5c:8f:c7:68:6f:9e:f4:f3:df:d7:8b:b6:ec: 8a:c8:5a:59:ab:06:32:40:ca:3a:fb:56:e5:5f:0b:cc: bc:24:e5:1e:a8:05:e5:ea:0d:00:02:65:78:45:34:64: b4:12:b3:b7:84:aa:d9:ac:55:25:a3:2d:d6:db:10:0c: 1f:84:33:24:b6:2b:f2:b6:b8:db:ce:66:bb:ab:be:d1: eb:67:2c:59:8d:b5:21:a5:7b:c5:74:5a:a6:cd:14:b2: 91:7b:48:48:96:49:8f:12:00:d4:27:e3:a4:b6:af:c5: 67:ad:fa:e9:74:90:a0:b3:e8:1b:48:ec:ef:be:1a:88: 13:dd:cc:c2:a6:f3:be:24:33:68:05:5e:92:5c:0e:ae: 50:8e:5e:e0:21:3f:dd:a6:ba:73:6b:45:a5:37:75:21: 2f:5a:b5:64:13:ca:da:ee:8e:39:84:c1:c5:06:82:ec: 7e:a8:30:14:e9:26:7e:40:0c:69:a6:83:19:c5:93:64: ca:e4:2f:51:9e:e9:2f:10:f4:8d:2d:f3:0c:44:7f:d7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 89:6a:9e:f4:dc:2c:90:6a:68:9f:11:bc:ed:de:97:25: 82:98:08:46:79:8f:ae:f1:7c:b4:d5:50:29:85:8e:42: b0:90:79:70:f4:aa:bd:7f:8d:d1:6c:a9:b3:60:7d:a0: 1d:10:11:59:71:96:9d:82:0b:c8:b2:46:e7:ed:88:98: 02:82:3d:80:e0:10:ed:6a:01:fd:9b:45:77:57:5c:ec: 43:1b:26:1d:9d:eb:d3:a5:2b:a6:b3:4e:13:32:9f:6a: 58:5d:81:a5:13:5a:f5:3f:35:eb:63:06:34:b4:8b:aa: 1d:72:e4:9e:61:a1:c5:0a:55:98:b6:d9:bf:7e:97:31: c9:52:e3:a1:f1:f5:93:90:1c:f8:64:eb:aa:2b:f7:28: 30:41:3d:c7:4b:92:12:17:16:08:4e:5b:c5:90:90:18: 4d:e0:5b:e3:85:47:f1:35:6a:55:86:f2:d6:fa:d2:7e: 8c:a5:7f:cb:ae:f5:12:9b:5a:a4:19:98:fb:61:7c:17: 5f:35:74:c8:2c:fa:28:1e:24:a1:de:a2:94:6e:6f:60: 33:06:1f:c9:92:db:52:16:bf:2d:41:93:3f:36:af:23: 80:de:43:37:d1:65:1b:0d:05:4f:d0:85:f6:ab:f0:b7: 21:ba:a4:3d:0f:62:4b:21:61:32:2c:bb:57:0f:e8:c1 Fingerprint (SHA-256): 6F:15:96:3D:ED:7B:21:EC:32:3A:F0:8E:E4:BA:C7:96:C6:09:4E:6D:2E:36:43:39:C5:76:28:28:18:E4:AB:6D Fingerprint (SHA1): C7:BC:91:9B:44:AD:E6:3A:E7:66:63:91:47:4D:AE:42:C7:93:DC:A1 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #411: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #412: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018164996 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #413: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #414: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #415: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #416: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018164997 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #417: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #418: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #419: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #420: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018164998 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #421: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #422: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #423: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #424: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1018164999 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #425: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #426: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #427: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #428: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018165000 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #429: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #430: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #431: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #432: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018165001 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #433: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #434: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #435: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #436: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1018165002 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #437: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #438: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #439: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #440: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #441: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #442: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #443: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164996 (0x3caff704) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 16:54:08 2023 Not After : Wed Oct 18 16:54:08 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:9f:00:76:c0:1b:9b:75:b9:dd:c3:51:a5:70:65:3a: 4e:9c:da:7a:88:33:05:a1:bf:53:33:88:3a:e0:23:12: 1a:4d:28:61:a6:bf:c3:18:33:16:91:dc:1b:f1:63:ef: d9:2a:03:55:7b:7d:f7:b3:73:a1:8d:a6:e0:35:74:f3: c4:4b:c5:1f:9d:8f:c5:38:77:5c:74:a3:69:62:76:d3: 15:60:da:a2:72:af:5c:3c:95:18:f7:f9:06:a1:29:21: e4:8f:2b:4b:60:c8:b2:49:66:2f:03:93:99:20:15:d5: c1:38:ad:69:70:db:30:68:ef:81:4e:52:b7:81:58:a7: 64:fa:86:ae:3f:9a:45:f3:12:a2:8d:ee:66:97:58:91: 3e:9c:40:05:48:47:3b:d5:73:53:8a:02:ac:a1:14:b0: 26:bf:d7:99:9a:76:da:4f:c5:64:20:21:82:f6:f8:4a: 23:45:ec:f7:49:9f:da:74:22:99:a1:8b:65:87:9b:3c: 81:cf:55:53:a2:de:16:2e:10:ce:0d:a0:c7:a0:8e:30: c5:d2:40:1a:e5:25:06:95:41:6a:31:02:17:2c:c6:3d: cc:2e:e4:5e:f0:b2:0b:9a:56:7f:54:2d:37:e9:b8:ae: c4:06:65:8a:ab:b0:92:61:0a:e9:62:80:35:4a:74:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:65:aa:e2:53:73:52:a5:21:e4:f6:91:5c:42:5d:d7: da:b4:fe:99:59:7d:0c:c3:45:d9:de:22:72:ce:be:89: 2b:cb:ab:71:57:08:e5:fc:a9:98:3c:b8:b4:ab:51:ce: c4:e5:18:25:85:66:de:f8:35:f5:2d:7a:18:a8:21:67: 11:b5:ab:2b:60:26:51:a9:31:ab:98:2d:d9:b1:6b:46: 0b:f0:28:46:5c:a5:cf:86:31:ec:54:44:ef:1f:30:90: 3b:ad:a9:2c:39:43:e1:22:26:8f:4a:04:f1:15:37:f4: 18:f7:09:ce:c2:1f:e7:b9:52:86:c5:83:2d:3c:b1:05: 55:63:3f:b2:03:87:96:b5:dd:03:7d:e4:6c:f4:1f:71: c6:65:69:6e:d1:6b:1e:ab:ca:6d:10:96:f6:88:f7:ca: 22:c8:9e:e4:d3:b0:80:93:e7:e0:c4:4f:10:3f:01:57: 13:2c:f2:b7:67:b2:74:f0:55:6e:43:51:1a:06:c6:27: 83:9d:5c:2b:da:fc:a8:55:28:c2:5f:90:4c:13:93:fc: 05:76:00:3e:96:cd:c2:7f:6b:a9:14:ae:03:b9:52:3e: 02:10:1f:08:e6:d1:11:8e:4f:97:d9:8d:58:ee:36:6e: 80:8d:60:c7:25:7a:0a:2f:f3:2e:8e:70:68:60:78:bd Fingerprint (SHA-256): 94:86:D5:55:0E:E0:22:A3:1C:D3:D7:E2:A4:5A:CA:15:FA:A9:CF:A6:88:EB:DE:D6:69:6C:F1:CC:A2:84:D1:AA Fingerprint (SHA1): 4B:55:51:87:15:B8:0D:24:E2:C1:A6:5B:F2:CA:9A:3C:27:7D:63:9E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #444: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #445: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #446: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #447: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018164996 (0x3caff704) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 16:54:08 2023 Not After : Wed Oct 18 16:54:08 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:9f:00:76:c0:1b:9b:75:b9:dd:c3:51:a5:70:65:3a: 4e:9c:da:7a:88:33:05:a1:bf:53:33:88:3a:e0:23:12: 1a:4d:28:61:a6:bf:c3:18:33:16:91:dc:1b:f1:63:ef: d9:2a:03:55:7b:7d:f7:b3:73:a1:8d:a6:e0:35:74:f3: c4:4b:c5:1f:9d:8f:c5:38:77:5c:74:a3:69:62:76:d3: 15:60:da:a2:72:af:5c:3c:95:18:f7:f9:06:a1:29:21: e4:8f:2b:4b:60:c8:b2:49:66:2f:03:93:99:20:15:d5: c1:38:ad:69:70:db:30:68:ef:81:4e:52:b7:81:58:a7: 64:fa:86:ae:3f:9a:45:f3:12:a2:8d:ee:66:97:58:91: 3e:9c:40:05:48:47:3b:d5:73:53:8a:02:ac:a1:14:b0: 26:bf:d7:99:9a:76:da:4f:c5:64:20:21:82:f6:f8:4a: 23:45:ec:f7:49:9f:da:74:22:99:a1:8b:65:87:9b:3c: 81:cf:55:53:a2:de:16:2e:10:ce:0d:a0:c7:a0:8e:30: c5:d2:40:1a:e5:25:06:95:41:6a:31:02:17:2c:c6:3d: cc:2e:e4:5e:f0:b2:0b:9a:56:7f:54:2d:37:e9:b8:ae: c4:06:65:8a:ab:b0:92:61:0a:e9:62:80:35:4a:74:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:65:aa:e2:53:73:52:a5:21:e4:f6:91:5c:42:5d:d7: da:b4:fe:99:59:7d:0c:c3:45:d9:de:22:72:ce:be:89: 2b:cb:ab:71:57:08:e5:fc:a9:98:3c:b8:b4:ab:51:ce: c4:e5:18:25:85:66:de:f8:35:f5:2d:7a:18:a8:21:67: 11:b5:ab:2b:60:26:51:a9:31:ab:98:2d:d9:b1:6b:46: 0b:f0:28:46:5c:a5:cf:86:31:ec:54:44:ef:1f:30:90: 3b:ad:a9:2c:39:43:e1:22:26:8f:4a:04:f1:15:37:f4: 18:f7:09:ce:c2:1f:e7:b9:52:86:c5:83:2d:3c:b1:05: 55:63:3f:b2:03:87:96:b5:dd:03:7d:e4:6c:f4:1f:71: c6:65:69:6e:d1:6b:1e:ab:ca:6d:10:96:f6:88:f7:ca: 22:c8:9e:e4:d3:b0:80:93:e7:e0:c4:4f:10:3f:01:57: 13:2c:f2:b7:67:b2:74:f0:55:6e:43:51:1a:06:c6:27: 83:9d:5c:2b:da:fc:a8:55:28:c2:5f:90:4c:13:93:fc: 05:76:00:3e:96:cd:c2:7f:6b:a9:14:ae:03:b9:52:3e: 02:10:1f:08:e6:d1:11:8e:4f:97:d9:8d:58:ee:36:6e: 80:8d:60:c7:25:7a:0a:2f:f3:2e:8e:70:68:60:78:bd Fingerprint (SHA-256): 94:86:D5:55:0E:E0:22:A3:1C:D3:D7:E2:A4:5A:CA:15:FA:A9:CF:A6:88:EB:DE:D6:69:6C:F1:CC:A2:84:D1:AA Fingerprint (SHA1): 4B:55:51:87:15:B8:0D:24:E2:C1:A6:5B:F2:CA:9A:3C:27:7D:63:9E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #448: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #449: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #450: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165003 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #451: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #452: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #453: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #454: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018165004 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #455: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #456: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #457: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #458: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1018165005 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #459: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #460: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #461: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #462: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1018165006 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #463: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #464: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #465: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #466: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1018165007 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #467: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #468: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #469: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #470: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1018165008 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #471: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #472: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #473: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #474: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1018165009 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #475: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #476: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #477: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #478: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1018165010 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #479: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #480: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #481: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #482: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1018165011 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #483: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #484: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #485: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #486: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1018165012 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #487: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #488: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #489: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #490: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1018165013 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #491: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #492: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #493: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #494: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1018165014 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #495: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #496: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #497: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #498: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1018165015 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #499: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #500: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #501: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #502: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1018165016 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #503: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #504: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #505: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #506: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1018165017 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #507: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #508: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #509: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #510: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1018165018 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #511: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #512: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #513: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #514: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1018165019 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #515: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #516: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #517: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #518: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1018165020 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #519: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #520: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #521: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #522: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1018165021 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #523: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #524: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #525: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #526: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1018165022 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #527: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #528: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #529: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #530: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1018165023 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #531: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #532: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #533: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #534: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1018165024 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #535: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #536: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #537: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #538: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1018165025 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #539: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #540: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #541: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #542: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1018165026 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #543: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #544: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #545: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #546: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1018165027 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #547: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #548: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #549: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #550: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1018165028 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #551: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #552: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #553: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #554: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1018165029 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #555: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #556: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #557: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #558: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1018165030 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #559: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #560: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #561: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #562: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1018165031 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #563: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #564: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #565: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #566: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1018165032 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #567: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #568: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #569: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165003 (0x3caff70b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 16:54:32 2023 Not After : Wed Oct 18 16:54:32 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:c9:19:19:24:84:53:a2:11:a7:97:ce:32:ad:88:a8: 35:fa:29:15:65:21:cb:61:37:c0:c4:76:06:1e:49:6b: b4:cd:36:93:b7:c2:df:32:71:b1:45:cf:e2:bc:24:99: 81:52:0a:34:17:e1:c2:26:a1:1a:f5:57:c9:34:74:2a: 85:b6:bd:6e:b9:0b:a8:e7:8d:10:cd:7a:f2:f2:94:5c: 56:b1:df:e4:d7:c1:44:c3:97:fd:97:13:9a:db:a4:69: 5c:f2:2e:a9:22:f3:94:75:45:9e:a5:29:c3:dd:7a:7d: ef:f0:ca:7f:03:6f:3e:d9:7a:75:f3:5c:72:54:68:23: 92:ca:de:00:d9:2a:f1:96:ea:8d:77:24:9b:fa:26:53: e0:04:b8:f0:87:a9:c5:26:72:98:3b:95:49:57:29:4b: 24:74:d9:ce:e9:34:ff:36:6c:c8:7c:42:a3:f0:72:5e: 9e:31:0a:54:6c:c1:11:27:70:d9:fc:d0:0f:bf:20:9a: d6:54:fc:7d:e1:ae:d6:2f:a3:71:15:14:f2:dd:bb:99: be:88:a6:05:97:bb:df:ec:f2:e7:c2:96:be:2d:d2:7c: 1e:df:c4:7c:cc:0f:90:ee:26:6b:f7:56:23:c2:19:56: f9:64:a3:39:3c:90:8c:9b:99:7a:64:25:4f:77:50:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:08:4e:34:77:28:0a:a1:c7:09:c7:d0:97:cc:ea:bd: 19:e5:8e:b5:e1:69:35:74:26:68:2d:c4:96:cb:ea:22: df:8e:2f:c9:82:f8:b4:ec:1c:ad:54:67:5b:8a:bf:71: 3c:3c:85:1c:d4:48:e0:4b:f4:f2:18:30:78:2f:c9:3c: b1:17:37:f9:9a:7c:b1:d0:02:18:82:3e:06:39:e1:41: 80:bb:7f:c4:0a:88:02:1f:83:90:17:3a:8c:b2:0d:9f: d0:7c:cb:cc:a3:de:45:4f:2d:c7:0e:89:d4:a8:99:fb: 6a:10:bb:7e:9f:96:bd:4a:af:89:e3:d1:f9:1a:d2:a8: 2f:c4:7e:0c:f6:92:d6:3a:1d:9d:93:4d:ce:8b:ec:3d: 8b:15:ec:22:98:1a:b9:ce:f7:bf:91:66:d2:67:9a:f8: 73:38:2e:ed:5f:93:cd:6f:7f:e3:b1:fe:36:04:de:0e: 99:9c:91:1b:be:9a:9a:bc:5a:5e:e0:84:8b:29:5a:41: 7e:bd:86:da:7b:f5:2c:b0:bc:a6:e9:a7:50:f7:7d:85: b2:f1:5f:86:ac:19:53:35:fe:8f:32:01:f5:a4:9a:24: 10:bc:57:d3:03:a8:92:0f:03:a7:68:12:9f:be:8f:2c: 53:d9:ed:54:16:57:ed:31:20:41:45:ec:df:85:d8:d4 Fingerprint (SHA-256): 57:FF:33:6A:FB:05:67:12:55:8F:AF:F4:46:1F:AA:22:95:5F:F0:F3:A7:02:1D:0F:D6:9F:00:26:3D:E9:4A:26 Fingerprint (SHA1): 50:AE:1D:6F:4B:06:AB:4E:2A:C2:5E:6A:9C:42:3F:06:07:3C:25:EA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #570: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #571: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165003 (0x3caff70b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 16:54:32 2023 Not After : Wed Oct 18 16:54:32 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:c9:19:19:24:84:53:a2:11:a7:97:ce:32:ad:88:a8: 35:fa:29:15:65:21:cb:61:37:c0:c4:76:06:1e:49:6b: b4:cd:36:93:b7:c2:df:32:71:b1:45:cf:e2:bc:24:99: 81:52:0a:34:17:e1:c2:26:a1:1a:f5:57:c9:34:74:2a: 85:b6:bd:6e:b9:0b:a8:e7:8d:10:cd:7a:f2:f2:94:5c: 56:b1:df:e4:d7:c1:44:c3:97:fd:97:13:9a:db:a4:69: 5c:f2:2e:a9:22:f3:94:75:45:9e:a5:29:c3:dd:7a:7d: ef:f0:ca:7f:03:6f:3e:d9:7a:75:f3:5c:72:54:68:23: 92:ca:de:00:d9:2a:f1:96:ea:8d:77:24:9b:fa:26:53: e0:04:b8:f0:87:a9:c5:26:72:98:3b:95:49:57:29:4b: 24:74:d9:ce:e9:34:ff:36:6c:c8:7c:42:a3:f0:72:5e: 9e:31:0a:54:6c:c1:11:27:70:d9:fc:d0:0f:bf:20:9a: d6:54:fc:7d:e1:ae:d6:2f:a3:71:15:14:f2:dd:bb:99: be:88:a6:05:97:bb:df:ec:f2:e7:c2:96:be:2d:d2:7c: 1e:df:c4:7c:cc:0f:90:ee:26:6b:f7:56:23:c2:19:56: f9:64:a3:39:3c:90:8c:9b:99:7a:64:25:4f:77:50:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:08:4e:34:77:28:0a:a1:c7:09:c7:d0:97:cc:ea:bd: 19:e5:8e:b5:e1:69:35:74:26:68:2d:c4:96:cb:ea:22: df:8e:2f:c9:82:f8:b4:ec:1c:ad:54:67:5b:8a:bf:71: 3c:3c:85:1c:d4:48:e0:4b:f4:f2:18:30:78:2f:c9:3c: b1:17:37:f9:9a:7c:b1:d0:02:18:82:3e:06:39:e1:41: 80:bb:7f:c4:0a:88:02:1f:83:90:17:3a:8c:b2:0d:9f: d0:7c:cb:cc:a3:de:45:4f:2d:c7:0e:89:d4:a8:99:fb: 6a:10:bb:7e:9f:96:bd:4a:af:89:e3:d1:f9:1a:d2:a8: 2f:c4:7e:0c:f6:92:d6:3a:1d:9d:93:4d:ce:8b:ec:3d: 8b:15:ec:22:98:1a:b9:ce:f7:bf:91:66:d2:67:9a:f8: 73:38:2e:ed:5f:93:cd:6f:7f:e3:b1:fe:36:04:de:0e: 99:9c:91:1b:be:9a:9a:bc:5a:5e:e0:84:8b:29:5a:41: 7e:bd:86:da:7b:f5:2c:b0:bc:a6:e9:a7:50:f7:7d:85: b2:f1:5f:86:ac:19:53:35:fe:8f:32:01:f5:a4:9a:24: 10:bc:57:d3:03:a8:92:0f:03:a7:68:12:9f:be:8f:2c: 53:d9:ed:54:16:57:ed:31:20:41:45:ec:df:85:d8:d4 Fingerprint (SHA-256): 57:FF:33:6A:FB:05:67:12:55:8F:AF:F4:46:1F:AA:22:95:5F:F0:F3:A7:02:1D:0F:D6:9F:00:26:3D:E9:4A:26 Fingerprint (SHA1): 50:AE:1D:6F:4B:06:AB:4E:2A:C2:5E:6A:9C:42:3F:06:07:3C:25:EA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #572: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #573: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #574: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #575: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165003 (0x3caff70b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 16:54:32 2023 Not After : Wed Oct 18 16:54:32 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:c9:19:19:24:84:53:a2:11:a7:97:ce:32:ad:88:a8: 35:fa:29:15:65:21:cb:61:37:c0:c4:76:06:1e:49:6b: b4:cd:36:93:b7:c2:df:32:71:b1:45:cf:e2:bc:24:99: 81:52:0a:34:17:e1:c2:26:a1:1a:f5:57:c9:34:74:2a: 85:b6:bd:6e:b9:0b:a8:e7:8d:10:cd:7a:f2:f2:94:5c: 56:b1:df:e4:d7:c1:44:c3:97:fd:97:13:9a:db:a4:69: 5c:f2:2e:a9:22:f3:94:75:45:9e:a5:29:c3:dd:7a:7d: ef:f0:ca:7f:03:6f:3e:d9:7a:75:f3:5c:72:54:68:23: 92:ca:de:00:d9:2a:f1:96:ea:8d:77:24:9b:fa:26:53: e0:04:b8:f0:87:a9:c5:26:72:98:3b:95:49:57:29:4b: 24:74:d9:ce:e9:34:ff:36:6c:c8:7c:42:a3:f0:72:5e: 9e:31:0a:54:6c:c1:11:27:70:d9:fc:d0:0f:bf:20:9a: d6:54:fc:7d:e1:ae:d6:2f:a3:71:15:14:f2:dd:bb:99: be:88:a6:05:97:bb:df:ec:f2:e7:c2:96:be:2d:d2:7c: 1e:df:c4:7c:cc:0f:90:ee:26:6b:f7:56:23:c2:19:56: f9:64:a3:39:3c:90:8c:9b:99:7a:64:25:4f:77:50:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:08:4e:34:77:28:0a:a1:c7:09:c7:d0:97:cc:ea:bd: 19:e5:8e:b5:e1:69:35:74:26:68:2d:c4:96:cb:ea:22: df:8e:2f:c9:82:f8:b4:ec:1c:ad:54:67:5b:8a:bf:71: 3c:3c:85:1c:d4:48:e0:4b:f4:f2:18:30:78:2f:c9:3c: b1:17:37:f9:9a:7c:b1:d0:02:18:82:3e:06:39:e1:41: 80:bb:7f:c4:0a:88:02:1f:83:90:17:3a:8c:b2:0d:9f: d0:7c:cb:cc:a3:de:45:4f:2d:c7:0e:89:d4:a8:99:fb: 6a:10:bb:7e:9f:96:bd:4a:af:89:e3:d1:f9:1a:d2:a8: 2f:c4:7e:0c:f6:92:d6:3a:1d:9d:93:4d:ce:8b:ec:3d: 8b:15:ec:22:98:1a:b9:ce:f7:bf:91:66:d2:67:9a:f8: 73:38:2e:ed:5f:93:cd:6f:7f:e3:b1:fe:36:04:de:0e: 99:9c:91:1b:be:9a:9a:bc:5a:5e:e0:84:8b:29:5a:41: 7e:bd:86:da:7b:f5:2c:b0:bc:a6:e9:a7:50:f7:7d:85: b2:f1:5f:86:ac:19:53:35:fe:8f:32:01:f5:a4:9a:24: 10:bc:57:d3:03:a8:92:0f:03:a7:68:12:9f:be:8f:2c: 53:d9:ed:54:16:57:ed:31:20:41:45:ec:df:85:d8:d4 Fingerprint (SHA-256): 57:FF:33:6A:FB:05:67:12:55:8F:AF:F4:46:1F:AA:22:95:5F:F0:F3:A7:02:1D:0F:D6:9F:00:26:3D:E9:4A:26 Fingerprint (SHA1): 50:AE:1D:6F:4B:06:AB:4E:2A:C2:5E:6A:9C:42:3F:06:07:3C:25:EA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #576: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #577: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #578: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #579: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165003 (0x3caff70b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 16:54:32 2023 Not After : Wed Oct 18 16:54:32 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:c9:19:19:24:84:53:a2:11:a7:97:ce:32:ad:88:a8: 35:fa:29:15:65:21:cb:61:37:c0:c4:76:06:1e:49:6b: b4:cd:36:93:b7:c2:df:32:71:b1:45:cf:e2:bc:24:99: 81:52:0a:34:17:e1:c2:26:a1:1a:f5:57:c9:34:74:2a: 85:b6:bd:6e:b9:0b:a8:e7:8d:10:cd:7a:f2:f2:94:5c: 56:b1:df:e4:d7:c1:44:c3:97:fd:97:13:9a:db:a4:69: 5c:f2:2e:a9:22:f3:94:75:45:9e:a5:29:c3:dd:7a:7d: ef:f0:ca:7f:03:6f:3e:d9:7a:75:f3:5c:72:54:68:23: 92:ca:de:00:d9:2a:f1:96:ea:8d:77:24:9b:fa:26:53: e0:04:b8:f0:87:a9:c5:26:72:98:3b:95:49:57:29:4b: 24:74:d9:ce:e9:34:ff:36:6c:c8:7c:42:a3:f0:72:5e: 9e:31:0a:54:6c:c1:11:27:70:d9:fc:d0:0f:bf:20:9a: d6:54:fc:7d:e1:ae:d6:2f:a3:71:15:14:f2:dd:bb:99: be:88:a6:05:97:bb:df:ec:f2:e7:c2:96:be:2d:d2:7c: 1e:df:c4:7c:cc:0f:90:ee:26:6b:f7:56:23:c2:19:56: f9:64:a3:39:3c:90:8c:9b:99:7a:64:25:4f:77:50:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:08:4e:34:77:28:0a:a1:c7:09:c7:d0:97:cc:ea:bd: 19:e5:8e:b5:e1:69:35:74:26:68:2d:c4:96:cb:ea:22: df:8e:2f:c9:82:f8:b4:ec:1c:ad:54:67:5b:8a:bf:71: 3c:3c:85:1c:d4:48:e0:4b:f4:f2:18:30:78:2f:c9:3c: b1:17:37:f9:9a:7c:b1:d0:02:18:82:3e:06:39:e1:41: 80:bb:7f:c4:0a:88:02:1f:83:90:17:3a:8c:b2:0d:9f: d0:7c:cb:cc:a3:de:45:4f:2d:c7:0e:89:d4:a8:99:fb: 6a:10:bb:7e:9f:96:bd:4a:af:89:e3:d1:f9:1a:d2:a8: 2f:c4:7e:0c:f6:92:d6:3a:1d:9d:93:4d:ce:8b:ec:3d: 8b:15:ec:22:98:1a:b9:ce:f7:bf:91:66:d2:67:9a:f8: 73:38:2e:ed:5f:93:cd:6f:7f:e3:b1:fe:36:04:de:0e: 99:9c:91:1b:be:9a:9a:bc:5a:5e:e0:84:8b:29:5a:41: 7e:bd:86:da:7b:f5:2c:b0:bc:a6:e9:a7:50:f7:7d:85: b2:f1:5f:86:ac:19:53:35:fe:8f:32:01:f5:a4:9a:24: 10:bc:57:d3:03:a8:92:0f:03:a7:68:12:9f:be:8f:2c: 53:d9:ed:54:16:57:ed:31:20:41:45:ec:df:85:d8:d4 Fingerprint (SHA-256): 57:FF:33:6A:FB:05:67:12:55:8F:AF:F4:46:1F:AA:22:95:5F:F0:F3:A7:02:1D:0F:D6:9F:00:26:3D:E9:4A:26 Fingerprint (SHA1): 50:AE:1D:6F:4B:06:AB:4E:2A:C2:5E:6A:9C:42:3F:06:07:3C:25:EA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #580: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165003 (0x3caff70b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 16:54:32 2023 Not After : Wed Oct 18 16:54:32 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:c9:19:19:24:84:53:a2:11:a7:97:ce:32:ad:88:a8: 35:fa:29:15:65:21:cb:61:37:c0:c4:76:06:1e:49:6b: b4:cd:36:93:b7:c2:df:32:71:b1:45:cf:e2:bc:24:99: 81:52:0a:34:17:e1:c2:26:a1:1a:f5:57:c9:34:74:2a: 85:b6:bd:6e:b9:0b:a8:e7:8d:10:cd:7a:f2:f2:94:5c: 56:b1:df:e4:d7:c1:44:c3:97:fd:97:13:9a:db:a4:69: 5c:f2:2e:a9:22:f3:94:75:45:9e:a5:29:c3:dd:7a:7d: ef:f0:ca:7f:03:6f:3e:d9:7a:75:f3:5c:72:54:68:23: 92:ca:de:00:d9:2a:f1:96:ea:8d:77:24:9b:fa:26:53: e0:04:b8:f0:87:a9:c5:26:72:98:3b:95:49:57:29:4b: 24:74:d9:ce:e9:34:ff:36:6c:c8:7c:42:a3:f0:72:5e: 9e:31:0a:54:6c:c1:11:27:70:d9:fc:d0:0f:bf:20:9a: d6:54:fc:7d:e1:ae:d6:2f:a3:71:15:14:f2:dd:bb:99: be:88:a6:05:97:bb:df:ec:f2:e7:c2:96:be:2d:d2:7c: 1e:df:c4:7c:cc:0f:90:ee:26:6b:f7:56:23:c2:19:56: f9:64:a3:39:3c:90:8c:9b:99:7a:64:25:4f:77:50:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:08:4e:34:77:28:0a:a1:c7:09:c7:d0:97:cc:ea:bd: 19:e5:8e:b5:e1:69:35:74:26:68:2d:c4:96:cb:ea:22: df:8e:2f:c9:82:f8:b4:ec:1c:ad:54:67:5b:8a:bf:71: 3c:3c:85:1c:d4:48:e0:4b:f4:f2:18:30:78:2f:c9:3c: b1:17:37:f9:9a:7c:b1:d0:02:18:82:3e:06:39:e1:41: 80:bb:7f:c4:0a:88:02:1f:83:90:17:3a:8c:b2:0d:9f: d0:7c:cb:cc:a3:de:45:4f:2d:c7:0e:89:d4:a8:99:fb: 6a:10:bb:7e:9f:96:bd:4a:af:89:e3:d1:f9:1a:d2:a8: 2f:c4:7e:0c:f6:92:d6:3a:1d:9d:93:4d:ce:8b:ec:3d: 8b:15:ec:22:98:1a:b9:ce:f7:bf:91:66:d2:67:9a:f8: 73:38:2e:ed:5f:93:cd:6f:7f:e3:b1:fe:36:04:de:0e: 99:9c:91:1b:be:9a:9a:bc:5a:5e:e0:84:8b:29:5a:41: 7e:bd:86:da:7b:f5:2c:b0:bc:a6:e9:a7:50:f7:7d:85: b2:f1:5f:86:ac:19:53:35:fe:8f:32:01:f5:a4:9a:24: 10:bc:57:d3:03:a8:92:0f:03:a7:68:12:9f:be:8f:2c: 53:d9:ed:54:16:57:ed:31:20:41:45:ec:df:85:d8:d4 Fingerprint (SHA-256): 57:FF:33:6A:FB:05:67:12:55:8F:AF:F4:46:1F:AA:22:95:5F:F0:F3:A7:02:1D:0F:D6:9F:00:26:3D:E9:4A:26 Fingerprint (SHA1): 50:AE:1D:6F:4B:06:AB:4E:2A:C2:5E:6A:9C:42:3F:06:07:3C:25:EA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #581: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #582: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165003 (0x3caff70b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 16:54:32 2023 Not After : Wed Oct 18 16:54:32 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:c9:19:19:24:84:53:a2:11:a7:97:ce:32:ad:88:a8: 35:fa:29:15:65:21:cb:61:37:c0:c4:76:06:1e:49:6b: b4:cd:36:93:b7:c2:df:32:71:b1:45:cf:e2:bc:24:99: 81:52:0a:34:17:e1:c2:26:a1:1a:f5:57:c9:34:74:2a: 85:b6:bd:6e:b9:0b:a8:e7:8d:10:cd:7a:f2:f2:94:5c: 56:b1:df:e4:d7:c1:44:c3:97:fd:97:13:9a:db:a4:69: 5c:f2:2e:a9:22:f3:94:75:45:9e:a5:29:c3:dd:7a:7d: ef:f0:ca:7f:03:6f:3e:d9:7a:75:f3:5c:72:54:68:23: 92:ca:de:00:d9:2a:f1:96:ea:8d:77:24:9b:fa:26:53: e0:04:b8:f0:87:a9:c5:26:72:98:3b:95:49:57:29:4b: 24:74:d9:ce:e9:34:ff:36:6c:c8:7c:42:a3:f0:72:5e: 9e:31:0a:54:6c:c1:11:27:70:d9:fc:d0:0f:bf:20:9a: d6:54:fc:7d:e1:ae:d6:2f:a3:71:15:14:f2:dd:bb:99: be:88:a6:05:97:bb:df:ec:f2:e7:c2:96:be:2d:d2:7c: 1e:df:c4:7c:cc:0f:90:ee:26:6b:f7:56:23:c2:19:56: f9:64:a3:39:3c:90:8c:9b:99:7a:64:25:4f:77:50:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:08:4e:34:77:28:0a:a1:c7:09:c7:d0:97:cc:ea:bd: 19:e5:8e:b5:e1:69:35:74:26:68:2d:c4:96:cb:ea:22: df:8e:2f:c9:82:f8:b4:ec:1c:ad:54:67:5b:8a:bf:71: 3c:3c:85:1c:d4:48:e0:4b:f4:f2:18:30:78:2f:c9:3c: b1:17:37:f9:9a:7c:b1:d0:02:18:82:3e:06:39:e1:41: 80:bb:7f:c4:0a:88:02:1f:83:90:17:3a:8c:b2:0d:9f: d0:7c:cb:cc:a3:de:45:4f:2d:c7:0e:89:d4:a8:99:fb: 6a:10:bb:7e:9f:96:bd:4a:af:89:e3:d1:f9:1a:d2:a8: 2f:c4:7e:0c:f6:92:d6:3a:1d:9d:93:4d:ce:8b:ec:3d: 8b:15:ec:22:98:1a:b9:ce:f7:bf:91:66:d2:67:9a:f8: 73:38:2e:ed:5f:93:cd:6f:7f:e3:b1:fe:36:04:de:0e: 99:9c:91:1b:be:9a:9a:bc:5a:5e:e0:84:8b:29:5a:41: 7e:bd:86:da:7b:f5:2c:b0:bc:a6:e9:a7:50:f7:7d:85: b2:f1:5f:86:ac:19:53:35:fe:8f:32:01:f5:a4:9a:24: 10:bc:57:d3:03:a8:92:0f:03:a7:68:12:9f:be:8f:2c: 53:d9:ed:54:16:57:ed:31:20:41:45:ec:df:85:d8:d4 Fingerprint (SHA-256): 57:FF:33:6A:FB:05:67:12:55:8F:AF:F4:46:1F:AA:22:95:5F:F0:F3:A7:02:1D:0F:D6:9F:00:26:3D:E9:4A:26 Fingerprint (SHA1): 50:AE:1D:6F:4B:06:AB:4E:2A:C2:5E:6A:9C:42:3F:06:07:3C:25:EA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #583: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #584: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #585: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #586: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165003 (0x3caff70b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 16:54:32 2023 Not After : Wed Oct 18 16:54:32 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:c9:19:19:24:84:53:a2:11:a7:97:ce:32:ad:88:a8: 35:fa:29:15:65:21:cb:61:37:c0:c4:76:06:1e:49:6b: b4:cd:36:93:b7:c2:df:32:71:b1:45:cf:e2:bc:24:99: 81:52:0a:34:17:e1:c2:26:a1:1a:f5:57:c9:34:74:2a: 85:b6:bd:6e:b9:0b:a8:e7:8d:10:cd:7a:f2:f2:94:5c: 56:b1:df:e4:d7:c1:44:c3:97:fd:97:13:9a:db:a4:69: 5c:f2:2e:a9:22:f3:94:75:45:9e:a5:29:c3:dd:7a:7d: ef:f0:ca:7f:03:6f:3e:d9:7a:75:f3:5c:72:54:68:23: 92:ca:de:00:d9:2a:f1:96:ea:8d:77:24:9b:fa:26:53: e0:04:b8:f0:87:a9:c5:26:72:98:3b:95:49:57:29:4b: 24:74:d9:ce:e9:34:ff:36:6c:c8:7c:42:a3:f0:72:5e: 9e:31:0a:54:6c:c1:11:27:70:d9:fc:d0:0f:bf:20:9a: d6:54:fc:7d:e1:ae:d6:2f:a3:71:15:14:f2:dd:bb:99: be:88:a6:05:97:bb:df:ec:f2:e7:c2:96:be:2d:d2:7c: 1e:df:c4:7c:cc:0f:90:ee:26:6b:f7:56:23:c2:19:56: f9:64:a3:39:3c:90:8c:9b:99:7a:64:25:4f:77:50:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:08:4e:34:77:28:0a:a1:c7:09:c7:d0:97:cc:ea:bd: 19:e5:8e:b5:e1:69:35:74:26:68:2d:c4:96:cb:ea:22: df:8e:2f:c9:82:f8:b4:ec:1c:ad:54:67:5b:8a:bf:71: 3c:3c:85:1c:d4:48:e0:4b:f4:f2:18:30:78:2f:c9:3c: b1:17:37:f9:9a:7c:b1:d0:02:18:82:3e:06:39:e1:41: 80:bb:7f:c4:0a:88:02:1f:83:90:17:3a:8c:b2:0d:9f: d0:7c:cb:cc:a3:de:45:4f:2d:c7:0e:89:d4:a8:99:fb: 6a:10:bb:7e:9f:96:bd:4a:af:89:e3:d1:f9:1a:d2:a8: 2f:c4:7e:0c:f6:92:d6:3a:1d:9d:93:4d:ce:8b:ec:3d: 8b:15:ec:22:98:1a:b9:ce:f7:bf:91:66:d2:67:9a:f8: 73:38:2e:ed:5f:93:cd:6f:7f:e3:b1:fe:36:04:de:0e: 99:9c:91:1b:be:9a:9a:bc:5a:5e:e0:84:8b:29:5a:41: 7e:bd:86:da:7b:f5:2c:b0:bc:a6:e9:a7:50:f7:7d:85: b2:f1:5f:86:ac:19:53:35:fe:8f:32:01:f5:a4:9a:24: 10:bc:57:d3:03:a8:92:0f:03:a7:68:12:9f:be:8f:2c: 53:d9:ed:54:16:57:ed:31:20:41:45:ec:df:85:d8:d4 Fingerprint (SHA-256): 57:FF:33:6A:FB:05:67:12:55:8F:AF:F4:46:1F:AA:22:95:5F:F0:F3:A7:02:1D:0F:D6:9F:00:26:3D:E9:4A:26 Fingerprint (SHA1): 50:AE:1D:6F:4B:06:AB:4E:2A:C2:5E:6A:9C:42:3F:06:07:3C:25:EA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #587: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165003 (0x3caff70b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 16:54:32 2023 Not After : Wed Oct 18 16:54:32 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:c9:19:19:24:84:53:a2:11:a7:97:ce:32:ad:88:a8: 35:fa:29:15:65:21:cb:61:37:c0:c4:76:06:1e:49:6b: b4:cd:36:93:b7:c2:df:32:71:b1:45:cf:e2:bc:24:99: 81:52:0a:34:17:e1:c2:26:a1:1a:f5:57:c9:34:74:2a: 85:b6:bd:6e:b9:0b:a8:e7:8d:10:cd:7a:f2:f2:94:5c: 56:b1:df:e4:d7:c1:44:c3:97:fd:97:13:9a:db:a4:69: 5c:f2:2e:a9:22:f3:94:75:45:9e:a5:29:c3:dd:7a:7d: ef:f0:ca:7f:03:6f:3e:d9:7a:75:f3:5c:72:54:68:23: 92:ca:de:00:d9:2a:f1:96:ea:8d:77:24:9b:fa:26:53: e0:04:b8:f0:87:a9:c5:26:72:98:3b:95:49:57:29:4b: 24:74:d9:ce:e9:34:ff:36:6c:c8:7c:42:a3:f0:72:5e: 9e:31:0a:54:6c:c1:11:27:70:d9:fc:d0:0f:bf:20:9a: d6:54:fc:7d:e1:ae:d6:2f:a3:71:15:14:f2:dd:bb:99: be:88:a6:05:97:bb:df:ec:f2:e7:c2:96:be:2d:d2:7c: 1e:df:c4:7c:cc:0f:90:ee:26:6b:f7:56:23:c2:19:56: f9:64:a3:39:3c:90:8c:9b:99:7a:64:25:4f:77:50:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:08:4e:34:77:28:0a:a1:c7:09:c7:d0:97:cc:ea:bd: 19:e5:8e:b5:e1:69:35:74:26:68:2d:c4:96:cb:ea:22: df:8e:2f:c9:82:f8:b4:ec:1c:ad:54:67:5b:8a:bf:71: 3c:3c:85:1c:d4:48:e0:4b:f4:f2:18:30:78:2f:c9:3c: b1:17:37:f9:9a:7c:b1:d0:02:18:82:3e:06:39:e1:41: 80:bb:7f:c4:0a:88:02:1f:83:90:17:3a:8c:b2:0d:9f: d0:7c:cb:cc:a3:de:45:4f:2d:c7:0e:89:d4:a8:99:fb: 6a:10:bb:7e:9f:96:bd:4a:af:89:e3:d1:f9:1a:d2:a8: 2f:c4:7e:0c:f6:92:d6:3a:1d:9d:93:4d:ce:8b:ec:3d: 8b:15:ec:22:98:1a:b9:ce:f7:bf:91:66:d2:67:9a:f8: 73:38:2e:ed:5f:93:cd:6f:7f:e3:b1:fe:36:04:de:0e: 99:9c:91:1b:be:9a:9a:bc:5a:5e:e0:84:8b:29:5a:41: 7e:bd:86:da:7b:f5:2c:b0:bc:a6:e9:a7:50:f7:7d:85: b2:f1:5f:86:ac:19:53:35:fe:8f:32:01:f5:a4:9a:24: 10:bc:57:d3:03:a8:92:0f:03:a7:68:12:9f:be:8f:2c: 53:d9:ed:54:16:57:ed:31:20:41:45:ec:df:85:d8:d4 Fingerprint (SHA-256): 57:FF:33:6A:FB:05:67:12:55:8F:AF:F4:46:1F:AA:22:95:5F:F0:F3:A7:02:1D:0F:D6:9F:00:26:3D:E9:4A:26 Fingerprint (SHA1): 50:AE:1D:6F:4B:06:AB:4E:2A:C2:5E:6A:9C:42:3F:06:07:3C:25:EA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #588: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165003 (0x3caff70b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 16:54:32 2023 Not After : Wed Oct 18 16:54:32 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:c9:19:19:24:84:53:a2:11:a7:97:ce:32:ad:88:a8: 35:fa:29:15:65:21:cb:61:37:c0:c4:76:06:1e:49:6b: b4:cd:36:93:b7:c2:df:32:71:b1:45:cf:e2:bc:24:99: 81:52:0a:34:17:e1:c2:26:a1:1a:f5:57:c9:34:74:2a: 85:b6:bd:6e:b9:0b:a8:e7:8d:10:cd:7a:f2:f2:94:5c: 56:b1:df:e4:d7:c1:44:c3:97:fd:97:13:9a:db:a4:69: 5c:f2:2e:a9:22:f3:94:75:45:9e:a5:29:c3:dd:7a:7d: ef:f0:ca:7f:03:6f:3e:d9:7a:75:f3:5c:72:54:68:23: 92:ca:de:00:d9:2a:f1:96:ea:8d:77:24:9b:fa:26:53: e0:04:b8:f0:87:a9:c5:26:72:98:3b:95:49:57:29:4b: 24:74:d9:ce:e9:34:ff:36:6c:c8:7c:42:a3:f0:72:5e: 9e:31:0a:54:6c:c1:11:27:70:d9:fc:d0:0f:bf:20:9a: d6:54:fc:7d:e1:ae:d6:2f:a3:71:15:14:f2:dd:bb:99: be:88:a6:05:97:bb:df:ec:f2:e7:c2:96:be:2d:d2:7c: 1e:df:c4:7c:cc:0f:90:ee:26:6b:f7:56:23:c2:19:56: f9:64:a3:39:3c:90:8c:9b:99:7a:64:25:4f:77:50:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:08:4e:34:77:28:0a:a1:c7:09:c7:d0:97:cc:ea:bd: 19:e5:8e:b5:e1:69:35:74:26:68:2d:c4:96:cb:ea:22: df:8e:2f:c9:82:f8:b4:ec:1c:ad:54:67:5b:8a:bf:71: 3c:3c:85:1c:d4:48:e0:4b:f4:f2:18:30:78:2f:c9:3c: b1:17:37:f9:9a:7c:b1:d0:02:18:82:3e:06:39:e1:41: 80:bb:7f:c4:0a:88:02:1f:83:90:17:3a:8c:b2:0d:9f: d0:7c:cb:cc:a3:de:45:4f:2d:c7:0e:89:d4:a8:99:fb: 6a:10:bb:7e:9f:96:bd:4a:af:89:e3:d1:f9:1a:d2:a8: 2f:c4:7e:0c:f6:92:d6:3a:1d:9d:93:4d:ce:8b:ec:3d: 8b:15:ec:22:98:1a:b9:ce:f7:bf:91:66:d2:67:9a:f8: 73:38:2e:ed:5f:93:cd:6f:7f:e3:b1:fe:36:04:de:0e: 99:9c:91:1b:be:9a:9a:bc:5a:5e:e0:84:8b:29:5a:41: 7e:bd:86:da:7b:f5:2c:b0:bc:a6:e9:a7:50:f7:7d:85: b2:f1:5f:86:ac:19:53:35:fe:8f:32:01:f5:a4:9a:24: 10:bc:57:d3:03:a8:92:0f:03:a7:68:12:9f:be:8f:2c: 53:d9:ed:54:16:57:ed:31:20:41:45:ec:df:85:d8:d4 Fingerprint (SHA-256): 57:FF:33:6A:FB:05:67:12:55:8F:AF:F4:46:1F:AA:22:95:5F:F0:F3:A7:02:1D:0F:D6:9F:00:26:3D:E9:4A:26 Fingerprint (SHA1): 50:AE:1D:6F:4B:06:AB:4E:2A:C2:5E:6A:9C:42:3F:06:07:3C:25:EA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #589: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165003 (0x3caff70b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 16:54:32 2023 Not After : Wed Oct 18 16:54:32 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:c9:19:19:24:84:53:a2:11:a7:97:ce:32:ad:88:a8: 35:fa:29:15:65:21:cb:61:37:c0:c4:76:06:1e:49:6b: b4:cd:36:93:b7:c2:df:32:71:b1:45:cf:e2:bc:24:99: 81:52:0a:34:17:e1:c2:26:a1:1a:f5:57:c9:34:74:2a: 85:b6:bd:6e:b9:0b:a8:e7:8d:10:cd:7a:f2:f2:94:5c: 56:b1:df:e4:d7:c1:44:c3:97:fd:97:13:9a:db:a4:69: 5c:f2:2e:a9:22:f3:94:75:45:9e:a5:29:c3:dd:7a:7d: ef:f0:ca:7f:03:6f:3e:d9:7a:75:f3:5c:72:54:68:23: 92:ca:de:00:d9:2a:f1:96:ea:8d:77:24:9b:fa:26:53: e0:04:b8:f0:87:a9:c5:26:72:98:3b:95:49:57:29:4b: 24:74:d9:ce:e9:34:ff:36:6c:c8:7c:42:a3:f0:72:5e: 9e:31:0a:54:6c:c1:11:27:70:d9:fc:d0:0f:bf:20:9a: d6:54:fc:7d:e1:ae:d6:2f:a3:71:15:14:f2:dd:bb:99: be:88:a6:05:97:bb:df:ec:f2:e7:c2:96:be:2d:d2:7c: 1e:df:c4:7c:cc:0f:90:ee:26:6b:f7:56:23:c2:19:56: f9:64:a3:39:3c:90:8c:9b:99:7a:64:25:4f:77:50:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:08:4e:34:77:28:0a:a1:c7:09:c7:d0:97:cc:ea:bd: 19:e5:8e:b5:e1:69:35:74:26:68:2d:c4:96:cb:ea:22: df:8e:2f:c9:82:f8:b4:ec:1c:ad:54:67:5b:8a:bf:71: 3c:3c:85:1c:d4:48:e0:4b:f4:f2:18:30:78:2f:c9:3c: b1:17:37:f9:9a:7c:b1:d0:02:18:82:3e:06:39:e1:41: 80:bb:7f:c4:0a:88:02:1f:83:90:17:3a:8c:b2:0d:9f: d0:7c:cb:cc:a3:de:45:4f:2d:c7:0e:89:d4:a8:99:fb: 6a:10:bb:7e:9f:96:bd:4a:af:89:e3:d1:f9:1a:d2:a8: 2f:c4:7e:0c:f6:92:d6:3a:1d:9d:93:4d:ce:8b:ec:3d: 8b:15:ec:22:98:1a:b9:ce:f7:bf:91:66:d2:67:9a:f8: 73:38:2e:ed:5f:93:cd:6f:7f:e3:b1:fe:36:04:de:0e: 99:9c:91:1b:be:9a:9a:bc:5a:5e:e0:84:8b:29:5a:41: 7e:bd:86:da:7b:f5:2c:b0:bc:a6:e9:a7:50:f7:7d:85: b2:f1:5f:86:ac:19:53:35:fe:8f:32:01:f5:a4:9a:24: 10:bc:57:d3:03:a8:92:0f:03:a7:68:12:9f:be:8f:2c: 53:d9:ed:54:16:57:ed:31:20:41:45:ec:df:85:d8:d4 Fingerprint (SHA-256): 57:FF:33:6A:FB:05:67:12:55:8F:AF:F4:46:1F:AA:22:95:5F:F0:F3:A7:02:1D:0F:D6:9F:00:26:3D:E9:4A:26 Fingerprint (SHA1): 50:AE:1D:6F:4B:06:AB:4E:2A:C2:5E:6A:9C:42:3F:06:07:3C:25:EA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #590: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165003 (0x3caff70b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 16:54:32 2023 Not After : Wed Oct 18 16:54:32 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:c9:19:19:24:84:53:a2:11:a7:97:ce:32:ad:88:a8: 35:fa:29:15:65:21:cb:61:37:c0:c4:76:06:1e:49:6b: b4:cd:36:93:b7:c2:df:32:71:b1:45:cf:e2:bc:24:99: 81:52:0a:34:17:e1:c2:26:a1:1a:f5:57:c9:34:74:2a: 85:b6:bd:6e:b9:0b:a8:e7:8d:10:cd:7a:f2:f2:94:5c: 56:b1:df:e4:d7:c1:44:c3:97:fd:97:13:9a:db:a4:69: 5c:f2:2e:a9:22:f3:94:75:45:9e:a5:29:c3:dd:7a:7d: ef:f0:ca:7f:03:6f:3e:d9:7a:75:f3:5c:72:54:68:23: 92:ca:de:00:d9:2a:f1:96:ea:8d:77:24:9b:fa:26:53: e0:04:b8:f0:87:a9:c5:26:72:98:3b:95:49:57:29:4b: 24:74:d9:ce:e9:34:ff:36:6c:c8:7c:42:a3:f0:72:5e: 9e:31:0a:54:6c:c1:11:27:70:d9:fc:d0:0f:bf:20:9a: d6:54:fc:7d:e1:ae:d6:2f:a3:71:15:14:f2:dd:bb:99: be:88:a6:05:97:bb:df:ec:f2:e7:c2:96:be:2d:d2:7c: 1e:df:c4:7c:cc:0f:90:ee:26:6b:f7:56:23:c2:19:56: f9:64:a3:39:3c:90:8c:9b:99:7a:64:25:4f:77:50:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:08:4e:34:77:28:0a:a1:c7:09:c7:d0:97:cc:ea:bd: 19:e5:8e:b5:e1:69:35:74:26:68:2d:c4:96:cb:ea:22: df:8e:2f:c9:82:f8:b4:ec:1c:ad:54:67:5b:8a:bf:71: 3c:3c:85:1c:d4:48:e0:4b:f4:f2:18:30:78:2f:c9:3c: b1:17:37:f9:9a:7c:b1:d0:02:18:82:3e:06:39:e1:41: 80:bb:7f:c4:0a:88:02:1f:83:90:17:3a:8c:b2:0d:9f: d0:7c:cb:cc:a3:de:45:4f:2d:c7:0e:89:d4:a8:99:fb: 6a:10:bb:7e:9f:96:bd:4a:af:89:e3:d1:f9:1a:d2:a8: 2f:c4:7e:0c:f6:92:d6:3a:1d:9d:93:4d:ce:8b:ec:3d: 8b:15:ec:22:98:1a:b9:ce:f7:bf:91:66:d2:67:9a:f8: 73:38:2e:ed:5f:93:cd:6f:7f:e3:b1:fe:36:04:de:0e: 99:9c:91:1b:be:9a:9a:bc:5a:5e:e0:84:8b:29:5a:41: 7e:bd:86:da:7b:f5:2c:b0:bc:a6:e9:a7:50:f7:7d:85: b2:f1:5f:86:ac:19:53:35:fe:8f:32:01:f5:a4:9a:24: 10:bc:57:d3:03:a8:92:0f:03:a7:68:12:9f:be:8f:2c: 53:d9:ed:54:16:57:ed:31:20:41:45:ec:df:85:d8:d4 Fingerprint (SHA-256): 57:FF:33:6A:FB:05:67:12:55:8F:AF:F4:46:1F:AA:22:95:5F:F0:F3:A7:02:1D:0F:D6:9F:00:26:3D:E9:4A:26 Fingerprint (SHA1): 50:AE:1D:6F:4B:06:AB:4E:2A:C2:5E:6A:9C:42:3F:06:07:3C:25:EA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #591: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165003 (0x3caff70b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 16:54:32 2023 Not After : Wed Oct 18 16:54:32 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ab:c9:19:19:24:84:53:a2:11:a7:97:ce:32:ad:88:a8: 35:fa:29:15:65:21:cb:61:37:c0:c4:76:06:1e:49:6b: b4:cd:36:93:b7:c2:df:32:71:b1:45:cf:e2:bc:24:99: 81:52:0a:34:17:e1:c2:26:a1:1a:f5:57:c9:34:74:2a: 85:b6:bd:6e:b9:0b:a8:e7:8d:10:cd:7a:f2:f2:94:5c: 56:b1:df:e4:d7:c1:44:c3:97:fd:97:13:9a:db:a4:69: 5c:f2:2e:a9:22:f3:94:75:45:9e:a5:29:c3:dd:7a:7d: ef:f0:ca:7f:03:6f:3e:d9:7a:75:f3:5c:72:54:68:23: 92:ca:de:00:d9:2a:f1:96:ea:8d:77:24:9b:fa:26:53: e0:04:b8:f0:87:a9:c5:26:72:98:3b:95:49:57:29:4b: 24:74:d9:ce:e9:34:ff:36:6c:c8:7c:42:a3:f0:72:5e: 9e:31:0a:54:6c:c1:11:27:70:d9:fc:d0:0f:bf:20:9a: d6:54:fc:7d:e1:ae:d6:2f:a3:71:15:14:f2:dd:bb:99: be:88:a6:05:97:bb:df:ec:f2:e7:c2:96:be:2d:d2:7c: 1e:df:c4:7c:cc:0f:90:ee:26:6b:f7:56:23:c2:19:56: f9:64:a3:39:3c:90:8c:9b:99:7a:64:25:4f:77:50:9f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 7b:08:4e:34:77:28:0a:a1:c7:09:c7:d0:97:cc:ea:bd: 19:e5:8e:b5:e1:69:35:74:26:68:2d:c4:96:cb:ea:22: df:8e:2f:c9:82:f8:b4:ec:1c:ad:54:67:5b:8a:bf:71: 3c:3c:85:1c:d4:48:e0:4b:f4:f2:18:30:78:2f:c9:3c: b1:17:37:f9:9a:7c:b1:d0:02:18:82:3e:06:39:e1:41: 80:bb:7f:c4:0a:88:02:1f:83:90:17:3a:8c:b2:0d:9f: d0:7c:cb:cc:a3:de:45:4f:2d:c7:0e:89:d4:a8:99:fb: 6a:10:bb:7e:9f:96:bd:4a:af:89:e3:d1:f9:1a:d2:a8: 2f:c4:7e:0c:f6:92:d6:3a:1d:9d:93:4d:ce:8b:ec:3d: 8b:15:ec:22:98:1a:b9:ce:f7:bf:91:66:d2:67:9a:f8: 73:38:2e:ed:5f:93:cd:6f:7f:e3:b1:fe:36:04:de:0e: 99:9c:91:1b:be:9a:9a:bc:5a:5e:e0:84:8b:29:5a:41: 7e:bd:86:da:7b:f5:2c:b0:bc:a6:e9:a7:50:f7:7d:85: b2:f1:5f:86:ac:19:53:35:fe:8f:32:01:f5:a4:9a:24: 10:bc:57:d3:03:a8:92:0f:03:a7:68:12:9f:be:8f:2c: 53:d9:ed:54:16:57:ed:31:20:41:45:ec:df:85:d8:d4 Fingerprint (SHA-256): 57:FF:33:6A:FB:05:67:12:55:8F:AF:F4:46:1F:AA:22:95:5F:F0:F3:A7:02:1D:0F:D6:9F:00:26:3D:E9:4A:26 Fingerprint (SHA1): 50:AE:1D:6F:4B:06:AB:4E:2A:C2:5E:6A:9C:42:3F:06:07:3C:25:EA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #592: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #593: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #594: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165033 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #595: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #596: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #597: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #598: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1018165034 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #599: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #600: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #601: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #602: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1018165035 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #603: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #604: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #605: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #606: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1018165036 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #607: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #608: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #609: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #610: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1018165037 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #611: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #612: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #613: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #614: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1018165038 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #615: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #616: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #617: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #618: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1018165039 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #619: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #620: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #621: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165033 (0x3caff729) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:56:12 2023 Not After : Wed Oct 18 16:56:12 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:9e:3a:2d:ad:a3:cf:da:e1:c2:a1:b9:a9:86:e6:e3: d9:62:eb:e4:90:54:82:f5:7c:1a:6f:b0:17:86:d1:d5: b0:c6:58:2c:05:15:97:b6:89:9d:5e:3a:b0:73:19:73: 88:aa:2e:f5:d1:5b:8c:c5:7f:02:41:cf:d0:86:d6:10: af:5c:6e:31:2c:d2:89:35:fa:2a:af:43:99:9a:eb:cd: 9b:1d:f4:a7:0e:2e:37:f4:c5:d1:6b:05:d0:87:f4:5b: b5:02:81:70:f0:64:1d:1f:3e:f2:b0:0d:e2:a7:92:97: 6f:03:2c:fd:b8:da:57:4f:f1:36:b6:09:19:62:94:51: ea:c3:9f:b4:92:82:f8:a7:bb:1f:d0:a3:82:f0:fd:e0: db:86:ec:45:01:f8:14:0d:96:21:e3:7f:1d:dd:b8:61: a5:ad:a5:55:4a:0e:93:b8:b8:c6:b2:1e:f2:35:8b:de: 7c:0e:b4:0f:bd:5d:e1:dc:68:da:49:5b:de:a2:ca:93: fd:4e:49:d0:a2:a1:2a:3c:20:73:f4:1c:1e:a0:97:ae: 79:f8:73:1a:cb:a1:bf:1b:1a:45:33:53:8f:ff:ac:fe: 70:d4:45:dc:30:9b:d7:2a:74:8b:e2:7d:8c:f0:7e:76: 21:2f:f0:29:97:45:33:bf:c2:b1:72:4d:28:69:17:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:89:37:be:8b:07:f0:88:6c:46:cf:93:1f:6f:86:1d: 54:e6:d2:dd:74:92:b8:91:91:1e:e2:80:9e:f9:b8:82: d4:e5:a2:10:f2:d2:38:1c:7a:77:4d:81:d1:bc:f4:df: 15:4e:b8:43:9f:91:71:6f:44:66:12:c6:6a:da:4d:02: 2a:24:d3:da:b8:f7:f1:62:35:39:8b:4c:83:d2:f8:c9: c7:09:3d:37:36:a0:d3:ad:7e:08:7d:b3:f8:46:be:9b: cc:8b:cd:92:5d:8d:90:9f:78:ef:0d:e6:53:2e:8a:94: fc:dc:e7:e3:86:9d:65:f8:d8:98:72:1e:4f:59:3b:fb: 15:46:0c:93:f7:47:94:e7:72:de:b2:5c:f7:f0:c1:9d: a2:15:3d:13:40:ed:62:1f:e3:8b:34:17:e8:70:e2:4d: 21:e9:1a:fa:7f:b6:2f:1f:66:86:b4:e9:7f:0a:ed:72: b0:72:6f:3b:86:62:1d:d4:e2:d8:db:db:46:1c:9c:ff: 8b:3b:a6:bf:54:df:7a:bd:70:37:b8:2c:16:b0:55:40: e4:72:a2:52:f0:11:f4:49:40:99:45:9f:4d:c7:65:ef: cb:c7:84:9b:3d:87:c8:fe:77:bc:9e:48:3a:93:34:87: b8:e4:32:4f:03:09:e4:96:0b:8b:4c:5d:5f:9b:19:1f Fingerprint (SHA-256): F5:9A:C7:8E:B1:28:12:86:48:59:22:57:A2:6A:00:19:21:E3:77:B9:B3:8E:14:50:CE:63:EE:4D:8C:58:8C:72 Fingerprint (SHA1): B6:A3:AA:02:D6:C6:43:B5:F6:E8:CA:1D:C4:FC:FD:6D:E3:C8:7F:56 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #622: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #623: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #624: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #625: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165033 (0x3caff729) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:56:12 2023 Not After : Wed Oct 18 16:56:12 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:9e:3a:2d:ad:a3:cf:da:e1:c2:a1:b9:a9:86:e6:e3: d9:62:eb:e4:90:54:82:f5:7c:1a:6f:b0:17:86:d1:d5: b0:c6:58:2c:05:15:97:b6:89:9d:5e:3a:b0:73:19:73: 88:aa:2e:f5:d1:5b:8c:c5:7f:02:41:cf:d0:86:d6:10: af:5c:6e:31:2c:d2:89:35:fa:2a:af:43:99:9a:eb:cd: 9b:1d:f4:a7:0e:2e:37:f4:c5:d1:6b:05:d0:87:f4:5b: b5:02:81:70:f0:64:1d:1f:3e:f2:b0:0d:e2:a7:92:97: 6f:03:2c:fd:b8:da:57:4f:f1:36:b6:09:19:62:94:51: ea:c3:9f:b4:92:82:f8:a7:bb:1f:d0:a3:82:f0:fd:e0: db:86:ec:45:01:f8:14:0d:96:21:e3:7f:1d:dd:b8:61: a5:ad:a5:55:4a:0e:93:b8:b8:c6:b2:1e:f2:35:8b:de: 7c:0e:b4:0f:bd:5d:e1:dc:68:da:49:5b:de:a2:ca:93: fd:4e:49:d0:a2:a1:2a:3c:20:73:f4:1c:1e:a0:97:ae: 79:f8:73:1a:cb:a1:bf:1b:1a:45:33:53:8f:ff:ac:fe: 70:d4:45:dc:30:9b:d7:2a:74:8b:e2:7d:8c:f0:7e:76: 21:2f:f0:29:97:45:33:bf:c2:b1:72:4d:28:69:17:fd Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 37:89:37:be:8b:07:f0:88:6c:46:cf:93:1f:6f:86:1d: 54:e6:d2:dd:74:92:b8:91:91:1e:e2:80:9e:f9:b8:82: d4:e5:a2:10:f2:d2:38:1c:7a:77:4d:81:d1:bc:f4:df: 15:4e:b8:43:9f:91:71:6f:44:66:12:c6:6a:da:4d:02: 2a:24:d3:da:b8:f7:f1:62:35:39:8b:4c:83:d2:f8:c9: c7:09:3d:37:36:a0:d3:ad:7e:08:7d:b3:f8:46:be:9b: cc:8b:cd:92:5d:8d:90:9f:78:ef:0d:e6:53:2e:8a:94: fc:dc:e7:e3:86:9d:65:f8:d8:98:72:1e:4f:59:3b:fb: 15:46:0c:93:f7:47:94:e7:72:de:b2:5c:f7:f0:c1:9d: a2:15:3d:13:40:ed:62:1f:e3:8b:34:17:e8:70:e2:4d: 21:e9:1a:fa:7f:b6:2f:1f:66:86:b4:e9:7f:0a:ed:72: b0:72:6f:3b:86:62:1d:d4:e2:d8:db:db:46:1c:9c:ff: 8b:3b:a6:bf:54:df:7a:bd:70:37:b8:2c:16:b0:55:40: e4:72:a2:52:f0:11:f4:49:40:99:45:9f:4d:c7:65:ef: cb:c7:84:9b:3d:87:c8:fe:77:bc:9e:48:3a:93:34:87: b8:e4:32:4f:03:09:e4:96:0b:8b:4c:5d:5f:9b:19:1f Fingerprint (SHA-256): F5:9A:C7:8E:B1:28:12:86:48:59:22:57:A2:6A:00:19:21:E3:77:B9:B3:8E:14:50:CE:63:EE:4D:8C:58:8C:72 Fingerprint (SHA1): B6:A3:AA:02:D6:C6:43:B5:F6:E8:CA:1D:C4:FC:FD:6D:E3:C8:7F:56 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #626: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #627: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #628: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #629: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165040 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #630: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #631: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #632: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #633: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018165041 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #634: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #635: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #636: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #637: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018165042 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #638: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #639: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #640: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #641: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018165043 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #642: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #643: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #644: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #645: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #646: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #647: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165040 (0x3caff730) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:56:35 2023 Not After : Wed Oct 18 16:56:35 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c1:c4:3d:78:19:a1:d0:a6:63:e3:ab:d9:87:43:ce:b1: 32:82:b4:22:49:02:f6:e6:0b:6d:a5:96:0e:9e:20:87: 72:57:ab:d3:5a:58:a6:43:ca:d2:f8:3a:c3:d4:9b:48: 06:07:65:80:1e:05:75:4b:03:58:17:38:cb:90:02:d5: 47:61:f9:02:9d:39:31:ff:01:9a:a1:e1:14:46:e2:8f: bf:37:d3:70:cf:a5:1b:a7:77:9b:32:68:25:44:73:b8: df:a3:e4:d0:59:f2:3f:e6:f5:cd:5e:af:07:57:08:05: 38:12:ee:65:20:1c:ff:46:e0:57:79:1e:81:61:10:60: 13:b5:d4:db:79:28:8a:c2:17:e5:6b:a8:0b:36:44:6f: 97:5e:36:6b:0c:48:34:4d:ab:3c:c6:09:12:72:3a:6c: 25:bd:05:97:44:8f:33:12:1d:2f:2b:ad:85:c1:60:fb: 8b:bc:fe:1b:30:06:a2:19:38:8a:c1:66:c2:34:b0:c9: 94:29:f6:34:49:43:f7:5a:d7:0b:64:c8:54:7c:8f:79: c4:56:45:b5:62:fb:2b:bb:8e:6d:b0:d4:9c:c2:e9:13: f8:6a:96:16:c9:c4:a8:e8:a2:58:3c:5c:75:f9:79:e0: 87:d0:57:9e:c1:49:b6:59:c0:57:1f:ee:3b:bf:d6:a7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 87:32:62:44:d0:86:0c:d9:6f:83:54:f6:d7:76:d9:42: 25:60:52:96:74:bc:f2:5b:43:aa:04:65:a1:3c:ee:36: d8:f4:ec:cd:a4:af:89:19:9f:e0:49:81:77:f8:8d:85: ea:d5:3a:82:f4:d8:84:84:0f:c2:7f:c8:61:72:57:f5: ad:57:4d:3d:fc:af:45:29:5c:09:b7:fd:53:ce:d7:cd: a0:a5:ee:b1:b7:95:09:91:cd:14:93:00:4f:57:45:cd: bb:70:c7:37:45:fd:11:79:da:1f:8a:4c:d9:41:f3:b4: 42:cf:ec:4b:16:62:da:37:c3:e2:f4:92:49:56:0b:34: 3e:72:e3:01:11:e1:26:4d:71:a0:51:ca:55:31:25:f3: 5a:39:c1:73:54:f7:82:46:17:02:a9:dc:f2:68:90:dc: 77:9e:6d:1e:c3:d4:cb:32:bd:a8:f1:69:02:00:20:f4: cd:fb:ab:de:72:56:5e:3c:18:f9:28:66:c3:43:ac:99: 8c:ae:20:5c:be:3c:89:fc:d0:74:82:04:e3:21:6b:b5: 40:41:e8:be:a5:8a:5f:c4:9a:47:e4:e7:e7:6c:93:f8: 2a:8d:b2:06:3b:3c:e2:e5:07:52:98:c0:4f:de:a1:75: 1f:4a:93:2d:73:17:57:0a:f9:ae:69:32:60:fd:3f:e7 Fingerprint (SHA-256): 16:C7:65:FC:96:27:C4:58:5C:B4:C2:B0:71:32:9F:BC:DF:51:E1:9D:89:97:C5:F7:6D:E7:1E:5D:8D:3D:9D:77 Fingerprint (SHA1): A6:4F:26:3D:08:6D:0E:49:5F:9E:3A:AB:F9:14:25:F8:15:EE:E1:27 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #648: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #649: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #650: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165041 (0x3caff731) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:56:38 2023 Not After : Wed Oct 18 16:56:38 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c2:53:be:fd:fe:20:7b:6c:9b:05:50:cc:5d:69:16:fc: d8:b9:0f:4e:83:88:e4:71:ed:d0:ed:2a:40:de:9d:b9: 0d:a7:d0:36:03:db:37:e3:b8:af:30:65:27:ee:c8:30: a7:99:e3:58:ee:3c:2a:24:58:76:c3:19:e1:cc:ef:6e: 2d:88:c6:69:aa:45:a0:7d:4d:3a:92:86:da:16:4f:91: 4f:3c:37:f3:61:cc:79:0a:52:d8:94:b9:f7:44:d1:91: 85:3e:45:0a:e2:80:26:d5:a0:30:8f:1a:f2:17:d9:4b: bc:52:04:45:ae:bd:68:99:85:6a:f1:6f:7b:b8:5c:04: d5:06:36:83:cd:ef:6c:81:34:01:ad:ef:8d:69:31:32: f4:5e:be:97:3a:4a:3a:a2:ec:ea:02:21:d1:eb:b1:72: cd:cd:5d:ae:71:83:89:25:de:a9:10:a8:45:af:1f:aa: 54:d1:64:87:3f:07:83:1e:e4:6e:8a:e0:56:72:6f:31: 38:fd:07:cc:d6:da:24:ed:30:50:fd:af:c4:dc:cc:c5: 78:31:3c:52:48:ec:5a:ee:13:05:5f:e6:c6:2d:a7:2a: a9:0f:b7:fd:16:16:ca:10:26:3a:b9:97:09:53:0b:1e: f5:fb:d5:32:6b:b0:58:59:56:93:13:6a:c1:aa:f5:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4b:fe:8b:24:e7:01:e6:d6:63:06:f4:dc:93:64:59:5e: 66:a4:d2:71:85:31:73:21:94:b5:81:a2:98:92:ce:4e: a4:51:15:bb:4b:b3:f6:8c:cd:2f:22:c1:ef:33:b6:08: ec:ef:5c:11:41:78:ed:5d:c8:69:cb:5f:e1:af:5f:94: f9:b4:a8:87:e4:af:8f:a3:69:a1:9d:cb:55:89:63:f0: 27:35:c8:1a:3a:c9:ab:01:41:40:07:47:0a:f2:e4:88: 4c:2c:13:b5:8b:69:a6:43:0b:ad:0b:e9:76:78:fd:be: f4:a9:c5:27:67:11:e0:a3:82:b2:35:79:f1:64:72:84: d9:06:b8:3f:30:d4:f1:f5:af:b0:c6:a5:44:d5:d1:46: cf:f3:ce:fa:cd:16:8e:3e:dc:66:e0:ce:47:3c:10:23: 09:35:34:31:d5:c1:4f:02:b5:02:85:f3:24:51:74:b9: 3a:52:89:35:4a:02:41:42:42:26:6b:76:61:88:ae:67: 11:3d:5b:b7:3d:74:72:62:9b:76:db:03:b5:7d:8c:ba: 59:d3:d7:f2:90:52:4e:39:8d:1d:34:d6:c6:82:59:96: 18:0e:fe:ec:6f:ae:e3:db:4b:56:ec:53:86:3b:18:4a: dc:dc:20:8c:f3:3f:b5:98:66:8d:01:3e:5b:7e:b6:7d Fingerprint (SHA-256): 45:FF:29:46:EC:F1:51:4D:1F:71:41:B2:9D:56:F1:A7:54:11:33:C9:E9:0F:0C:1B:EE:00:95:B6:B6:A8:85:24 Fingerprint (SHA1): 08:7D:8D:59:86:C7:4B:28:EB:A7:73:4F:09:73:89:06:E9:A6:BA:9D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #651: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #652: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165042 (0x3caff732) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 16:56:41 2023 Not After : Wed Oct 18 16:56:41 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:84:c1:6f:48:4c:88:80:11:a2:4d:5f:9c:d6:5b:51: bd:e5:4f:2e:ee:a6:61:3d:b1:cc:f8:11:21:44:34:4b: c5:95:d7:f4:21:34:38:b5:89:54:79:23:ec:29:a5:84: 5e:c5:35:6c:f0:5b:af:16:03:c8:30:12:c9:eb:a7:8c: 36:83:bc:00:54:9c:73:ce:11:4f:9b:f2:c2:d5:95:ea: 53:5c:46:ee:16:d0:c7:07:76:2d:e4:28:bb:ff:a7:cd: e2:04:7f:45:2b:d7:6d:00:72:ea:23:9a:0e:13:9e:5f: 8d:8d:f6:fd:38:81:4b:b8:e2:24:cb:60:07:b9:3f:07: fb:eb:39:53:ac:da:79:89:a9:4f:17:10:30:5b:49:2e: 81:d5:94:41:46:b2:5a:ca:ab:5d:d2:8f:87:de:2d:b6: ed:c7:b7:c4:38:a7:23:e6:14:b0:67:2e:5c:87:87:14: ce:cd:ac:43:d0:84:c9:fd:51:43:cf:3c:aa:0a:d0:65: 48:5b:79:a9:28:20:a6:48:25:37:1b:85:6b:6b:a4:98: 5a:bf:4f:f7:fe:ba:61:00:bb:dd:a9:bb:56:22:63:b3: a1:6d:4e:30:e7:f9:3d:68:86:51:6a:69:37:89:d1:0f: 18:ff:be:92:ee:f0:9e:55:6e:4a:1e:de:91:02:4c:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:a6:77:d3:e8:36:ca:5e:55:71:00:d5:d8:c9:60:f5: ed:07:aa:5c:51:0a:45:f7:55:81:1a:39:6c:c3:e5:1e: 1d:c7:8a:59:ca:66:95:5f:ff:49:ee:d6:63:77:41:db: 53:b0:2c:2f:fb:a2:48:30:7a:51:7b:af:54:68:4b:46: a4:ea:11:a4:81:0b:25:8b:71:23:42:46:8b:1d:85:0e: 05:da:2b:87:02:2a:62:d9:98:e8:18:77:82:28:9d:93: 77:be:6d:98:50:92:e8:ff:91:6a:b0:c3:3d:25:25:d0: 05:2e:cc:ac:f1:e0:02:53:99:22:a7:c8:6f:c5:4d:f1: 00:f6:62:37:41:b4:6f:ce:ae:b5:34:0c:e8:62:55:49: 64:1b:76:4a:c0:cd:1d:77:1b:4d:6b:f3:e2:98:2f:bb: 8b:e3:a2:97:e8:33:cb:75:4a:f3:cb:5a:f0:f2:23:c5: ae:5e:11:4d:72:01:f5:76:07:a0:3c:43:65:0e:ca:f6: bf:b0:d2:6c:23:4c:df:7e:f7:b1:12:c6:db:b7:73:2c: b2:d2:d1:32:1b:76:2a:42:ee:95:6c:00:59:90:c0:a6: 33:80:e5:cc:8c:f3:c6:c9:1a:cf:0a:4f:d8:a4:d1:d6: 55:15:d9:d9:00:75:eb:8b:d3:3c:2f:47:c2:8a:c3:c6 Fingerprint (SHA-256): CD:A8:6F:AC:E2:58:7E:6F:05:DD:79:5A:76:3C:45:25:73:FC:C8:C0:4E:67:97:DD:DF:B4:17:51:C3:CA:16:7D Fingerprint (SHA1): AD:D2:5E:E5:E0:2D:01:B9:07:FC:95:00:7A:7D:E4:80:8F:71:B1:3F Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #653: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #654: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165044 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #655: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #656: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #657: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #658: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018165045 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #659: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #660: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #661: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #662: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018165046 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #663: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #664: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #665: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #666: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1018165047 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #667: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #668: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #669: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #670: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1018165048 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #671: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #672: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #673: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #674: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #675: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #676: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #677: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165044 (0x3caff734) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:56:49 2023 Not After : Wed Oct 18 16:56:49 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:c8:08:b1:1c:4a:12:0b:7c:66:08:94:d7:0f:e1:62: 4d:83:87:9f:c5:11:20:70:43:70:e1:88:1b:3d:25:87: 92:b3:b3:51:ee:cc:41:2a:f8:c7:d0:b5:df:48:85:60: 24:a6:dc:8a:dd:db:85:ff:44:53:72:2a:64:a8:24:c7: 8a:7a:a6:8b:a7:f1:ac:df:b2:b0:0e:bc:ef:ec:6c:91: 9b:bf:f0:13:04:47:71:b3:63:06:8b:31:97:05:8d:36: 75:3f:2a:65:89:6e:23:70:f2:40:ad:55:ad:3b:56:82: d5:2a:8e:20:91:4f:70:27:9e:1b:88:12:64:8b:19:c5: 8e:47:b1:76:9d:09:48:28:fd:da:b1:62:c9:1d:c9:60: 8f:16:97:f1:c1:6b:c6:06:6e:a3:f8:e0:e6:61:91:c2: 5a:55:c7:aa:db:71:44:c8:ae:03:71:5f:31:c3:1f:42: 52:89:60:a2:8d:61:48:c4:fa:ff:bc:02:c6:28:73:e8: 6b:34:40:11:b7:38:66:82:29:35:c2:9a:64:25:a4:c0: fe:60:eb:e6:06:19:27:82:70:7d:e1:cc:c8:75:1b:67: 1e:6c:0b:33:60:d7:7f:9d:21:a4:1a:3d:b5:c2:a0:2c: ec:c7:d2:a2:70:cb:74:0b:f1:45:c5:bf:6d:9c:15:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:59:13:2c:e0:a4:1c:d2:c0:f9:dc:5e:cf:af:5a:af: 38:3f:49:a3:39:8c:a8:4d:e3:b4:7d:06:57:4d:dc:21: 03:99:28:ed:50:9e:d9:95:46:65:68:f0:47:0e:81:82: c3:3a:a1:cb:c5:9a:9e:8f:cb:95:81:f3:38:c4:09:5d: ed:c7:27:9a:4a:f1:d9:f4:fb:ef:ce:d5:3d:6d:27:f9: 35:2f:f7:4d:83:06:ef:97:36:bc:f3:02:d6:b3:d9:44: 33:54:88:b2:9a:81:81:45:09:77:59:0f:2d:9b:86:ea: 69:e6:65:ad:a2:e5:78:71:fd:7f:f7:b8:78:68:8e:84: 81:d8:f2:90:6e:9c:7e:b7:31:e9:ff:31:d1:89:af:0a: a0:81:19:fb:60:de:92:3c:07:1f:81:6a:4c:85:f7:00: 5e:76:1a:d8:10:47:fc:f4:64:bb:85:5e:a0:ac:3e:cc: 84:18:7d:96:07:70:a5:a1:0a:a2:b7:50:0d:16:6d:63: 9d:f2:10:01:0c:4a:59:5f:92:c5:b9:79:14:18:1e:5d: 28:c6:c5:dc:31:cb:36:88:5a:59:28:50:07:d1:48:bb: 51:84:5a:0a:5e:2b:0b:66:04:b2:7a:85:14:ce:46:20: ae:e1:e1:0a:c3:83:33:6a:0d:a5:5b:00:7d:05:6e:04 Fingerprint (SHA-256): 9F:C9:43:F2:8F:F9:F2:00:2F:11:E1:9D:A0:3B:33:1F:9C:45:41:D3:63:38:21:C5:F7:C0:EC:21:D3:13:2E:2D Fingerprint (SHA1): 33:66:C0:44:6C:9C:35:90:4B:CB:CD:67:5A:09:A2:19:34:4A:82:D0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #678: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #679: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165045 (0x3caff735) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:56:52 2023 Not After : Wed Oct 18 16:56:52 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:c6:2f:fe:d5:1a:82:41:f3:d3:85:e3:33:b0:fd:ed: 88:96:19:67:d4:0b:33:fa:47:5f:e0:2c:e0:64:b3:28: 60:56:01:72:1f:73:6d:98:f1:7f:78:ff:11:00:f4:bc: c1:f1:e1:3b:27:da:a1:82:27:b6:86:2a:cc:9d:a3:99: 80:ea:bf:91:d1:d8:c7:b5:41:ab:96:ab:f4:27:28:38: 75:be:68:d3:86:e3:4b:31:8a:b4:be:c9:b9:97:cc:46: 26:4b:9e:73:fd:0d:76:36:22:ad:aa:f2:a0:09:16:da: 56:58:44:4e:ae:f8:86:fe:76:72:47:c1:0c:d6:e4:ba: ac:8a:b5:47:fc:87:dc:9d:3f:a8:31:76:59:dd:4f:b5: 82:f8:cc:9c:97:59:be:32:98:09:92:3f:0d:9f:e6:80: 4b:62:61:57:65:5e:15:dd:b1:24:21:c2:57:12:91:9b: 84:ec:fb:4e:a2:03:69:c0:d3:7d:49:84:f4:a6:2c:23: 7a:ca:c6:72:12:04:24:dd:29:96:26:a4:ea:14:46:67: cb:d5:f8:36:65:0e:9d:45:39:f1:73:a9:68:07:61:2f: 23:f4:91:d5:cf:e2:23:2f:e0:b2:6d:76:a9:20:b3:6a: b7:46:37:ad:e8:c3:b0:6a:37:01:e2:24:4f:f3:c1:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 13:e8:2f:fd:4a:ea:33:c5:9c:2c:49:c6:fc:ef:14:06: f1:07:1c:e6:de:43:77:29:b8:1e:09:2d:86:33:64:1f: 41:c6:fb:f8:cd:11:a9:34:f3:4c:77:e1:71:f7:8e:b2: f1:a8:dd:ff:d4:f2:a3:05:af:0e:3e:a1:fb:25:62:1f: ef:46:18:45:d5:00:84:b0:09:32:b7:17:62:9e:89:a4: 68:8a:b9:cb:ca:1a:5b:e7:0c:f0:2a:c9:8a:52:25:b3: 66:dd:7a:e3:0f:11:ab:2f:af:3b:d3:8c:38:8f:04:9c: f6:82:0a:14:ff:8f:32:a4:a5:4f:42:48:9d:e3:97:3d: 1d:0e:58:b2:8a:5a:d0:76:60:78:91:da:6f:36:4b:da: 3e:b7:a3:13:89:bd:4e:51:db:fb:06:5d:06:4c:06:66: 49:ef:90:c7:2f:da:38:0c:ce:a2:8d:59:a8:51:81:12: 26:41:88:1f:50:e1:84:5a:45:2e:d6:6d:a8:17:4c:3f: 05:08:47:56:d6:ae:41:d2:78:d3:d7:45:2a:f8:39:9f: aa:95:73:b5:a2:4a:5c:7c:e4:73:78:ff:68:1c:bd:6a: f4:5a:fc:6b:ca:ad:27:f5:c0:49:62:dc:69:d2:f9:27: 2c:5b:c2:37:12:55:3b:9c:2c:69:d0:fb:4d:e2:d0:4c Fingerprint (SHA-256): C0:6C:D0:69:E6:0F:91:65:56:70:6E:79:08:A4:26:28:E9:51:2A:A6:51:BD:B6:9E:BD:4B:22:E8:C9:52:CE:8C Fingerprint (SHA1): 15:FA:08:37:FC:2A:40:92:80:D3:9A:62:D1:FE:04:55:F8:0F:66:29 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #680: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #681: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #682: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165046 (0x3caff736) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 16:56:56 2023 Not After : Wed Oct 18 16:56:56 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:42:a3:b7:b6:c4:5c:26:e8:58:cd:eb:30:0a:2d:91: bf:50:45:e6:7a:1f:2c:21:6f:02:eb:01:9b:0f:64:27: 88:0a:86:55:89:93:4a:cc:a2:95:8f:65:8c:b8:ad:7f: 71:17:3f:b8:48:0b:13:d5:fe:17:2e:53:87:a5:7a:94: 57:21:0f:45:44:01:54:aa:b7:5d:c8:5d:43:5e:a4:cb: 5d:af:a4:2e:80:79:21:20:9e:27:d7:fe:11:9d:7f:a8: 01:80:93:4b:dd:16:ff:03:2e:48:0e:e8:6b:29:e2:ff: ab:56:08:1e:97:fd:15:ed:73:9f:cd:6e:b6:9d:6f:92: ca:f8:7d:55:fc:9b:e7:a8:89:77:dd:2f:28:da:a7:af: 75:fa:46:45:1f:56:3e:6f:c0:11:05:40:87:c7:61:0f: 58:47:92:5d:d5:e2:5a:a8:16:30:3d:72:a6:cc:a8:6a: 93:4d:b4:6c:ec:46:da:51:ef:e4:5a:f7:fb:73:cc:ba: 14:50:fc:a0:a0:54:d4:41:a4:a4:e8:10:0a:ee:17:60: 34:3c:c1:f4:1a:61:c8:4b:c3:8a:4b:e0:98:bf:73:66: 01:be:da:31:e6:02:07:f2:64:d2:f0:56:b5:aa:f5:0e: 69:da:57:57:fc:ad:d9:ef:74:c9:b3:f4:a0:6b:8d:25 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 56:76:e7:cd:64:9d:d3:59:78:d7:02:17:49:5e:92:43: f7:c1:e2:69:94:bc:8c:1e:c4:14:4a:b7:3b:1b:92:de: 7f:85:df:b9:20:74:5d:85:61:4b:dc:e4:85:7c:c1:b7: 33:66:99:2a:cb:b2:83:ad:96:34:88:0e:1c:9a:ff:4b: 4d:a0:4c:c1:ee:89:ff:eb:de:02:f9:a3:e0:80:96:14: e4:37:aa:4b:39:8d:83:93:06:1d:a8:e4:79:69:c1:d3: 41:db:ca:e2:eb:7e:a3:23:65:ba:ea:3e:e6:8f:68:20: b8:f1:53:96:22:e1:f5:03:78:f8:dd:f9:8c:86:4d:97: cc:ff:e7:e5:fb:47:89:de:6b:ad:74:75:ab:19:db:21: 99:e2:b7:c1:2f:7c:7f:74:c9:19:06:b0:e0:f9:d9:42: a8:c7:ce:2b:1c:93:9c:c5:b3:20:bd:19:e1:c2:83:71: 90:59:c6:c8:35:2a:09:9c:af:4f:05:8c:3c:cd:31:da: e7:93:b7:5c:47:58:9d:d7:db:31:8e:be:fe:d9:70:c5: 24:75:a0:43:b1:e4:72:5a:38:77:b5:76:9e:a8:3f:d5: 22:36:fe:8b:55:ad:33:d1:21:88:33:00:89:a4:90:9a: 36:80:62:82:f4:b3:28:02:bf:5c:7f:8c:8d:00:83:ca Fingerprint (SHA-256): E8:DD:6A:C8:8C:19:7A:5D:33:69:A9:3F:CF:14:DD:9A:E3:24:A0:86:49:9C:37:AB:89:36:88:B5:CB:8E:4E:BD Fingerprint (SHA1): 49:29:B0:C8:D0:91:12:2B:0D:79:90:CB:EB:7C:4B:DE:2F:14:D2:7D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #683: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #684: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165049 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #685: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #686: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #687: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #688: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018165050 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #689: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #690: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #691: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #692: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018165051 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA1Root-1018164942.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #693: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #694: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #695: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #696: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018165052 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #697: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #698: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #699: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165049 (0x3caff739) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:57:07 2023 Not After : Wed Oct 18 16:57:07 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:fa:f6:12:f1:a4:84:fc:12:8c:12:28:79:15:36:7a: d0:26:1e:94:1b:b7:80:26:55:32:1c:89:70:8e:6c:b7: 88:03:b0:75:30:98:24:54:06:69:ac:de:76:0a:94:99: 67:c9:ef:f0:37:3e:d4:a1:7a:59:4c:ec:35:1f:1f:e4: 9d:fa:6f:4d:eb:dd:1a:2c:b0:0e:5a:e8:0d:0a:05:18: 0d:cd:d7:42:b0:12:f1:2b:b4:77:34:8d:8b:76:da:5c: 75:16:d5:28:49:cd:95:3d:2f:58:cb:a6:c4:a5:6b:4d: 61:db:8b:69:2f:9d:fb:76:55:0d:06:1e:ba:d2:16:bc: cc:be:8b:dd:85:69:cf:27:bf:78:7f:1b:29:53:72:76: e7:e2:e0:bd:44:20:48:42:44:c1:8f:63:ed:0e:e5:69: dd:e1:ad:2f:06:82:42:91:a7:2b:ba:ef:b6:c1:0c:1b: 8b:28:13:59:07:ca:60:1f:a4:71:27:20:7c:fa:5c:46: c8:4d:d6:66:93:c0:e2:16:79:62:98:86:58:23:52:b0: 91:1f:39:68:c0:df:7b:c7:9d:14:4b:d7:2d:91:5b:a2: c6:c6:ed:3a:fe:0b:45:d8:3f:ed:34:e1:7c:05:49:a5: e9:7d:d2:69:99:a0:19:d6:cf:45:0f:77:1e:c0:27:fb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6d:b6:13:ae:58:3c:88:9d:62:b1:3b:88:fa:5f:3b:f2: 8e:7e:1c:a9:ff:99:7e:c4:16:ca:fb:69:61:bb:8e:16: 32:34:df:05:ce:56:c3:41:05:25:04:d6:fb:4e:3d:7b: 18:a1:ae:2e:ec:87:2e:64:2f:d8:11:69:b1:2a:8f:90: ac:c8:9b:03:c8:9e:5e:3e:3e:f8:93:22:54:24:81:a0: 61:15:d7:62:39:f4:c6:f9:7c:dd:28:5f:e7:f9:27:04: ae:d6:91:7f:d9:a1:3c:38:d7:3a:6a:5c:ba:be:d4:f4: 3e:85:aa:e9:42:8b:b3:c3:92:12:27:eb:b5:ab:2a:1e: 68:50:98:f9:b7:59:c2:02:20:1d:da:7b:51:e4:52:ad: 90:a6:4e:e2:67:dc:9f:a6:74:90:39:36:a6:c1:2d:89: 52:a9:b7:7e:f4:ea:8f:05:a3:9d:46:60:42:4f:2a:91: a9:32:cb:5b:bb:0b:95:d5:6a:1a:ee:85:55:1a:a1:ce: db:a8:b9:ad:ab:24:f9:f2:54:f8:6c:56:c5:2d:0d:ed: 4e:23:bc:64:48:17:47:93:7e:83:9b:cd:55:b2:2c:0f: e0:89:04:ad:b5:6f:aa:66:4b:70:d0:7e:43:ea:70:11: 75:d2:c2:f1:34:c3:95:94:44:4f:3b:f1:f3:78:33:66 Fingerprint (SHA-256): C7:3E:E1:4E:52:AD:27:B4:C4:C2:AA:AA:00:4A:DA:F9:D2:55:C6:26:00:63:57:8B:97:65:C7:EE:C3:40:C4:3C Fingerprint (SHA1): 8E:16:63:60:38:86:BB:2E:50:DF:CF:96:46:65:3A:25:CE:57:21:49 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #700: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #701: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165053 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #702: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #703: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #704: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165054 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #705: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #706: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #707: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #708: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018165055 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #709: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #710: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018165056 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #711: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #712: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #713: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #714: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #715: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018165057 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-Bridge-1018164943.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #716: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #717: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #718: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #719: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018165058 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #720: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #721: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #722: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165053 (0x3caff73d) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 16:57:19 2023 Not After : Wed Oct 18 16:57:19 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a6:79:c7:dc:db:72:9f:bb:f7:58:ef:31:84:b1:e9:bf: 4c:a6:3b:d9:7a:c2:fa:3d:bb:da:6d:a0:4f:ca:28:8a: b2:bd:84:41:b7:c4:ec:b1:80:02:2d:9a:03:06:f9:82: 0f:7e:48:61:3f:12:d8:bd:6f:98:ac:74:0a:47:e8:d6: e5:67:81:95:fb:26:a8:75:54:39:5f:b7:92:ed:91:66: 76:b6:a1:9a:b1:b4:c1:3e:33:17:04:19:37:b5:28:e1: 76:c3:81:26:56:dc:0a:f9:86:65:9a:c5:50:16:38:b4: 63:e2:e6:0f:62:ec:bf:ae:d2:a5:3d:1c:9d:83:72:b4: 86:13:7f:db:a0:03:33:cd:0f:0a:83:7d:5f:9c:97:e4: 94:6c:48:d8:16:fd:6a:23:20:4f:93:e3:fb:39:67:4e: 01:39:0c:1a:96:24:a8:c2:c4:0f:a2:b3:cb:cc:2d:72: 0f:70:95:50:36:c1:b2:b9:7c:3d:8d:c6:57:1d:1c:41: 9d:0c:a3:da:43:16:34:26:55:39:39:c7:26:8c:e3:09: 0c:1e:59:2b:47:a8:4b:5f:2b:92:38:b8:39:cd:65:82: 14:f9:ff:d3:23:18:b5:d4:f7:02:ea:2e:ff:ca:0f:3e: 3e:47:6e:b4:f8:7b:93:ef:b0:04:93:67:f9:66:59:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1f:5e:3b:c3:41:88:12:49:5c:c9:85:91:5f:79:f6:01: 08:ee:e1:b6:3c:80:84:d8:dc:28:d1:ee:d2:70:a2:e5: 60:f0:ec:a3:be:b6:7e:db:98:d2:f5:30:65:64:ea:97: 3c:6d:cc:92:31:1b:d4:c2:69:ef:02:3a:e0:d1:0a:9e: 5b:67:4c:25:3f:5b:b4:ab:62:fe:31:be:2c:e8:50:46: 64:bb:99:94:d0:6b:f5:43:a6:5a:38:ea:55:8a:c1:9f: d1:d6:fd:36:0a:19:7d:5d:ae:45:5f:19:41:27:19:f1: 5a:92:a9:c4:51:68:c7:04:3a:aa:09:17:35:e6:c8:71: 71:c6:f8:67:b7:0a:50:b6:a3:b4:5a:2d:95:fc:13:bb: ce:eb:4a:97:31:d8:c4:87:29:6a:98:7a:0c:fe:16:a6: 27:0d:6e:d2:73:de:02:56:fc:23:8f:f8:a1:a1:60:9e: 75:c2:48:9f:16:55:5f:25:d3:ad:3f:a5:4d:b2:7e:f6: cb:43:7a:cd:d0:b6:3f:9d:b7:5c:8e:f4:b7:8e:ad:3f: 30:3f:3c:5f:25:4e:29:df:51:4e:94:9c:f2:3c:cb:d1: 59:78:7f:ec:62:10:12:26:ff:4c:a9:5c:9b:9f:3c:ac: 81:18:ad:f6:84:f2:b9:d4:87:bd:00:b4:ce:44:0a:33 Fingerprint (SHA-256): E0:8A:3E:35:AE:C2:29:F6:74:D3:B5:AE:21:05:92:3F:67:24:35:1D:87:1B:08:07:9E:AB:07:F8:1B:3D:97:3F Fingerprint (SHA1): 9C:7A:6F:00:98:7D:25:2F:F4:1D:22:74:AD:92:B5:51:69:7C:32:02 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #723: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165054 (0x3caff73e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 16:57:22 2023 Not After : Wed Oct 18 16:57:22 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:a8:6a:e4:3c:b1:a5:bd:44:7b:5e:91:a2:1c:0b:f7: 97:54:99:2a:b0:61:72:64:64:77:9b:13:d2:45:73:d2: 08:79:c6:5a:7f:60:dd:70:47:df:6c:aa:51:8a:a2:64: 29:ff:28:96:08:52:28:d4:fd:84:4d:c0:ca:27:09:70: 27:73:e6:0b:28:5a:cb:5c:d9:61:c9:89:d2:4f:54:16: 48:37:b2:4c:07:62:7e:bc:ed:3a:44:a4:82:38:80:b0: ca:b7:1b:2d:98:7c:aa:7b:a9:1f:be:28:63:b3:a2:ec: 65:9c:ab:82:b1:8f:4f:0b:8d:87:d9:da:8e:14:26:3d: 0b:fc:ff:a1:3f:12:18:89:ab:0f:35:8e:d5:54:cc:fc: c3:a5:89:1a:88:89:71:5d:42:5e:04:89:91:52:f3:90: 30:ae:c9:4e:b6:bf:9f:ad:a0:48:8d:9d:98:0d:04:7b: af:c0:cb:51:02:27:57:b2:9e:30:94:1f:2b:34:3d:33: 29:32:21:2e:77:1c:47:97:e8:6c:25:11:e2:1a:85:99: 6f:11:4d:26:5a:25:d8:a9:4c:ae:12:2c:25:a4:68:f8: b9:00:ea:50:4f:68:f0:6d:c6:3f:20:31:06:0e:b4:fd: 76:97:69:9a:62:41:fe:2c:78:89:9b:fd:9c:8d:9b:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:ae:19:68:65:81:28:d4:0a:e0:d1:68:92:d9:35:ca: 65:b7:57:34:03:04:f2:c0:b0:0d:92:68:51:7f:ca:4b: 3a:07:4b:ea:9c:ac:26:5a:d3:a4:56:99:f7:93:7f:87: 27:a5:a0:19:2d:d9:f5:62:ac:0f:bf:0e:d8:c5:24:a1: e7:da:bb:aa:a6:71:36:c5:c6:0c:7c:cc:10:e7:55:74: 45:5a:63:4c:0f:30:9b:ef:74:d6:fa:80:8b:24:c8:2f: b0:64:e0:8b:b6:57:72:b2:5b:28:53:b2:d6:43:8c:b4: 1f:ff:54:0c:40:de:4d:b1:cc:03:ce:ca:41:72:10:80: bb:2a:37:6d:b4:e2:82:96:96:0f:f7:4f:6b:b6:83:47: ae:7e:2f:fb:04:5a:1a:13:08:55:58:49:ce:66:9e:06: fa:6b:d9:e7:5d:f0:2a:43:5c:5e:29:fb:1f:8b:49:eb: bf:c6:0e:cf:fc:de:1e:46:40:28:9b:ef:46:be:c7:9c: 1b:20:24:a3:96:0d:37:23:bb:82:8c:10:bc:83:8e:bd: 35:87:85:05:3d:aa:40:6c:fb:1e:9c:45:bf:80:2c:19: 3a:31:e2:2d:72:bc:56:1f:af:0d:26:8e:17:d3:94:f1: 4b:b3:2f:93:d2:59:c5:80:28:53:b8:e2:81:40:eb:07 Fingerprint (SHA-256): F2:AF:D4:1D:BD:A7:6A:BF:4E:91:78:7D:09:BD:1B:2F:5A:6F:F8:C3:3A:C7:CD:5E:52:DA:F0:CD:D0:EA:3C:AD Fingerprint (SHA1): 69:36:7D:51:3E:70:51:08:9D:D3:B0:CA:86:E7:56:D7:87:F1:A5:66 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #724: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165054 (0x3caff73e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 16:57:22 2023 Not After : Wed Oct 18 16:57:22 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a5:a8:6a:e4:3c:b1:a5:bd:44:7b:5e:91:a2:1c:0b:f7: 97:54:99:2a:b0:61:72:64:64:77:9b:13:d2:45:73:d2: 08:79:c6:5a:7f:60:dd:70:47:df:6c:aa:51:8a:a2:64: 29:ff:28:96:08:52:28:d4:fd:84:4d:c0:ca:27:09:70: 27:73:e6:0b:28:5a:cb:5c:d9:61:c9:89:d2:4f:54:16: 48:37:b2:4c:07:62:7e:bc:ed:3a:44:a4:82:38:80:b0: ca:b7:1b:2d:98:7c:aa:7b:a9:1f:be:28:63:b3:a2:ec: 65:9c:ab:82:b1:8f:4f:0b:8d:87:d9:da:8e:14:26:3d: 0b:fc:ff:a1:3f:12:18:89:ab:0f:35:8e:d5:54:cc:fc: c3:a5:89:1a:88:89:71:5d:42:5e:04:89:91:52:f3:90: 30:ae:c9:4e:b6:bf:9f:ad:a0:48:8d:9d:98:0d:04:7b: af:c0:cb:51:02:27:57:b2:9e:30:94:1f:2b:34:3d:33: 29:32:21:2e:77:1c:47:97:e8:6c:25:11:e2:1a:85:99: 6f:11:4d:26:5a:25:d8:a9:4c:ae:12:2c:25:a4:68:f8: b9:00:ea:50:4f:68:f0:6d:c6:3f:20:31:06:0e:b4:fd: 76:97:69:9a:62:41:fe:2c:78:89:9b:fd:9c:8d:9b:99 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:ae:19:68:65:81:28:d4:0a:e0:d1:68:92:d9:35:ca: 65:b7:57:34:03:04:f2:c0:b0:0d:92:68:51:7f:ca:4b: 3a:07:4b:ea:9c:ac:26:5a:d3:a4:56:99:f7:93:7f:87: 27:a5:a0:19:2d:d9:f5:62:ac:0f:bf:0e:d8:c5:24:a1: e7:da:bb:aa:a6:71:36:c5:c6:0c:7c:cc:10:e7:55:74: 45:5a:63:4c:0f:30:9b:ef:74:d6:fa:80:8b:24:c8:2f: b0:64:e0:8b:b6:57:72:b2:5b:28:53:b2:d6:43:8c:b4: 1f:ff:54:0c:40:de:4d:b1:cc:03:ce:ca:41:72:10:80: bb:2a:37:6d:b4:e2:82:96:96:0f:f7:4f:6b:b6:83:47: ae:7e:2f:fb:04:5a:1a:13:08:55:58:49:ce:66:9e:06: fa:6b:d9:e7:5d:f0:2a:43:5c:5e:29:fb:1f:8b:49:eb: bf:c6:0e:cf:fc:de:1e:46:40:28:9b:ef:46:be:c7:9c: 1b:20:24:a3:96:0d:37:23:bb:82:8c:10:bc:83:8e:bd: 35:87:85:05:3d:aa:40:6c:fb:1e:9c:45:bf:80:2c:19: 3a:31:e2:2d:72:bc:56:1f:af:0d:26:8e:17:d3:94:f1: 4b:b3:2f:93:d2:59:c5:80:28:53:b8:e2:81:40:eb:07 Fingerprint (SHA-256): F2:AF:D4:1D:BD:A7:6A:BF:4E:91:78:7D:09:BD:1B:2F:5A:6F:F8:C3:3A:C7:CD:5E:52:DA:F0:CD:D0:EA:3C:AD Fingerprint (SHA1): 69:36:7D:51:3E:70:51:08:9D:D3:B0:CA:86:E7:56:D7:87:F1:A5:66 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #725: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #726: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165059 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #727: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #728: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #729: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165060 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #730: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #731: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #732: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #733: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018165061 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #734: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #735: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018165062 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #736: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #737: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #738: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #739: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #740: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018165063 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-Bridge-1018164944.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #741: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #742: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #743: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #744: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018165064 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #745: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #746: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #747: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #748: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018165065 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-BridgeNavy-1018164945.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #749: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #750: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #751: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #752: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018165066 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #753: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #754: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #755: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165059 (0x3caff743) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 16:57:36 2023 Not After : Wed Oct 18 16:57:36 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:68:fd:8e:ed:8f:9c:73:12:f4:66:af:2e:63:29:06: 0d:1c:9f:2f:35:ea:bc:4c:76:f5:0f:f8:df:04:a9:20: d8:0c:88:0c:3f:d0:45:7a:98:03:0c:04:0f:4e:4b:16: fd:e1:f6:e6:29:ff:42:80:de:45:70:94:7d:5a:89:04: c3:3f:d5:4b:ed:53:be:bb:f7:65:87:3b:f2:c5:fe:6d: 17:08:82:0f:af:1a:29:de:a2:8c:a6:81:55:de:39:a0: 14:50:2a:40:ea:54:eb:99:21:0c:85:2e:f1:7e:3c:ea: 92:b4:c2:7f:e7:25:1b:c7:4a:03:3b:0c:55:ba:de:e0: e9:41:7d:c8:e5:1d:e4:d8:d0:81:82:f0:bf:95:db:61: dd:08:fc:9c:7e:ed:b4:e0:78:20:88:2a:97:2e:29:51: 2c:d6:bb:cf:0e:58:7c:18:6d:41:52:e7:2a:26:bf:1b: a3:62:6a:d5:23:f9:b7:50:b7:0b:ac:c1:a7:78:4b:59: 96:81:d0:d7:3c:bb:13:21:83:ad:3d:a8:e1:80:88:e0: 07:a1:72:f8:8d:24:a4:d5:47:f1:16:7a:22:41:1a:5d: 26:a8:0d:ae:6a:f0:d8:7c:1e:96:5a:70:60:57:61:1a: e7:ef:73:74:de:a3:97:b6:03:e2:28:93:e3:09:aa:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:3c:91:dc:55:96:32:7d:f6:95:56:25:74:e3:8e:c8: 06:19:e3:98:10:dc:d5:5a:9c:72:6d:64:54:64:d1:04: 11:b9:67:8b:5a:50:ab:e0:14:bc:02:6e:5c:8b:8c:96: e3:56:50:db:1b:4f:f5:59:bb:fa:c1:eb:63:dd:c7:0e: 6e:56:a4:f7:37:56:62:aa:98:5c:0b:61:dd:9a:e8:9c: 32:59:ae:0a:90:ed:bf:22:ca:ce:30:ed:f6:cb:86:22: 1d:dc:65:fe:09:4f:eb:de:55:75:75:d7:96:a1:99:d2: 5b:a2:88:44:83:cf:d1:80:8f:94:8f:8d:d1:12:09:51: c7:5c:5c:ee:5c:96:fb:41:f3:6a:2c:18:b0:85:d1:57: ac:25:30:72:e2:47:a8:87:94:cd:f4:c3:34:76:85:a9: 7e:e5:1a:c9:37:da:a0:97:f9:d6:9c:71:a3:f0:38:98: fd:82:f1:00:dc:09:42:81:e4:b0:78:fb:44:5e:70:bf: de:1b:b8:86:9e:74:9b:8a:d7:3b:83:8b:8b:41:c5:2e: 3b:5b:e1:06:b2:81:99:8f:58:80:8f:e8:ef:2d:2a:e6: f5:ab:6b:e5:83:79:c7:6e:68:0a:eb:64:0f:27:0e:66: 91:01:ab:b4:5d:dc:f0:fb:88:1a:d4:40:34:19:5c:12 Fingerprint (SHA-256): D8:2F:95:5A:FA:BC:FC:33:C8:5F:DA:61:38:A9:A3:7A:C8:48:CD:87:7D:0D:C3:3E:DD:55:17:DB:E4:DA:ED:1A Fingerprint (SHA1): A2:93:E0:E5:F6:8B:D1:8C:52:20:0A:65:FA:8E:4F:6D:6C:7C:FC:F7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #756: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165060 (0x3caff744) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 16:57:40 2023 Not After : Wed Oct 18 16:57:40 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:a1:18:34:a0:8d:9c:b2:d0:15:42:a5:46:5f:20:22: 3c:cb:7a:b2:b3:76:16:70:8e:d9:f1:c9:00:71:4f:91: 0f:57:7a:08:93:e7:12:cc:e4:7b:a9:c4:b7:1c:c3:0f: e1:06:10:27:a1:55:0c:7c:ad:8e:c0:c1:ba:63:27:6b: b8:17:4e:97:96:9e:92:95:a2:df:cc:79:ce:4b:c0:60: 57:47:61:a4:33:c2:32:d8:a5:c9:cf:99:91:04:59:8f: 29:b6:2d:dc:4e:96:68:4d:80:dd:b4:12:0c:8b:d8:d7: 03:5e:08:66:e3:93:f0:4f:c3:83:81:a7:e8:68:78:9d: cc:ee:78:42:07:9f:6f:e3:cb:80:bd:50:8f:28:44:3b: f4:b1:84:fe:e4:f2:93:61:d0:f6:b5:e2:ef:14:e1:2e: 29:bb:5f:67:7d:41:91:b3:b7:ca:c8:52:cd:1d:44:ca: 84:42:67:3f:db:b5:06:1e:09:f0:ae:1b:7f:e0:d9:7f: 1e:88:a7:be:ae:4f:6d:10:78:1f:8b:2c:fb:00:fd:bb: 90:50:d0:92:8f:b5:8d:46:1e:a9:42:cf:92:aa:93:6b: a9:1b:7a:2f:21:03:90:28:1c:12:1d:7a:28:91:e3:4b: 82:c8:d8:9d:bb:13:ab:6b:c9:75:08:a1:73:af:10:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:ae:c7:c0:45:b5:58:03:ff:52:23:ea:94:ef:87:c9: e4:4d:79:9d:4a:7c:13:55:aa:e8:20:06:aa:32:2a:d1: f1:a5:f5:1c:ef:e5:67:b1:f2:74:6f:15:87:d3:90:a6: 10:81:3f:cb:04:74:e4:e4:3b:a0:43:3d:66:91:cc:50: e2:8c:90:d3:14:42:13:6d:84:53:00:d1:62:a5:45:fb: 00:f8:3f:ff:e9:67:56:6e:a0:ee:67:71:d1:28:7a:e6: b9:61:eb:aa:4b:2e:7b:21:e6:30:f3:40:41:b7:e3:d3: c5:d4:97:ed:4e:0d:c7:7a:1f:c1:fc:03:f0:78:3e:67: 86:9f:1d:f6:f9:81:38:ab:8d:8b:4c:d1:37:6d:3c:70: 5f:f7:cc:36:cf:a9:67:af:9e:3e:00:3b:91:f4:4b:42: f3:74:a4:c8:5f:cf:cd:84:b0:30:6d:3c:70:97:b1:5e: 5b:73:13:75:cb:9b:77:1b:13:7b:11:67:38:9b:e9:c5: b6:06:6e:a5:50:66:f2:92:78:e0:07:94:9b:eb:94:87: 3c:75:52:4b:69:93:22:4c:9c:76:75:a1:f9:54:f8:eb: 76:17:3b:c8:b4:f2:2e:84:bb:ae:1d:8c:a6:65:2c:86: 15:cd:e5:ac:19:6d:a8:32:be:5c:76:49:1b:bc:ed:20 Fingerprint (SHA-256): EB:38:B2:25:8B:2C:2F:7B:74:DC:0C:B4:45:0C:64:A7:5B:08:40:88:0E:18:6C:45:87:85:2B:B3:8E:62:5E:6D Fingerprint (SHA1): 60:98:39:11:BD:0D:1C:8D:A3:9C:7B:5E:A6:59:24:52:D4:83:44:9B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #757: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165060 (0x3caff744) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 16:57:40 2023 Not After : Wed Oct 18 16:57:40 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:a1:18:34:a0:8d:9c:b2:d0:15:42:a5:46:5f:20:22: 3c:cb:7a:b2:b3:76:16:70:8e:d9:f1:c9:00:71:4f:91: 0f:57:7a:08:93:e7:12:cc:e4:7b:a9:c4:b7:1c:c3:0f: e1:06:10:27:a1:55:0c:7c:ad:8e:c0:c1:ba:63:27:6b: b8:17:4e:97:96:9e:92:95:a2:df:cc:79:ce:4b:c0:60: 57:47:61:a4:33:c2:32:d8:a5:c9:cf:99:91:04:59:8f: 29:b6:2d:dc:4e:96:68:4d:80:dd:b4:12:0c:8b:d8:d7: 03:5e:08:66:e3:93:f0:4f:c3:83:81:a7:e8:68:78:9d: cc:ee:78:42:07:9f:6f:e3:cb:80:bd:50:8f:28:44:3b: f4:b1:84:fe:e4:f2:93:61:d0:f6:b5:e2:ef:14:e1:2e: 29:bb:5f:67:7d:41:91:b3:b7:ca:c8:52:cd:1d:44:ca: 84:42:67:3f:db:b5:06:1e:09:f0:ae:1b:7f:e0:d9:7f: 1e:88:a7:be:ae:4f:6d:10:78:1f:8b:2c:fb:00:fd:bb: 90:50:d0:92:8f:b5:8d:46:1e:a9:42:cf:92:aa:93:6b: a9:1b:7a:2f:21:03:90:28:1c:12:1d:7a:28:91:e3:4b: 82:c8:d8:9d:bb:13:ab:6b:c9:75:08:a1:73:af:10:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:ae:c7:c0:45:b5:58:03:ff:52:23:ea:94:ef:87:c9: e4:4d:79:9d:4a:7c:13:55:aa:e8:20:06:aa:32:2a:d1: f1:a5:f5:1c:ef:e5:67:b1:f2:74:6f:15:87:d3:90:a6: 10:81:3f:cb:04:74:e4:e4:3b:a0:43:3d:66:91:cc:50: e2:8c:90:d3:14:42:13:6d:84:53:00:d1:62:a5:45:fb: 00:f8:3f:ff:e9:67:56:6e:a0:ee:67:71:d1:28:7a:e6: b9:61:eb:aa:4b:2e:7b:21:e6:30:f3:40:41:b7:e3:d3: c5:d4:97:ed:4e:0d:c7:7a:1f:c1:fc:03:f0:78:3e:67: 86:9f:1d:f6:f9:81:38:ab:8d:8b:4c:d1:37:6d:3c:70: 5f:f7:cc:36:cf:a9:67:af:9e:3e:00:3b:91:f4:4b:42: f3:74:a4:c8:5f:cf:cd:84:b0:30:6d:3c:70:97:b1:5e: 5b:73:13:75:cb:9b:77:1b:13:7b:11:67:38:9b:e9:c5: b6:06:6e:a5:50:66:f2:92:78:e0:07:94:9b:eb:94:87: 3c:75:52:4b:69:93:22:4c:9c:76:75:a1:f9:54:f8:eb: 76:17:3b:c8:b4:f2:2e:84:bb:ae:1d:8c:a6:65:2c:86: 15:cd:e5:ac:19:6d:a8:32:be:5c:76:49:1b:bc:ed:20 Fingerprint (SHA-256): EB:38:B2:25:8B:2C:2F:7B:74:DC:0C:B4:45:0C:64:A7:5B:08:40:88:0E:18:6C:45:87:85:2B:B3:8E:62:5E:6D Fingerprint (SHA1): 60:98:39:11:BD:0D:1C:8D:A3:9C:7B:5E:A6:59:24:52:D4:83:44:9B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #758: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #759: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165059 (0x3caff743) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 16:57:36 2023 Not After : Wed Oct 18 16:57:36 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:68:fd:8e:ed:8f:9c:73:12:f4:66:af:2e:63:29:06: 0d:1c:9f:2f:35:ea:bc:4c:76:f5:0f:f8:df:04:a9:20: d8:0c:88:0c:3f:d0:45:7a:98:03:0c:04:0f:4e:4b:16: fd:e1:f6:e6:29:ff:42:80:de:45:70:94:7d:5a:89:04: c3:3f:d5:4b:ed:53:be:bb:f7:65:87:3b:f2:c5:fe:6d: 17:08:82:0f:af:1a:29:de:a2:8c:a6:81:55:de:39:a0: 14:50:2a:40:ea:54:eb:99:21:0c:85:2e:f1:7e:3c:ea: 92:b4:c2:7f:e7:25:1b:c7:4a:03:3b:0c:55:ba:de:e0: e9:41:7d:c8:e5:1d:e4:d8:d0:81:82:f0:bf:95:db:61: dd:08:fc:9c:7e:ed:b4:e0:78:20:88:2a:97:2e:29:51: 2c:d6:bb:cf:0e:58:7c:18:6d:41:52:e7:2a:26:bf:1b: a3:62:6a:d5:23:f9:b7:50:b7:0b:ac:c1:a7:78:4b:59: 96:81:d0:d7:3c:bb:13:21:83:ad:3d:a8:e1:80:88:e0: 07:a1:72:f8:8d:24:a4:d5:47:f1:16:7a:22:41:1a:5d: 26:a8:0d:ae:6a:f0:d8:7c:1e:96:5a:70:60:57:61:1a: e7:ef:73:74:de:a3:97:b6:03:e2:28:93:e3:09:aa:af Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:3c:91:dc:55:96:32:7d:f6:95:56:25:74:e3:8e:c8: 06:19:e3:98:10:dc:d5:5a:9c:72:6d:64:54:64:d1:04: 11:b9:67:8b:5a:50:ab:e0:14:bc:02:6e:5c:8b:8c:96: e3:56:50:db:1b:4f:f5:59:bb:fa:c1:eb:63:dd:c7:0e: 6e:56:a4:f7:37:56:62:aa:98:5c:0b:61:dd:9a:e8:9c: 32:59:ae:0a:90:ed:bf:22:ca:ce:30:ed:f6:cb:86:22: 1d:dc:65:fe:09:4f:eb:de:55:75:75:d7:96:a1:99:d2: 5b:a2:88:44:83:cf:d1:80:8f:94:8f:8d:d1:12:09:51: c7:5c:5c:ee:5c:96:fb:41:f3:6a:2c:18:b0:85:d1:57: ac:25:30:72:e2:47:a8:87:94:cd:f4:c3:34:76:85:a9: 7e:e5:1a:c9:37:da:a0:97:f9:d6:9c:71:a3:f0:38:98: fd:82:f1:00:dc:09:42:81:e4:b0:78:fb:44:5e:70:bf: de:1b:b8:86:9e:74:9b:8a:d7:3b:83:8b:8b:41:c5:2e: 3b:5b:e1:06:b2:81:99:8f:58:80:8f:e8:ef:2d:2a:e6: f5:ab:6b:e5:83:79:c7:6e:68:0a:eb:64:0f:27:0e:66: 91:01:ab:b4:5d:dc:f0:fb:88:1a:d4:40:34:19:5c:12 Fingerprint (SHA-256): D8:2F:95:5A:FA:BC:FC:33:C8:5F:DA:61:38:A9:A3:7A:C8:48:CD:87:7D:0D:C3:3E:DD:55:17:DB:E4:DA:ED:1A Fingerprint (SHA1): A2:93:E0:E5:F6:8B:D1:8C:52:20:0A:65:FA:8E:4F:6D:6C:7C:FC:F7 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #760: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165060 (0x3caff744) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 16:57:40 2023 Not After : Wed Oct 18 16:57:40 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:a1:18:34:a0:8d:9c:b2:d0:15:42:a5:46:5f:20:22: 3c:cb:7a:b2:b3:76:16:70:8e:d9:f1:c9:00:71:4f:91: 0f:57:7a:08:93:e7:12:cc:e4:7b:a9:c4:b7:1c:c3:0f: e1:06:10:27:a1:55:0c:7c:ad:8e:c0:c1:ba:63:27:6b: b8:17:4e:97:96:9e:92:95:a2:df:cc:79:ce:4b:c0:60: 57:47:61:a4:33:c2:32:d8:a5:c9:cf:99:91:04:59:8f: 29:b6:2d:dc:4e:96:68:4d:80:dd:b4:12:0c:8b:d8:d7: 03:5e:08:66:e3:93:f0:4f:c3:83:81:a7:e8:68:78:9d: cc:ee:78:42:07:9f:6f:e3:cb:80:bd:50:8f:28:44:3b: f4:b1:84:fe:e4:f2:93:61:d0:f6:b5:e2:ef:14:e1:2e: 29:bb:5f:67:7d:41:91:b3:b7:ca:c8:52:cd:1d:44:ca: 84:42:67:3f:db:b5:06:1e:09:f0:ae:1b:7f:e0:d9:7f: 1e:88:a7:be:ae:4f:6d:10:78:1f:8b:2c:fb:00:fd:bb: 90:50:d0:92:8f:b5:8d:46:1e:a9:42:cf:92:aa:93:6b: a9:1b:7a:2f:21:03:90:28:1c:12:1d:7a:28:91:e3:4b: 82:c8:d8:9d:bb:13:ab:6b:c9:75:08:a1:73:af:10:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:ae:c7:c0:45:b5:58:03:ff:52:23:ea:94:ef:87:c9: e4:4d:79:9d:4a:7c:13:55:aa:e8:20:06:aa:32:2a:d1: f1:a5:f5:1c:ef:e5:67:b1:f2:74:6f:15:87:d3:90:a6: 10:81:3f:cb:04:74:e4:e4:3b:a0:43:3d:66:91:cc:50: e2:8c:90:d3:14:42:13:6d:84:53:00:d1:62:a5:45:fb: 00:f8:3f:ff:e9:67:56:6e:a0:ee:67:71:d1:28:7a:e6: b9:61:eb:aa:4b:2e:7b:21:e6:30:f3:40:41:b7:e3:d3: c5:d4:97:ed:4e:0d:c7:7a:1f:c1:fc:03:f0:78:3e:67: 86:9f:1d:f6:f9:81:38:ab:8d:8b:4c:d1:37:6d:3c:70: 5f:f7:cc:36:cf:a9:67:af:9e:3e:00:3b:91:f4:4b:42: f3:74:a4:c8:5f:cf:cd:84:b0:30:6d:3c:70:97:b1:5e: 5b:73:13:75:cb:9b:77:1b:13:7b:11:67:38:9b:e9:c5: b6:06:6e:a5:50:66:f2:92:78:e0:07:94:9b:eb:94:87: 3c:75:52:4b:69:93:22:4c:9c:76:75:a1:f9:54:f8:eb: 76:17:3b:c8:b4:f2:2e:84:bb:ae:1d:8c:a6:65:2c:86: 15:cd:e5:ac:19:6d:a8:32:be:5c:76:49:1b:bc:ed:20 Fingerprint (SHA-256): EB:38:B2:25:8B:2C:2F:7B:74:DC:0C:B4:45:0C:64:A7:5B:08:40:88:0E:18:6C:45:87:85:2B:B3:8E:62:5E:6D Fingerprint (SHA1): 60:98:39:11:BD:0D:1C:8D:A3:9C:7B:5E:A6:59:24:52:D4:83:44:9B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #761: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165060 (0x3caff744) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 16:57:40 2023 Not After : Wed Oct 18 16:57:40 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: af:a1:18:34:a0:8d:9c:b2:d0:15:42:a5:46:5f:20:22: 3c:cb:7a:b2:b3:76:16:70:8e:d9:f1:c9:00:71:4f:91: 0f:57:7a:08:93:e7:12:cc:e4:7b:a9:c4:b7:1c:c3:0f: e1:06:10:27:a1:55:0c:7c:ad:8e:c0:c1:ba:63:27:6b: b8:17:4e:97:96:9e:92:95:a2:df:cc:79:ce:4b:c0:60: 57:47:61:a4:33:c2:32:d8:a5:c9:cf:99:91:04:59:8f: 29:b6:2d:dc:4e:96:68:4d:80:dd:b4:12:0c:8b:d8:d7: 03:5e:08:66:e3:93:f0:4f:c3:83:81:a7:e8:68:78:9d: cc:ee:78:42:07:9f:6f:e3:cb:80:bd:50:8f:28:44:3b: f4:b1:84:fe:e4:f2:93:61:d0:f6:b5:e2:ef:14:e1:2e: 29:bb:5f:67:7d:41:91:b3:b7:ca:c8:52:cd:1d:44:ca: 84:42:67:3f:db:b5:06:1e:09:f0:ae:1b:7f:e0:d9:7f: 1e:88:a7:be:ae:4f:6d:10:78:1f:8b:2c:fb:00:fd:bb: 90:50:d0:92:8f:b5:8d:46:1e:a9:42:cf:92:aa:93:6b: a9:1b:7a:2f:21:03:90:28:1c:12:1d:7a:28:91:e3:4b: 82:c8:d8:9d:bb:13:ab:6b:c9:75:08:a1:73:af:10:0f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 65:ae:c7:c0:45:b5:58:03:ff:52:23:ea:94:ef:87:c9: e4:4d:79:9d:4a:7c:13:55:aa:e8:20:06:aa:32:2a:d1: f1:a5:f5:1c:ef:e5:67:b1:f2:74:6f:15:87:d3:90:a6: 10:81:3f:cb:04:74:e4:e4:3b:a0:43:3d:66:91:cc:50: e2:8c:90:d3:14:42:13:6d:84:53:00:d1:62:a5:45:fb: 00:f8:3f:ff:e9:67:56:6e:a0:ee:67:71:d1:28:7a:e6: b9:61:eb:aa:4b:2e:7b:21:e6:30:f3:40:41:b7:e3:d3: c5:d4:97:ed:4e:0d:c7:7a:1f:c1:fc:03:f0:78:3e:67: 86:9f:1d:f6:f9:81:38:ab:8d:8b:4c:d1:37:6d:3c:70: 5f:f7:cc:36:cf:a9:67:af:9e:3e:00:3b:91:f4:4b:42: f3:74:a4:c8:5f:cf:cd:84:b0:30:6d:3c:70:97:b1:5e: 5b:73:13:75:cb:9b:77:1b:13:7b:11:67:38:9b:e9:c5: b6:06:6e:a5:50:66:f2:92:78:e0:07:94:9b:eb:94:87: 3c:75:52:4b:69:93:22:4c:9c:76:75:a1:f9:54:f8:eb: 76:17:3b:c8:b4:f2:2e:84:bb:ae:1d:8c:a6:65:2c:86: 15:cd:e5:ac:19:6d:a8:32:be:5c:76:49:1b:bc:ed:20 Fingerprint (SHA-256): EB:38:B2:25:8B:2C:2F:7B:74:DC:0C:B4:45:0C:64:A7:5B:08:40:88:0E:18:6C:45:87:85:2B:B3:8E:62:5E:6D Fingerprint (SHA1): 60:98:39:11:BD:0D:1C:8D:A3:9C:7B:5E:A6:59:24:52:D4:83:44:9B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #762: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #763: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165067 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #764: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #765: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #766: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165068 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #767: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #768: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #769: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #770: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1018165069 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #771: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #772: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #773: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #774: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1018165070 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #775: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #776: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #777: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #778: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1018165071 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #779: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #780: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1018165072 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #781: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #782: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #783: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #784: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #785: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018165073 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #786: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #787: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #788: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #789: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018165074 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #790: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #791: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #792: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #793: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018165075 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #794: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #795: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #796: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #797: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018165076 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #798: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #799: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #800: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165067 (0x3caff74b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 16:57:59 2023 Not After : Wed Oct 18 16:57:59 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:c0:a4:86:42:2e:a3:ff:1b:ce:25:f1:c8:22:ba:94: 86:1b:96:22:41:35:79:26:62:5b:0a:51:66:35:af:63: 4b:38:02:90:c4:ed:b7:b9:77:34:c2:51:4b:01:16:b8: 96:21:0c:47:ba:30:7e:aa:d8:a8:5d:cd:90:88:4d:7e: c2:23:7e:58:99:4f:dc:18:d1:52:f6:d4:61:cf:9d:6a: 2d:e1:f9:0b:07:4b:89:12:b9:97:c4:80:71:96:71:b1: 35:1c:8f:ef:9d:fe:65:6c:31:96:6f:76:d6:a7:df:c9: 8d:e3:87:7c:1a:9f:96:82:2b:9c:aa:66:8f:13:c9:2b: 40:66:7f:0c:47:b2:81:48:e3:6d:79:36:63:a9:17:d0: fb:a3:eb:9a:64:60:d2:2e:fa:0e:60:1a:db:83:24:2e: 9a:50:b9:b9:c5:e2:2b:0a:a7:ab:97:02:b1:23:80:93: 68:ed:1d:8e:8e:23:09:b4:a3:4b:d6:96:df:25:44:e0: af:59:2d:ef:62:a1:35:61:21:45:5c:94:65:55:1d:4e: 29:96:43:25:d8:1d:bd:e2:de:b5:4e:3b:12:81:4f:b8: 06:5e:10:2e:dd:f6:a5:3b:f2:79:71:ab:80:15:d0:b0: c5:8a:bb:25:71:9d:72:3d:1a:42:53:8f:8b:ae:95:55 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:66:c8:2e:d3:27:ef:8c:dc:69:f9:a7:67:52:93:79: 30:62:e3:ff:5f:3a:8d:0b:c3:21:eb:81:9d:b7:98:fa: 31:7d:83:46:60:32:3b:6f:94:eb:a4:36:0c:c5:3f:4d: a2:94:34:69:53:a0:49:82:3f:0e:09:72:fd:30:b3:ef: be:bb:42:c4:1c:43:d3:43:a3:62:63:2c:1e:1c:43:a4: df:b7:af:77:e9:5e:66:47:be:34:dc:6e:ce:71:b7:4f: 23:96:0a:ff:36:05:f3:a5:54:6c:59:68:b6:f3:c6:46: c5:9a:c2:28:2d:c2:e8:7c:5b:28:09:da:98:41:82:4e: 6f:de:09:61:80:30:2c:ac:a3:ca:81:b1:b0:eb:63:99: 87:57:8c:76:94:b3:e8:92:48:de:37:c7:7a:d8:a5:98: 7e:80:dd:28:ce:8f:88:cd:ff:0b:8f:32:08:c6:9b:75: 41:bc:c2:1b:56:55:c4:57:68:f2:93:eb:42:43:ac:da: fb:1f:18:fb:3b:25:e2:ee:40:99:32:3c:b9:92:4f:bc: 42:d6:96:8b:33:a0:be:c3:c0:ca:16:a3:63:23:a4:6f: ff:a7:5e:4b:18:04:cc:b0:d2:d9:09:c1:d4:ef:e6:57: 63:78:c7:1e:9a:fa:db:23:9e:5e:49:6b:2b:64:20:1b Fingerprint (SHA-256): 4D:EA:7C:4E:67:E8:51:88:6B:70:BD:61:EE:6D:E8:F2:5C:45:91:19:58:66:B9:1C:9A:AE:DD:57:3B:89:91:62 Fingerprint (SHA1): 24:93:AE:5B:D0:16:E8:F5:94:A5:F6:48:F7:AE:42:ED:EF:BF:F7:F1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #801: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #802: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #803: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #804: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #805: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #806: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #807: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #808: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #809: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165068 (0x3caff74c) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 16:58:02 2023 Not After : Wed Oct 18 16:58:02 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c8:14:5e:c1:a2:c3:e3:e2:48:2c:f7:de:5c:49:39:a2: c0:a5:20:04:29:f1:c5:99:af:01:ff:9e:cb:0a:fa:e4: 31:61:74:e1:02:c5:6d:40:b9:a5:42:db:82:dc:34:30: 21:aa:52:d0:e1:ed:49:be:18:d4:e0:fc:63:78:6e:5c: bf:30:14:5c:1c:63:67:6b:36:79:99:54:87:ca:36:e4: 90:08:a1:55:89:4f:35:9e:f8:0e:80:49:a6:f9:a2:c1: c3:3a:3e:1c:6a:40:2e:42:0e:2a:3c:3d:16:ff:06:cf: 2f:9e:cb:5a:a7:bb:59:ee:74:e5:9c:2f:e0:12:25:c0: 01:06:ce:25:73:ae:69:f2:36:2a:88:da:a8:50:19:7e: 0b:34:5a:49:4e:14:bf:bb:af:75:59:ef:6e:af:f8:57: 89:6a:bb:57:88:75:39:a4:05:d0:23:01:24:3a:6d:43: 20:c8:27:18:56:4c:0c:d0:d0:42:40:8c:15:15:17:fd: 86:3a:e5:02:d0:6b:5b:d2:9e:37:00:09:fc:49:f4:92: 7d:a7:cd:b5:5c:f0:89:2a:83:3d:69:fb:73:3c:f9:8c: af:43:dd:0e:a6:61:23:96:53:a9:d8:b9:8c:07:10:7d: 3c:70:98:5e:d9:82:dd:e9:cb:a2:59:91:59:2b:2c:ed Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:ea:96:1b:ec:4d:63:a9:b7:bc:5d:7f:eb:b8:a1:25: 12:e8:5e:a1:cf:7d:d4:99:e5:70:58:89:96:80:e9:d0: ac:64:8f:f0:6e:02:91:0a:06:16:29:30:48:d3:70:2e: 90:60:46:b8:69:12:bd:58:8f:a8:70:b1:d2:9d:29:f2: 61:15:7b:18:18:4b:7e:1b:99:72:96:af:d2:5b:5f:51: 09:5c:c9:01:45:f3:99:32:0a:5b:dd:de:80:06:f1:80: a2:9c:a9:fe:14:e0:ae:b7:7d:b3:1e:29:ec:43:7f:88: 1e:7e:2e:3f:a2:02:de:05:b5:01:a6:e8:aa:41:a6:b6: 47:d8:c4:86:9a:af:3a:4a:36:ef:9e:68:3f:fc:a5:03: 04:6e:39:69:1a:2d:b5:ba:9a:73:01:c1:94:82:6d:ce: 53:ad:47:30:c5:19:06:90:9a:a1:1b:a8:d5:09:80:bd: 88:14:15:2c:99:91:80:ae:37:24:8c:f0:02:81:83:88: 3a:d7:73:fa:d9:a3:3e:56:35:17:bf:98:b9:13:70:4e: c8:40:e3:8e:5c:41:02:80:cb:68:ba:20:cb:ce:89:42: a6:67:4e:a0:33:f7:c7:75:50:e7:0e:d4:92:fe:a2:4b: 6a:4a:c0:d9:cc:a8:a1:a4:1b:29:9b:aa:ed:81:97:9e Fingerprint (SHA-256): 2D:14:5F:ED:67:48:C9:8A:08:99:5C:FD:0E:2A:78:ED:FD:02:B9:D9:2D:4F:14:47:97:87:8E:CC:20:7D:96:32 Fingerprint (SHA1): 20:15:9B:BE:86:F3:05:FC:E9:F5:45:7E:10:78:15:11:9E:90:70:E8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #810: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #811: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #812: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #813: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #814: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #815: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #816: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #817: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #818: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #819: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #820: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #821: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #822: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #823: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #824: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #825: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #826: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #827: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #828: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165077 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #829: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #830: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #831: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #832: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018165078 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #833: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #834: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #835: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #836: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018165079 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #837: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #838: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #839: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #840: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1018165080 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #841: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #842: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #843: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #844: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018165081 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #845: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #846: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #847: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #848: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1018165082 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #849: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #850: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #851: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #852: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1018165083 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #853: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #854: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #855: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #856: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1018165084 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #857: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #858: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #859: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #860: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1018165085 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #861: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #862: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #863: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165077 (0x3caff755) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:58:30 2023 Not After : Wed Oct 18 16:58:30 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 72:e7:38:d2:80:4c:13:db:ce:43:f0:27:4c:f0:97:26: 76:3a:33:69:9c:0b:a4:a6:c1:9d:8e:c9:91:2a:40:c3: c8:24:4e:8e:94:b4:0a:31:65:0a:4d:26:da:77:5a:34: 79:06:ac:07:2d:31:2b:67:0d:68:26:5e:d0:56:f6:47: df:ba:ad:18:56:ba:6b:35:cf:b5:3a:33:9a:b0:e2:20: 34:14:d8:17:55:ca:f7:a9:6e:6f:ad:fd:6a:74:f9:a7: 9d:32:d7:9e:4d:91:80:19:7a:55:e6:40:a7:8d:14:a4: d8:f6:ae:75:c5:67:b4:88:a2:23:88:ea:ce:4c:da:8c: ac:0d:6f:dd:01:71:58:61:e7:fd:7c:e8:54:b2:da:46: 7c:0f:93:46:45:c1:02:29:40:90:74:13:e5:4d:8a:6c: 77:f2:16:84:59:52:aa:c3:dd:cb:68:d3:29:f6:56:3f: 07:d1:70:38:db:d3:c2:36:dc:be:5b:7e:2b:38:1a:76: f2:0c:62:bc:ee:96:da:f8:66:4c:ed:de:c1:94:28:1b: 68:43:7a:7e:14:cb:ac:f6:36:e3:83:cd:2f:76:af:c4: b7:ca:e7:cd:96:89:67:8b:50:98:a9:46:b9:1e:61:e7: a4:f5:3e:e0:df:ba:80:7b:4a:cd:6b:92:d0:dd:56:f7 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:46:95:60:68:d5:77:6a:e3:d2:1f:0b:10: 36:6f:0c:84:84:f7:4f:3b:f6:e3:b7:54:cd:03:bf:ba: 02:1d:00:e5:74:97:e5:45:07:76:95:83:e2:c3:4d:9e: de:8a:e5:4a:cf:2e:a5:a1:d9:8d:b2:57:aa:09:f1 Fingerprint (SHA-256): 0A:C1:2B:12:85:4F:E7:0E:57:63:6A:23:DD:9F:EB:0F:C2:DB:27:49:26:14:AB:4D:C1:33:5C:31:A3:96:77:6B Fingerprint (SHA1): 8A:2E:B2:4A:10:1D:B5:88:6B:CD:07:45:3A:6F:EC:97:B3:71:44:85 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #864: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165077 (0x3caff755) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:58:30 2023 Not After : Wed Oct 18 16:58:30 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 72:e7:38:d2:80:4c:13:db:ce:43:f0:27:4c:f0:97:26: 76:3a:33:69:9c:0b:a4:a6:c1:9d:8e:c9:91:2a:40:c3: c8:24:4e:8e:94:b4:0a:31:65:0a:4d:26:da:77:5a:34: 79:06:ac:07:2d:31:2b:67:0d:68:26:5e:d0:56:f6:47: df:ba:ad:18:56:ba:6b:35:cf:b5:3a:33:9a:b0:e2:20: 34:14:d8:17:55:ca:f7:a9:6e:6f:ad:fd:6a:74:f9:a7: 9d:32:d7:9e:4d:91:80:19:7a:55:e6:40:a7:8d:14:a4: d8:f6:ae:75:c5:67:b4:88:a2:23:88:ea:ce:4c:da:8c: ac:0d:6f:dd:01:71:58:61:e7:fd:7c:e8:54:b2:da:46: 7c:0f:93:46:45:c1:02:29:40:90:74:13:e5:4d:8a:6c: 77:f2:16:84:59:52:aa:c3:dd:cb:68:d3:29:f6:56:3f: 07:d1:70:38:db:d3:c2:36:dc:be:5b:7e:2b:38:1a:76: f2:0c:62:bc:ee:96:da:f8:66:4c:ed:de:c1:94:28:1b: 68:43:7a:7e:14:cb:ac:f6:36:e3:83:cd:2f:76:af:c4: b7:ca:e7:cd:96:89:67:8b:50:98:a9:46:b9:1e:61:e7: a4:f5:3e:e0:df:ba:80:7b:4a:cd:6b:92:d0:dd:56:f7 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:46:95:60:68:d5:77:6a:e3:d2:1f:0b:10: 36:6f:0c:84:84:f7:4f:3b:f6:e3:b7:54:cd:03:bf:ba: 02:1d:00:e5:74:97:e5:45:07:76:95:83:e2:c3:4d:9e: de:8a:e5:4a:cf:2e:a5:a1:d9:8d:b2:57:aa:09:f1 Fingerprint (SHA-256): 0A:C1:2B:12:85:4F:E7:0E:57:63:6A:23:DD:9F:EB:0F:C2:DB:27:49:26:14:AB:4D:C1:33:5C:31:A3:96:77:6B Fingerprint (SHA1): 8A:2E:B2:4A:10:1D:B5:88:6B:CD:07:45:3A:6F:EC:97:B3:71:44:85 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #865: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165077 (0x3caff755) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:58:30 2023 Not After : Wed Oct 18 16:58:30 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 72:e7:38:d2:80:4c:13:db:ce:43:f0:27:4c:f0:97:26: 76:3a:33:69:9c:0b:a4:a6:c1:9d:8e:c9:91:2a:40:c3: c8:24:4e:8e:94:b4:0a:31:65:0a:4d:26:da:77:5a:34: 79:06:ac:07:2d:31:2b:67:0d:68:26:5e:d0:56:f6:47: df:ba:ad:18:56:ba:6b:35:cf:b5:3a:33:9a:b0:e2:20: 34:14:d8:17:55:ca:f7:a9:6e:6f:ad:fd:6a:74:f9:a7: 9d:32:d7:9e:4d:91:80:19:7a:55:e6:40:a7:8d:14:a4: d8:f6:ae:75:c5:67:b4:88:a2:23:88:ea:ce:4c:da:8c: ac:0d:6f:dd:01:71:58:61:e7:fd:7c:e8:54:b2:da:46: 7c:0f:93:46:45:c1:02:29:40:90:74:13:e5:4d:8a:6c: 77:f2:16:84:59:52:aa:c3:dd:cb:68:d3:29:f6:56:3f: 07:d1:70:38:db:d3:c2:36:dc:be:5b:7e:2b:38:1a:76: f2:0c:62:bc:ee:96:da:f8:66:4c:ed:de:c1:94:28:1b: 68:43:7a:7e:14:cb:ac:f6:36:e3:83:cd:2f:76:af:c4: b7:ca:e7:cd:96:89:67:8b:50:98:a9:46:b9:1e:61:e7: a4:f5:3e:e0:df:ba:80:7b:4a:cd:6b:92:d0:dd:56:f7 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:46:95:60:68:d5:77:6a:e3:d2:1f:0b:10: 36:6f:0c:84:84:f7:4f:3b:f6:e3:b7:54:cd:03:bf:ba: 02:1d:00:e5:74:97:e5:45:07:76:95:83:e2:c3:4d:9e: de:8a:e5:4a:cf:2e:a5:a1:d9:8d:b2:57:aa:09:f1 Fingerprint (SHA-256): 0A:C1:2B:12:85:4F:E7:0E:57:63:6A:23:DD:9F:EB:0F:C2:DB:27:49:26:14:AB:4D:C1:33:5C:31:A3:96:77:6B Fingerprint (SHA1): 8A:2E:B2:4A:10:1D:B5:88:6B:CD:07:45:3A:6F:EC:97:B3:71:44:85 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #866: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165077 (0x3caff755) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:58:30 2023 Not After : Wed Oct 18 16:58:30 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 72:e7:38:d2:80:4c:13:db:ce:43:f0:27:4c:f0:97:26: 76:3a:33:69:9c:0b:a4:a6:c1:9d:8e:c9:91:2a:40:c3: c8:24:4e:8e:94:b4:0a:31:65:0a:4d:26:da:77:5a:34: 79:06:ac:07:2d:31:2b:67:0d:68:26:5e:d0:56:f6:47: df:ba:ad:18:56:ba:6b:35:cf:b5:3a:33:9a:b0:e2:20: 34:14:d8:17:55:ca:f7:a9:6e:6f:ad:fd:6a:74:f9:a7: 9d:32:d7:9e:4d:91:80:19:7a:55:e6:40:a7:8d:14:a4: d8:f6:ae:75:c5:67:b4:88:a2:23:88:ea:ce:4c:da:8c: ac:0d:6f:dd:01:71:58:61:e7:fd:7c:e8:54:b2:da:46: 7c:0f:93:46:45:c1:02:29:40:90:74:13:e5:4d:8a:6c: 77:f2:16:84:59:52:aa:c3:dd:cb:68:d3:29:f6:56:3f: 07:d1:70:38:db:d3:c2:36:dc:be:5b:7e:2b:38:1a:76: f2:0c:62:bc:ee:96:da:f8:66:4c:ed:de:c1:94:28:1b: 68:43:7a:7e:14:cb:ac:f6:36:e3:83:cd:2f:76:af:c4: b7:ca:e7:cd:96:89:67:8b:50:98:a9:46:b9:1e:61:e7: a4:f5:3e:e0:df:ba:80:7b:4a:cd:6b:92:d0:dd:56:f7 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3d:02:1c:46:95:60:68:d5:77:6a:e3:d2:1f:0b:10: 36:6f:0c:84:84:f7:4f:3b:f6:e3:b7:54:cd:03:bf:ba: 02:1d:00:e5:74:97:e5:45:07:76:95:83:e2:c3:4d:9e: de:8a:e5:4a:cf:2e:a5:a1:d9:8d:b2:57:aa:09:f1 Fingerprint (SHA-256): 0A:C1:2B:12:85:4F:E7:0E:57:63:6A:23:DD:9F:EB:0F:C2:DB:27:49:26:14:AB:4D:C1:33:5C:31:A3:96:77:6B Fingerprint (SHA1): 8A:2E:B2:4A:10:1D:B5:88:6B:CD:07:45:3A:6F:EC:97:B3:71:44:85 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #867: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #868: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #869: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #870: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #871: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #872: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #873: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #874: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #875: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #876: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #877: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #878: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #879: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #880: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #881: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #882: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #883: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #884: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #885: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #886: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #887: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #888: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #889: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #890: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #891: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #892: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #893: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #894: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018165915Z nextupdate=20241018165915Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 16:59:15 2023 Next Update: Fri Oct 18 16:59:15 2024 CRL Extensions: chains.sh: #895: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018165915Z nextupdate=20241018165915Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 16:59:15 2023 Next Update: Fri Oct 18 16:59:15 2024 CRL Extensions: chains.sh: #896: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018165916Z nextupdate=20241018165916Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 16:59:16 2023 Next Update: Fri Oct 18 16:59:16 2024 CRL Extensions: chains.sh: #897: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018165917Z nextupdate=20241018165917Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 16:59:17 2023 Next Update: Fri Oct 18 16:59:17 2024 CRL Extensions: chains.sh: #898: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018165918Z addcert 14 20231018165918Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 16:59:18 2023 Next Update: Fri Oct 18 16:59:16 2024 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Wed Oct 18 16:59:18 2023 CRL Extensions: chains.sh: #899: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018165919Z addcert 15 20231018165919Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 16:59:19 2023 Next Update: Fri Oct 18 16:59:15 2024 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Wed Oct 18 16:59:19 2023 CRL Extensions: chains.sh: #900: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #901: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #902: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #903: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #904: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #905: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #906: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #907: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #908: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #909: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:58:55 2023 Not After : Wed Oct 18 16:58:55 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:52:46:bd:4d:f0:d0:11:3a:2d:78:5b:63:95:b1:32: 02:b5:c7:a0:79:0b:70:c3:0e:e0:30:25:1b:fc:c5:24: 65:3a:df:bc:59:be:0e:79:01:fb:9d:f2:9a:ab:d8:59: cf:0d:42:0c:fd:18:aa:31:0a:5c:d7:cd:d3:25:a6:28: 4c:3e:33:84:cc:30:d0:b4:a1:eb:d5:19:50:b0:15:e2: 0d:81:ac:54:09:8e:5a:6e:9c:13:78:3b:95:f6:6e:c9: 71:e9:21:dc:47:19:8b:36:39:52:a2:d5:67:d6:8d:51: 29:18:4d:d0:71:92:2f:97:07:6a:c7:d1:71:d0:91:4b: 89:f6:de:86:f0:40:65:00:bf:71:cd:c6:44:90:a8:30: 9c:06:5a:13:df:c1:56:fd:67:a3:73:e5:40:b9:04:8a: d9:7c:30:82:4e:1c:47:18:a5:58:9a:cb:38:09:bc:df: f7:4a:60:9c:c9:0b:06:78:79:a2:1d:33:73:60:08:ba: 8e:dd:31:5f:54:ec:47:ca:4f:7c:36:44:dc:52:a2:dc: 1a:1f:aa:29:f1:48:76:b9:f3:5f:fb:b9:b7:4c:f8:5b: 8e:37:05:d3:c6:90:36:ac:ec:62:d5:7c:e9:b1:bd:d3: fa:23:f1:e0:b7:06:7f:76:63:ee:08:71:b2:4f:c7:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3b:a8:8b:ec:a4:da:d1:63:93:65:d9:48:d7:c0:74:89: 86:3a:37:d4:df:ab:2a:5d:92:0d:99:70:0a:38:9d:04: e5:40:ca:d0:86:87:83:ad:60:f8:fe:60:4d:01:3c:b0: 2e:c4:c0:d9:56:b5:2b:e1:0a:9a:19:65:fb:81:01:63: 5a:40:bb:c1:61:f2:4c:79:35:4f:dc:f2:1d:39:8d:bc: fc:30:d9:60:21:d0:0e:4a:37:99:20:81:30:9c:ac:0f: 18:a6:b1:23:3a:f8:2c:1e:2b:56:f8:51:dd:06:24:fa: af:1c:68:da:8b:1b:88:8f:21:75:b8:10:9f:51:4b:9f: fa:67:2f:38:b9:f5:bd:44:c0:3c:15:69:ad:90:6c:b2: 01:4f:c4:0f:10:20:c5:41:eb:80:0c:ee:22:3f:71:ef: 8e:c8:a7:0a:ff:70:92:7c:ce:82:04:58:3d:cb:91:96: de:3c:b6:4a:91:63:e7:8e:16:c6:62:ca:23:35:6b:91: db:62:29:58:ac:52:c4:53:5b:9b:2e:c3:24:38:75:d7: 01:6c:16:8b:86:75:a3:10:84:68:cd:29:c7:7c:10:05: e7:10:d8:fb:8f:60:d8:5d:6b:3b:97:f4:2b:61:4d:37: b1:dd:bc:90:3b:fd:41:ee:0e:73:95:f9:71:fd:7c:53 Fingerprint (SHA-256): E1:B9:97:12:6C:4C:F7:14:BE:03:35:10:24:1E:A5:9D:45:BD:D4:CA:FB:2D:B1:9B:9A:1C:CA:20:0C:4A:A9:78 Fingerprint (SHA1): F4:E3:1D:A2:95:D8:78:43:61:50:94:B3:F8:FA:C5:FD:16:1A:FD:5D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #910: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #911: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:58:55 2023 Not After : Wed Oct 18 16:58:55 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cd:52:46:bd:4d:f0:d0:11:3a:2d:78:5b:63:95:b1:32: 02:b5:c7:a0:79:0b:70:c3:0e:e0:30:25:1b:fc:c5:24: 65:3a:df:bc:59:be:0e:79:01:fb:9d:f2:9a:ab:d8:59: cf:0d:42:0c:fd:18:aa:31:0a:5c:d7:cd:d3:25:a6:28: 4c:3e:33:84:cc:30:d0:b4:a1:eb:d5:19:50:b0:15:e2: 0d:81:ac:54:09:8e:5a:6e:9c:13:78:3b:95:f6:6e:c9: 71:e9:21:dc:47:19:8b:36:39:52:a2:d5:67:d6:8d:51: 29:18:4d:d0:71:92:2f:97:07:6a:c7:d1:71:d0:91:4b: 89:f6:de:86:f0:40:65:00:bf:71:cd:c6:44:90:a8:30: 9c:06:5a:13:df:c1:56:fd:67:a3:73:e5:40:b9:04:8a: d9:7c:30:82:4e:1c:47:18:a5:58:9a:cb:38:09:bc:df: f7:4a:60:9c:c9:0b:06:78:79:a2:1d:33:73:60:08:ba: 8e:dd:31:5f:54:ec:47:ca:4f:7c:36:44:dc:52:a2:dc: 1a:1f:aa:29:f1:48:76:b9:f3:5f:fb:b9:b7:4c:f8:5b: 8e:37:05:d3:c6:90:36:ac:ec:62:d5:7c:e9:b1:bd:d3: fa:23:f1:e0:b7:06:7f:76:63:ee:08:71:b2:4f:c7:93 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3b:a8:8b:ec:a4:da:d1:63:93:65:d9:48:d7:c0:74:89: 86:3a:37:d4:df:ab:2a:5d:92:0d:99:70:0a:38:9d:04: e5:40:ca:d0:86:87:83:ad:60:f8:fe:60:4d:01:3c:b0: 2e:c4:c0:d9:56:b5:2b:e1:0a:9a:19:65:fb:81:01:63: 5a:40:bb:c1:61:f2:4c:79:35:4f:dc:f2:1d:39:8d:bc: fc:30:d9:60:21:d0:0e:4a:37:99:20:81:30:9c:ac:0f: 18:a6:b1:23:3a:f8:2c:1e:2b:56:f8:51:dd:06:24:fa: af:1c:68:da:8b:1b:88:8f:21:75:b8:10:9f:51:4b:9f: fa:67:2f:38:b9:f5:bd:44:c0:3c:15:69:ad:90:6c:b2: 01:4f:c4:0f:10:20:c5:41:eb:80:0c:ee:22:3f:71:ef: 8e:c8:a7:0a:ff:70:92:7c:ce:82:04:58:3d:cb:91:96: de:3c:b6:4a:91:63:e7:8e:16:c6:62:ca:23:35:6b:91: db:62:29:58:ac:52:c4:53:5b:9b:2e:c3:24:38:75:d7: 01:6c:16:8b:86:75:a3:10:84:68:cd:29:c7:7c:10:05: e7:10:d8:fb:8f:60:d8:5d:6b:3b:97:f4:2b:61:4d:37: b1:dd:bc:90:3b:fd:41:ee:0e:73:95:f9:71:fd:7c:53 Fingerprint (SHA-256): E1:B9:97:12:6C:4C:F7:14:BE:03:35:10:24:1E:A5:9D:45:BD:D4:CA:FB:2D:B1:9B:9A:1C:CA:20:0C:4A:A9:78 Fingerprint (SHA1): F4:E3:1D:A2:95:D8:78:43:61:50:94:B3:F8:FA:C5:FD:16:1A:FD:5D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #912: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #913: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #914: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165086 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #915: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #916: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #917: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #918: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1018165087 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #919: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #920: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #921: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018164962.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #922: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018164946.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #923: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #924: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #925: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018164962.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #926: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1018165088 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #927: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #928: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #929: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018164962.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #930: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018164947.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #931: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #932: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #933: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #934: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1018165089 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #935: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #936: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #937: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018164962.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #938: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018164948.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #939: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #940: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #941: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018164962.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #942: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018164949.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #943: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #944: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018165948Z nextupdate=20241018165948Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 16:59:48 2023 Next Update: Fri Oct 18 16:59:48 2024 CRL Extensions: chains.sh: #945: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018165949Z nextupdate=20241018165949Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 16:59:49 2023 Next Update: Fri Oct 18 16:59:49 2024 CRL Extensions: chains.sh: #946: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018165950Z nextupdate=20241018165950Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 16:59:50 2023 Next Update: Fri Oct 18 16:59:50 2024 CRL Extensions: chains.sh: #947: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018165950Z nextupdate=20241018165950Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 16:59:50 2023 Next Update: Fri Oct 18 16:59:50 2024 CRL Extensions: chains.sh: #948: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018165951Z addcert 20 20231018165951Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 16:59:51 2023 Next Update: Fri Oct 18 16:59:49 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 16:59:51 2023 CRL Extensions: chains.sh: #949: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018165952Z addcert 40 20231018165952Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 16:59:52 2023 Next Update: Fri Oct 18 16:59:49 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 16:59:51 2023 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Wed Oct 18 16:59:52 2023 CRL Extensions: chains.sh: #950: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #951: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #952: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #953: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165086 (0x3caff75e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:59:26 2023 Not After : Wed Oct 18 16:59:26 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:9b:5e:31:47:f7:32:6d:03:24:f9:69:ae:64:ea:4d: 6d:19:7b:1f:7e:5b:76:dc:d5:18:42:f1:c3:03:74:db: 72:96:29:96:37:69:30:6f:e2:bd:1d:67:8f:01:aa:c1: 83:fa:24:f2:25:b9:4a:48:30:4d:0a:e5:ca:b2:d5:8e: c0:68:00:6c:7b:2c:cb:e4:d4:de:a8:18:77:2e:72:9a: 03:70:34:9b:b2:fd:9e:de:dc:77:86:4b:0d:3d:d6:e0: 87:58:fc:1e:1b:44:e8:b1:ad:5d:98:31:40:9c:8e:eb: 07:9a:74:00:8d:99:80:2c:61:6d:22:49:b4:fa:4b:53: be:ef:3a:2f:a2:96:f9:ff:b1:32:96:b4:1e:6a:8e:6b: a0:6e:39:dd:eb:10:95:41:fb:b9:19:c2:c6:68:f0:6e: 29:4a:e9:2c:18:67:5e:f0:0e:9d:8b:8c:f2:52:28:21: 05:ed:bb:0f:73:87:a2:62:a3:1d:36:94:43:65:2d:a2: 07:4e:6b:33:4b:93:e5:e9:3c:dd:01:52:72:49:f7:aa: a1:7a:52:42:68:38:ff:6f:1b:86:03:b1:9d:53:cd:c0: 7e:a5:b4:a1:24:d2:cc:b3:b3:7a:f9:e3:25:d0:26:53: 43:d1:62:5a:4d:ee:2d:9a:74:e6:10:47:ba:0e:09:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:27:a6:12:67:0a:95:e9:20:0e:f9:d0:a4:f3:ed:84: 55:69:ad:26:b0:05:89:3f:77:5c:1c:b0:21:d6:9a:cd: a9:8a:51:99:8b:dd:03:f6:ac:78:15:ba:2b:e6:a2:64: 9a:b6:fa:55:10:9b:e5:0e:47:b2:9e:59:d2:57:00:78: fe:09:c0:03:64:04:8e:8d:ac:45:de:3a:94:17:ab:23: 2d:de:5e:a1:de:e2:d0:84:a1:65:4b:b3:b3:0a:c6:a5: 5a:64:07:5c:36:0a:30:cf:20:42:1a:e7:04:bf:c6:74: 1c:4f:66:0a:c3:81:df:9c:d9:23:b4:6d:de:61:38:d8: c8:62:65:61:7e:2b:11:fd:8f:2d:c5:21:a0:4e:49:3a: bc:57:3f:70:54:15:54:0d:2d:69:8a:d0:e0:eb:68:2c: 52:1b:fa:42:d7:2b:07:6b:92:92:66:eb:96:bd:26:4f: 21:af:74:b7:d4:c9:48:3a:8b:5c:5b:e8:60:45:e6:15: 6e:2b:17:3a:62:e2:bf:7f:a7:0f:09:58:37:ef:7c:63: 43:f8:3e:83:28:bc:2c:d1:c6:6f:4a:2b:0f:8f:22:ca: 5f:a2:c3:2a:1e:53:97:d1:08:14:82:de:46:be:87:a4: 25:37:89:4c:d4:1d:65:47:ce:77:59:00:1f:1f:11:77 Fingerprint (SHA-256): 7B:C1:17:39:FF:6F:8F:F7:0A:D4:BE:81:45:D9:AA:10:E4:03:97:45:3D:47:97:37:A2:24:4B:B3:F8:33:C5:1D Fingerprint (SHA1): C7:88:22:94:79:8A:41:23:67:24:D0:79:5F:AE:59:9C:60:19:DC:A4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #954: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #955: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165086 (0x3caff75e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 16:59:26 2023 Not After : Wed Oct 18 16:59:26 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c4:9b:5e:31:47:f7:32:6d:03:24:f9:69:ae:64:ea:4d: 6d:19:7b:1f:7e:5b:76:dc:d5:18:42:f1:c3:03:74:db: 72:96:29:96:37:69:30:6f:e2:bd:1d:67:8f:01:aa:c1: 83:fa:24:f2:25:b9:4a:48:30:4d:0a:e5:ca:b2:d5:8e: c0:68:00:6c:7b:2c:cb:e4:d4:de:a8:18:77:2e:72:9a: 03:70:34:9b:b2:fd:9e:de:dc:77:86:4b:0d:3d:d6:e0: 87:58:fc:1e:1b:44:e8:b1:ad:5d:98:31:40:9c:8e:eb: 07:9a:74:00:8d:99:80:2c:61:6d:22:49:b4:fa:4b:53: be:ef:3a:2f:a2:96:f9:ff:b1:32:96:b4:1e:6a:8e:6b: a0:6e:39:dd:eb:10:95:41:fb:b9:19:c2:c6:68:f0:6e: 29:4a:e9:2c:18:67:5e:f0:0e:9d:8b:8c:f2:52:28:21: 05:ed:bb:0f:73:87:a2:62:a3:1d:36:94:43:65:2d:a2: 07:4e:6b:33:4b:93:e5:e9:3c:dd:01:52:72:49:f7:aa: a1:7a:52:42:68:38:ff:6f:1b:86:03:b1:9d:53:cd:c0: 7e:a5:b4:a1:24:d2:cc:b3:b3:7a:f9:e3:25:d0:26:53: 43:d1:62:5a:4d:ee:2d:9a:74:e6:10:47:ba:0e:09:0b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 46:27:a6:12:67:0a:95:e9:20:0e:f9:d0:a4:f3:ed:84: 55:69:ad:26:b0:05:89:3f:77:5c:1c:b0:21:d6:9a:cd: a9:8a:51:99:8b:dd:03:f6:ac:78:15:ba:2b:e6:a2:64: 9a:b6:fa:55:10:9b:e5:0e:47:b2:9e:59:d2:57:00:78: fe:09:c0:03:64:04:8e:8d:ac:45:de:3a:94:17:ab:23: 2d:de:5e:a1:de:e2:d0:84:a1:65:4b:b3:b3:0a:c6:a5: 5a:64:07:5c:36:0a:30:cf:20:42:1a:e7:04:bf:c6:74: 1c:4f:66:0a:c3:81:df:9c:d9:23:b4:6d:de:61:38:d8: c8:62:65:61:7e:2b:11:fd:8f:2d:c5:21:a0:4e:49:3a: bc:57:3f:70:54:15:54:0d:2d:69:8a:d0:e0:eb:68:2c: 52:1b:fa:42:d7:2b:07:6b:92:92:66:eb:96:bd:26:4f: 21:af:74:b7:d4:c9:48:3a:8b:5c:5b:e8:60:45:e6:15: 6e:2b:17:3a:62:e2:bf:7f:a7:0f:09:58:37:ef:7c:63: 43:f8:3e:83:28:bc:2c:d1:c6:6f:4a:2b:0f:8f:22:ca: 5f:a2:c3:2a:1e:53:97:d1:08:14:82:de:46:be:87:a4: 25:37:89:4c:d4:1d:65:47:ce:77:59:00:1f:1f:11:77 Fingerprint (SHA-256): 7B:C1:17:39:FF:6F:8F:F7:0A:D4:BE:81:45:D9:AA:10:E4:03:97:45:3D:47:97:37:A2:24:4B:B3:F8:33:C5:1D Fingerprint (SHA1): C7:88:22:94:79:8A:41:23:67:24:D0:79:5F:AE:59:9C:60:19:DC:A4 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #956: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #957: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #958: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165090 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #959: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #960: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #961: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #962: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018165091 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #963: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #964: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #965: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #966: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018165092 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #967: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #968: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #969: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #970: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1018165093 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #971: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #972: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #973: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165094 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #974: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #975: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #976: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #977: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1018165095 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #978: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #979: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #980: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #981: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1018165096 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #982: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #983: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #984: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #985: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #986: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165090 (0x3caff762) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 16:59:57 2023 Not After : Wed Oct 18 16:59:57 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:18:2c:d2:6b:32:e4:1a:82:62:a4:d6:a2:8b:29:b8: 99:3c:0d:00:96:40:d8:b5:8e:f9:82:0f:bc:50:9c:0b: 08:e6:fe:9d:a4:46:13:67:56:13:ec:12:4b:b2:b9:98: 87:cf:22:40:c4:5f:dc:9c:8a:ef:2c:dd:e0:72:44:77: ef:92:29:15:7d:57:b1:c2:c4:f5:5c:cc:cc:7b:38:48: 8a:d2:bb:df:38:29:ca:7f:6c:fe:39:51:58:e0:7a:15: 02:fc:27:1a:44:7a:ab:c2:5b:fc:d3:6c:bf:38:12:f1: f6:4e:95:dc:2c:6f:c2:7a:61:28:ba:47:9a:c7:df:df: f1:74:37:37:09:3b:18:cd:30:62:59:7c:a9:e9:81:01: ea:cf:29:1c:e8:dd:ab:12:be:54:5e:56:1c:f4:22:11: 43:7b:ed:0e:fa:bc:73:e3:51:7c:16:4e:57:67:d9:bc: 45:4e:e0:a2:ab:fb:ed:93:ed:c5:3b:fd:29:b0:aa:7f: ae:d6:e8:5e:10:e1:9f:02:e2:5e:6a:e4:52:fa:15:e8: 75:b2:bc:20:68:a2:aa:2f:9f:82:02:e1:ae:2c:3a:38: 0f:9c:d6:37:ee:91:a3:53:ca:cc:fb:af:4a:84:b8:82: 07:fa:0e:f6:c5:da:f1:8b:c5:48:24:62:68:4e:c0:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:3f:a7:b4:3b:fe:7d:2a:ed:b1:f6:ed:81:bf:bd:f9: fa:b1:63:91:88:29:de:33:c9:d7:b9:b6:c8:bb:18:f5: a9:83:3a:62:e7:10:26:63:d1:4b:e6:53:d4:ae:f7:0f: b7:4a:f6:8e:cd:95:a6:1d:c2:d4:34:e5:de:c4:5b:39: b8:29:b3:c7:10:3d:92:92:c1:00:7f:d2:e8:0e:6c:81: 1a:5a:21:4a:e9:b8:fd:9d:15:a8:d4:60:0a:49:be:8b: e7:ca:23:6f:48:97:99:05:b5:16:8e:2f:61:a4:f3:32: 07:41:eb:02:e9:47:5d:cd:16:2f:44:78:77:f9:d3:96: 29:95:36:83:7b:fe:cf:40:52:61:3f:ee:8d:d3:22:90: d8:bf:9a:88:48:04:d7:c4:50:9b:f6:79:5c:68:ca:e3: df:a5:ed:3b:d0:62:2c:9c:40:0c:d7:d2:9d:b7:ed:7d: 26:92:2b:a8:20:f2:c8:84:2e:6f:f7:c1:0b:1f:af:d6: 16:a4:2c:0c:6f:39:b9:5b:03:cb:84:54:41:02:31:4c: f9:a8:9d:3e:b0:14:e8:12:40:71:ae:1b:39:0d:11:bf: 1c:ba:f3:e1:48:d7:09:04:b8:25:d5:a4:20:f7:b0:b3: d5:5f:3c:c6:9c:8a:e1:1f:3f:f6:74:4d:51:ca:96:d9 Fingerprint (SHA-256): F6:11:B8:B4:7D:86:1C:27:08:21:C7:DA:EA:54:C5:39:52:EC:2F:5F:FB:E5:86:AC:1A:66:BD:6C:81:66:4F:A3 Fingerprint (SHA1): 74:9D:61:34:0B:30:BB:DD:CE:AD:C7:86:F2:90:C7:E5:A6:F5:82:AA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #987: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165092 (0x3caff764) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:00:04 2023 Not After : Wed Oct 18 17:00:04 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:1d:09:d2:5b:3b:e5:d2:c6:db:ca:c1:36:15:fe:c0: ba:c5:50:84:2a:04:b0:3d:6a:89:66:30:82:ef:ab:91: ee:89:89:00:00:80:6e:2f:33:62:cc:5a:86:87:75:8c: be:a9:04:33:a0:c2:4f:c5:5a:4e:58:fa:2d:6b:c2:a2: de:74:47:eb:4a:19:0d:42:ef:f6:3b:19:34:28:24:51: 96:0d:14:3f:c3:f7:2b:4b:80:5d:75:25:ff:09:57:15: c8:2d:7c:28:f2:f5:ec:71:c2:5b:4c:aa:03:0d:1d:e8: 67:ae:0c:0d:c3:b5:43:c6:ba:29:ab:91:5d:2e:19:88: 8e:d1:7b:45:3d:0c:94:5c:60:43:bc:49:42:04:b1:35: 30:8f:3b:56:48:c8:39:2c:c4:cf:ea:73:bf:65:ce:0e: a4:7f:25:00:02:8a:cb:ed:4a:77:24:d6:cd:62:b3:85: bf:8f:43:a9:4b:7c:04:23:58:26:72:60:a8:1f:78:0d: 17:47:4d:48:0d:14:62:b8:2b:10:d7:1a:cd:a7:dc:c2: 06:14:56:0e:89:06:72:a6:02:22:3e:0c:31:18:59:f3: f6:b6:8e:f8:7e:95:f4:a3:7e:e0:eb:56:95:53:f5:64: 75:e9:f2:7d:6d:44:1d:49:60:65:e1:4c:ba:53:01:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d1:bf:b1:14:d0:a6:d9:60:ad:da:02:64:55:74:ac:f2: e0:2b:6c:78:f8:3f:c5:d4:4c:e3:0e:c1:84:a2:45:1b: dc:69:73:e1:55:81:30:68:03:af:5d:e8:a8:f1:94:86: 40:77:a5:3a:23:e9:f2:40:14:84:97:18:86:c0:97:23: 3e:ee:23:3f:5c:d7:75:90:d0:71:27:5a:bc:7f:ec:bc: 8c:a4:52:44:71:cf:92:80:2f:e8:35:44:62:3b:02:b3: c8:a0:11:66:35:47:ca:dc:88:12:52:65:26:40:74:9e: 42:4b:79:3f:9f:5c:6a:72:14:e8:82:14:d7:5a:fd:98: 65:08:9e:25:45:f8:b3:a7:86:ea:0c:fc:6d:04:1a:cc: 8a:15:34:08:4e:a7:c9:d8:87:09:8b:90:7f:22:b8:73: d6:62:fb:02:07:e3:3c:5c:46:bb:23:86:8c:a2:dc:da: b1:a4:18:f6:79:34:bf:69:b0:68:bd:76:fc:cc:c7:da: 58:17:0b:ea:0d:42:c6:42:6f:ed:a6:bd:a7:71:74:54: c9:f5:86:0c:75:db:dd:b6:8d:32:e7:24:34:21:d4:7f: d7:b6:3c:0c:c0:3b:41:ca:54:bb:5b:ab:3c:92:93:9e: 71:31:2d:0e:1f:ad:81:89:39:b3:40:73:8f:87:b7:9b Fingerprint (SHA-256): 50:3F:E2:5F:A6:1B:EB:B7:51:6B:C3:CC:7F:A4:38:27:26:B6:80:66:39:B3:FA:00:F1:2C:26:04:FA:B9:88:5E Fingerprint (SHA1): E2:B6:8B:65:25:D5:CB:1F:63:D7:CA:42:DF:C2:1E:D4:FA:A1:0D:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #988: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165090 (0x3caff762) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 16:59:57 2023 Not After : Wed Oct 18 16:59:57 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:18:2c:d2:6b:32:e4:1a:82:62:a4:d6:a2:8b:29:b8: 99:3c:0d:00:96:40:d8:b5:8e:f9:82:0f:bc:50:9c:0b: 08:e6:fe:9d:a4:46:13:67:56:13:ec:12:4b:b2:b9:98: 87:cf:22:40:c4:5f:dc:9c:8a:ef:2c:dd:e0:72:44:77: ef:92:29:15:7d:57:b1:c2:c4:f5:5c:cc:cc:7b:38:48: 8a:d2:bb:df:38:29:ca:7f:6c:fe:39:51:58:e0:7a:15: 02:fc:27:1a:44:7a:ab:c2:5b:fc:d3:6c:bf:38:12:f1: f6:4e:95:dc:2c:6f:c2:7a:61:28:ba:47:9a:c7:df:df: f1:74:37:37:09:3b:18:cd:30:62:59:7c:a9:e9:81:01: ea:cf:29:1c:e8:dd:ab:12:be:54:5e:56:1c:f4:22:11: 43:7b:ed:0e:fa:bc:73:e3:51:7c:16:4e:57:67:d9:bc: 45:4e:e0:a2:ab:fb:ed:93:ed:c5:3b:fd:29:b0:aa:7f: ae:d6:e8:5e:10:e1:9f:02:e2:5e:6a:e4:52:fa:15:e8: 75:b2:bc:20:68:a2:aa:2f:9f:82:02:e1:ae:2c:3a:38: 0f:9c:d6:37:ee:91:a3:53:ca:cc:fb:af:4a:84:b8:82: 07:fa:0e:f6:c5:da:f1:8b:c5:48:24:62:68:4e:c0:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:3f:a7:b4:3b:fe:7d:2a:ed:b1:f6:ed:81:bf:bd:f9: fa:b1:63:91:88:29:de:33:c9:d7:b9:b6:c8:bb:18:f5: a9:83:3a:62:e7:10:26:63:d1:4b:e6:53:d4:ae:f7:0f: b7:4a:f6:8e:cd:95:a6:1d:c2:d4:34:e5:de:c4:5b:39: b8:29:b3:c7:10:3d:92:92:c1:00:7f:d2:e8:0e:6c:81: 1a:5a:21:4a:e9:b8:fd:9d:15:a8:d4:60:0a:49:be:8b: e7:ca:23:6f:48:97:99:05:b5:16:8e:2f:61:a4:f3:32: 07:41:eb:02:e9:47:5d:cd:16:2f:44:78:77:f9:d3:96: 29:95:36:83:7b:fe:cf:40:52:61:3f:ee:8d:d3:22:90: d8:bf:9a:88:48:04:d7:c4:50:9b:f6:79:5c:68:ca:e3: df:a5:ed:3b:d0:62:2c:9c:40:0c:d7:d2:9d:b7:ed:7d: 26:92:2b:a8:20:f2:c8:84:2e:6f:f7:c1:0b:1f:af:d6: 16:a4:2c:0c:6f:39:b9:5b:03:cb:84:54:41:02:31:4c: f9:a8:9d:3e:b0:14:e8:12:40:71:ae:1b:39:0d:11:bf: 1c:ba:f3:e1:48:d7:09:04:b8:25:d5:a4:20:f7:b0:b3: d5:5f:3c:c6:9c:8a:e1:1f:3f:f6:74:4d:51:ca:96:d9 Fingerprint (SHA-256): F6:11:B8:B4:7D:86:1C:27:08:21:C7:DA:EA:54:C5:39:52:EC:2F:5F:FB:E5:86:AC:1A:66:BD:6C:81:66:4F:A3 Fingerprint (SHA1): 74:9D:61:34:0B:30:BB:DD:CE:AD:C7:86:F2:90:C7:E5:A6:F5:82:AA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #989: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #990: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165090 (0x3caff762) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 16:59:57 2023 Not After : Wed Oct 18 16:59:57 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:18:2c:d2:6b:32:e4:1a:82:62:a4:d6:a2:8b:29:b8: 99:3c:0d:00:96:40:d8:b5:8e:f9:82:0f:bc:50:9c:0b: 08:e6:fe:9d:a4:46:13:67:56:13:ec:12:4b:b2:b9:98: 87:cf:22:40:c4:5f:dc:9c:8a:ef:2c:dd:e0:72:44:77: ef:92:29:15:7d:57:b1:c2:c4:f5:5c:cc:cc:7b:38:48: 8a:d2:bb:df:38:29:ca:7f:6c:fe:39:51:58:e0:7a:15: 02:fc:27:1a:44:7a:ab:c2:5b:fc:d3:6c:bf:38:12:f1: f6:4e:95:dc:2c:6f:c2:7a:61:28:ba:47:9a:c7:df:df: f1:74:37:37:09:3b:18:cd:30:62:59:7c:a9:e9:81:01: ea:cf:29:1c:e8:dd:ab:12:be:54:5e:56:1c:f4:22:11: 43:7b:ed:0e:fa:bc:73:e3:51:7c:16:4e:57:67:d9:bc: 45:4e:e0:a2:ab:fb:ed:93:ed:c5:3b:fd:29:b0:aa:7f: ae:d6:e8:5e:10:e1:9f:02:e2:5e:6a:e4:52:fa:15:e8: 75:b2:bc:20:68:a2:aa:2f:9f:82:02:e1:ae:2c:3a:38: 0f:9c:d6:37:ee:91:a3:53:ca:cc:fb:af:4a:84:b8:82: 07:fa:0e:f6:c5:da:f1:8b:c5:48:24:62:68:4e:c0:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:3f:a7:b4:3b:fe:7d:2a:ed:b1:f6:ed:81:bf:bd:f9: fa:b1:63:91:88:29:de:33:c9:d7:b9:b6:c8:bb:18:f5: a9:83:3a:62:e7:10:26:63:d1:4b:e6:53:d4:ae:f7:0f: b7:4a:f6:8e:cd:95:a6:1d:c2:d4:34:e5:de:c4:5b:39: b8:29:b3:c7:10:3d:92:92:c1:00:7f:d2:e8:0e:6c:81: 1a:5a:21:4a:e9:b8:fd:9d:15:a8:d4:60:0a:49:be:8b: e7:ca:23:6f:48:97:99:05:b5:16:8e:2f:61:a4:f3:32: 07:41:eb:02:e9:47:5d:cd:16:2f:44:78:77:f9:d3:96: 29:95:36:83:7b:fe:cf:40:52:61:3f:ee:8d:d3:22:90: d8:bf:9a:88:48:04:d7:c4:50:9b:f6:79:5c:68:ca:e3: df:a5:ed:3b:d0:62:2c:9c:40:0c:d7:d2:9d:b7:ed:7d: 26:92:2b:a8:20:f2:c8:84:2e:6f:f7:c1:0b:1f:af:d6: 16:a4:2c:0c:6f:39:b9:5b:03:cb:84:54:41:02:31:4c: f9:a8:9d:3e:b0:14:e8:12:40:71:ae:1b:39:0d:11:bf: 1c:ba:f3:e1:48:d7:09:04:b8:25:d5:a4:20:f7:b0:b3: d5:5f:3c:c6:9c:8a:e1:1f:3f:f6:74:4d:51:ca:96:d9 Fingerprint (SHA-256): F6:11:B8:B4:7D:86:1C:27:08:21:C7:DA:EA:54:C5:39:52:EC:2F:5F:FB:E5:86:AC:1A:66:BD:6C:81:66:4F:A3 Fingerprint (SHA1): 74:9D:61:34:0B:30:BB:DD:CE:AD:C7:86:F2:90:C7:E5:A6:F5:82:AA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #991: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165092 (0x3caff764) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:00:04 2023 Not After : Wed Oct 18 17:00:04 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d2:1d:09:d2:5b:3b:e5:d2:c6:db:ca:c1:36:15:fe:c0: ba:c5:50:84:2a:04:b0:3d:6a:89:66:30:82:ef:ab:91: ee:89:89:00:00:80:6e:2f:33:62:cc:5a:86:87:75:8c: be:a9:04:33:a0:c2:4f:c5:5a:4e:58:fa:2d:6b:c2:a2: de:74:47:eb:4a:19:0d:42:ef:f6:3b:19:34:28:24:51: 96:0d:14:3f:c3:f7:2b:4b:80:5d:75:25:ff:09:57:15: c8:2d:7c:28:f2:f5:ec:71:c2:5b:4c:aa:03:0d:1d:e8: 67:ae:0c:0d:c3:b5:43:c6:ba:29:ab:91:5d:2e:19:88: 8e:d1:7b:45:3d:0c:94:5c:60:43:bc:49:42:04:b1:35: 30:8f:3b:56:48:c8:39:2c:c4:cf:ea:73:bf:65:ce:0e: a4:7f:25:00:02:8a:cb:ed:4a:77:24:d6:cd:62:b3:85: bf:8f:43:a9:4b:7c:04:23:58:26:72:60:a8:1f:78:0d: 17:47:4d:48:0d:14:62:b8:2b:10:d7:1a:cd:a7:dc:c2: 06:14:56:0e:89:06:72:a6:02:22:3e:0c:31:18:59:f3: f6:b6:8e:f8:7e:95:f4:a3:7e:e0:eb:56:95:53:f5:64: 75:e9:f2:7d:6d:44:1d:49:60:65:e1:4c:ba:53:01:5f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d1:bf:b1:14:d0:a6:d9:60:ad:da:02:64:55:74:ac:f2: e0:2b:6c:78:f8:3f:c5:d4:4c:e3:0e:c1:84:a2:45:1b: dc:69:73:e1:55:81:30:68:03:af:5d:e8:a8:f1:94:86: 40:77:a5:3a:23:e9:f2:40:14:84:97:18:86:c0:97:23: 3e:ee:23:3f:5c:d7:75:90:d0:71:27:5a:bc:7f:ec:bc: 8c:a4:52:44:71:cf:92:80:2f:e8:35:44:62:3b:02:b3: c8:a0:11:66:35:47:ca:dc:88:12:52:65:26:40:74:9e: 42:4b:79:3f:9f:5c:6a:72:14:e8:82:14:d7:5a:fd:98: 65:08:9e:25:45:f8:b3:a7:86:ea:0c:fc:6d:04:1a:cc: 8a:15:34:08:4e:a7:c9:d8:87:09:8b:90:7f:22:b8:73: d6:62:fb:02:07:e3:3c:5c:46:bb:23:86:8c:a2:dc:da: b1:a4:18:f6:79:34:bf:69:b0:68:bd:76:fc:cc:c7:da: 58:17:0b:ea:0d:42:c6:42:6f:ed:a6:bd:a7:71:74:54: c9:f5:86:0c:75:db:dd:b6:8d:32:e7:24:34:21:d4:7f: d7:b6:3c:0c:c0:3b:41:ca:54:bb:5b:ab:3c:92:93:9e: 71:31:2d:0e:1f:ad:81:89:39:b3:40:73:8f:87:b7:9b Fingerprint (SHA-256): 50:3F:E2:5F:A6:1B:EB:B7:51:6B:C3:CC:7F:A4:38:27:26:B6:80:66:39:B3:FA:00:F1:2C:26:04:FA:B9:88:5E Fingerprint (SHA1): E2:B6:8B:65:25:D5:CB:1F:63:D7:CA:42:DF:C2:1E:D4:FA:A1:0D:EB Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #992: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #993: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #994: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #995: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165090 (0x3caff762) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 16:59:57 2023 Not After : Wed Oct 18 16:59:57 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:18:2c:d2:6b:32:e4:1a:82:62:a4:d6:a2:8b:29:b8: 99:3c:0d:00:96:40:d8:b5:8e:f9:82:0f:bc:50:9c:0b: 08:e6:fe:9d:a4:46:13:67:56:13:ec:12:4b:b2:b9:98: 87:cf:22:40:c4:5f:dc:9c:8a:ef:2c:dd:e0:72:44:77: ef:92:29:15:7d:57:b1:c2:c4:f5:5c:cc:cc:7b:38:48: 8a:d2:bb:df:38:29:ca:7f:6c:fe:39:51:58:e0:7a:15: 02:fc:27:1a:44:7a:ab:c2:5b:fc:d3:6c:bf:38:12:f1: f6:4e:95:dc:2c:6f:c2:7a:61:28:ba:47:9a:c7:df:df: f1:74:37:37:09:3b:18:cd:30:62:59:7c:a9:e9:81:01: ea:cf:29:1c:e8:dd:ab:12:be:54:5e:56:1c:f4:22:11: 43:7b:ed:0e:fa:bc:73:e3:51:7c:16:4e:57:67:d9:bc: 45:4e:e0:a2:ab:fb:ed:93:ed:c5:3b:fd:29:b0:aa:7f: ae:d6:e8:5e:10:e1:9f:02:e2:5e:6a:e4:52:fa:15:e8: 75:b2:bc:20:68:a2:aa:2f:9f:82:02:e1:ae:2c:3a:38: 0f:9c:d6:37:ee:91:a3:53:ca:cc:fb:af:4a:84:b8:82: 07:fa:0e:f6:c5:da:f1:8b:c5:48:24:62:68:4e:c0:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:3f:a7:b4:3b:fe:7d:2a:ed:b1:f6:ed:81:bf:bd:f9: fa:b1:63:91:88:29:de:33:c9:d7:b9:b6:c8:bb:18:f5: a9:83:3a:62:e7:10:26:63:d1:4b:e6:53:d4:ae:f7:0f: b7:4a:f6:8e:cd:95:a6:1d:c2:d4:34:e5:de:c4:5b:39: b8:29:b3:c7:10:3d:92:92:c1:00:7f:d2:e8:0e:6c:81: 1a:5a:21:4a:e9:b8:fd:9d:15:a8:d4:60:0a:49:be:8b: e7:ca:23:6f:48:97:99:05:b5:16:8e:2f:61:a4:f3:32: 07:41:eb:02:e9:47:5d:cd:16:2f:44:78:77:f9:d3:96: 29:95:36:83:7b:fe:cf:40:52:61:3f:ee:8d:d3:22:90: d8:bf:9a:88:48:04:d7:c4:50:9b:f6:79:5c:68:ca:e3: df:a5:ed:3b:d0:62:2c:9c:40:0c:d7:d2:9d:b7:ed:7d: 26:92:2b:a8:20:f2:c8:84:2e:6f:f7:c1:0b:1f:af:d6: 16:a4:2c:0c:6f:39:b9:5b:03:cb:84:54:41:02:31:4c: f9:a8:9d:3e:b0:14:e8:12:40:71:ae:1b:39:0d:11:bf: 1c:ba:f3:e1:48:d7:09:04:b8:25:d5:a4:20:f7:b0:b3: d5:5f:3c:c6:9c:8a:e1:1f:3f:f6:74:4d:51:ca:96:d9 Fingerprint (SHA-256): F6:11:B8:B4:7D:86:1C:27:08:21:C7:DA:EA:54:C5:39:52:EC:2F:5F:FB:E5:86:AC:1A:66:BD:6C:81:66:4F:A3 Fingerprint (SHA1): 74:9D:61:34:0B:30:BB:DD:CE:AD:C7:86:F2:90:C7:E5:A6:F5:82:AA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #996: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165094 (0x3caff766) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 17:00:10 2023 Not After : Wed Oct 18 17:00:10 2073 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:42:cd:d7:d6:f0:cd:7e:d8:e9:08:c7:06:0e:aa:99: 74:cc:56:ad:ee:dc:18:2f:ad:73:9b:ea:eb:88:1a:35: 15:de:70:a2:07:fc:12:a1:dd:0b:31:e4:d7:2f:0a:8a: 23:37:8e:c2:75:60:2e:cd:03:61:f8:b1:45:54:36:b4: f8:d3:79:56:f4:23:a0:d6:52:0e:60:57:2b:03:05:57: 4d:e4:68:83:fe:8f:de:fd:02:bb:c4:7f:44:ec:92:f1: 7e:e1:71:6a:52:53:db:e8:18:86:c0:7b:6f:e7:cc:75: 95:3d:bc:e7:83:cc:45:58:66:24:7a:34:46:f4:bb:e3: fa:8a:fe:75:c4:d1:dc:98:d2:78:ea:2c:5e:0f:19:01: a4:f4:b8:31:5e:eb:73:f4:d9:e2:fb:1d:9a:55:fc:bd: f6:39:c0:e9:f2:02:58:4a:03:3b:54:e6:fe:9e:50:00: c4:c1:33:7e:b0:00:94:cf:2e:6d:03:ac:d1:b6:c1:27: 55:69:6e:3f:12:32:ae:0f:b3:42:b6:85:16:3c:47:55: 59:da:ff:0d:df:c0:5d:96:78:39:97:16:27:24:d3:fd: fa:52:90:4c:36:01:1e:41:d0:1b:e0:b5:90:8f:17:d2: d0:c7:47:94:45:67:c9:75:e3:25:b0:1d:33:78:e0:59 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: af:2b:b4:6a:4b:46:05:13:c1:0e:3d:ac:aa:48:ac:9a: a5:54:83:a4:67:50:0a:87:2b:0a:8a:87:e5:8f:ad:bb: 58:dc:0d:f5:2e:36:da:c3:dc:24:cf:8f:b6:46:42:96: fb:75:24:0d:4a:4b:27:0d:f2:7c:d2:41:dd:9c:14:b4: ea:f9:18:e1:bc:c8:54:94:d8:5a:f0:5d:06:d5:05:f8: dc:33:69:e0:8c:88:78:6f:83:43:19:8b:18:35:e5:22: 2a:2d:8f:5f:e5:fa:61:79:2a:6d:4e:6b:ec:d8:1e:cf: 52:88:36:77:95:4c:8e:d7:1b:d0:c2:01:dc:33:1f:c7: ce:32:c5:de:1d:2f:cf:11:e0:03:18:c4:ad:90:c8:96: 9d:85:5a:d1:de:de:ea:58:42:c7:e3:cb:6f:6a:df:f2: 34:b7:ca:d1:10:bc:f7:19:8b:64:dd:00:49:f0:b9:9f: 64:b6:d9:a5:62:8f:4b:9d:d3:90:df:44:25:95:d8:ff: f5:ab:3c:4c:0b:9b:a0:51:90:e9:24:34:69:68:fd:18: a3:43:09:9f:f4:60:56:cb:ca:11:84:13:c7:ff:44:a0: d8:c5:1b:8c:32:2b:de:e1:15:34:35:8f:51:b3:1e:c4: fa:68:f8:8e:e8:27:86:e3:98:b4:62:70:9d:d7:db:49 Fingerprint (SHA-256): 91:98:36:1A:FD:34:68:7D:07:D7:2C:5A:7F:41:50:9A:8A:CA:06:DE:E9:06:83:BF:FE:75:02:E2:F7:E6:69:40 Fingerprint (SHA1): 17:8C:CF:FA:3C:30:D9:80:59:86:AA:32:96:4F:7B:97:9A:CD:0E:53 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #997: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165090 (0x3caff762) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 16:59:57 2023 Not After : Wed Oct 18 16:59:57 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:18:2c:d2:6b:32:e4:1a:82:62:a4:d6:a2:8b:29:b8: 99:3c:0d:00:96:40:d8:b5:8e:f9:82:0f:bc:50:9c:0b: 08:e6:fe:9d:a4:46:13:67:56:13:ec:12:4b:b2:b9:98: 87:cf:22:40:c4:5f:dc:9c:8a:ef:2c:dd:e0:72:44:77: ef:92:29:15:7d:57:b1:c2:c4:f5:5c:cc:cc:7b:38:48: 8a:d2:bb:df:38:29:ca:7f:6c:fe:39:51:58:e0:7a:15: 02:fc:27:1a:44:7a:ab:c2:5b:fc:d3:6c:bf:38:12:f1: f6:4e:95:dc:2c:6f:c2:7a:61:28:ba:47:9a:c7:df:df: f1:74:37:37:09:3b:18:cd:30:62:59:7c:a9:e9:81:01: ea:cf:29:1c:e8:dd:ab:12:be:54:5e:56:1c:f4:22:11: 43:7b:ed:0e:fa:bc:73:e3:51:7c:16:4e:57:67:d9:bc: 45:4e:e0:a2:ab:fb:ed:93:ed:c5:3b:fd:29:b0:aa:7f: ae:d6:e8:5e:10:e1:9f:02:e2:5e:6a:e4:52:fa:15:e8: 75:b2:bc:20:68:a2:aa:2f:9f:82:02:e1:ae:2c:3a:38: 0f:9c:d6:37:ee:91:a3:53:ca:cc:fb:af:4a:84:b8:82: 07:fa:0e:f6:c5:da:f1:8b:c5:48:24:62:68:4e:c0:2f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 84:3f:a7:b4:3b:fe:7d:2a:ed:b1:f6:ed:81:bf:bd:f9: fa:b1:63:91:88:29:de:33:c9:d7:b9:b6:c8:bb:18:f5: a9:83:3a:62:e7:10:26:63:d1:4b:e6:53:d4:ae:f7:0f: b7:4a:f6:8e:cd:95:a6:1d:c2:d4:34:e5:de:c4:5b:39: b8:29:b3:c7:10:3d:92:92:c1:00:7f:d2:e8:0e:6c:81: 1a:5a:21:4a:e9:b8:fd:9d:15:a8:d4:60:0a:49:be:8b: e7:ca:23:6f:48:97:99:05:b5:16:8e:2f:61:a4:f3:32: 07:41:eb:02:e9:47:5d:cd:16:2f:44:78:77:f9:d3:96: 29:95:36:83:7b:fe:cf:40:52:61:3f:ee:8d:d3:22:90: d8:bf:9a:88:48:04:d7:c4:50:9b:f6:79:5c:68:ca:e3: df:a5:ed:3b:d0:62:2c:9c:40:0c:d7:d2:9d:b7:ed:7d: 26:92:2b:a8:20:f2:c8:84:2e:6f:f7:c1:0b:1f:af:d6: 16:a4:2c:0c:6f:39:b9:5b:03:cb:84:54:41:02:31:4c: f9:a8:9d:3e:b0:14:e8:12:40:71:ae:1b:39:0d:11:bf: 1c:ba:f3:e1:48:d7:09:04:b8:25:d5:a4:20:f7:b0:b3: d5:5f:3c:c6:9c:8a:e1:1f:3f:f6:74:4d:51:ca:96:d9 Fingerprint (SHA-256): F6:11:B8:B4:7D:86:1C:27:08:21:C7:DA:EA:54:C5:39:52:EC:2F:5F:FB:E5:86:AC:1A:66:BD:6C:81:66:4F:A3 Fingerprint (SHA1): 74:9D:61:34:0B:30:BB:DD:CE:AD:C7:86:F2:90:C7:E5:A6:F5:82:AA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #998: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #999: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1000: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1001: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1002: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1003: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165095 (0x3caff767) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 17:00:13 2023 Not After : Wed Oct 18 17:00:13 2028 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d6:a0:31:a5:80:4a:62:61:ee:28:9a:48:67:3d:01:cb: f3:0e:da:3c:8c:f6:2a:71:3a:03:7a:6a:95:f7:56:b7: b5:fb:74:1f:7a:40:ca:6a:b1:dd:f5:e0:6b:4d:86:79: d6:f2:23:ec:2a:f5:6c:f2:6d:2c:e0:fd:88:23:28:d5: 75:8f:87:b9:76:b6:bb:1f:51:4b:f0:01:e6:bf:28:33: a8:30:d1:c7:9e:be:4b:8f:71:f9:e7:bf:19:4d:56:f7: de:3c:0e:ea:cb:8e:46:54:d7:30:86:da:98:e9:b2:67: 3c:1d:e0:29:4f:a4:e3:8f:bc:50:fa:99:e0:8b:1b:1c: 39:e1:0a:22:58:2a:72:08:b0:df:87:76:c5:6c:54:a6: 2a:4b:bd:12:a4:88:6c:c0:cf:5f:5f:93:a4:3d:14:14: d5:ca:c9:de:ee:6b:7e:69:54:8d:b3:e3:52:dc:b2:0f: 3a:3f:a8:42:1d:bd:44:38:69:55:32:b7:cd:b9:27:a9: bc:64:a5:61:53:6a:c2:e9:00:8d:b9:b4:eb:c7:65:20: 35:2a:52:ff:ed:e2:82:b5:c2:ee:b7:33:e7:2e:c1:7a: cd:0a:e9:02:4b:5c:d9:32:ce:87:95:a5:49:76:15:38: 33:85:20:1a:db:f1:13:66:14:27:23:f0:d4:8e:6d:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:3d:cd:02:5e:61:62:8d:43:39:2a:7a:29:ee:86:40: c0:a8:df:ef:80:2a:f3:c2:68:1d:bc:08:af:db:36:ee: 74:3f:2f:e0:f0:d5:e3:b3:c8:17:67:e3:d5:a3:8b:3e: 91:fc:f0:b1:1f:cb:ee:4c:fe:4d:62:52:a1:7d:8b:98: 66:3f:ea:f7:10:22:a2:af:a6:fa:7d:a6:53:ca:d9:4d: f9:69:0f:4c:31:c1:00:80:5e:f1:62:de:ca:a1:87:fb: d9:ad:f3:33:ee:04:5e:4c:44:28:bb:36:1a:43:50:66: 19:ac:63:4d:52:fd:6e:28:e8:31:b6:ce:f5:77:07:55: 8f:f4:35:ac:5b:03:cb:e0:c0:46:94:50:5e:db:52:da: 42:66:36:2d:2f:d8:a7:e9:d5:ec:0a:18:80:91:d7:cd: a5:5c:78:a9:7a:84:c0:84:93:b8:d9:a3:e5:f4:f1:69: 25:b8:a5:e2:8a:bd:06:1e:8f:22:59:f1:e2:60:a4:26: 9d:ee:bc:15:ff:54:4b:2b:71:3f:34:74:4d:8e:9d:8d: 0a:64:fa:32:08:54:e7:be:9d:11:f5:29:8e:74:b9:fe: 59:22:21:cd:83:79:6b:0b:50:46:18:f4:94:bc:16:8b: 64:36:51:07:01:00:75:f8:b3:1c:33:c1:a7:73:86:2e Fingerprint (SHA-256): DE:6E:F3:A4:0B:65:DE:18:4D:76:28:2E:90:D2:0D:BD:7D:4F:73:A6:4C:A9:16:33:C4:BB:6F:9F:42:0A:81:B9 Fingerprint (SHA1): 00:BE:13:84:2B:4A:D1:2B:06:E0:60:51:75:9C:45:51:C4:D6:5F:09 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1004: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1005: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1006: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1007: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1008: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1009: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1010: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1011: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1012: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1013: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1014: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1015: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1016: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1017: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1018: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bar.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1019: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=site.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1020: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=Honest Achmed,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1021: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=OtherOrg,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1022: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1023: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=testfoo.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1024: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test3.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1025: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1026: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1027: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1028: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1029: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 10974 at Wed Oct 18 17:00:31 UTC 2023 kill -USR1 10974 httpserv: normal termination httpserv -b -p 10007 2>/dev/null; httpserv with PID 10974 killed at Wed Oct 18 17:00:31 UTC 2023 httpserv starting at Wed Oct 18 17:00:31 UTC 2023 httpserv -D -p 10007 \ -A OCSPRoot -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPRoot.crl -A OCSPCA1 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA1.crl \ -A OCSPCA2 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA2.crl -A OCSPCA3 -C /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/OCSPCA3.crl \ -O get-unknown -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/ -f /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/chains/OCSPD/ServerDB/dbpasswd \ -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/aiahttp/http_pid.17687 & trying to connect to httpserv at Wed Oct 18 17:00:31 UTC 2023 tstclnt -4 -p 10007 -h localhost.localdomain -q -v tstclnt: connecting to localhost.localdomain:10007 (address=127.0.0.1) tstclnt: exiting with return code 0 kill -0 23411 >/dev/null 2>/dev/null httpserv with PID 23411 found at Wed Oct 18 17:00:31 UTC 2023 httpserv with PID 23411 started at Wed Oct 18 17:00:31 UTC 2023 chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 vfychain -d trustanchorsDB -pp -vv -u 12 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1030: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 12 - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1031: Bridge: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165097 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1032: Bridge: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1033: Bridge: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1034: Bridge: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165098 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1035: Bridge: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1036: Bridge: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1037: Bridge: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1038: Bridge: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018165099 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1039: Bridge: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1040: Bridge: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018165100 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1041: Bridge: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1042: Bridge: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1043: Bridge: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1044: Bridge: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1045: Bridge: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserBridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i UserReq.der -o UserBridge.der -f BridgeDB/dbpasswd -m 1018165101 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1046: Bridge: Creating certficate UserBridge.der signed by Bridge - PASSED chains.sh: Importing certificate UserBridge.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserBridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1047: Bridge: Importing certificate UserBridge.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1048: Bridge: Creating DB AllDB - PASSED chains.sh: Importing certificate Army.der to AllDB database certutil -A -n Army -t "" -d AllDB -f AllDB/dbpasswd -i Army.der chains.sh: #1049: Bridge: Importing certificate Army.der to AllDB database - PASSED chains.sh: Importing certificate Navy.der to AllDB database certutil -A -n Navy -t "" -d AllDB -f AllDB/dbpasswd -i Navy.der chains.sh: #1050: Bridge: Importing certificate Navy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165098 (0x3caff76a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:00:37 2023 Not After : Wed Oct 18 17:00:37 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:fd:fd:f1:41:5b:c9:6c:7b:f2:9d:f2:88:87:57:15: d3:0c:26:79:f2:f6:5a:36:5a:b4:19:a5:d3:dc:07:4c: c7:1f:51:7d:0a:dc:fb:d5:ad:65:35:1e:90:a1:c4:72: ca:f2:05:2c:81:cb:ef:14:58:2d:3d:b0:68:e3:51:25: f2:96:8d:a9:73:1d:37:eb:84:c7:ab:39:fa:fd:a7:9c: 44:db:57:a2:35:76:05:ef:f8:43:aa:1d:de:a3:27:aa: 58:64:a3:b0:bd:87:69:59:1f:59:cf:bf:26:a3:ff:19: 65:41:41:11:db:d1:3b:5f:0c:18:06:e4:e8:40:2b:d4: dc:ad:a5:91:04:83:e5:77:00:25:0a:0f:01:07:a1:5b: 12:18:37:f0:f9:8d:db:26:26:7e:f6:21:e1:a8:33:4d: 33:a1:4b:a6:bf:35:95:a9:2f:32:11:f8:6e:f9:98:21: 98:63:a4:33:96:f2:8a:b2:a2:63:15:be:57:74:09:61: 6e:d5:50:b6:db:c9:92:78:81:43:09:6f:ea:e6:b4:7e: d4:10:a6:5d:1b:26:9a:47:0f:2d:cf:2a:ef:5f:f1:4e: 92:fa:8d:f4:9e:29:7b:0a:1c:e3:3c:0a:55:cb:83:1e: 81:96:66:b9:52:97:d6:81:9f:66:a1:c6:44:e4:e1:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:26:7e:b3:22:d2:2c:b0:80:dc:97:94:6b:2c:42:e6: 7f:52:a8:04:db:65:33:f7:f9:f0:77:7e:28:ec:b3:c3: 30:f0:77:69:a9:da:90:03:2d:6f:34:8c:60:e7:24:a2: ae:50:2c:c6:dc:9f:10:79:9c:9f:11:46:b0:76:a9:41: 27:16:53:7f:43:e4:2f:0f:24:3c:e4:d4:85:15:61:47: 0c:67:18:25:19:63:3a:63:10:3d:78:7d:ce:6a:4f:96: ff:3d:c8:e7:a8:4a:73:81:c1:57:a5:76:fe:95:99:f3: 1d:df:0a:8d:60:21:f7:72:bd:8c:45:d0:ff:7f:96:72: af:ce:5d:2e:e4:95:17:6e:82:d3:36:bc:69:a6:66:61: 2f:2f:a7:1c:25:15:bf:8d:2c:8c:e9:6e:44:d0:1d:59: 39:c9:7f:7a:ec:8d:f8:ff:7a:00:f0:68:ca:df:87:8f: 8a:73:ae:d0:ba:86:61:ea:98:85:43:04:e3:db:f8:3c: 8f:d6:c8:e7:9a:7e:ea:53:48:0c:95:02:5e:86:7b:df: 49:e8:5c:12:33:3e:c8:79:91:99:69:4c:c0:5c:3a:8f: 84:e9:a8:12:42:57:76:13:6a:64:71:72:7e:49:b9:7a: 17:36:80:ae:cf:81:89:7a:27:fa:7d:52:c8:ad:e8:5b Fingerprint (SHA-256): 90:E5:FE:56:02:B6:A5:9B:01:DD:43:40:12:57:AC:04:52:40:D8:2F:A5:63:DB:C3:32:1B:D7:C2:6E:06:AE:04 Fingerprint (SHA1): E6:49:D7:40:DE:18:94:80:77:75:1E:1C:9D:E3:0C:20:77:BB:A0:D8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1051: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeArmy.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165097 (0x3caff769) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:00:34 2023 Not After : Wed Oct 18 17:00:34 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:a9:7d:fd:3c:dc:07:23:2d:f1:48:8c:e4:e4:bb:1c: b8:78:11:3d:9b:5f:1d:67:a3:b1:24:b9:53:ad:32:4c: 55:7a:a5:1e:f8:b2:50:11:24:7c:15:9e:2f:0a:59:58: 72:bb:c0:13:c2:24:57:e5:53:b0:96:d3:e6:27:18:82: db:21:4c:90:e3:f6:2d:3e:d8:b4:d7:d7:93:e2:d1:d3: 04:0f:5c:8e:23:38:20:57:35:3b:d8:9d:fc:4f:ab:7d: 35:ca:a7:f3:e6:71:7c:77:eb:51:86:ab:3d:f3:e6:9f: b2:9f:48:18:a5:7d:74:24:ac:cc:df:ce:e6:23:0d:ff: 48:55:8a:04:7e:c2:5d:9b:a2:8d:c9:96:bb:97:39:e5: 69:a5:f9:ef:8e:7b:0e:d7:e2:32:45:3f:a5:e3:9e:11: 45:5e:d2:85:b6:84:bb:2f:38:1e:c6:b5:92:76:fb:18: ec:e4:08:b5:a6:67:2e:af:fa:82:b6:5a:91:d5:ee:a4: 8c:cf:5e:21:01:bc:68:b4:50:59:af:77:c5:74:b3:99: b7:4b:33:69:78:17:17:2d:65:02:d1:f8:98:80:fe:80: e6:83:d3:59:c7:6f:63:e1:15:a8:37:ca:46:59:db:ac: fa:85:49:e5:e1:54:6c:7d:be:ef:fc:0b:8a:08:f2:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:c3:ac:31:4e:ff:ae:e5:f0:fa:a1:45:9e:c4:5b:7b: 83:63:34:66:75:41:cf:29:27:e8:f5:c3:c8:39:ea:75: d8:ca:92:8b:68:26:14:3a:44:36:46:ee:dc:c2:2c:18: 28:fb:7d:a5:4f:6a:93:f0:15:6f:56:ee:8b:3d:d4:68: a1:83:ee:98:94:6f:82:95:35:60:96:0f:cc:5c:92:71: e4:23:cc:2c:52:79:b3:9c:3f:f6:43:e8:c6:4f:08:09: 61:c4:49:ea:c7:6a:e4:67:3d:dd:ed:b0:ff:1a:21:02: 40:08:6c:26:fe:31:72:bb:15:12:a0:dc:07:13:c4:37: d2:af:c7:5f:ab:bb:96:e6:c0:c2:30:4e:22:1a:d6:62: 17:62:09:e1:47:08:21:25:b4:c7:c7:d5:41:ff:2a:bc: 07:c3:27:f2:41:78:62:d8:11:f6:fc:06:5a:f8:0a:9f: 05:5e:04:db:57:53:d2:a0:cd:a5:c9:aa:55:3f:c4:e1: 61:b9:e8:07:11:fd:97:a6:ed:20:4b:35:cc:8d:fe:bc: 88:e9:f7:7f:ed:d0:fe:2a:48:95:0d:74:38:ef:18:eb: c6:f8:93:09:c8:06:3b:d3:fc:34:d2:11:ae:31:31:5c: bc:9c:1e:bc:20:7e:83:5b:e6:61:65:4b:ec:36:2c:4d Fingerprint (SHA-256): BD:7A:8B:F5:ED:92:B5:95:94:19:86:69:50:94:3A:07:DC:B0:43:58:F5:CB:C0:D6:2D:C9:C7:4B:CE:30:78:8C Fingerprint (SHA1): 3E:06:90:96:4E:38:20:59:76:9C:0C:E1:C0:AF:1D:43:D2:58:FB:67 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1052: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der BridgeNavy.der -t Army Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Navy [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1053: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Importing certificate BridgeArmy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeArmy.der chains.sh: #1054: Bridge: Importing certificate BridgeArmy.der to AllDB database - PASSED chains.sh: Importing certificate BridgeNavy.der to AllDB database certutil -A -n Bridge -t "" -d AllDB -f AllDB/dbpasswd -i BridgeNavy.der chains.sh: #1055: Bridge: Importing certificate BridgeNavy.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army vfychain -d AllDB -pp -vv UserBridge.der -t Army Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165097 (0x3caff769) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:00:34 2023 Not After : Wed Oct 18 17:00:34 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:a9:7d:fd:3c:dc:07:23:2d:f1:48:8c:e4:e4:bb:1c: b8:78:11:3d:9b:5f:1d:67:a3:b1:24:b9:53:ad:32:4c: 55:7a:a5:1e:f8:b2:50:11:24:7c:15:9e:2f:0a:59:58: 72:bb:c0:13:c2:24:57:e5:53:b0:96:d3:e6:27:18:82: db:21:4c:90:e3:f6:2d:3e:d8:b4:d7:d7:93:e2:d1:d3: 04:0f:5c:8e:23:38:20:57:35:3b:d8:9d:fc:4f:ab:7d: 35:ca:a7:f3:e6:71:7c:77:eb:51:86:ab:3d:f3:e6:9f: b2:9f:48:18:a5:7d:74:24:ac:cc:df:ce:e6:23:0d:ff: 48:55:8a:04:7e:c2:5d:9b:a2:8d:c9:96:bb:97:39:e5: 69:a5:f9:ef:8e:7b:0e:d7:e2:32:45:3f:a5:e3:9e:11: 45:5e:d2:85:b6:84:bb:2f:38:1e:c6:b5:92:76:fb:18: ec:e4:08:b5:a6:67:2e:af:fa:82:b6:5a:91:d5:ee:a4: 8c:cf:5e:21:01:bc:68:b4:50:59:af:77:c5:74:b3:99: b7:4b:33:69:78:17:17:2d:65:02:d1:f8:98:80:fe:80: e6:83:d3:59:c7:6f:63:e1:15:a8:37:ca:46:59:db:ac: fa:85:49:e5:e1:54:6c:7d:be:ef:fc:0b:8a:08:f2:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:c3:ac:31:4e:ff:ae:e5:f0:fa:a1:45:9e:c4:5b:7b: 83:63:34:66:75:41:cf:29:27:e8:f5:c3:c8:39:ea:75: d8:ca:92:8b:68:26:14:3a:44:36:46:ee:dc:c2:2c:18: 28:fb:7d:a5:4f:6a:93:f0:15:6f:56:ee:8b:3d:d4:68: a1:83:ee:98:94:6f:82:95:35:60:96:0f:cc:5c:92:71: e4:23:cc:2c:52:79:b3:9c:3f:f6:43:e8:c6:4f:08:09: 61:c4:49:ea:c7:6a:e4:67:3d:dd:ed:b0:ff:1a:21:02: 40:08:6c:26:fe:31:72:bb:15:12:a0:dc:07:13:c4:37: d2:af:c7:5f:ab:bb:96:e6:c0:c2:30:4e:22:1a:d6:62: 17:62:09:e1:47:08:21:25:b4:c7:c7:d5:41:ff:2a:bc: 07:c3:27:f2:41:78:62:d8:11:f6:fc:06:5a:f8:0a:9f: 05:5e:04:db:57:53:d2:a0:cd:a5:c9:aa:55:3f:c4:e1: 61:b9:e8:07:11:fd:97:a6:ed:20:4b:35:cc:8d:fe:bc: 88:e9:f7:7f:ed:d0:fe:2a:48:95:0d:74:38:ef:18:eb: c6:f8:93:09:c8:06:3b:d3:fc:34:d2:11:ae:31:31:5c: bc:9c:1e:bc:20:7e:83:5b:e6:61:65:4b:ec:36:2c:4d Fingerprint (SHA-256): BD:7A:8B:F5:ED:92:B5:95:94:19:86:69:50:94:3A:07:DC:B0:43:58:F5:CB:C0:D6:2D:C9:C7:4B:CE:30:78:8C Fingerprint (SHA1): 3E:06:90:96:4E:38:20:59:76:9C:0C:E1:C0:AF:1D:43:D2:58:FB:67 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1056: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Army - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy vfychain -d AllDB -pp -vv UserBridge.der -t Navy Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165098 (0x3caff76a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:00:37 2023 Not After : Wed Oct 18 17:00:37 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:fd:fd:f1:41:5b:c9:6c:7b:f2:9d:f2:88:87:57:15: d3:0c:26:79:f2:f6:5a:36:5a:b4:19:a5:d3:dc:07:4c: c7:1f:51:7d:0a:dc:fb:d5:ad:65:35:1e:90:a1:c4:72: ca:f2:05:2c:81:cb:ef:14:58:2d:3d:b0:68:e3:51:25: f2:96:8d:a9:73:1d:37:eb:84:c7:ab:39:fa:fd:a7:9c: 44:db:57:a2:35:76:05:ef:f8:43:aa:1d:de:a3:27:aa: 58:64:a3:b0:bd:87:69:59:1f:59:cf:bf:26:a3:ff:19: 65:41:41:11:db:d1:3b:5f:0c:18:06:e4:e8:40:2b:d4: dc:ad:a5:91:04:83:e5:77:00:25:0a:0f:01:07:a1:5b: 12:18:37:f0:f9:8d:db:26:26:7e:f6:21:e1:a8:33:4d: 33:a1:4b:a6:bf:35:95:a9:2f:32:11:f8:6e:f9:98:21: 98:63:a4:33:96:f2:8a:b2:a2:63:15:be:57:74:09:61: 6e:d5:50:b6:db:c9:92:78:81:43:09:6f:ea:e6:b4:7e: d4:10:a6:5d:1b:26:9a:47:0f:2d:cf:2a:ef:5f:f1:4e: 92:fa:8d:f4:9e:29:7b:0a:1c:e3:3c:0a:55:cb:83:1e: 81:96:66:b9:52:97:d6:81:9f:66:a1:c6:44:e4:e1:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:26:7e:b3:22:d2:2c:b0:80:dc:97:94:6b:2c:42:e6: 7f:52:a8:04:db:65:33:f7:f9:f0:77:7e:28:ec:b3:c3: 30:f0:77:69:a9:da:90:03:2d:6f:34:8c:60:e7:24:a2: ae:50:2c:c6:dc:9f:10:79:9c:9f:11:46:b0:76:a9:41: 27:16:53:7f:43:e4:2f:0f:24:3c:e4:d4:85:15:61:47: 0c:67:18:25:19:63:3a:63:10:3d:78:7d:ce:6a:4f:96: ff:3d:c8:e7:a8:4a:73:81:c1:57:a5:76:fe:95:99:f3: 1d:df:0a:8d:60:21:f7:72:bd:8c:45:d0:ff:7f:96:72: af:ce:5d:2e:e4:95:17:6e:82:d3:36:bc:69:a6:66:61: 2f:2f:a7:1c:25:15:bf:8d:2c:8c:e9:6e:44:d0:1d:59: 39:c9:7f:7a:ec:8d:f8:ff:7a:00:f0:68:ca:df:87:8f: 8a:73:ae:d0:ba:86:61:ea:98:85:43:04:e3:db:f8:3c: 8f:d6:c8:e7:9a:7e:ea:53:48:0c:95:02:5e:86:7b:df: 49:e8:5c:12:33:3e:c8:79:91:99:69:4c:c0:5c:3a:8f: 84:e9:a8:12:42:57:76:13:6a:64:71:72:7e:49:b9:7a: 17:36:80:ae:cf:81:89:7a:27:fa:7d:52:c8:ad:e8:5b Fingerprint (SHA-256): 90:E5:FE:56:02:B6:A5:9B:01:DD:43:40:12:57:AC:04:52:40:D8:2F:A5:63:DB:C3:32:1B:D7:C2:6E:06:AE:04 Fingerprint (SHA1): E6:49:D7:40:DE:18:94:80:77:75:1E:1C:9D:E3:0C:20:77:BB:A0:D8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1057: Bridge: Verifying certificate(s) UserBridge.der with flags -d AllDB -pp -t Navy - PASSED chains.sh: Creating DB ArmyOnlyDB certutil -N -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd chains.sh: #1058: Bridge: Creating DB ArmyOnlyDB - PASSED chains.sh: Importing certificate Army.der to ArmyOnlyDB database certutil -A -n Army -t "C,," -d ArmyOnlyDB -f ArmyOnlyDB/dbpasswd -i Army.der chains.sh: #1059: Bridge: Importing certificate Army.der to ArmyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1060: Bridge: Verifying certificate(s) UserBridge.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@navy [Certificate Authority]: Email Address(es): bridge@navy ERROR -8179: Peer's Certificate issuer is not recognized. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1061: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Navy ROOT CA,O=Navy,C=US Returned value is 1, expected result is fail chains.sh: #1062: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der Navy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165098 (0x3caff76a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:00:37 2023 Not After : Wed Oct 18 17:00:37 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:fd:fd:f1:41:5b:c9:6c:7b:f2:9d:f2:88:87:57:15: d3:0c:26:79:f2:f6:5a:36:5a:b4:19:a5:d3:dc:07:4c: c7:1f:51:7d:0a:dc:fb:d5:ad:65:35:1e:90:a1:c4:72: ca:f2:05:2c:81:cb:ef:14:58:2d:3d:b0:68:e3:51:25: f2:96:8d:a9:73:1d:37:eb:84:c7:ab:39:fa:fd:a7:9c: 44:db:57:a2:35:76:05:ef:f8:43:aa:1d:de:a3:27:aa: 58:64:a3:b0:bd:87:69:59:1f:59:cf:bf:26:a3:ff:19: 65:41:41:11:db:d1:3b:5f:0c:18:06:e4:e8:40:2b:d4: dc:ad:a5:91:04:83:e5:77:00:25:0a:0f:01:07:a1:5b: 12:18:37:f0:f9:8d:db:26:26:7e:f6:21:e1:a8:33:4d: 33:a1:4b:a6:bf:35:95:a9:2f:32:11:f8:6e:f9:98:21: 98:63:a4:33:96:f2:8a:b2:a2:63:15:be:57:74:09:61: 6e:d5:50:b6:db:c9:92:78:81:43:09:6f:ea:e6:b4:7e: d4:10:a6:5d:1b:26:9a:47:0f:2d:cf:2a:ef:5f:f1:4e: 92:fa:8d:f4:9e:29:7b:0a:1c:e3:3c:0a:55:cb:83:1e: 81:96:66:b9:52:97:d6:81:9f:66:a1:c6:44:e4:e1:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:26:7e:b3:22:d2:2c:b0:80:dc:97:94:6b:2c:42:e6: 7f:52:a8:04:db:65:33:f7:f9:f0:77:7e:28:ec:b3:c3: 30:f0:77:69:a9:da:90:03:2d:6f:34:8c:60:e7:24:a2: ae:50:2c:c6:dc:9f:10:79:9c:9f:11:46:b0:76:a9:41: 27:16:53:7f:43:e4:2f:0f:24:3c:e4:d4:85:15:61:47: 0c:67:18:25:19:63:3a:63:10:3d:78:7d:ce:6a:4f:96: ff:3d:c8:e7:a8:4a:73:81:c1:57:a5:76:fe:95:99:f3: 1d:df:0a:8d:60:21:f7:72:bd:8c:45:d0:ff:7f:96:72: af:ce:5d:2e:e4:95:17:6e:82:d3:36:bc:69:a6:66:61: 2f:2f:a7:1c:25:15:bf:8d:2c:8c:e9:6e:44:d0:1d:59: 39:c9:7f:7a:ec:8d:f8:ff:7a:00:f0:68:ca:df:87:8f: 8a:73:ae:d0:ba:86:61:ea:98:85:43:04:e3:db:f8:3c: 8f:d6:c8:e7:9a:7e:ea:53:48:0c:95:02:5e:86:7b:df: 49:e8:5c:12:33:3e:c8:79:91:99:69:4c:c0:5c:3a:8f: 84:e9:a8:12:42:57:76:13:6a:64:71:72:7e:49:b9:7a: 17:36:80:ae:cf:81:89:7a:27:fa:7d:52:c8:ad:e8:5b Fingerprint (SHA-256): 90:E5:FE:56:02:B6:A5:9B:01:DD:43:40:12:57:AC:04:52:40:D8:2F:A5:63:DB:C3:32:1B:D7:C2:6E:06:AE:04 Fingerprint (SHA1): E6:49:D7:40:DE:18:94:80:77:75:1E:1C:9D:E3:0C:20:77:BB:A0:D8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1063: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der Navy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der vfychain -d ArmyOnlyDB -pp -vv UserBridge.der BridgeNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165098 (0x3caff76a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:00:37 2023 Not After : Wed Oct 18 17:00:37 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e4:fd:fd:f1:41:5b:c9:6c:7b:f2:9d:f2:88:87:57:15: d3:0c:26:79:f2:f6:5a:36:5a:b4:19:a5:d3:dc:07:4c: c7:1f:51:7d:0a:dc:fb:d5:ad:65:35:1e:90:a1:c4:72: ca:f2:05:2c:81:cb:ef:14:58:2d:3d:b0:68:e3:51:25: f2:96:8d:a9:73:1d:37:eb:84:c7:ab:39:fa:fd:a7:9c: 44:db:57:a2:35:76:05:ef:f8:43:aa:1d:de:a3:27:aa: 58:64:a3:b0:bd:87:69:59:1f:59:cf:bf:26:a3:ff:19: 65:41:41:11:db:d1:3b:5f:0c:18:06:e4:e8:40:2b:d4: dc:ad:a5:91:04:83:e5:77:00:25:0a:0f:01:07:a1:5b: 12:18:37:f0:f9:8d:db:26:26:7e:f6:21:e1:a8:33:4d: 33:a1:4b:a6:bf:35:95:a9:2f:32:11:f8:6e:f9:98:21: 98:63:a4:33:96:f2:8a:b2:a2:63:15:be:57:74:09:61: 6e:d5:50:b6:db:c9:92:78:81:43:09:6f:ea:e6:b4:7e: d4:10:a6:5d:1b:26:9a:47:0f:2d:cf:2a:ef:5f:f1:4e: 92:fa:8d:f4:9e:29:7b:0a:1c:e3:3c:0a:55:cb:83:1e: 81:96:66:b9:52:97:d6:81:9f:66:a1:c6:44:e4:e1:a5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:26:7e:b3:22:d2:2c:b0:80:dc:97:94:6b:2c:42:e6: 7f:52:a8:04:db:65:33:f7:f9:f0:77:7e:28:ec:b3:c3: 30:f0:77:69:a9:da:90:03:2d:6f:34:8c:60:e7:24:a2: ae:50:2c:c6:dc:9f:10:79:9c:9f:11:46:b0:76:a9:41: 27:16:53:7f:43:e4:2f:0f:24:3c:e4:d4:85:15:61:47: 0c:67:18:25:19:63:3a:63:10:3d:78:7d:ce:6a:4f:96: ff:3d:c8:e7:a8:4a:73:81:c1:57:a5:76:fe:95:99:f3: 1d:df:0a:8d:60:21:f7:72:bd:8c:45:d0:ff:7f:96:72: af:ce:5d:2e:e4:95:17:6e:82:d3:36:bc:69:a6:66:61: 2f:2f:a7:1c:25:15:bf:8d:2c:8c:e9:6e:44:d0:1d:59: 39:c9:7f:7a:ec:8d:f8:ff:7a:00:f0:68:ca:df:87:8f: 8a:73:ae:d0:ba:86:61:ea:98:85:43:04:e3:db:f8:3c: 8f:d6:c8:e7:9a:7e:ea:53:48:0c:95:02:5e:86:7b:df: 49:e8:5c:12:33:3e:c8:79:91:99:69:4c:c0:5c:3a:8f: 84:e9:a8:12:42:57:76:13:6a:64:71:72:7e:49:b9:7a: 17:36:80:ae:cf:81:89:7a:27:fa:7d:52:c8:ad:e8:5b Fingerprint (SHA-256): 90:E5:FE:56:02:B6:A5:9B:01:DD:43:40:12:57:AC:04:52:40:D8:2F:A5:63:DB:C3:32:1B:D7:C2:6E:06:AE:04 Fingerprint (SHA1): E6:49:D7:40:DE:18:94:80:77:75:1E:1C:9D:E3:0C:20:77:BB:A0:D8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1064: Bridge: Verifying certificate(s) UserBridge.der BridgeNavy.der with flags -d ArmyOnlyDB -pp -t Navy.der - PASSED chains.sh: Creating DB NavyOnlyDB certutil -N -d NavyOnlyDB -f NavyOnlyDB/dbpasswd chains.sh: #1065: Bridge: Creating DB NavyOnlyDB - PASSED chains.sh: Importing certificate Navy.der to NavyOnlyDB database certutil -A -n Navy -t "C,," -d NavyOnlyDB -f NavyOnlyDB/dbpasswd -i Navy.der chains.sh: #1066: Bridge: Importing certificate Navy.der to NavyOnlyDB database - PASSED chains.sh: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=User EE,O=User,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1067: Bridge: Verifying certificate(s) UserBridge.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. bridge@army [Certificate Authority]: Email Address(es): bridge@army ERROR -8179: Peer's Certificate issuer is not recognized. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1068: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8172: Peer's certificate issuer has been marked as not trusted by the user. CN=Army ROOT CA,O=Army,C=US Returned value is 1, expected result is fail chains.sh: #1069: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der Army.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165097 (0x3caff769) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:00:34 2023 Not After : Wed Oct 18 17:00:34 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:a9:7d:fd:3c:dc:07:23:2d:f1:48:8c:e4:e4:bb:1c: b8:78:11:3d:9b:5f:1d:67:a3:b1:24:b9:53:ad:32:4c: 55:7a:a5:1e:f8:b2:50:11:24:7c:15:9e:2f:0a:59:58: 72:bb:c0:13:c2:24:57:e5:53:b0:96:d3:e6:27:18:82: db:21:4c:90:e3:f6:2d:3e:d8:b4:d7:d7:93:e2:d1:d3: 04:0f:5c:8e:23:38:20:57:35:3b:d8:9d:fc:4f:ab:7d: 35:ca:a7:f3:e6:71:7c:77:eb:51:86:ab:3d:f3:e6:9f: b2:9f:48:18:a5:7d:74:24:ac:cc:df:ce:e6:23:0d:ff: 48:55:8a:04:7e:c2:5d:9b:a2:8d:c9:96:bb:97:39:e5: 69:a5:f9:ef:8e:7b:0e:d7:e2:32:45:3f:a5:e3:9e:11: 45:5e:d2:85:b6:84:bb:2f:38:1e:c6:b5:92:76:fb:18: ec:e4:08:b5:a6:67:2e:af:fa:82:b6:5a:91:d5:ee:a4: 8c:cf:5e:21:01:bc:68:b4:50:59:af:77:c5:74:b3:99: b7:4b:33:69:78:17:17:2d:65:02:d1:f8:98:80:fe:80: e6:83:d3:59:c7:6f:63:e1:15:a8:37:ca:46:59:db:ac: fa:85:49:e5:e1:54:6c:7d:be:ef:fc:0b:8a:08:f2:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:c3:ac:31:4e:ff:ae:e5:f0:fa:a1:45:9e:c4:5b:7b: 83:63:34:66:75:41:cf:29:27:e8:f5:c3:c8:39:ea:75: d8:ca:92:8b:68:26:14:3a:44:36:46:ee:dc:c2:2c:18: 28:fb:7d:a5:4f:6a:93:f0:15:6f:56:ee:8b:3d:d4:68: a1:83:ee:98:94:6f:82:95:35:60:96:0f:cc:5c:92:71: e4:23:cc:2c:52:79:b3:9c:3f:f6:43:e8:c6:4f:08:09: 61:c4:49:ea:c7:6a:e4:67:3d:dd:ed:b0:ff:1a:21:02: 40:08:6c:26:fe:31:72:bb:15:12:a0:dc:07:13:c4:37: d2:af:c7:5f:ab:bb:96:e6:c0:c2:30:4e:22:1a:d6:62: 17:62:09:e1:47:08:21:25:b4:c7:c7:d5:41:ff:2a:bc: 07:c3:27:f2:41:78:62:d8:11:f6:fc:06:5a:f8:0a:9f: 05:5e:04:db:57:53:d2:a0:cd:a5:c9:aa:55:3f:c4:e1: 61:b9:e8:07:11:fd:97:a6:ed:20:4b:35:cc:8d:fe:bc: 88:e9:f7:7f:ed:d0:fe:2a:48:95:0d:74:38:ef:18:eb: c6:f8:93:09:c8:06:3b:d3:fc:34:d2:11:ae:31:31:5c: bc:9c:1e:bc:20:7e:83:5b:e6:61:65:4b:ec:36:2c:4d Fingerprint (SHA-256): BD:7A:8B:F5:ED:92:B5:95:94:19:86:69:50:94:3A:07:DC:B0:43:58:F5:CB:C0:D6:2D:C9:C7:4B:CE:30:78:8C Fingerprint (SHA1): 3E:06:90:96:4E:38:20:59:76:9C:0C:E1:C0:AF:1D:43:D2:58:FB:67 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1070: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der Army.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der vfychain -d NavyOnlyDB -pp -vv UserBridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165097 (0x3caff769) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:00:34 2023 Not After : Wed Oct 18 17:00:34 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a0:a9:7d:fd:3c:dc:07:23:2d:f1:48:8c:e4:e4:bb:1c: b8:78:11:3d:9b:5f:1d:67:a3:b1:24:b9:53:ad:32:4c: 55:7a:a5:1e:f8:b2:50:11:24:7c:15:9e:2f:0a:59:58: 72:bb:c0:13:c2:24:57:e5:53:b0:96:d3:e6:27:18:82: db:21:4c:90:e3:f6:2d:3e:d8:b4:d7:d7:93:e2:d1:d3: 04:0f:5c:8e:23:38:20:57:35:3b:d8:9d:fc:4f:ab:7d: 35:ca:a7:f3:e6:71:7c:77:eb:51:86:ab:3d:f3:e6:9f: b2:9f:48:18:a5:7d:74:24:ac:cc:df:ce:e6:23:0d:ff: 48:55:8a:04:7e:c2:5d:9b:a2:8d:c9:96:bb:97:39:e5: 69:a5:f9:ef:8e:7b:0e:d7:e2:32:45:3f:a5:e3:9e:11: 45:5e:d2:85:b6:84:bb:2f:38:1e:c6:b5:92:76:fb:18: ec:e4:08:b5:a6:67:2e:af:fa:82:b6:5a:91:d5:ee:a4: 8c:cf:5e:21:01:bc:68:b4:50:59:af:77:c5:74:b3:99: b7:4b:33:69:78:17:17:2d:65:02:d1:f8:98:80:fe:80: e6:83:d3:59:c7:6f:63:e1:15:a8:37:ca:46:59:db:ac: fa:85:49:e5:e1:54:6c:7d:be:ef:fc:0b:8a:08:f2:69 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1b:c3:ac:31:4e:ff:ae:e5:f0:fa:a1:45:9e:c4:5b:7b: 83:63:34:66:75:41:cf:29:27:e8:f5:c3:c8:39:ea:75: d8:ca:92:8b:68:26:14:3a:44:36:46:ee:dc:c2:2c:18: 28:fb:7d:a5:4f:6a:93:f0:15:6f:56:ee:8b:3d:d4:68: a1:83:ee:98:94:6f:82:95:35:60:96:0f:cc:5c:92:71: e4:23:cc:2c:52:79:b3:9c:3f:f6:43:e8:c6:4f:08:09: 61:c4:49:ea:c7:6a:e4:67:3d:dd:ed:b0:ff:1a:21:02: 40:08:6c:26:fe:31:72:bb:15:12:a0:dc:07:13:c4:37: d2:af:c7:5f:ab:bb:96:e6:c0:c2:30:4e:22:1a:d6:62: 17:62:09:e1:47:08:21:25:b4:c7:c7:d5:41:ff:2a:bc: 07:c3:27:f2:41:78:62:d8:11:f6:fc:06:5a:f8:0a:9f: 05:5e:04:db:57:53:d2:a0:cd:a5:c9:aa:55:3f:c4:e1: 61:b9:e8:07:11:fd:97:a6:ed:20:4b:35:cc:8d:fe:bc: 88:e9:f7:7f:ed:d0:fe:2a:48:95:0d:74:38:ef:18:eb: c6:f8:93:09:c8:06:3b:d3:fc:34:d2:11:ae:31:31:5c: bc:9c:1e:bc:20:7e:83:5b:e6:61:65:4b:ec:36:2c:4d Fingerprint (SHA-256): BD:7A:8B:F5:ED:92:B5:95:94:19:86:69:50:94:3A:07:DC:B0:43:58:F5:CB:C0:D6:2D:C9:C7:4B:CE:30:78:8C Fingerprint (SHA1): 3E:06:90:96:4E:38:20:59:76:9C:0C:E1:C0:AF:1D:43:D2:58:FB:67 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1071: Bridge: Verifying certificate(s) UserBridge.der BridgeArmy.der with flags -d NavyOnlyDB -pp -t Army.der - PASSED chains.sh: Creating DB Root1DB certutil -N -d Root1DB -f Root1DB/dbpasswd chains.sh: #1072: MegaBridge_3_2: Creating DB Root1DB - PASSED chains.sh: Creating Root CA Root1 certutil -s "CN=Root1 ROOT CA, O=Root1, C=US" -S -n Root1 -t CTu,CTu,CTu -v 600 -x -d Root1DB -1 -2 -5 -f Root1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165102 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1073: MegaBridge_3_2: Creating Root CA Root1 - PASSED chains.sh: Exporting Root CA Root1.der certutil -L -d Root1DB -r -n Root1 -o Root1.der chains.sh: #1074: MegaBridge_3_2: Exporting Root CA Root1.der - PASSED chains.sh: Creating DB Root2DB certutil -N -d Root2DB -f Root2DB/dbpasswd chains.sh: #1075: MegaBridge_3_2: Creating DB Root2DB - PASSED chains.sh: Creating Root CA Root2 certutil -s "CN=Root2 ROOT CA, O=Root2, C=US" -S -n Root2 -t CTu,CTu,CTu -v 600 -x -d Root2DB -1 -2 -5 -f Root2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165103 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1076: MegaBridge_3_2: Creating Root CA Root2 - PASSED chains.sh: Exporting Root CA Root2.der certutil -L -d Root2DB -r -n Root2 -o Root2.der chains.sh: #1077: MegaBridge_3_2: Exporting Root CA Root2.der - PASSED chains.sh: Creating DB Root3DB certutil -N -d Root3DB -f Root3DB/dbpasswd chains.sh: #1078: MegaBridge_3_2: Creating DB Root3DB - PASSED chains.sh: Creating Root CA Root3 certutil -s "CN=Root3 ROOT CA, O=Root3, C=US" -S -n Root3 -t CTu,CTu,CTu -v 600 -x -d Root3DB -1 -2 -5 -f Root3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165104 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1079: MegaBridge_3_2: Creating Root CA Root3 - PASSED chains.sh: Exporting Root CA Root3.der certutil -L -d Root3DB -r -n Root3 -o Root3.der chains.sh: #1080: MegaBridge_3_2: Exporting Root CA Root3.der - PASSED chains.sh: Creating DB Root4DB certutil -N -d Root4DB -f Root4DB/dbpasswd chains.sh: #1081: MegaBridge_3_2: Creating DB Root4DB - PASSED chains.sh: Creating Root CA Root4 certutil -s "CN=Root4 ROOT CA, O=Root4, C=US" -S -n Root4 -t CTu,CTu,CTu -v 600 -x -d Root4DB -1 -2 -5 -f Root4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165105 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1082: MegaBridge_3_2: Creating Root CA Root4 - PASSED chains.sh: Exporting Root CA Root4.der certutil -L -d Root4DB -r -n Root4 -o Root4.der chains.sh: #1083: MegaBridge_3_2: Exporting Root CA Root4.der - PASSED chains.sh: Creating DB Root5DB certutil -N -d Root5DB -f Root5DB/dbpasswd chains.sh: #1084: MegaBridge_3_2: Creating DB Root5DB - PASSED chains.sh: Creating Root CA Root5 certutil -s "CN=Root5 ROOT CA, O=Root5, C=US" -S -n Root5 -t CTu,CTu,CTu -v 600 -x -d Root5DB -1 -2 -5 -f Root5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165106 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1085: MegaBridge_3_2: Creating Root CA Root5 - PASSED chains.sh: Exporting Root CA Root5.der certutil -L -d Root5DB -r -n Root5 -o Root5.der chains.sh: #1086: MegaBridge_3_2: Exporting Root CA Root5.der - PASSED chains.sh: Creating DB Root6DB certutil -N -d Root6DB -f Root6DB/dbpasswd chains.sh: #1087: MegaBridge_3_2: Creating DB Root6DB - PASSED chains.sh: Creating Root CA Root6 certutil -s "CN=Root6 ROOT CA, O=Root6, C=US" -S -n Root6 -t CTu,CTu,CTu -v 600 -x -d Root6DB -1 -2 -5 -f Root6DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165107 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1088: MegaBridge_3_2: Creating Root CA Root6 - PASSED chains.sh: Exporting Root CA Root6.der certutil -L -d Root6DB -r -n Root6 -o Root6.der chains.sh: #1089: MegaBridge_3_2: Exporting Root CA Root6.der - PASSED chains.sh: Creating DB Root7DB certutil -N -d Root7DB -f Root7DB/dbpasswd chains.sh: #1090: MegaBridge_3_2: Creating DB Root7DB - PASSED chains.sh: Creating Root CA Root7 certutil -s "CN=Root7 ROOT CA, O=Root7, C=US" -S -n Root7 -t CTu,CTu,CTu -v 600 -x -d Root7DB -1 -2 -5 -f Root7DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165108 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1091: MegaBridge_3_2: Creating Root CA Root7 - PASSED chains.sh: Exporting Root CA Root7.der certutil -L -d Root7DB -r -n Root7 -o Root7.der chains.sh: #1092: MegaBridge_3_2: Exporting Root CA Root7.der - PASSED chains.sh: Creating DB Root8DB certutil -N -d Root8DB -f Root8DB/dbpasswd chains.sh: #1093: MegaBridge_3_2: Creating DB Root8DB - PASSED chains.sh: Creating Root CA Root8 certutil -s "CN=Root8 ROOT CA, O=Root8, C=US" -S -n Root8 -t CTu,CTu,CTu -v 600 -x -d Root8DB -1 -2 -5 -f Root8DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165109 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1094: MegaBridge_3_2: Creating Root CA Root8 - PASSED chains.sh: Exporting Root CA Root8.der certutil -L -d Root8DB -r -n Root8 -o Root8.der chains.sh: #1095: MegaBridge_3_2: Exporting Root CA Root8.der - PASSED chains.sh: Creating DB Root9DB certutil -N -d Root9DB -f Root9DB/dbpasswd chains.sh: #1096: MegaBridge_3_2: Creating DB Root9DB - PASSED chains.sh: Creating Root CA Root9 certutil -s "CN=Root9 ROOT CA, O=Root9, C=US" -S -n Root9 -t CTu,CTu,CTu -v 600 -x -d Root9DB -1 -2 -5 -f Root9DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165110 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1097: MegaBridge_3_2: Creating Root CA Root9 - PASSED chains.sh: Exporting Root CA Root9.der certutil -L -d Root9DB -r -n Root9 -o Root9.der chains.sh: #1098: MegaBridge_3_2: Exporting Root CA Root9.der - PASSED chains.sh: Creating DB Bridge11DB certutil -N -d Bridge11DB -f Bridge11DB/dbpasswd chains.sh: #1099: MegaBridge_3_2: Creating DB Bridge11DB - PASSED chains.sh: Creating Bridge certifiate request Bridge11Req.der certutil -s "CN=Bridge11 Bridge, O=Bridge11, C=US" -R -2 -d Bridge11DB -f Bridge11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1100: MegaBridge_3_2: Creating Bridge certifiate request Bridge11Req.der - PASSED chains.sh: Creating certficate Bridge11Root1.der signed by Root1 certutil -C -c Root1 -v 60 -d Root1DB -i Bridge11Req.der -o Bridge11Root1.der -f Root1DB/dbpasswd -m 1018165111 -7 Bridge11@Root1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1101: MegaBridge_3_2: Creating certficate Bridge11Root1.der signed by Root1 - PASSED chains.sh: Importing certificate Bridge11Root1.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1102: MegaBridge_3_2: Importing certificate Bridge11Root1.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root2.der signed by Root2 certutil -C -c Root2 -v 60 -d Root2DB -i Bridge11Req.der -o Bridge11Root2.der -f Root2DB/dbpasswd -m 1018165112 -7 Bridge11@Root2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1103: MegaBridge_3_2: Creating certficate Bridge11Root2.der signed by Root2 - PASSED chains.sh: Importing certificate Bridge11Root2.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1104: MegaBridge_3_2: Importing certificate Bridge11Root2.der to Bridge11DB database - PASSED chains.sh: Creating certficate Bridge11Root3.der signed by Root3 certutil -C -c Root3 -v 60 -d Root3DB -i Bridge11Req.der -o Bridge11Root3.der -f Root3DB/dbpasswd -m 1018165113 -7 Bridge11@Root3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1105: MegaBridge_3_2: Creating certficate Bridge11Root3.der signed by Root3 - PASSED chains.sh: Importing certificate Bridge11Root3.der to Bridge11DB database certutil -A -n Bridge11 -t u,u,u -d Bridge11DB -f Bridge11DB/dbpasswd -i Bridge11Root3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1106: MegaBridge_3_2: Importing certificate Bridge11Root3.der to Bridge11DB database - PASSED chains.sh: Generating PKCS7 package from Bridge11DB database cmsutil -O -r "Bridge11@Root1,Bridge11@Root2,Bridge11@Root3" -d Bridge11DB > Bridge11.p7 chains.sh: #1107: MegaBridge_3_2: Generating PKCS7 package from Bridge11DB database - PASSED chains.sh: Creating DB Bridge12DB certutil -N -d Bridge12DB -f Bridge12DB/dbpasswd chains.sh: #1108: MegaBridge_3_2: Creating DB Bridge12DB - PASSED chains.sh: Creating Bridge certifiate request Bridge12Req.der certutil -s "CN=Bridge12 Bridge, O=Bridge12, C=US" -R -2 -d Bridge12DB -f Bridge12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1109: MegaBridge_3_2: Creating Bridge certifiate request Bridge12Req.der - PASSED chains.sh: Creating certficate Bridge12Root4.der signed by Root4 certutil -C -c Root4 -v 60 -d Root4DB -i Bridge12Req.der -o Bridge12Root4.der -f Root4DB/dbpasswd -m 1018165114 -7 Bridge12@Root4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1110: MegaBridge_3_2: Creating certficate Bridge12Root4.der signed by Root4 - PASSED chains.sh: Importing certificate Bridge12Root4.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1111: MegaBridge_3_2: Importing certificate Bridge12Root4.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root5.der signed by Root5 certutil -C -c Root5 -v 60 -d Root5DB -i Bridge12Req.der -o Bridge12Root5.der -f Root5DB/dbpasswd -m 1018165115 -7 Bridge12@Root5 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1112: MegaBridge_3_2: Creating certficate Bridge12Root5.der signed by Root5 - PASSED chains.sh: Importing certificate Bridge12Root5.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root5.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1113: MegaBridge_3_2: Importing certificate Bridge12Root5.der to Bridge12DB database - PASSED chains.sh: Creating certficate Bridge12Root6.der signed by Root6 certutil -C -c Root6 -v 60 -d Root6DB -i Bridge12Req.der -o Bridge12Root6.der -f Root6DB/dbpasswd -m 1018165116 -7 Bridge12@Root6 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1114: MegaBridge_3_2: Creating certficate Bridge12Root6.der signed by Root6 - PASSED chains.sh: Importing certificate Bridge12Root6.der to Bridge12DB database certutil -A -n Bridge12 -t u,u,u -d Bridge12DB -f Bridge12DB/dbpasswd -i Bridge12Root6.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1115: MegaBridge_3_2: Importing certificate Bridge12Root6.der to Bridge12DB database - PASSED chains.sh: Generating PKCS7 package from Bridge12DB database cmsutil -O -r "Bridge12@Root4,Bridge12@Root5,Bridge12@Root6" -d Bridge12DB > Bridge12.p7 chains.sh: #1116: MegaBridge_3_2: Generating PKCS7 package from Bridge12DB database - PASSED chains.sh: Creating DB Bridge13DB certutil -N -d Bridge13DB -f Bridge13DB/dbpasswd chains.sh: #1117: MegaBridge_3_2: Creating DB Bridge13DB - PASSED chains.sh: Creating Bridge certifiate request Bridge13Req.der certutil -s "CN=Bridge13 Bridge, O=Bridge13, C=US" -R -2 -d Bridge13DB -f Bridge13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1118: MegaBridge_3_2: Creating Bridge certifiate request Bridge13Req.der - PASSED chains.sh: Creating certficate Bridge13Root7.der signed by Root7 certutil -C -c Root7 -v 60 -d Root7DB -i Bridge13Req.der -o Bridge13Root7.der -f Root7DB/dbpasswd -m 1018165117 -7 Bridge13@Root7 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1119: MegaBridge_3_2: Creating certficate Bridge13Root7.der signed by Root7 - PASSED chains.sh: Importing certificate Bridge13Root7.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root7.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1120: MegaBridge_3_2: Importing certificate Bridge13Root7.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root8.der signed by Root8 certutil -C -c Root8 -v 60 -d Root8DB -i Bridge13Req.der -o Bridge13Root8.der -f Root8DB/dbpasswd -m 1018165118 -7 Bridge13@Root8 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1121: MegaBridge_3_2: Creating certficate Bridge13Root8.der signed by Root8 - PASSED chains.sh: Importing certificate Bridge13Root8.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root8.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1122: MegaBridge_3_2: Importing certificate Bridge13Root8.der to Bridge13DB database - PASSED chains.sh: Creating certficate Bridge13Root9.der signed by Root9 certutil -C -c Root9 -v 60 -d Root9DB -i Bridge13Req.der -o Bridge13Root9.der -f Root9DB/dbpasswd -m 1018165119 -7 Bridge13@Root9 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1123: MegaBridge_3_2: Creating certficate Bridge13Root9.der signed by Root9 - PASSED chains.sh: Importing certificate Bridge13Root9.der to Bridge13DB database certutil -A -n Bridge13 -t u,u,u -d Bridge13DB -f Bridge13DB/dbpasswd -i Bridge13Root9.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1124: MegaBridge_3_2: Importing certificate Bridge13Root9.der to Bridge13DB database - PASSED chains.sh: Generating PKCS7 package from Bridge13DB database cmsutil -O -r "Bridge13@Root7,Bridge13@Root8,Bridge13@Root9" -d Bridge13DB > Bridge13.p7 chains.sh: #1125: MegaBridge_3_2: Generating PKCS7 package from Bridge13DB database - PASSED chains.sh: Creating DB Bridge21DB certutil -N -d Bridge21DB -f Bridge21DB/dbpasswd chains.sh: #1126: MegaBridge_3_2: Creating DB Bridge21DB - PASSED chains.sh: Creating Bridge certifiate request Bridge21Req.der certutil -s "CN=Bridge21 Bridge, O=Bridge21, C=US" -R -2 -d Bridge21DB -f Bridge21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o Bridge21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1127: MegaBridge_3_2: Creating Bridge certifiate request Bridge21Req.der - PASSED chains.sh: Creating certficate Bridge21Bridge11.der signed by Bridge11 certutil -C -c Bridge11 -v 60 -d Bridge11DB -i Bridge21Req.der -o Bridge21Bridge11.der -f Bridge11DB/dbpasswd -m 1018165120 -7 Bridge21@Bridge11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1128: MegaBridge_3_2: Creating certficate Bridge21Bridge11.der signed by Bridge11 - PASSED chains.sh: Importing certificate Bridge21Bridge11.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge11.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1129: MegaBridge_3_2: Importing certificate Bridge21Bridge11.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge12.der signed by Bridge12 certutil -C -c Bridge12 -v 60 -d Bridge12DB -i Bridge21Req.der -o Bridge21Bridge12.der -f Bridge12DB/dbpasswd -m 1018165121 -7 Bridge21@Bridge12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1130: MegaBridge_3_2: Creating certficate Bridge21Bridge12.der signed by Bridge12 - PASSED chains.sh: Importing certificate Bridge21Bridge12.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1131: MegaBridge_3_2: Importing certificate Bridge21Bridge12.der to Bridge21DB database - PASSED chains.sh: Creating certficate Bridge21Bridge13.der signed by Bridge13 certutil -C -c Bridge13 -v 60 -d Bridge13DB -i Bridge21Req.der -o Bridge21Bridge13.der -f Bridge13DB/dbpasswd -m 1018165122 -7 Bridge21@Bridge13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1132: MegaBridge_3_2: Creating certficate Bridge21Bridge13.der signed by Bridge13 - PASSED chains.sh: Importing certificate Bridge21Bridge13.der to Bridge21DB database certutil -A -n Bridge21 -t u,u,u -d Bridge21DB -f Bridge21DB/dbpasswd -i Bridge21Bridge13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1133: MegaBridge_3_2: Importing certificate Bridge21Bridge13.der to Bridge21DB database - PASSED chains.sh: Generating PKCS7 package from Bridge21DB database cmsutil -O -r "Bridge21@Bridge11,Bridge21@Bridge12,Bridge21@Bridge13" -d Bridge21DB > Bridge21.p7 chains.sh: #1134: MegaBridge_3_2: Generating PKCS7 package from Bridge21DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1135: MegaBridge_3_2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1136: MegaBridge_3_2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge21.der signed by Bridge21 certutil -C -c Bridge21 -v 60 -d Bridge21DB -i CA1Req.der -o CA1Bridge21.der -f Bridge21DB/dbpasswd -m 1018165123 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1137: MegaBridge_3_2: Creating certficate CA1Bridge21.der signed by Bridge21 - PASSED chains.sh: Importing certificate CA1Bridge21.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge21.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1138: MegaBridge_3_2: Importing certificate CA1Bridge21.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1139: MegaBridge_3_2: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1140: MegaBridge_3_2: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018165124 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1141: MegaBridge_3_2: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1142: MegaBridge_3_2: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der -t Root1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165102 (0x3caff76e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root1 ROOT CA,O=Root1,C=US" Validity: Not Before: Wed Oct 18 17:00:53 2023 Not After : Wed Oct 18 17:00:53 2073 Subject: "CN=Root1 ROOT CA,O=Root1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:88:b0:01:92:69:e8:98:c4:06:85:57:90:40:3d:6a: dc:8d:c0:03:67:61:be:48:7d:55:be:a5:b6:55:25:2d: 76:a8:8b:08:0a:84:0b:f9:dd:55:f6:1b:39:2e:cf:94: 39:aa:09:03:3f:72:6a:7b:7b:da:12:27:0f:a0:fe:d5: 6f:ba:3d:99:6f:17:c4:63:55:eb:00:3c:5a:68:9a:b4: f5:4a:a9:7c:5c:6a:46:db:5b:6f:43:af:51:0f:46:ee: 8a:bd:c4:5b:c3:d0:c8:00:8d:4a:7b:35:73:b2:71:4b: f8:df:c7:24:64:4d:06:29:18:ac:42:15:bc:3d:79:a8: 0c:1f:df:7b:28:c0:de:63:8e:53:c4:02:d8:a9:da:fb: 19:6f:c3:07:64:df:79:ff:89:68:b1:d4:8f:68:5e:5e: 24:af:01:70:c0:3e:c0:fc:08:58:38:5f:43:49:93:db: 59:e7:2d:fd:dd:53:07:e7:8b:9c:30:1c:97:bb:4f:b6: d6:e2:fa:3e:30:3c:62:57:cd:25:9b:3e:b6:51:eb:28: e6:86:50:c8:2a:53:88:1d:c4:c0:fc:87:f0:c8:56:af: 56:4d:ce:df:62:16:17:a0:aa:5d:b2:7b:24:16:4b:93: a9:0e:a8:fc:43:4e:99:13:74:e7:5a:d2:81:9f:2e:ff Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ce:78:07:4e:67:51:43:48:41:8b:f9:ae:b0:13:6d:09: 5e:35:ee:0b:29:d1:9b:44:7e:5d:67:5b:86:37:29:ff: 11:a9:0c:2e:b0:ea:c6:e2:6c:81:2a:e8:55:4d:62:e5: 51:38:9a:97:52:a7:ea:df:84:b3:17:40:94:66:c7:e9: 40:56:f2:c8:9e:33:1e:3b:68:e3:1b:5d:f1:d9:23:be: cc:71:e3:e7:ab:40:36:51:72:ea:f4:5a:2f:b5:3b:af: 46:5c:d9:9d:03:9a:81:18:b6:25:30:6c:4c:f8:13:a6: 89:0d:85:f8:dc:b1:31:8a:53:28:dc:d9:ac:da:ef:e2: ca:ac:db:14:5c:c2:43:c5:8c:6f:3f:ca:f7:63:80:37: 9b:81:1b:38:3a:60:ec:0d:42:07:6b:3a:f3:49:7f:08: d2:0b:cd:b5:c6:b0:bb:22:25:74:e2:7a:61:5d:d4:72: 99:13:d4:a9:78:d9:8a:4c:bb:d8:a9:83:1b:0f:59:35: 4b:0e:02:b9:ff:b2:06:46:e6:d2:f4:59:34:cb:73:c1: 5f:66:b2:80:f6:d6:f3:e3:48:2c:b7:15:cd:0a:39:96: 0d:27:67:6a:e2:80:d9:af:45:e5:1c:cb:e6:7b:ef:1c: cc:cf:a4:65:0a:87:18:9a:ce:bd:aa:a2:51:62:ed:aa Fingerprint (SHA-256): 24:60:DD:85:F0:1C:34:6B:CF:46:B9:C6:8F:F2:4E:64:79:85:92:BD:BE:91:B9:F0:BA:F6:63:CC:F2:7E:C0:BE Fingerprint (SHA1): 1B:CC:F4:BC:47:23:E9:D8:3F:4C:60:44:65:14:2C:16:26:DE:2B:0A Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1143: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root1.der with flags -d EE1DB -pp -t Root1.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der -t Root2.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165103 (0x3caff76f) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root2 ROOT CA,O=Root2,C=US" Validity: Not Before: Wed Oct 18 17:00:56 2023 Not After : Wed Oct 18 17:00:56 2073 Subject: "CN=Root2 ROOT CA,O=Root2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:b1:cf:3b:d5:2f:86:a8:91:bc:c5:8b:fe:50:7f:1d: b5:77:e6:7a:34:f8:92:f7:8f:ff:26:2a:b6:ad:ee:73: 0d:fd:c7:9f:ad:de:d2:91:40:7d:a9:52:82:d4:0e:44: 1b:90:70:1d:b7:b4:de:65:43:3c:a8:6b:10:5a:0d:29: 6f:4a:4c:5f:43:6c:0c:c2:90:a7:83:ac:dc:2d:a9:ae: ab:ad:be:d0:49:8f:6f:66:6a:07:ac:4e:fa:5e:09:32: 02:f2:63:94:74:4d:9d:b1:b0:f7:6a:7b:99:de:73:77: fa:82:29:5d:0d:e1:7f:17:ea:5e:03:d4:99:4f:5d:70: f5:d8:65:dd:50:72:06:5b:17:3b:27:56:df:0f:00:74: cd:f0:c7:6d:9f:c4:35:d7:6b:f2:4d:47:f7:09:bc:31: b5:fe:b7:e7:8c:0c:9a:47:9e:c2:50:ed:14:d0:94:71: 8f:24:30:2d:a0:e7:2e:60:c9:a5:e7:16:46:03:3b:c1: 25:38:b8:09:e5:97:28:b5:c1:8e:80:4a:f1:fa:4b:bc: 33:a2:0c:3c:4f:40:b2:a5:df:b4:af:e2:3d:c0:32:52: af:a2:b5:1c:e9:91:a0:3d:fe:bd:78:94:e6:bb:c9:75: 50:05:c5:8d:e4:c7:35:92:17:77:9e:27:10:d2:a8:f5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3a:76:2d:dd:cc:58:4f:9b:e6:97:c0:8d:05:03:14:80: b9:bb:2c:50:9b:b2:01:e5:09:89:c3:91:ad:34:c9:a5: 50:b7:9b:8d:3f:5a:34:f1:fa:ae:fd:f6:8e:d6:51:cc: 94:d4:21:6a:98:46:ad:26:7a:31:86:4b:85:86:f2:14: ee:41:93:b6:e0:e8:99:e0:a7:ee:87:3f:81:05:b3:08: 65:bb:0b:77:a1:47:86:ad:5a:eb:c9:b7:7e:6a:01:98: 59:87:be:42:c1:78:e9:4d:15:42:e8:de:72:88:c8:ea: bb:3f:f8:91:d7:7c:4a:85:d4:65:60:d3:de:eb:c6:a5: 68:f5:d1:d7:b3:17:8d:c5:b8:da:6d:9c:76:9a:91:cd: 59:1a:6d:38:dc:17:e2:dc:6c:8c:a3:ed:a1:f3:15:4e: e1:f1:50:3c:9b:00:36:bc:dd:64:3c:0c:2f:e8:e8:05: 04:c1:ef:c6:f8:39:0d:33:e5:8b:ff:2e:a4:7e:61:49: 69:32:82:90:bc:a8:36:f3:3d:db:0b:3b:65:be:8c:aa: e2:22:27:ea:55:1b:ef:ff:ef:6c:71:8d:48:bf:90:95: 1a:57:6e:c9:3b:6a:1a:a4:e1:c4:4a:3b:06:72:1e:24: a2:94:f3:d0:5f:cf:9e:ac:e3:04:a9:35:43:75:eb:d2 Fingerprint (SHA-256): 92:C3:56:90:4A:85:FB:33:92:EB:36:4F:9E:61:D6:CC:AD:75:A2:44:C6:13:B1:D6:87:71:2A:24:EA:9B:9D:95 Fingerprint (SHA1): 1B:5C:FF:48:F7:41:D4:DB:95:E6:A6:AB:CA:A1:23:33:AB:10:A2:B2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1144: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root2.der with flags -d EE1DB -pp -t Root2.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der -t Root3.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165104 (0x3caff770) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root3 ROOT CA,O=Root3,C=US" Validity: Not Before: Wed Oct 18 17:00:58 2023 Not After : Wed Oct 18 17:00:58 2073 Subject: "CN=Root3 ROOT CA,O=Root3,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f2:6e:94:cf:91:0e:d8:ee:db:77:94:ff:75:89:6c:68: 2d:a6:7e:b8:e1:7f:c0:e2:57:37:9d:42:dd:db:5c:15: 78:1f:95:6b:cc:6d:7d:02:65:33:9d:38:57:33:55:70: 59:58:91:55:46:9e:c3:20:b2:76:4a:9a:38:83:d3:8e: 67:13:94:62:8e:ee:0a:29:17:47:d4:f1:b1:13:6c:12: 5c:a2:d9:51:3e:e7:12:58:57:43:31:88:4a:81:29:11: 3e:53:dd:71:a0:8a:dd:d2:1b:f5:b5:2b:87:11:b4:ae: b8:d4:05:20:d4:23:be:01:08:e3:1f:d3:43:54:84:25: e9:12:75:08:5c:27:bd:89:0f:d2:e3:c5:d0:88:33:bd: 68:87:1e:db:f4:a0:8e:a8:0a:65:33:8a:cc:a5:c9:3a: a2:55:30:b0:6c:18:46:0d:52:0d:27:2d:f0:21:5f:e8: 42:30:59:8b:61:c0:d7:ed:af:c1:a9:0c:bc:c1:fe:e1: bc:aa:67:3a:7f:3e:ee:7c:3b:6b:59:26:4e:3b:19:1e: cc:20:1b:00:ac:60:3d:8c:34:56:99:5c:48:2f:4a:3b: 22:63:dd:5e:2e:ea:d6:c6:bc:6d:3d:4b:8d:3d:06:e0: 69:8e:6f:c6:5e:f1:33:c6:97:8c:4d:06:9e:a0:87:15 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 25:86:85:26:2d:a5:f0:12:72:9a:13:ce:d7:a5:89:b2: 66:24:82:d7:34:3c:1d:49:6c:40:11:73:70:8e:06:91: 79:44:60:67:89:5d:d9:b4:8b:0e:78:aa:13:4d:69:9b: 33:99:16:d4:a6:dc:38:3e:2f:43:fb:dd:d1:84:7e:fa: 4e:e8:4b:93:5f:6c:f7:17:af:0a:37:94:46:28:a1:9f: cd:e9:ad:7e:ef:88:58:a3:69:73:d8:88:1e:35:33:ce: 41:87:66:43:4d:1a:4f:d0:a0:62:6d:d0:71:90:25:80: a7:a0:6e:55:11:7d:16:d1:7b:8d:cc:6c:85:de:90:95: 0f:6c:10:ff:f3:b2:8f:3a:1f:26:5c:31:60:2c:8c:5d: 1d:c7:44:1b:6d:49:91:8b:e2:bc:49:31:ee:54:1f:1c: dd:b8:7d:2a:e5:a0:0b:f9:0a:ca:74:0b:a8:64:a9:07: 16:85:36:4c:55:70:a0:3f:f2:c8:fb:88:10:60:16:ec: 22:43:da:9f:42:64:67:a2:bb:84:32:76:2e:01:d5:35: c6:77:61:68:51:e8:6c:96:e5:d0:a9:ef:d1:c0:88:e6: a0:76:1d:d1:0b:93:b6:cf:ed:31:a4:15:31:34:ec:13: b6:8b:88:85:fd:cc:34:1b:64:10:de:44:a8:a2:c1:21 Fingerprint (SHA-256): 6A:05:50:C9:26:5C:62:E5:0B:DB:8A:A9:51:19:9D:B7:6E:61:99:FE:FE:C7:C6:C5:29:59:59:52:F9:CD:41:A8 Fingerprint (SHA1): DA:44:57:00:CE:95:08:6C:DC:AB:54:8E:AE:3D:C5:89:AE:27:5E:B2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge11 Bridge,O=Bridge11,C=US" Returned value is 0, expected result is pass chains.sh: #1145: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge11.der Bridge11Root3.der with flags -d EE1DB -pp -t Root3.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der -t Root4.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165105 (0x3caff771) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root4 ROOT CA,O=Root4,C=US" Validity: Not Before: Wed Oct 18 17:01:01 2023 Not After : Wed Oct 18 17:01:01 2073 Subject: "CN=Root4 ROOT CA,O=Root4,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a2:95:c6:bd:9f:c3:11:c1:c9:49:11:ad:bc:bc:2f:c9: bc:88:53:45:ef:36:5c:fe:57:e3:57:23:2e:80:18:ee: 1f:55:fc:40:96:58:a3:5c:db:51:68:3f:34:2f:b1:d1: 59:89:d8:ef:dc:eb:27:50:29:85:7f:d6:24:c9:ac:1b: 8a:15:66:b2:8e:92:a8:46:03:79:d8:8c:59:9e:58:2f: ab:39:c2:3a:60:ae:32:e6:9d:86:08:4b:6e:43:fc:51: 0c:dd:20:03:ec:f5:a8:1c:fe:af:c1:eb:96:af:41:63: ff:af:b4:d5:77:4c:a2:fe:bd:0f:ea:f0:44:0c:95:4e: 16:7e:ad:29:d9:93:2d:3a:c0:e2:2d:b4:de:ed:a8:86: ec:9d:d1:0f:46:16:00:bc:86:9c:58:f2:0d:5f:14:76: 28:27:ec:01:eb:8d:35:db:e2:b6:b3:01:1e:4f:e0:d4: 30:a9:3d:1f:a3:5c:e0:49:e3:0b:10:86:b3:68:dd:d0: cc:10:b9:92:c3:05:b8:d9:70:28:13:fd:d9:5c:6a:fd: 3f:a0:1e:0a:77:79:a2:b0:1d:a5:a9:d5:55:05:98:d6: 82:69:a2:79:1c:9b:c2:e5:01:14:8b:b5:b1:0d:31:70: ca:28:db:6c:e2:79:24:19:80:ba:89:74:a4:2d:7d:41 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9e:79:01:5f:60:f2:0b:0c:eb:7c:ab:78:43:4f:d1:e0: 01:f4:74:69:93:3f:c5:9b:aa:0c:7c:28:50:06:44:58: d1:96:7d:cd:34:de:53:91:f5:15:89:a2:54:73:f0:24: 84:86:d9:57:3f:e2:a2:f7:ed:e2:d4:f3:e1:f5:7f:4f: 81:a5:ed:71:40:69:66:61:88:1f:1e:f3:02:5f:f5:08: 7a:d4:24:e9:fa:18:6f:96:6e:61:b4:17:27:c6:f5:a7: cc:89:e4:7f:d9:96:5c:2c:dc:ac:24:89:5a:20:73:ae: 59:95:b7:2c:86:34:00:67:7f:1c:20:6f:51:6b:d1:1c: c3:0e:3a:fe:fe:29:98:3e:b6:af:1b:16:7d:3d:16:f4: 94:50:93:ac:18:94:d2:43:01:41:a4:e8:18:4d:3e:b2: fc:7d:c9:6d:c7:9e:47:d7:9d:5f:2f:a6:de:9c:df:9b: cc:19:ad:20:ea:94:a5:c0:48:7f:5f:25:6c:c5:de:e9: 9b:b6:e5:f4:2c:6d:53:94:2c:e0:11:54:f5:2b:70:e5: 7c:53:86:6e:b3:1f:8f:98:78:f3:5d:06:c8:ed:2c:b5: 13:57:56:d3:4a:4b:4c:8d:15:11:2e:1a:0f:13:97:94: 0e:66:bb:c0:0a:aa:29:d0:4d:b1:0c:2e:ba:54:a1:3a Fingerprint (SHA-256): 54:B1:1A:89:49:C6:9B:68:61:F9:7F:50:79:D1:24:EF:4F:DB:EB:DA:ED:56:A0:1B:CB:50:C1:2B:CA:5A:9F:D9 Fingerprint (SHA1): 51:EF:7E:73:E7:79:A2:2E:83:E0:C8:4C:F9:86:27:9C:30:F4:37:19 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1146: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root4.der with flags -d EE1DB -pp -t Root4.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der -t Root5.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165106 (0x3caff772) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root5 ROOT CA,O=Root5,C=US" Validity: Not Before: Wed Oct 18 17:01:04 2023 Not After : Wed Oct 18 17:01:04 2073 Subject: "CN=Root5 ROOT CA,O=Root5,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:5b:93:8c:ad:6b:7d:4a:76:ee:cd:e0:24:0f:51:35: 3d:8b:d6:13:1c:49:59:71:fa:ab:a9:9d:74:46:79:a9: 47:7d:12:0e:3c:e5:bd:b3:70:c8:5c:a1:7c:26:69:00: 8a:07:de:2d:62:4c:5f:d5:71:78:c6:a6:f6:68:6c:db: 2f:f6:52:c1:21:62:10:b5:25:b0:c6:7a:73:ef:55:8f: d3:cd:9b:a5:59:5b:e3:fe:2e:5e:81:7b:8c:14:b4:9a: 3c:a6:e8:97:54:b2:e6:85:a3:20:6b:dd:40:9f:1d:9d: a7:a5:da:69:90:d8:1a:aa:93:d3:f4:79:4d:91:35:67: 59:b8:d2:3f:ef:ba:7a:dc:40:28:13:53:2c:aa:5a:88: 2f:bd:18:68:2e:93:32:fd:5d:8a:f6:c9:a0:f8:8a:74: 7a:c2:dd:db:f9:0b:f7:82:4f:e1:b9:87:89:31:98:df: 0a:1a:f0:37:8f:64:4c:ee:b4:cd:52:1b:0a:de:0c:1c: b1:ee:4c:27:6e:ee:7b:82:45:79:40:4b:ae:0b:ab:d6: c4:28:b0:81:a2:3f:be:fc:03:3e:24:4d:73:3e:c7:6f: 4f:96:32:5a:0c:2e:dc:c7:93:dd:3c:53:46:0b:b9:55: 07:8d:9d:88:1f:51:12:00:97:8d:97:e0:61:ba:b9:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ce:c7:7c:fe:0f:4d:5a:04:f2:f6:7e:cb:78:1e:a2:b7: d7:a8:99:bb:6d:30:13:16:50:bc:3c:65:1e:76:ab:d1: b1:bb:29:c2:81:81:3e:08:e1:23:2a:aa:ff:16:78:75: 7c:9d:d2:bf:df:7d:63:99:3e:34:07:06:7d:0d:4c:49: 54:2c:b3:4e:98:e2:32:b8:d3:de:9b:6f:74:8b:ff:a4: 4d:2e:17:fe:9a:2c:05:07:60:c5:07:ff:8c:bd:07:7f: ec:fe:67:c9:5f:a3:f3:88:01:07:e7:6b:a0:98:0d:f9: 3d:d0:45:e9:5e:5b:17:b6:95:f1:aa:28:b6:f8:47:95: bb:d8:b7:87:fa:4e:a1:d1:91:cd:fd:21:fb:22:24:07: 5d:63:04:0c:69:38:87:15:24:bd:cb:9b:75:04:ca:e8: 2f:89:d0:cb:f3:5b:ee:cb:99:5b:ad:5a:ec:b5:73:5c: 44:32:da:06:29:58:13:39:3a:36:d7:78:a7:19:64:61: 13:ff:ab:55:3c:67:02:bd:89:3e:74:76:b7:95:87:9c: f7:34:8e:71:14:23:ee:21:d7:b4:1a:b4:34:4b:c9:23: 47:2d:2e:91:50:20:96:0c:2b:bd:25:a1:98:e0:5e:d9: fa:4f:bb:c3:7f:19:f0:9b:d1:2d:33:2a:b5:8c:b0:35 Fingerprint (SHA-256): FC:DA:B9:4E:A1:E4:8E:31:0C:65:DF:3E:C4:7C:B2:C0:7E:EB:CE:0F:8F:82:47:BD:91:05:B9:72:B7:97:C9:0B Fingerprint (SHA1): 00:91:B6:D5:67:87:02:23:4D:B7:7E:5E:4D:B8:43:4B:2B:89:3F:4D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1147: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root5.der with flags -d EE1DB -pp -t Root5.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der -t Root6.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165107 (0x3caff773) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root6 ROOT CA,O=Root6,C=US" Validity: Not Before: Wed Oct 18 17:01:07 2023 Not After : Wed Oct 18 17:01:07 2073 Subject: "CN=Root6 ROOT CA,O=Root6,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e8:cc:28:c4:fb:a9:6b:e8:7a:81:aa:bf:96:1a:fd:41: 7e:b7:a8:8f:db:b9:f8:cc:10:7f:50:bc:17:14:73:e1: c5:a0:6a:3c:46:0a:fb:a8:7a:34:df:f9:ff:01:9c:6d: 3e:a1:a1:6e:1b:31:cd:ba:80:f6:22:fe:46:9a:6f:ea: 55:ee:cc:06:54:29:bf:f1:b9:5c:30:d5:9c:b7:5d:e3: 3a:3f:f7:4c:26:31:b4:31:f0:93:fc:f1:b8:35:49:ed: 2b:5f:c4:2a:9e:ad:97:57:60:03:86:d1:62:10:29:bb: 50:bf:df:1b:61:cb:9d:fb:15:4d:8b:91:db:55:1d:b9: 5a:ae:67:cc:3c:65:18:c8:2a:26:e8:c4:a9:2b:d2:c6: c7:0f:9f:b3:9c:28:a4:6a:25:60:47:c6:e4:17:75:5c: cc:05:85:55:60:93:2d:ec:11:f0:7d:93:9c:08:ce:c6: 64:6c:e9:73:9d:ed:3f:3b:2e:b4:d0:47:1a:30:2f:03: b7:86:c9:d4:07:71:06:e0:3e:8d:e8:6c:fc:d0:4f:36: 6d:5e:92:52:8c:b4:9c:2f:6a:c9:bc:99:0d:0e:d5:2b: 80:18:d7:8f:78:a7:2d:5e:77:87:05:9b:99:6f:3b:7b: e8:7d:1d:65:1c:4c:d9:d7:f2:9a:9c:e8:a0:2f:ca:87 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:1e:cb:34:47:03:ce:e2:18:8b:68:8a:d1:44:5d:35: 08:fb:76:02:81:f9:e4:a9:49:fb:a1:28:5c:de:58:d1: 89:44:07:6a:35:76:fe:73:59:5e:4f:5a:f7:60:f5:ef: 81:c5:9b:3d:e3:42:97:1a:49:8d:d7:17:e1:1c:41:9e: 22:3f:df:47:ba:c6:09:31:23:94:f8:ee:6a:aa:4b:28: cb:68:fc:ff:46:ad:cf:0a:60:73:a5:84:4f:fc:54:da: 50:b5:e8:d5:0a:df:6f:d3:57:07:ec:e4:46:33:1a:fc: 45:dd:d6:2d:5e:87:28:e4:15:5a:35:b6:53:5a:97:96: 76:e7:47:98:17:d9:96:82:6d:f7:a6:9f:4c:86:99:44: c6:d8:7c:0e:08:ae:3f:5b:96:e0:bc:0c:de:7c:21:54: 73:9d:15:51:34:05:52:bc:8c:ce:87:ae:02:72:9e:90: dd:b2:40:1f:ce:2f:4f:22:6d:63:62:2d:a6:2b:f1:b7: cb:cf:8d:cf:26:c5:b5:eb:9c:c0:db:2b:bd:61:73:f3: b9:95:4e:7e:ff:04:3f:e6:1e:7f:fe:c8:f7:3b:55:b9: b8:25:18:47:80:d1:b6:91:d3:2a:43:c2:d6:35:a3:4e: d7:76:43:fc:57:0c:4b:3a:b0:40:83:15:8b:6c:f7:19 Fingerprint (SHA-256): 3D:FE:A1:E0:58:3A:34:FC:B2:38:C1:42:88:1A:BC:DD:1C:75:2F:FA:C4:EC:8C:1A:21:52:EF:4C:41:3F:AC:52 Fingerprint (SHA1): 5B:EC:61:12:B6:9A:3C:48:05:0F:96:6B:A2:E9:FC:D1:68:B6:DC:4E Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge12 Bridge,O=Bridge12,C=US" Returned value is 0, expected result is pass chains.sh: #1148: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge12.der Bridge12Root6.der with flags -d EE1DB -pp -t Root6.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der -t Root7.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165108 (0x3caff774) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root7 ROOT CA,O=Root7,C=US" Validity: Not Before: Wed Oct 18 17:01:10 2023 Not After : Wed Oct 18 17:01:10 2073 Subject: "CN=Root7 ROOT CA,O=Root7,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c5:79:ae:0f:24:6a:0f:5d:11:71:11:6a:1a:a2:61:08: dc:1a:a3:06:9c:20:8d:99:07:98:7b:ab:60:03:5a:c3: f2:73:39:5f:0e:ee:96:c4:28:a8:17:6a:ef:4e:8f:94: 40:9c:13:8d:b9:46:0b:f0:a7:7d:54:01:4d:a6:8c:e8: cf:e3:6d:fa:7f:bc:cc:79:61:d3:ed:c3:ad:99:6f:a3: 27:b5:30:b7:89:7e:96:b9:b5:56:59:d7:f0:fb:73:cf: 1e:98:d6:61:83:37:45:00:42:b6:85:82:d6:82:8d:a6: 87:e4:9b:91:21:f1:bd:35:00:cf:7c:69:f3:c8:f4:99: 18:cf:d5:92:e0:76:dd:33:0e:b5:ef:f0:df:2d:ba:96: 65:d3:bc:80:68:a2:ad:53:1b:6a:a1:f2:81:41:5a:90: 68:ae:70:85:2e:f7:cb:50:d8:e1:7d:31:22:cf:bb:2c: 28:ec:c3:71:81:6d:1b:0f:32:fa:77:75:a6:eb:a4:5a: 7d:e3:51:3b:2b:40:22:4f:66:f7:2a:86:70:ec:a5:11: 08:ee:75:7d:02:f8:bf:1f:5f:ba:6b:e0:4a:cb:32:16: b5:c8:b8:e6:4d:8d:68:61:d4:12:62:7d:3d:0b:ab:b1: 16:f6:ce:cb:30:24:f9:d0:8b:60:97:a2:62:23:80:77 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8a:2a:c9:5b:d1:e8:18:62:15:75:da:7f:b1:7d:67:9b: 8d:54:97:ea:fd:ba:22:ad:d0:6e:e2:39:0a:e2:c2:77: ed:2f:ac:7b:36:4f:66:23:96:f8:f6:bc:c7:a6:be:03: de:f7:01:92:8e:52:f7:1d:67:2e:da:85:64:47:b7:b4: 7a:1f:74:9f:a3:fc:21:d6:7f:2a:60:db:b1:da:28:a7: bf:fd:f3:ee:da:5a:59:d0:93:4f:b1:25:cd:88:21:5c: 32:98:08:6f:b0:b6:88:04:ac:63:73:da:27:b5:d8:9c: b8:7d:89:7a:8e:4d:43:25:ed:15:0f:bf:24:18:a9:ac: c3:cd:9a:c9:88:8b:d2:a0:e1:70:3e:ff:3a:bf:9e:44: c9:c9:61:a2:c9:a8:7d:41:2a:81:c1:44:6a:42:a6:1b: 0c:7b:17:59:88:96:1f:d8:97:de:32:8c:96:e7:14:96: 5f:10:2d:24:54:a6:4a:30:c0:78:10:a5:17:86:08:01: fb:e3:38:65:d3:77:a2:1d:eb:0f:a0:a2:ab:ed:32:d5: d4:30:04:77:b8:10:9a:84:92:c0:c7:b3:40:ce:32:a9: 2d:88:a1:e5:01:d9:1f:f7:88:a5:bf:82:41:98:99:10: 7a:fa:7a:3b:48:0f:c1:36:b5:60:99:75:e6:2d:e0:66 Fingerprint (SHA-256): 13:93:FE:E7:5B:55:B5:76:38:4C:E8:1D:25:FD:C4:B0:DD:F2:0F:A2:1E:7C:49:67:6F:7D:2C:B0:5E:BC:AD:B4 Fingerprint (SHA1): A8:49:0A:1D:9B:F5:06:9B:56:1C:4A:3F:3C:73:57:F3:A7:16:59:A1 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1149: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root7.der with flags -d EE1DB -pp -t Root7.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der -t Root8.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165109 (0x3caff775) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root8 ROOT CA,O=Root8,C=US" Validity: Not Before: Wed Oct 18 17:01:13 2023 Not After : Wed Oct 18 17:01:13 2073 Subject: "CN=Root8 ROOT CA,O=Root8,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: dd:27:39:27:39:8d:94:ee:fa:66:67:5b:92:1e:53:6e: 89:a5:a2:dd:08:08:99:f2:db:b9:86:bd:a7:db:81:ea: 23:f7:9a:7e:68:35:88:c5:c3:c9:84:7d:1e:ca:9d:1f: 6c:e7:63:7b:2b:c4:57:02:8b:70:fd:b3:e9:25:a7:59: b1:3e:01:53:8b:8d:5f:27:14:a9:a9:82:67:b7:d1:a0: 66:f3:94:a2:af:da:83:85:20:0c:e8:16:d5:a7:1a:e0: cf:60:a0:3d:71:9a:8a:45:98:40:80:88:22:15:57:9f: b7:1a:a0:17:22:5c:f2:03:55:fc:0c:ce:b6:b4:fe:f2: c5:a4:d7:50:93:e5:10:74:2d:51:6e:34:31:82:a3:d7: 8d:4a:8e:8a:fc:8c:e3:fd:a7:e8:e4:92:a5:c6:fd:35: 34:95:4a:f2:fc:c4:68:2f:eb:45:ab:a7:15:f3:35:72: 07:47:a3:eb:cd:e8:d7:3c:3b:a5:2a:6e:92:c5:56:f0: c4:16:bc:d0:ea:fa:9c:a2:d8:35:1a:9b:2d:1f:39:5f: e6:7d:eb:fd:e6:07:ba:6c:3f:5c:6e:43:e0:50:9f:00: 0c:24:3c:4d:d2:62:9a:aa:4a:47:25:82:bf:20:df:c1: 59:73:92:fb:c0:75:6a:b3:b8:b8:a2:cd:db:a1:53:1d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9c:88:33:34:4b:3c:e7:e9:10:54:95:ea:44:41:43:14: 8d:35:fb:34:ad:14:e8:7d:f9:98:f4:90:35:87:49:aa: d3:18:fe:86:d7:5c:34:d2:b5:cc:40:a0:ee:c1:98:68: 51:1f:7b:36:41:05:65:32:c6:0d:34:65:3d:af:62:4f: f1:bc:d3:86:d8:8f:6f:b0:b9:0f:0b:3c:67:4b:40:e9: 9b:76:d9:2b:a2:90:e9:c4:4b:4f:01:03:0e:5d:0f:3d: ab:5c:a6:15:4b:40:21:89:e5:75:f1:25:f3:4e:03:78: 1e:32:59:bb:2c:a5:c9:8e:79:f0:c0:3c:6c:b8:91:a2: 21:8e:2d:ca:1f:57:49:31:91:ae:ac:ba:b0:8b:f8:65: fc:d1:f6:72:5a:c5:5b:3b:76:ee:68:c1:32:90:bc:81: 2c:8d:6f:ab:2b:a7:93:bb:79:27:4d:47:ec:28:25:04: e9:99:8a:3a:44:d2:32:51:fc:44:e9:f3:07:2e:a7:61: 33:1e:ab:7a:06:2d:c3:d8:1b:4c:92:f1:e9:e7:56:f3: 59:a0:99:3b:bc:57:7e:c2:9d:c6:0a:28:9e:f0:69:49: eb:ef:db:d6:cb:73:ca:bf:41:73:64:7f:ef:5a:e5:a9: 69:cd:d7:1f:e4:26:a3:16:81:d7:ca:94:ee:de:fa:19 Fingerprint (SHA-256): 7A:86:98:B0:D2:73:9D:FE:75:F3:4F:A9:9A:60:DD:A5:07:41:50:56:0E:56:6E:5F:AB:2B:19:3C:34:4E:36:75 Fingerprint (SHA1): BB:FE:0E:BD:E6:86:BC:95:56:00:BE:2F:39:2B:5E:DF:6A:1A:60:31 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1150: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root8.der with flags -d EE1DB -pp -t Root8.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der -t Root9.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165110 (0x3caff776) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root9 ROOT CA,O=Root9,C=US" Validity: Not Before: Wed Oct 18 17:01:16 2023 Not After : Wed Oct 18 17:01:16 2073 Subject: "CN=Root9 ROOT CA,O=Root9,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:4e:d6:dc:b4:85:7a:c0:9c:32:b9:b0:a7:d7:2c:fd: de:2b:0d:93:1c:06:a2:54:d5:41:3e:1b:03:47:5e:ff: dc:0f:4c:f0:8a:32:7d:56:bc:6a:46:43:b3:20:18:a0: 4a:cb:d8:be:d3:1c:24:fa:14:0d:4d:0b:45:05:a4:26: 44:8e:71:92:ad:ed:b7:04:58:45:5d:61:6e:aa:50:f9: 1a:ad:31:8b:9b:51:e9:21:95:5e:f2:e6:e7:b7:5e:7c: 68:40:8f:30:a7:fc:ae:7f:5c:80:0e:59:20:32:6a:81: 8e:7b:fc:3b:c3:02:7b:5e:0a:36:22:05:85:75:30:7b: b6:11:64:2a:49:58:b0:ca:20:be:8d:a2:51:8e:af:b0: 5f:42:8e:57:94:5f:3a:3d:da:7e:a2:c3:d0:fb:89:f3: aa:d3:0f:74:cc:d7:52:78:17:82:23:ea:82:ad:72:bd: 8d:e1:cd:b6:ae:ee:d4:24:a7:9d:5e:43:b5:67:c5:2b: 9b:24:24:39:77:44:6b:20:a4:d9:18:88:86:8f:14:e3: d6:cd:f0:19:dd:ef:04:b7:9e:ba:c9:33:f2:db:8e:70: 50:ae:01:7e:3c:71:3f:f2:79:0d:58:5a:42:11:29:26: 2e:33:7e:af:d8:85:14:cb:33:65:c3:1b:75:cb:8b:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6c:45:39:bc:a8:9a:e0:71:58:6e:b6:a6:cc:9a:64:1d: 33:32:e1:e4:44:75:f0:c6:d1:63:8b:7f:38:7d:0d:4c: 3f:6f:43:e8:c6:07:30:da:88:c9:08:4d:89:88:e7:bc: 79:20:98:d5:7d:12:a5:1a:1f:f4:18:07:d7:9c:18:b5: 7b:0e:6f:67:5d:ed:54:01:9f:c0:04:96:fe:32:ff:3a: c2:b0:50:4a:dd:50:bc:10:18:a7:f4:97:ec:6f:a4:e9: 43:48:43:d0:2a:dc:b8:32:32:b7:42:7f:2e:27:a9:a3: 03:6a:af:57:6e:7c:5c:03:1e:24:49:38:42:fd:49:12: 84:64:67:f5:12:17:f9:25:88:7c:88:01:a6:51:58:46: ff:0f:97:c2:bb:13:bc:61:1a:9b:e2:64:de:19:c1:cb: 1f:17:0c:cc:3e:be:c7:89:41:39:ce:8d:a5:dc:79:b9: e8:df:63:62:7d:b1:26:33:19:b2:29:20:bf:4d:4c:d6: da:a6:88:d0:0d:7b:49:dc:5c:d8:3a:15:3c:8d:67:35: 5a:92:2c:c9:e8:a9:09:03:d4:c2:90:c9:1b:44:f2:c6: c2:14:40:b3:a1:a7:3e:9b:d4:5f:08:6e:70:af:43:58: 0f:66:32:ff:d3:e6:2c:b6:e0:f0:a2:93:70:7f:ae:c0 Fingerprint (SHA-256): 4B:E4:89:B1:8F:19:3B:FD:23:35:8A:7D:A8:A4:BD:27:41:6B:11:3F:F1:F6:FC:99:32:4D:98:49:44:AC:B9:8E Fingerprint (SHA1): E6:00:57:E3:07:D2:FE:E7:BF:F6:22:4B:1A:4C:D8:7E:01:1E:24:BA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge21 Bridge,O=Bridge21,C=US" Certificate 4 Subject: "CN=Bridge13 Bridge,O=Bridge13,C=US" Returned value is 0, expected result is pass chains.sh: #1151: MegaBridge_3_2: Verifying certificate(s) EE1CA1.der CA1Bridge21.der Bridge21Bridge13.der Bridge13Root9.der with flags -d EE1DB -pp -t Root9.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1152: Extension: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165125 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1153: Extension: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1154: Extension: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1155: Extension: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1156: Extension: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018165126 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1157: Extension: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1158: Extension: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1159: Extension: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1160: Extension: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018165127 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1161: Extension: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1162: Extension: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1163: Extension: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1164: Extension: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018165128 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1165: Extension: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1166: Extension: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1167: Extension: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165125 (0x3caff785) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:01:45 2023 Not After : Wed Oct 18 17:01:45 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:c7:e4:d5:3a:0f:aa:51:85:a6:37:20:9e:ac:b5:f8: 4e:28:ed:0f:68:c5:3c:6a:28:15:8a:2f:d4:49:8b:52: af:8f:c8:69:ee:46:fc:c0:2d:29:85:20:49:88:4e:6c: 3a:55:94:31:53:81:a4:6d:8a:f5:5b:35:94:35:7c:6c: 6e:98:c2:99:5e:38:2f:4e:be:82:5a:50:0b:3f:76:bf: 90:a3:f9:15:ed:30:93:23:81:46:89:75:23:83:c2:bb: e1:5a:1e:e6:e1:60:51:ba:1b:4c:58:2c:f6:8e:dc:84: c3:ad:47:71:18:00:16:8d:f0:c3:61:bc:06:a2:17:72: 7f:43:70:a4:3a:82:30:4c:dd:91:e8:7b:47:ef:70:d6: 89:c5:a8:f8:fc:e8:ea:a1:11:c9:86:b3:c0:89:3e:91: 27:69:de:91:eb:0e:60:37:8e:9e:f5:2e:53:f2:ad:75: a6:01:73:fb:13:4c:cb:bd:51:f3:40:da:4d:45:f8:27: fc:03:9a:48:c5:d2:75:b6:2a:65:30:30:ae:9e:5f:32: 1a:ef:0a:bd:a4:83:53:4a:2e:15:07:1e:8b:a9:01:ef: 69:14:18:c0:7e:6e:5a:3d:7b:4c:02:7e:67:79:a3:25: b8:01:88:97:7e:7f:2b:a6:72:7f:3a:bd:97:2c:6b:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 09:96:b6:97:bd:a9:9f:9c:af:73:b6:49:cd:04:bf:af: 28:42:e5:7e:26:25:52:84:ee:87:ec:58:04:4e:50:0f: 3c:1a:97:86:96:ee:61:be:7c:e5:c9:cc:91:3b:da:74: 27:d9:9b:c2:cf:75:9d:1d:a5:70:74:6b:26:ea:7b:07: ed:45:dc:b8:da:10:cb:73:e3:37:19:ab:1d:4c:4e:44: 74:10:7e:b7:bc:d0:8c:57:05:89:56:1e:78:21:6a:0f: bd:83:43:fa:67:cf:26:f2:46:57:37:44:a5:35:64:6b: 82:d8:7a:39:e9:76:d5:3a:df:d0:63:e2:03:65:98:d1: c1:69:77:31:83:31:b7:b0:04:2d:f5:6f:4a:93:f9:5d: c2:15:a3:d2:ee:6d:8e:59:82:84:45:23:f3:04:08:66: 38:02:1e:82:24:a4:f9:ef:85:d3:25:e7:cd:82:10:bf: 7f:51:b5:23:2b:1d:f8:35:d6:0a:14:ad:95:37:65:03: 02:56:08:13:ca:64:7d:f0:51:93:3a:94:df:e9:a9:d6: a3:d1:d7:de:14:a2:27:6a:2f:79:f4:9e:7f:c8:4a:3f: 0d:cc:c4:67:d0:51:cb:51:87:91:91:8d:66:ce:d7:dd: ef:7f:eb:67:a9:ef:50:1e:55:ee:08:82:19:2f:10:70 Fingerprint (SHA-256): 46:44:D5:F8:4E:4E:0F:F9:AB:06:88:B3:5B:68:38:C4:74:FE:0C:8E:3A:EA:00:6C:80:3D:18:2A:4D:2D:91:95 Fingerprint (SHA1): B5:2E:A4:46:68:C1:6A:05:44:F2:F9:E1:C0:D9:D7:3D:C7:BD:49:17 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1168: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1169: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165126 (0x3caff786) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:01:48 2023 Not After : Wed Oct 18 17:01:48 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:98:1e:a5:2b:ec:2e:96:67:35:7b:67:cf:d2:2b:67: dc:9b:fc:92:3b:74:24:e2:e3:9a:5c:f1:73:32:4f:22: fc:18:6c:ed:b7:c6:0b:d0:98:df:c9:7b:d9:57:a6:ca: a7:d6:45:37:f3:dc:03:f9:10:fd:fe:8c:ba:11:44:66: 95:ec:07:9f:1b:86:be:94:77:51:f7:0e:46:97:10:cb: 25:cb:8e:4c:95:86:f7:7a:34:ca:69:5b:e2:cb:e9:f1: e5:43:6b:50:a0:09:61:b3:4b:b8:e0:dd:31:ec:ea:fb: d3:98:05:47:14:90:94:cd:77:e5:fc:87:85:05:de:ad: 30:77:c4:f7:fe:16:8d:d2:cd:7e:68:a7:22:bb:89:0c: 23:b3:23:14:ff:4b:f8:1d:e4:a1:2b:88:e5:87:0e:1b: a4:83:15:e9:b9:4c:9a:d9:51:38:64:28:ee:22:f3:3c: da:06:3c:47:1a:43:d4:8b:81:be:92:67:e7:a6:c2:1a: 95:a9:92:7e:54:90:2b:58:fa:1f:43:6d:ec:66:9e:bb: 64:af:af:16:00:96:2f:59:07:3e:c3:4b:91:49:9f:09: 45:75:70:9a:ad:09:de:02:d6:4f:b6:a8:3f:46:fb:f5: 6c:a9:df:08:b1:2a:f4:a4:8e:d2:41:51:9b:44:ae:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:a3:be:4e:78:19:85:2c:ff:c2:af:36:28:5b:04:ae: f0:61:4e:81:2c:fc:a7:1d:9f:14:aa:b2:e0:17:14:34: cd:b5:bd:2c:26:f6:f7:c8:8e:c3:cc:22:5d:ee:18:17: 33:15:fb:0c:46:a9:94:12:03:10:79:a6:d1:ce:df:e1: af:3e:8f:d5:2f:43:92:a2:6b:98:12:99:cc:ca:c8:d6: d1:cf:93:98:d4:a4:94:7d:fa:ec:0b:78:74:21:e5:9f: df:53:44:50:95:b7:4b:13:19:85:3f:87:07:12:bc:91: 79:cb:63:9d:78:37:fd:1b:8c:fe:43:0d:b7:2d:77:e4: ee:2a:1a:bd:87:4b:60:31:dc:5d:cc:ec:e2:88:4b:c5: 5c:90:89:8f:b3:26:17:74:19:d5:15:34:49:f4:5e:ca: 49:e8:bb:44:71:e6:6b:01:2d:74:13:3c:93:f6:01:15: 3b:b3:dd:7b:cf:5e:cd:3b:2e:17:27:8a:4f:4d:b6:81: bd:78:ef:91:d1:7e:e2:e8:f3:55:1b:6b:73:39:a6:6f: 36:ca:74:b3:d1:98:a3:7f:87:9e:55:cc:ce:46:e0:6d: f7:2a:82:6f:bb:96:58:9f:43:b9:8a:f5:bb:1a:f3:54: a1:2b:a1:4b:64:6f:02:20:7f:0a:e6:01:e7:f3:c1:87 Fingerprint (SHA-256): DE:22:E3:CE:88:49:59:DC:78:FD:DB:6D:7B:AD:B6:79:1F:79:89:23:8C:58:A2:E1:3D:DE:60:8F:B6:70:8E:A8 Fingerprint (SHA1): DD:0C:C4:74:4B:A4:C9:D5:80:FC:AC:1B:84:4F:76:3E:79:AD:63:11 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1170: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1171: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165127 (0x3caff787) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:01:51 2023 Not After : Wed Oct 18 17:01:51 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:e9:86:eb:69:7e:8d:3a:cd:76:ab:f7:4c:3a:11:9c: e5:36:1f:c3:04:07:47:ff:b4:b3:b6:b0:87:9f:b9:69: e7:c9:d9:64:84:08:aa:14:ff:ed:bf:ae:58:e6:a9:62: 1e:93:19:63:e5:6b:f5:b9:6c:49:d3:ca:3d:4a:da:4b: 6a:a7:2d:6f:d4:22:a9:c7:03:97:3c:51:0a:17:ed:c7: cb:af:09:2a:1e:7d:fc:83:6f:2d:34:39:ed:18:26:61: 37:43:c0:86:f0:aa:de:9c:ca:6c:76:9e:84:33:38:41: ee:d4:7a:f0:4d:00:09:cf:e2:93:b3:d1:91:a1:50:5f: c5:0e:d9:af:97:55:af:66:13:b2:e9:8a:68:de:c4:54: 8b:60:85:9d:23:f4:98:2f:67:62:96:66:fe:7d:97:34: b9:cb:96:fb:28:fd:6d:18:7c:83:d9:59:73:52:38:e0: fd:9a:28:3b:3b:89:c7:c1:da:4f:34:e3:c6:ee:0b:b5: 58:bf:7a:02:97:43:64:af:e2:47:ab:70:47:91:4e:4d: f7:d5:90:81:64:70:80:14:90:33:23:a8:8e:8e:15:39: 2f:6f:e3:56:32:34:c9:e4:ec:e3:63:3f:2f:ef:42:f4: fe:bc:62:66:38:cc:d8:f4:b6:ad:a9:74:29:e2:6d:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:bb:73:ce:40:fc:d5:c7:35:43:26:44:e6:ea:2b:37: 3d:75:ae:46:73:d6:02:da:bf:b5:f3:89:79:aa:9e:14: e8:88:7e:91:36:53:3c:a7:04:d0:1d:b3:70:f2:61:07: be:b1:e8:93:1c:f5:4f:4d:a5:d9:8b:ee:b4:43:bf:82: ff:04:0a:ab:33:3b:78:42:3e:93:3a:ae:a2:f1:e8:46: a6:19:ed:13:59:63:cf:1d:4d:2e:e4:40:ea:d8:36:7e: 5d:2b:c1:56:13:c1:2f:08:1a:7e:5d:3c:ed:34:d2:45: 41:dc:4f:e5:16:53:17:a6:94:bd:07:fd:ac:f5:c4:b7: 5d:86:67:00:c0:1a:e8:75:52:25:06:eb:b1:17:93:de: 34:3a:87:d3:74:47:2a:40:ed:a7:2a:c0:7b:d6:16:ae: d4:04:53:73:fe:97:88:b4:7d:9b:6c:dd:b4:62:fc:ea: 8b:d7:8b:6f:07:18:c0:7f:69:b3:28:29:e0:62:b0:65: a2:e9:9d:0f:a9:be:c4:6c:98:75:18:ee:7b:f1:a5:ca: 1d:b8:5b:be:95:2d:90:d9:4c:72:9d:73:16:3d:16:46: eb:4e:8d:97:6e:62:59:85:9e:f8:82:f5:70:3a:77:e0: 6c:8a:b3:67:a9:0a:a5:0d:3c:45:6b:3b:d1:cf:b4:a7 Fingerprint (SHA-256): 4E:FF:CE:FC:60:28:F4:1F:98:B0:5A:25:73:AE:23:F8:56:3D:BD:8D:E6:68:20:08:73:E7:19:0A:39:87:7C:6F Fingerprint (SHA1): FE:40:44:15:BF:66:72:D2:52:08:F9:D6:C2:60:67:C9:47:DB:F1:D8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1172: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1173: Extension: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1174: Extension: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1175: Extension: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1176: Extension: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165125 (0x3caff785) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:01:45 2023 Not After : Wed Oct 18 17:01:45 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:c7:e4:d5:3a:0f:aa:51:85:a6:37:20:9e:ac:b5:f8: 4e:28:ed:0f:68:c5:3c:6a:28:15:8a:2f:d4:49:8b:52: af:8f:c8:69:ee:46:fc:c0:2d:29:85:20:49:88:4e:6c: 3a:55:94:31:53:81:a4:6d:8a:f5:5b:35:94:35:7c:6c: 6e:98:c2:99:5e:38:2f:4e:be:82:5a:50:0b:3f:76:bf: 90:a3:f9:15:ed:30:93:23:81:46:89:75:23:83:c2:bb: e1:5a:1e:e6:e1:60:51:ba:1b:4c:58:2c:f6:8e:dc:84: c3:ad:47:71:18:00:16:8d:f0:c3:61:bc:06:a2:17:72: 7f:43:70:a4:3a:82:30:4c:dd:91:e8:7b:47:ef:70:d6: 89:c5:a8:f8:fc:e8:ea:a1:11:c9:86:b3:c0:89:3e:91: 27:69:de:91:eb:0e:60:37:8e:9e:f5:2e:53:f2:ad:75: a6:01:73:fb:13:4c:cb:bd:51:f3:40:da:4d:45:f8:27: fc:03:9a:48:c5:d2:75:b6:2a:65:30:30:ae:9e:5f:32: 1a:ef:0a:bd:a4:83:53:4a:2e:15:07:1e:8b:a9:01:ef: 69:14:18:c0:7e:6e:5a:3d:7b:4c:02:7e:67:79:a3:25: b8:01:88:97:7e:7f:2b:a6:72:7f:3a:bd:97:2c:6b:45 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 09:96:b6:97:bd:a9:9f:9c:af:73:b6:49:cd:04:bf:af: 28:42:e5:7e:26:25:52:84:ee:87:ec:58:04:4e:50:0f: 3c:1a:97:86:96:ee:61:be:7c:e5:c9:cc:91:3b:da:74: 27:d9:9b:c2:cf:75:9d:1d:a5:70:74:6b:26:ea:7b:07: ed:45:dc:b8:da:10:cb:73:e3:37:19:ab:1d:4c:4e:44: 74:10:7e:b7:bc:d0:8c:57:05:89:56:1e:78:21:6a:0f: bd:83:43:fa:67:cf:26:f2:46:57:37:44:a5:35:64:6b: 82:d8:7a:39:e9:76:d5:3a:df:d0:63:e2:03:65:98:d1: c1:69:77:31:83:31:b7:b0:04:2d:f5:6f:4a:93:f9:5d: c2:15:a3:d2:ee:6d:8e:59:82:84:45:23:f3:04:08:66: 38:02:1e:82:24:a4:f9:ef:85:d3:25:e7:cd:82:10:bf: 7f:51:b5:23:2b:1d:f8:35:d6:0a:14:ad:95:37:65:03: 02:56:08:13:ca:64:7d:f0:51:93:3a:94:df:e9:a9:d6: a3:d1:d7:de:14:a2:27:6a:2f:79:f4:9e:7f:c8:4a:3f: 0d:cc:c4:67:d0:51:cb:51:87:91:91:8d:66:ce:d7:dd: ef:7f:eb:67:a9:ef:50:1e:55:ee:08:82:19:2f:10:70 Fingerprint (SHA-256): 46:44:D5:F8:4E:4E:0F:F9:AB:06:88:B3:5B:68:38:C4:74:FE:0C:8E:3A:EA:00:6C:80:3D:18:2A:4D:2D:91:95 Fingerprint (SHA1): B5:2E:A4:46:68:C1:6A:05:44:F2:F9:E1:C0:D9:D7:3D:C7:BD:49:17 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1177: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1178: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165126 (0x3caff786) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:01:48 2023 Not After : Wed Oct 18 17:01:48 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bf:98:1e:a5:2b:ec:2e:96:67:35:7b:67:cf:d2:2b:67: dc:9b:fc:92:3b:74:24:e2:e3:9a:5c:f1:73:32:4f:22: fc:18:6c:ed:b7:c6:0b:d0:98:df:c9:7b:d9:57:a6:ca: a7:d6:45:37:f3:dc:03:f9:10:fd:fe:8c:ba:11:44:66: 95:ec:07:9f:1b:86:be:94:77:51:f7:0e:46:97:10:cb: 25:cb:8e:4c:95:86:f7:7a:34:ca:69:5b:e2:cb:e9:f1: e5:43:6b:50:a0:09:61:b3:4b:b8:e0:dd:31:ec:ea:fb: d3:98:05:47:14:90:94:cd:77:e5:fc:87:85:05:de:ad: 30:77:c4:f7:fe:16:8d:d2:cd:7e:68:a7:22:bb:89:0c: 23:b3:23:14:ff:4b:f8:1d:e4:a1:2b:88:e5:87:0e:1b: a4:83:15:e9:b9:4c:9a:d9:51:38:64:28:ee:22:f3:3c: da:06:3c:47:1a:43:d4:8b:81:be:92:67:e7:a6:c2:1a: 95:a9:92:7e:54:90:2b:58:fa:1f:43:6d:ec:66:9e:bb: 64:af:af:16:00:96:2f:59:07:3e:c3:4b:91:49:9f:09: 45:75:70:9a:ad:09:de:02:d6:4f:b6:a8:3f:46:fb:f5: 6c:a9:df:08:b1:2a:f4:a4:8e:d2:41:51:9b:44:ae:6d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5f:a3:be:4e:78:19:85:2c:ff:c2:af:36:28:5b:04:ae: f0:61:4e:81:2c:fc:a7:1d:9f:14:aa:b2:e0:17:14:34: cd:b5:bd:2c:26:f6:f7:c8:8e:c3:cc:22:5d:ee:18:17: 33:15:fb:0c:46:a9:94:12:03:10:79:a6:d1:ce:df:e1: af:3e:8f:d5:2f:43:92:a2:6b:98:12:99:cc:ca:c8:d6: d1:cf:93:98:d4:a4:94:7d:fa:ec:0b:78:74:21:e5:9f: df:53:44:50:95:b7:4b:13:19:85:3f:87:07:12:bc:91: 79:cb:63:9d:78:37:fd:1b:8c:fe:43:0d:b7:2d:77:e4: ee:2a:1a:bd:87:4b:60:31:dc:5d:cc:ec:e2:88:4b:c5: 5c:90:89:8f:b3:26:17:74:19:d5:15:34:49:f4:5e:ca: 49:e8:bb:44:71:e6:6b:01:2d:74:13:3c:93:f6:01:15: 3b:b3:dd:7b:cf:5e:cd:3b:2e:17:27:8a:4f:4d:b6:81: bd:78:ef:91:d1:7e:e2:e8:f3:55:1b:6b:73:39:a6:6f: 36:ca:74:b3:d1:98:a3:7f:87:9e:55:cc:ce:46:e0:6d: f7:2a:82:6f:bb:96:58:9f:43:b9:8a:f5:bb:1a:f3:54: a1:2b:a1:4b:64:6f:02:20:7f:0a:e6:01:e7:f3:c1:87 Fingerprint (SHA-256): DE:22:E3:CE:88:49:59:DC:78:FD:DB:6D:7B:AD:B6:79:1F:79:89:23:8C:58:A2:E1:3D:DE:60:8F:B6:70:8E:A8 Fingerprint (SHA1): DD:0C:C4:74:4B:A4:C9:D5:80:FC:AC:1B:84:4F:76:3E:79:AD:63:11 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1179: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1180: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165127 (0x3caff787) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:01:51 2023 Not After : Wed Oct 18 17:01:51 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c7:e9:86:eb:69:7e:8d:3a:cd:76:ab:f7:4c:3a:11:9c: e5:36:1f:c3:04:07:47:ff:b4:b3:b6:b0:87:9f:b9:69: e7:c9:d9:64:84:08:aa:14:ff:ed:bf:ae:58:e6:a9:62: 1e:93:19:63:e5:6b:f5:b9:6c:49:d3:ca:3d:4a:da:4b: 6a:a7:2d:6f:d4:22:a9:c7:03:97:3c:51:0a:17:ed:c7: cb:af:09:2a:1e:7d:fc:83:6f:2d:34:39:ed:18:26:61: 37:43:c0:86:f0:aa:de:9c:ca:6c:76:9e:84:33:38:41: ee:d4:7a:f0:4d:00:09:cf:e2:93:b3:d1:91:a1:50:5f: c5:0e:d9:af:97:55:af:66:13:b2:e9:8a:68:de:c4:54: 8b:60:85:9d:23:f4:98:2f:67:62:96:66:fe:7d:97:34: b9:cb:96:fb:28:fd:6d:18:7c:83:d9:59:73:52:38:e0: fd:9a:28:3b:3b:89:c7:c1:da:4f:34:e3:c6:ee:0b:b5: 58:bf:7a:02:97:43:64:af:e2:47:ab:70:47:91:4e:4d: f7:d5:90:81:64:70:80:14:90:33:23:a8:8e:8e:15:39: 2f:6f:e3:56:32:34:c9:e4:ec:e3:63:3f:2f:ef:42:f4: fe:bc:62:66:38:cc:d8:f4:b6:ad:a9:74:29:e2:6d:23 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 77:bb:73:ce:40:fc:d5:c7:35:43:26:44:e6:ea:2b:37: 3d:75:ae:46:73:d6:02:da:bf:b5:f3:89:79:aa:9e:14: e8:88:7e:91:36:53:3c:a7:04:d0:1d:b3:70:f2:61:07: be:b1:e8:93:1c:f5:4f:4d:a5:d9:8b:ee:b4:43:bf:82: ff:04:0a:ab:33:3b:78:42:3e:93:3a:ae:a2:f1:e8:46: a6:19:ed:13:59:63:cf:1d:4d:2e:e4:40:ea:d8:36:7e: 5d:2b:c1:56:13:c1:2f:08:1a:7e:5d:3c:ed:34:d2:45: 41:dc:4f:e5:16:53:17:a6:94:bd:07:fd:ac:f5:c4:b7: 5d:86:67:00:c0:1a:e8:75:52:25:06:eb:b1:17:93:de: 34:3a:87:d3:74:47:2a:40:ed:a7:2a:c0:7b:d6:16:ae: d4:04:53:73:fe:97:88:b4:7d:9b:6c:dd:b4:62:fc:ea: 8b:d7:8b:6f:07:18:c0:7f:69:b3:28:29:e0:62:b0:65: a2:e9:9d:0f:a9:be:c4:6c:98:75:18:ee:7b:f1:a5:ca: 1d:b8:5b:be:95:2d:90:d9:4c:72:9d:73:16:3d:16:46: eb:4e:8d:97:6e:62:59:85:9e:f8:82:f5:70:3a:77:e0: 6c:8a:b3:67:a9:0a:a5:0d:3c:45:6b:3b:d1:cf:b4:a7 Fingerprint (SHA-256): 4E:FF:CE:FC:60:28:F4:1F:98:B0:5A:25:73:AE:23:F8:56:3D:BD:8D:E6:68:20:08:73:E7:19:0A:39:87:7C:6F Fingerprint (SHA1): FE:40:44:15:BF:66:72:D2:52:08:F9:D6:C2:60:67:C9:47:DB:F1:D8 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1181: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1182: Extension: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1183: Extension2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165129 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1184: Extension2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1185: Extension2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1186: Extension2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1187: Extension2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018165130 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1188: Extension2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1189: Extension2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1190: Extension2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1191: Extension2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018165131 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1192: Extension2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1193: Extension2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1194: Extension2: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1195: Extension2: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018165132 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1196: Extension2: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1197: Extension2: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1198: Extension2: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1199: Extension2: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018165133 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1200: Extension2: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1201: Extension2: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1202: Extension2: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165129 (0x3caff789) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:02:01 2023 Not After : Wed Oct 18 17:02:01 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:77:bd:83:3c:2f:b2:24:68:9d:bf:35:c8:7d:31:08: 3c:89:07:1d:0f:e3:91:29:7e:83:8e:9d:89:aa:79:8f: 94:82:7d:61:da:2d:2f:4b:fb:0b:d0:e7:b9:df:8c:57: 4d:db:c1:a8:7d:34:ca:34:4e:19:fa:54:1d:20:54:8d: f2:75:12:bc:fc:8f:af:a7:ad:66:e5:a2:02:4d:69:19: 7a:ca:d9:1c:88:b0:d5:7d:db:5a:01:5f:a4:5c:02:f0: d1:75:8d:19:a1:45:f3:48:16:54:d3:05:47:79:da:06: f9:64:99:76:aa:3f:42:d1:f1:9e:09:9a:22:24:ae:c9: a1:16:b9:57:9e:cb:53:cb:f9:c8:ef:ca:3b:f2:a7:ce: 92:1b:ab:90:0f:90:c4:bb:91:ab:9b:d9:37:1d:a1:48: a9:b1:98:b2:ce:e8:36:7a:9f:8b:95:f3:6a:2c:ba:2f: c7:1e:da:02:b6:9a:76:fa:2f:d2:e2:f4:28:cb:fa:86: 99:a1:b7:3c:b5:df:f8:18:88:67:94:f9:8e:be:7d:75: 77:18:17:c7:7f:78:84:d2:aa:1f:70:6f:fc:99:a0:19: b3:ef:2a:79:08:e3:ad:ae:27:87:fd:52:d1:ee:23:64: 1e:a0:83:ff:95:d6:83:df:21:cd:19:48:43:db:b5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:74:73:0c:1c:60:3d:52:5a:c1:7f:fe:a6:fb:22:ac: d2:c6:08:39:c2:49:1b:c9:55:03:ae:0a:67:b7:e4:9d: 1d:68:56:52:98:07:13:8b:c3:42:e8:de:8b:20:b0:9d: e5:7d:5e:bf:cd:b0:57:f5:b3:88:8d:6d:30:b5:b6:3c: 25:e5:23:30:d4:20:e9:bc:5f:61:52:9e:28:35:e8:34: 2a:52:e5:0d:61:d1:3f:2b:a9:6b:40:f5:c8:76:eb:29: 5f:4e:09:78:04:2e:60:c6:f7:6f:41:1a:61:30:aa:16: fa:81:23:07:8c:d9:39:77:09:69:b3:42:e4:51:02:a4: d5:b3:d7:a4:8a:35:68:71:fd:eb:dd:66:48:b2:df:3b: aa:39:99:5c:c3:25:c1:65:9f:b1:b4:f5:58:7e:a0:05: a4:69:e4:85:ce:33:c9:fc:ea:59:1f:7e:7d:5b:ba:f2: 16:b3:7f:67:cd:43:94:dd:f6:a3:e1:51:aa:84:c2:da: 21:b7:40:fe:9b:82:05:5b:aa:85:97:c4:45:3d:78:6d: d9:44:f4:cc:da:5f:f4:37:4a:33:78:44:bd:78:e0:4c: 5f:ba:6b:fa:73:c3:01:c1:56:88:2e:9c:b9:67:51:d8: 1c:a0:7a:ce:04:d1:3f:d9:94:4c:ea:87:25:9c:7d:4e Fingerprint (SHA-256): 36:71:E5:A5:27:3B:5A:32:4A:BF:EF:5B:9C:46:67:17:CC:11:7D:23:3D:60:23:27:DA:A2:6F:0C:3C:A0:21:20 Fingerprint (SHA1): 97:B4:BA:F8:D8:8B:0A:D9:8F:F1:34:2E:CF:5A:D3:62:54:9E:CA:ED Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1203: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1204: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der Root.der with flags -d AllDB -pp -o OID.2.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165130 (0x3caff78a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:02:04 2023 Not After : Wed Oct 18 17:02:04 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:a8:35:01:05:87:4a:70:fb:73:d9:9d:64:bb:78:31: 2e:91:55:60:88:b5:82:21:30:dd:a1:cb:41:62:e6:9e: bb:a8:27:af:93:59:97:b3:12:df:b3:ec:17:06:71:e3: 0c:f2:ce:9a:1e:d4:34:94:c8:c2:b1:8c:3f:62:b1:99: 1d:01:dc:22:2c:49:51:ec:06:35:ab:c3:d1:5d:a2:bc: 9e:09:05:85:b8:2a:6e:a0:33:9b:19:be:df:3f:3e:ca: c3:04:1c:dd:19:7b:ba:70:de:07:af:81:7a:21:86:e6: ab:c6:90:4c:01:b0:cf:cf:73:64:0e:0f:68:8c:dc:82: 07:dc:8b:79:39:c4:65:52:61:8a:c3:9b:f3:28:e6:fe: 4b:ca:68:0f:ff:22:a2:c1:d7:75:8a:b1:5a:c9:f4:cf: 2c:37:f8:ed:5f:59:c0:b4:57:24:0f:ad:88:9d:9e:96: 39:ea:8c:df:3a:15:c8:57:ab:e2:5e:d7:f7:92:6a:8e: a0:7a:99:cd:ca:b7:d1:e1:d4:a7:73:19:04:8f:0d:2b: 47:88:25:bd:fc:cc:b5:60:0f:48:4a:4c:28:07:d5:1f: 40:c3:a5:d5:00:84:6e:ab:7e:c5:38:31:69:4e:df:00: 2d:8d:76:0b:18:73:ec:4f:3f:7a:c4:ef:96:26:5e:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:91:a2:39:c8:67:b9:f6:54:93:5a:34:5d:25:3e:49: 64:34:42:66:d5:df:a7:0c:9a:64:d2:5c:46:7f:6e:c0: 61:4d:9c:0f:63:1b:f3:8f:4e:f6:d3:a8:ed:79:5a:26: 78:df:a6:70:62:d6:4f:73:ff:08:36:e5:ee:04:0a:b6: 32:59:08:d8:17:bf:60:a0:99:bd:cb:df:e7:47:e7:03: 5d:2a:f8:d8:87:26:6d:8b:4c:ee:28:3c:58:be:33:53: d0:16:14:f8:8f:68:1b:c4:8f:69:be:40:29:32:4c:c6: f5:97:c4:2f:43:6e:35:c6:7a:3c:f9:4c:cc:57:5d:f6: 93:27:7f:80:a1:6b:6d:c0:4d:46:8e:50:2f:24:b7:0f: 67:8c:c0:4c:c1:62:ff:0f:7f:6a:6d:a2:20:f8:39:dc: 08:ba:42:b3:d0:35:e4:34:57:ba:30:06:6b:b7:80:b2: 77:0c:e9:e9:b9:22:91:33:b1:0f:99:a4:c9:3e:c7:57: 09:12:fd:ba:fa:6a:bd:e6:bc:25:fb:b8:22:90:09:23: 43:f7:c4:24:0a:89:b6:a8:9d:21:27:a0:37:5a:48:a0: 30:18:0c:7c:04:30:23:24:42:a1:78:28:b4:a4:c3:19: 63:b2:37:35:cf:8e:d9:8e:2b:cc:10:20:cc:75:57:ab Fingerprint (SHA-256): 49:29:21:A3:61:68:B5:48:49:DE:06:57:5D:C4:23:B6:AD:3A:1E:A6:29:D8:C0:6E:1C:4C:7F:C1:45:D3:E4:59 Fingerprint (SHA1): 95:7A:69:94:6C:0A:BA:C6:82:BC:87:72:79:E2:D7:CA:9A:97:AA:FA Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1205: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.1.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der CA1Root.der -t CA1Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1206: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der CA1Root.der with flags -d AllDB -pp -o OID.2.0 -t CA1Root.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165131 (0x3caff78b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:02:07 2023 Not After : Wed Oct 18 17:02:07 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:28:77:c7:da:ea:c4:5c:03:e4:c0:c9:03:b7:37:d0: 3f:68:1c:a1:fa:f2:05:f0:81:83:e9:e8:ae:6c:0a:26: fc:f1:dd:d8:74:91:ec:21:d8:c9:d0:fa:86:5d:24:a1: c7:0c:17:50:9d:5e:9f:f4:62:96:d0:f2:22:74:c7:b4: ff:37:49:2e:07:f7:93:c2:36:64:e2:cf:7d:14:7f:7b: 9d:0f:98:7a:ee:86:58:17:52:d7:88:69:c4:f2:4a:3f: ab:dd:a2:51:09:f5:11:58:d5:c0:ff:f6:21:e1:83:18: 48:34:8f:64:bf:72:a8:1c:2a:eb:e0:ba:f9:14:fc:4e: 04:fd:9b:e8:cf:ea:0b:df:01:e0:5a:e6:0b:4d:32:d0: db:f1:10:e3:b1:76:e7:c2:90:c8:5c:e3:a2:23:ef:79: 8a:03:c9:c6:0d:cc:15:bf:1d:94:b2:ba:a6:57:52:84: 0a:db:62:fe:03:37:54:12:36:a7:04:3f:8a:5b:d1:02: f1:16:da:e3:41:37:41:5b:07:94:de:ff:2e:7a:14:d1: 02:27:e9:40:37:ed:4a:69:e8:ca:4b:87:7f:c4:47:34: 6c:7c:09:ee:04:4d:6d:0e:8d:b0:e2:7b:65:71:49:05: 00:40:9e:c5:84:66:4d:71:92:0a:5c:bc:5c:0e:91:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:0e:8c:84:35:aa:aa:2e:b8:59:ee:b0:75:ea:6a:99: ed:99:47:ff:37:44:b2:c8:95:b5:05:74:0f:34:b9:bc: 99:d8:65:06:4d:4d:12:c6:02:ae:fe:4b:65:fc:f2:f5: 12:9d:d9:cf:67:13:5a:5b:3a:e2:7c:92:52:b3:d1:18: 75:89:02:1a:af:2e:e5:68:0e:d1:5d:37:b4:98:ec:f7: 1f:9d:4a:6f:9b:93:6b:6a:c2:2f:24:ec:5b:bb:51:cf: bf:20:35:8c:40:c1:94:29:72:66:3b:aa:11:be:16:3c: ff:ea:4e:c9:81:9b:0c:fc:df:4d:3e:ae:7c:fd:38:0e: 90:7f:5d:b0:21:d1:5f:b5:3a:71:dd:21:68:62:c1:a3: 3f:ac:1c:7d:89:ba:14:d1:b9:93:61:d5:0b:be:b5:53: e6:15:2a:ff:3f:a8:10:a5:5d:4a:5d:2c:1f:95:3b:dc: c6:92:bf:5b:cf:cf:76:7b:3c:fa:99:a3:26:2c:2a:8f: 04:91:1d:09:25:b7:f4:1b:2e:0e:b9:21:5d:30:31:af: a2:b4:bf:42:71:0c:2d:fd:ec:16:35:b5:95:8f:d6:27: 2a:db:47:f0:50:4e:ed:96:57:16:30:0a:25:01:41:ec: fc:5d:b2:86:25:9a:f3:da:d9:22:1c:a7:1c:e5:f9:00 Fingerprint (SHA-256): C7:6A:03:E3:46:91:C1:8C:54:6B:89:8C:3C:14:E9:14:11:2A:94:4A:D8:2C:3C:ED:E9:ED:CB:A2:73:C3:8D:00 Fingerprint (SHA1): C2:AA:FB:84:2F:DA:8A:4D:65:40:06:6F:27:9A:AA:B3:9D:E7:BF:DC Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1207: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.1.0 -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der CA2CA1.der -t CA2CA1.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1208: Extension2: Verifying certificate(s) User1CA2.der CA2CA1.der with flags -d AllDB -pp -o OID.2.0 -t CA2CA1.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1209: Extension2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1210: Extension2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1211: Extension2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165129 (0x3caff789) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:02:01 2023 Not After : Wed Oct 18 17:02:01 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:77:bd:83:3c:2f:b2:24:68:9d:bf:35:c8:7d:31:08: 3c:89:07:1d:0f:e3:91:29:7e:83:8e:9d:89:aa:79:8f: 94:82:7d:61:da:2d:2f:4b:fb:0b:d0:e7:b9:df:8c:57: 4d:db:c1:a8:7d:34:ca:34:4e:19:fa:54:1d:20:54:8d: f2:75:12:bc:fc:8f:af:a7:ad:66:e5:a2:02:4d:69:19: 7a:ca:d9:1c:88:b0:d5:7d:db:5a:01:5f:a4:5c:02:f0: d1:75:8d:19:a1:45:f3:48:16:54:d3:05:47:79:da:06: f9:64:99:76:aa:3f:42:d1:f1:9e:09:9a:22:24:ae:c9: a1:16:b9:57:9e:cb:53:cb:f9:c8:ef:ca:3b:f2:a7:ce: 92:1b:ab:90:0f:90:c4:bb:91:ab:9b:d9:37:1d:a1:48: a9:b1:98:b2:ce:e8:36:7a:9f:8b:95:f3:6a:2c:ba:2f: c7:1e:da:02:b6:9a:76:fa:2f:d2:e2:f4:28:cb:fa:86: 99:a1:b7:3c:b5:df:f8:18:88:67:94:f9:8e:be:7d:75: 77:18:17:c7:7f:78:84:d2:aa:1f:70:6f:fc:99:a0:19: b3:ef:2a:79:08:e3:ad:ae:27:87:fd:52:d1:ee:23:64: 1e:a0:83:ff:95:d6:83:df:21:cd:19:48:43:db:b5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:74:73:0c:1c:60:3d:52:5a:c1:7f:fe:a6:fb:22:ac: d2:c6:08:39:c2:49:1b:c9:55:03:ae:0a:67:b7:e4:9d: 1d:68:56:52:98:07:13:8b:c3:42:e8:de:8b:20:b0:9d: e5:7d:5e:bf:cd:b0:57:f5:b3:88:8d:6d:30:b5:b6:3c: 25:e5:23:30:d4:20:e9:bc:5f:61:52:9e:28:35:e8:34: 2a:52:e5:0d:61:d1:3f:2b:a9:6b:40:f5:c8:76:eb:29: 5f:4e:09:78:04:2e:60:c6:f7:6f:41:1a:61:30:aa:16: fa:81:23:07:8c:d9:39:77:09:69:b3:42:e4:51:02:a4: d5:b3:d7:a4:8a:35:68:71:fd:eb:dd:66:48:b2:df:3b: aa:39:99:5c:c3:25:c1:65:9f:b1:b4:f5:58:7e:a0:05: a4:69:e4:85:ce:33:c9:fc:ea:59:1f:7e:7d:5b:ba:f2: 16:b3:7f:67:cd:43:94:dd:f6:a3:e1:51:aa:84:c2:da: 21:b7:40:fe:9b:82:05:5b:aa:85:97:c4:45:3d:78:6d: d9:44:f4:cc:da:5f:f4:37:4a:33:78:44:bd:78:e0:4c: 5f:ba:6b:fa:73:c3:01:c1:56:88:2e:9c:b9:67:51:d8: 1c:a0:7a:ce:04:d1:3f:d9:94:4c:ea:87:25:9c:7d:4e Fingerprint (SHA-256): 36:71:E5:A5:27:3B:5A:32:4A:BF:EF:5B:9C:46:67:17:CC:11:7D:23:3D:60:23:27:DA:A2:6F:0C:3C:A0:21:20 Fingerprint (SHA1): 97:B4:BA:F8:D8:8B:0A:D9:8F:F1:34:2E:CF:5A:D3:62:54:9E:CA:ED Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1212: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1213: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165130 (0x3caff78a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:02:04 2023 Not After : Wed Oct 18 17:02:04 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:a8:35:01:05:87:4a:70:fb:73:d9:9d:64:bb:78:31: 2e:91:55:60:88:b5:82:21:30:dd:a1:cb:41:62:e6:9e: bb:a8:27:af:93:59:97:b3:12:df:b3:ec:17:06:71:e3: 0c:f2:ce:9a:1e:d4:34:94:c8:c2:b1:8c:3f:62:b1:99: 1d:01:dc:22:2c:49:51:ec:06:35:ab:c3:d1:5d:a2:bc: 9e:09:05:85:b8:2a:6e:a0:33:9b:19:be:df:3f:3e:ca: c3:04:1c:dd:19:7b:ba:70:de:07:af:81:7a:21:86:e6: ab:c6:90:4c:01:b0:cf:cf:73:64:0e:0f:68:8c:dc:82: 07:dc:8b:79:39:c4:65:52:61:8a:c3:9b:f3:28:e6:fe: 4b:ca:68:0f:ff:22:a2:c1:d7:75:8a:b1:5a:c9:f4:cf: 2c:37:f8:ed:5f:59:c0:b4:57:24:0f:ad:88:9d:9e:96: 39:ea:8c:df:3a:15:c8:57:ab:e2:5e:d7:f7:92:6a:8e: a0:7a:99:cd:ca:b7:d1:e1:d4:a7:73:19:04:8f:0d:2b: 47:88:25:bd:fc:cc:b5:60:0f:48:4a:4c:28:07:d5:1f: 40:c3:a5:d5:00:84:6e:ab:7e:c5:38:31:69:4e:df:00: 2d:8d:76:0b:18:73:ec:4f:3f:7a:c4:ef:96:26:5e:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:91:a2:39:c8:67:b9:f6:54:93:5a:34:5d:25:3e:49: 64:34:42:66:d5:df:a7:0c:9a:64:d2:5c:46:7f:6e:c0: 61:4d:9c:0f:63:1b:f3:8f:4e:f6:d3:a8:ed:79:5a:26: 78:df:a6:70:62:d6:4f:73:ff:08:36:e5:ee:04:0a:b6: 32:59:08:d8:17:bf:60:a0:99:bd:cb:df:e7:47:e7:03: 5d:2a:f8:d8:87:26:6d:8b:4c:ee:28:3c:58:be:33:53: d0:16:14:f8:8f:68:1b:c4:8f:69:be:40:29:32:4c:c6: f5:97:c4:2f:43:6e:35:c6:7a:3c:f9:4c:cc:57:5d:f6: 93:27:7f:80:a1:6b:6d:c0:4d:46:8e:50:2f:24:b7:0f: 67:8c:c0:4c:c1:62:ff:0f:7f:6a:6d:a2:20:f8:39:dc: 08:ba:42:b3:d0:35:e4:34:57:ba:30:06:6b:b7:80:b2: 77:0c:e9:e9:b9:22:91:33:b1:0f:99:a4:c9:3e:c7:57: 09:12:fd:ba:fa:6a:bd:e6:bc:25:fb:b8:22:90:09:23: 43:f7:c4:24:0a:89:b6:a8:9d:21:27:a0:37:5a:48:a0: 30:18:0c:7c:04:30:23:24:42:a1:78:28:b4:a4:c3:19: 63:b2:37:35:cf:8e:d9:8e:2b:cc:10:20:cc:75:57:ab Fingerprint (SHA-256): 49:29:21:A3:61:68:B5:48:49:DE:06:57:5D:C4:23:B6:AD:3A:1E:A6:29:D8:C0:6E:1C:4C:7F:C1:45:D3:E4:59 Fingerprint (SHA1): 95:7A:69:94:6C:0A:BA:C6:82:BC:87:72:79:E2:D7:CA:9A:97:AA:FA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1214: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1215: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165131 (0x3caff78b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:02:07 2023 Not After : Wed Oct 18 17:02:07 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:28:77:c7:da:ea:c4:5c:03:e4:c0:c9:03:b7:37:d0: 3f:68:1c:a1:fa:f2:05:f0:81:83:e9:e8:ae:6c:0a:26: fc:f1:dd:d8:74:91:ec:21:d8:c9:d0:fa:86:5d:24:a1: c7:0c:17:50:9d:5e:9f:f4:62:96:d0:f2:22:74:c7:b4: ff:37:49:2e:07:f7:93:c2:36:64:e2:cf:7d:14:7f:7b: 9d:0f:98:7a:ee:86:58:17:52:d7:88:69:c4:f2:4a:3f: ab:dd:a2:51:09:f5:11:58:d5:c0:ff:f6:21:e1:83:18: 48:34:8f:64:bf:72:a8:1c:2a:eb:e0:ba:f9:14:fc:4e: 04:fd:9b:e8:cf:ea:0b:df:01:e0:5a:e6:0b:4d:32:d0: db:f1:10:e3:b1:76:e7:c2:90:c8:5c:e3:a2:23:ef:79: 8a:03:c9:c6:0d:cc:15:bf:1d:94:b2:ba:a6:57:52:84: 0a:db:62:fe:03:37:54:12:36:a7:04:3f:8a:5b:d1:02: f1:16:da:e3:41:37:41:5b:07:94:de:ff:2e:7a:14:d1: 02:27:e9:40:37:ed:4a:69:e8:ca:4b:87:7f:c4:47:34: 6c:7c:09:ee:04:4d:6d:0e:8d:b0:e2:7b:65:71:49:05: 00:40:9e:c5:84:66:4d:71:92:0a:5c:bc:5c:0e:91:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:0e:8c:84:35:aa:aa:2e:b8:59:ee:b0:75:ea:6a:99: ed:99:47:ff:37:44:b2:c8:95:b5:05:74:0f:34:b9:bc: 99:d8:65:06:4d:4d:12:c6:02:ae:fe:4b:65:fc:f2:f5: 12:9d:d9:cf:67:13:5a:5b:3a:e2:7c:92:52:b3:d1:18: 75:89:02:1a:af:2e:e5:68:0e:d1:5d:37:b4:98:ec:f7: 1f:9d:4a:6f:9b:93:6b:6a:c2:2f:24:ec:5b:bb:51:cf: bf:20:35:8c:40:c1:94:29:72:66:3b:aa:11:be:16:3c: ff:ea:4e:c9:81:9b:0c:fc:df:4d:3e:ae:7c:fd:38:0e: 90:7f:5d:b0:21:d1:5f:b5:3a:71:dd:21:68:62:c1:a3: 3f:ac:1c:7d:89:ba:14:d1:b9:93:61:d5:0b:be:b5:53: e6:15:2a:ff:3f:a8:10:a5:5d:4a:5d:2c:1f:95:3b:dc: c6:92:bf:5b:cf:cf:76:7b:3c:fa:99:a3:26:2c:2a:8f: 04:91:1d:09:25:b7:f4:1b:2e:0e:b9:21:5d:30:31:af: a2:b4:bf:42:71:0c:2d:fd:ec:16:35:b5:95:8f:d6:27: 2a:db:47:f0:50:4e:ed:96:57:16:30:0a:25:01:41:ec: fc:5d:b2:86:25:9a:f3:da:d9:22:1c:a7:1c:e5:f9:00 Fingerprint (SHA-256): C7:6A:03:E3:46:91:C1:8C:54:6B:89:8C:3C:14:E9:14:11:2A:94:4A:D8:2C:3C:ED:E9:ED:CB:A2:73:C3:8D:00 Fingerprint (SHA1): C2:AA:FB:84:2F:DA:8A:4D:65:40:06:6F:27:9A:AA:B3:9D:E7:BF:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Returned value is 0, expected result is pass chains.sh: #1216: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1217: Extension2: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165129 (0x3caff789) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:02:01 2023 Not After : Wed Oct 18 17:02:01 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:77:bd:83:3c:2f:b2:24:68:9d:bf:35:c8:7d:31:08: 3c:89:07:1d:0f:e3:91:29:7e:83:8e:9d:89:aa:79:8f: 94:82:7d:61:da:2d:2f:4b:fb:0b:d0:e7:b9:df:8c:57: 4d:db:c1:a8:7d:34:ca:34:4e:19:fa:54:1d:20:54:8d: f2:75:12:bc:fc:8f:af:a7:ad:66:e5:a2:02:4d:69:19: 7a:ca:d9:1c:88:b0:d5:7d:db:5a:01:5f:a4:5c:02:f0: d1:75:8d:19:a1:45:f3:48:16:54:d3:05:47:79:da:06: f9:64:99:76:aa:3f:42:d1:f1:9e:09:9a:22:24:ae:c9: a1:16:b9:57:9e:cb:53:cb:f9:c8:ef:ca:3b:f2:a7:ce: 92:1b:ab:90:0f:90:c4:bb:91:ab:9b:d9:37:1d:a1:48: a9:b1:98:b2:ce:e8:36:7a:9f:8b:95:f3:6a:2c:ba:2f: c7:1e:da:02:b6:9a:76:fa:2f:d2:e2:f4:28:cb:fa:86: 99:a1:b7:3c:b5:df:f8:18:88:67:94:f9:8e:be:7d:75: 77:18:17:c7:7f:78:84:d2:aa:1f:70:6f:fc:99:a0:19: b3:ef:2a:79:08:e3:ad:ae:27:87:fd:52:d1:ee:23:64: 1e:a0:83:ff:95:d6:83:df:21:cd:19:48:43:db:b5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:74:73:0c:1c:60:3d:52:5a:c1:7f:fe:a6:fb:22:ac: d2:c6:08:39:c2:49:1b:c9:55:03:ae:0a:67:b7:e4:9d: 1d:68:56:52:98:07:13:8b:c3:42:e8:de:8b:20:b0:9d: e5:7d:5e:bf:cd:b0:57:f5:b3:88:8d:6d:30:b5:b6:3c: 25:e5:23:30:d4:20:e9:bc:5f:61:52:9e:28:35:e8:34: 2a:52:e5:0d:61:d1:3f:2b:a9:6b:40:f5:c8:76:eb:29: 5f:4e:09:78:04:2e:60:c6:f7:6f:41:1a:61:30:aa:16: fa:81:23:07:8c:d9:39:77:09:69:b3:42:e4:51:02:a4: d5:b3:d7:a4:8a:35:68:71:fd:eb:dd:66:48:b2:df:3b: aa:39:99:5c:c3:25:c1:65:9f:b1:b4:f5:58:7e:a0:05: a4:69:e4:85:ce:33:c9:fc:ea:59:1f:7e:7d:5b:ba:f2: 16:b3:7f:67:cd:43:94:dd:f6:a3:e1:51:aa:84:c2:da: 21:b7:40:fe:9b:82:05:5b:aa:85:97:c4:45:3d:78:6d: d9:44:f4:cc:da:5f:f4:37:4a:33:78:44:bd:78:e0:4c: 5f:ba:6b:fa:73:c3:01:c1:56:88:2e:9c:b9:67:51:d8: 1c:a0:7a:ce:04:d1:3f:d9:94:4c:ea:87:25:9c:7d:4e Fingerprint (SHA-256): 36:71:E5:A5:27:3B:5A:32:4A:BF:EF:5B:9C:46:67:17:CC:11:7D:23:3D:60:23:27:DA:A2:6F:0C:3C:A0:21:20 Fingerprint (SHA1): 97:B4:BA:F8:D8:8B:0A:D9:8F:F1:34:2E:CF:5A:D3:62:54:9E:CA:ED Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1218: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165129 (0x3caff789) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:02:01 2023 Not After : Wed Oct 18 17:02:01 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: cb:77:bd:83:3c:2f:b2:24:68:9d:bf:35:c8:7d:31:08: 3c:89:07:1d:0f:e3:91:29:7e:83:8e:9d:89:aa:79:8f: 94:82:7d:61:da:2d:2f:4b:fb:0b:d0:e7:b9:df:8c:57: 4d:db:c1:a8:7d:34:ca:34:4e:19:fa:54:1d:20:54:8d: f2:75:12:bc:fc:8f:af:a7:ad:66:e5:a2:02:4d:69:19: 7a:ca:d9:1c:88:b0:d5:7d:db:5a:01:5f:a4:5c:02:f0: d1:75:8d:19:a1:45:f3:48:16:54:d3:05:47:79:da:06: f9:64:99:76:aa:3f:42:d1:f1:9e:09:9a:22:24:ae:c9: a1:16:b9:57:9e:cb:53:cb:f9:c8:ef:ca:3b:f2:a7:ce: 92:1b:ab:90:0f:90:c4:bb:91:ab:9b:d9:37:1d:a1:48: a9:b1:98:b2:ce:e8:36:7a:9f:8b:95:f3:6a:2c:ba:2f: c7:1e:da:02:b6:9a:76:fa:2f:d2:e2:f4:28:cb:fa:86: 99:a1:b7:3c:b5:df:f8:18:88:67:94:f9:8e:be:7d:75: 77:18:17:c7:7f:78:84:d2:aa:1f:70:6f:fc:99:a0:19: b3:ef:2a:79:08:e3:ad:ae:27:87:fd:52:d1:ee:23:64: 1e:a0:83:ff:95:d6:83:df:21:cd:19:48:43:db:b5:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 31:74:73:0c:1c:60:3d:52:5a:c1:7f:fe:a6:fb:22:ac: d2:c6:08:39:c2:49:1b:c9:55:03:ae:0a:67:b7:e4:9d: 1d:68:56:52:98:07:13:8b:c3:42:e8:de:8b:20:b0:9d: e5:7d:5e:bf:cd:b0:57:f5:b3:88:8d:6d:30:b5:b6:3c: 25:e5:23:30:d4:20:e9:bc:5f:61:52:9e:28:35:e8:34: 2a:52:e5:0d:61:d1:3f:2b:a9:6b:40:f5:c8:76:eb:29: 5f:4e:09:78:04:2e:60:c6:f7:6f:41:1a:61:30:aa:16: fa:81:23:07:8c:d9:39:77:09:69:b3:42:e4:51:02:a4: d5:b3:d7:a4:8a:35:68:71:fd:eb:dd:66:48:b2:df:3b: aa:39:99:5c:c3:25:c1:65:9f:b1:b4:f5:58:7e:a0:05: a4:69:e4:85:ce:33:c9:fc:ea:59:1f:7e:7d:5b:ba:f2: 16:b3:7f:67:cd:43:94:dd:f6:a3:e1:51:aa:84:c2:da: 21:b7:40:fe:9b:82:05:5b:aa:85:97:c4:45:3d:78:6d: d9:44:f4:cc:da:5f:f4:37:4a:33:78:44:bd:78:e0:4c: 5f:ba:6b:fa:73:c3:01:c1:56:88:2e:9c:b9:67:51:d8: 1c:a0:7a:ce:04:d1:3f:d9:94:4c:ea:87:25:9c:7d:4e Fingerprint (SHA-256): 36:71:E5:A5:27:3B:5A:32:4A:BF:EF:5B:9C:46:67:17:CC:11:7D:23:3D:60:23:27:DA:A2:6F:0C:3C:A0:21:20 Fingerprint (SHA1): 97:B4:BA:F8:D8:8B:0A:D9:8F:F1:34:2E:CF:5A:D3:62:54:9E:CA:ED Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1219: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t Root - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165130 (0x3caff78a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:02:04 2023 Not After : Wed Oct 18 17:02:04 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:a8:35:01:05:87:4a:70:fb:73:d9:9d:64:bb:78:31: 2e:91:55:60:88:b5:82:21:30:dd:a1:cb:41:62:e6:9e: bb:a8:27:af:93:59:97:b3:12:df:b3:ec:17:06:71:e3: 0c:f2:ce:9a:1e:d4:34:94:c8:c2:b1:8c:3f:62:b1:99: 1d:01:dc:22:2c:49:51:ec:06:35:ab:c3:d1:5d:a2:bc: 9e:09:05:85:b8:2a:6e:a0:33:9b:19:be:df:3f:3e:ca: c3:04:1c:dd:19:7b:ba:70:de:07:af:81:7a:21:86:e6: ab:c6:90:4c:01:b0:cf:cf:73:64:0e:0f:68:8c:dc:82: 07:dc:8b:79:39:c4:65:52:61:8a:c3:9b:f3:28:e6:fe: 4b:ca:68:0f:ff:22:a2:c1:d7:75:8a:b1:5a:c9:f4:cf: 2c:37:f8:ed:5f:59:c0:b4:57:24:0f:ad:88:9d:9e:96: 39:ea:8c:df:3a:15:c8:57:ab:e2:5e:d7:f7:92:6a:8e: a0:7a:99:cd:ca:b7:d1:e1:d4:a7:73:19:04:8f:0d:2b: 47:88:25:bd:fc:cc:b5:60:0f:48:4a:4c:28:07:d5:1f: 40:c3:a5:d5:00:84:6e:ab:7e:c5:38:31:69:4e:df:00: 2d:8d:76:0b:18:73:ec:4f:3f:7a:c4:ef:96:26:5e:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:91:a2:39:c8:67:b9:f6:54:93:5a:34:5d:25:3e:49: 64:34:42:66:d5:df:a7:0c:9a:64:d2:5c:46:7f:6e:c0: 61:4d:9c:0f:63:1b:f3:8f:4e:f6:d3:a8:ed:79:5a:26: 78:df:a6:70:62:d6:4f:73:ff:08:36:e5:ee:04:0a:b6: 32:59:08:d8:17:bf:60:a0:99:bd:cb:df:e7:47:e7:03: 5d:2a:f8:d8:87:26:6d:8b:4c:ee:28:3c:58:be:33:53: d0:16:14:f8:8f:68:1b:c4:8f:69:be:40:29:32:4c:c6: f5:97:c4:2f:43:6e:35:c6:7a:3c:f9:4c:cc:57:5d:f6: 93:27:7f:80:a1:6b:6d:c0:4d:46:8e:50:2f:24:b7:0f: 67:8c:c0:4c:c1:62:ff:0f:7f:6a:6d:a2:20:f8:39:dc: 08:ba:42:b3:d0:35:e4:34:57:ba:30:06:6b:b7:80:b2: 77:0c:e9:e9:b9:22:91:33:b1:0f:99:a4:c9:3e:c7:57: 09:12:fd:ba:fa:6a:bd:e6:bc:25:fb:b8:22:90:09:23: 43:f7:c4:24:0a:89:b6:a8:9d:21:27:a0:37:5a:48:a0: 30:18:0c:7c:04:30:23:24:42:a1:78:28:b4:a4:c3:19: 63:b2:37:35:cf:8e:d9:8e:2b:cc:10:20:cc:75:57:ab Fingerprint (SHA-256): 49:29:21:A3:61:68:B5:48:49:DE:06:57:5D:C4:23:B6:AD:3A:1E:A6:29:D8:C0:6E:1C:4C:7F:C1:45:D3:E4:59 Fingerprint (SHA1): 95:7A:69:94:6C:0A:BA:C6:82:BC:87:72:79:E2:D7:CA:9A:97:AA:FA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1220: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165130 (0x3caff78a) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:02:04 2023 Not After : Wed Oct 18 17:02:04 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:a8:35:01:05:87:4a:70:fb:73:d9:9d:64:bb:78:31: 2e:91:55:60:88:b5:82:21:30:dd:a1:cb:41:62:e6:9e: bb:a8:27:af:93:59:97:b3:12:df:b3:ec:17:06:71:e3: 0c:f2:ce:9a:1e:d4:34:94:c8:c2:b1:8c:3f:62:b1:99: 1d:01:dc:22:2c:49:51:ec:06:35:ab:c3:d1:5d:a2:bc: 9e:09:05:85:b8:2a:6e:a0:33:9b:19:be:df:3f:3e:ca: c3:04:1c:dd:19:7b:ba:70:de:07:af:81:7a:21:86:e6: ab:c6:90:4c:01:b0:cf:cf:73:64:0e:0f:68:8c:dc:82: 07:dc:8b:79:39:c4:65:52:61:8a:c3:9b:f3:28:e6:fe: 4b:ca:68:0f:ff:22:a2:c1:d7:75:8a:b1:5a:c9:f4:cf: 2c:37:f8:ed:5f:59:c0:b4:57:24:0f:ad:88:9d:9e:96: 39:ea:8c:df:3a:15:c8:57:ab:e2:5e:d7:f7:92:6a:8e: a0:7a:99:cd:ca:b7:d1:e1:d4:a7:73:19:04:8f:0d:2b: 47:88:25:bd:fc:cc:b5:60:0f:48:4a:4c:28:07:d5:1f: 40:c3:a5:d5:00:84:6e:ab:7e:c5:38:31:69:4e:df:00: 2d:8d:76:0b:18:73:ec:4f:3f:7a:c4:ef:96:26:5e:0d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 14:91:a2:39:c8:67:b9:f6:54:93:5a:34:5d:25:3e:49: 64:34:42:66:d5:df:a7:0c:9a:64:d2:5c:46:7f:6e:c0: 61:4d:9c:0f:63:1b:f3:8f:4e:f6:d3:a8:ed:79:5a:26: 78:df:a6:70:62:d6:4f:73:ff:08:36:e5:ee:04:0a:b6: 32:59:08:d8:17:bf:60:a0:99:bd:cb:df:e7:47:e7:03: 5d:2a:f8:d8:87:26:6d:8b:4c:ee:28:3c:58:be:33:53: d0:16:14:f8:8f:68:1b:c4:8f:69:be:40:29:32:4c:c6: f5:97:c4:2f:43:6e:35:c6:7a:3c:f9:4c:cc:57:5d:f6: 93:27:7f:80:a1:6b:6d:c0:4d:46:8e:50:2f:24:b7:0f: 67:8c:c0:4c:c1:62:ff:0f:7f:6a:6d:a2:20:f8:39:dc: 08:ba:42:b3:d0:35:e4:34:57:ba:30:06:6b:b7:80:b2: 77:0c:e9:e9:b9:22:91:33:b1:0f:99:a4:c9:3e:c7:57: 09:12:fd:ba:fa:6a:bd:e6:bc:25:fb:b8:22:90:09:23: 43:f7:c4:24:0a:89:b6:a8:9d:21:27:a0:37:5a:48:a0: 30:18:0c:7c:04:30:23:24:42:a1:78:28:b4:a4:c3:19: 63:b2:37:35:cf:8e:d9:8e:2b:cc:10:20:cc:75:57:ab Fingerprint (SHA-256): 49:29:21:A3:61:68:B5:48:49:DE:06:57:5D:C4:23:B6:AD:3A:1E:A6:29:D8:C0:6E:1C:4C:7F:C1:45:D3:E4:59 Fingerprint (SHA1): 95:7A:69:94:6C:0A:BA:C6:82:BC:87:72:79:E2:D7:CA:9A:97:AA:FA Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1221: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165131 (0x3caff78b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:02:07 2023 Not After : Wed Oct 18 17:02:07 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:28:77:c7:da:ea:c4:5c:03:e4:c0:c9:03:b7:37:d0: 3f:68:1c:a1:fa:f2:05:f0:81:83:e9:e8:ae:6c:0a:26: fc:f1:dd:d8:74:91:ec:21:d8:c9:d0:fa:86:5d:24:a1: c7:0c:17:50:9d:5e:9f:f4:62:96:d0:f2:22:74:c7:b4: ff:37:49:2e:07:f7:93:c2:36:64:e2:cf:7d:14:7f:7b: 9d:0f:98:7a:ee:86:58:17:52:d7:88:69:c4:f2:4a:3f: ab:dd:a2:51:09:f5:11:58:d5:c0:ff:f6:21:e1:83:18: 48:34:8f:64:bf:72:a8:1c:2a:eb:e0:ba:f9:14:fc:4e: 04:fd:9b:e8:cf:ea:0b:df:01:e0:5a:e6:0b:4d:32:d0: db:f1:10:e3:b1:76:e7:c2:90:c8:5c:e3:a2:23:ef:79: 8a:03:c9:c6:0d:cc:15:bf:1d:94:b2:ba:a6:57:52:84: 0a:db:62:fe:03:37:54:12:36:a7:04:3f:8a:5b:d1:02: f1:16:da:e3:41:37:41:5b:07:94:de:ff:2e:7a:14:d1: 02:27:e9:40:37:ed:4a:69:e8:ca:4b:87:7f:c4:47:34: 6c:7c:09:ee:04:4d:6d:0e:8d:b0:e2:7b:65:71:49:05: 00:40:9e:c5:84:66:4d:71:92:0a:5c:bc:5c:0e:91:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: 50 P Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:0e:8c:84:35:aa:aa:2e:b8:59:ee:b0:75:ea:6a:99: ed:99:47:ff:37:44:b2:c8:95:b5:05:74:0f:34:b9:bc: 99:d8:65:06:4d:4d:12:c6:02:ae:fe:4b:65:fc:f2:f5: 12:9d:d9:cf:67:13:5a:5b:3a:e2:7c:92:52:b3:d1:18: 75:89:02:1a:af:2e:e5:68:0e:d1:5d:37:b4:98:ec:f7: 1f:9d:4a:6f:9b:93:6b:6a:c2:2f:24:ec:5b:bb:51:cf: bf:20:35:8c:40:c1:94:29:72:66:3b:aa:11:be:16:3c: ff:ea:4e:c9:81:9b:0c:fc:df:4d:3e:ae:7c:fd:38:0e: 90:7f:5d:b0:21:d1:5f:b5:3a:71:dd:21:68:62:c1:a3: 3f:ac:1c:7d:89:ba:14:d1:b9:93:61:d5:0b:be:b5:53: e6:15:2a:ff:3f:a8:10:a5:5d:4a:5d:2c:1f:95:3b:dc: c6:92:bf:5b:cf:cf:76:7b:3c:fa:99:a3:26:2c:2a:8f: 04:91:1d:09:25:b7:f4:1b:2e:0e:b9:21:5d:30:31:af: a2:b4:bf:42:71:0c:2d:fd:ec:16:35:b5:95:8f:d6:27: 2a:db:47:f0:50:4e:ed:96:57:16:30:0a:25:01:41:ec: fc:5d:b2:86:25:9a:f3:da:d9:22:1c:a7:1c:e5:f9:00 Fingerprint (SHA-256): C7:6A:03:E3:46:91:C1:8C:54:6B:89:8C:3C:14:E9:14:11:2A:94:4A:D8:2C:3C:ED:E9:ED:CB:A2:73:C3:8D:00 Fingerprint (SHA1): C2:AA:FB:84:2F:DA:8A:4D:65:40:06:6F:27:9A:AA:B3:9D:E7:BF:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1222: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165131 (0x3caff78b) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:02:07 2023 Not After : Wed Oct 18 17:02:07 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d4:28:77:c7:da:ea:c4:5c:03:e4:c0:c9:03:b7:37:d0: 3f:68:1c:a1:fa:f2:05:f0:81:83:e9:e8:ae:6c:0a:26: fc:f1:dd:d8:74:91:ec:21:d8:c9:d0:fa:86:5d:24:a1: c7:0c:17:50:9d:5e:9f:f4:62:96:d0:f2:22:74:c7:b4: ff:37:49:2e:07:f7:93:c2:36:64:e2:cf:7d:14:7f:7b: 9d:0f:98:7a:ee:86:58:17:52:d7:88:69:c4:f2:4a:3f: ab:dd:a2:51:09:f5:11:58:d5:c0:ff:f6:21:e1:83:18: 48:34:8f:64:bf:72:a8:1c:2a:eb:e0:ba:f9:14:fc:4e: 04:fd:9b:e8:cf:ea:0b:df:01:e0:5a:e6:0b:4d:32:d0: db:f1:10:e3:b1:76:e7:c2:90:c8:5c:e3:a2:23:ef:79: 8a:03:c9:c6:0d:cc:15:bf:1d:94:b2:ba:a6:57:52:84: 0a:db:62:fe:03:37:54:12:36:a7:04:3f:8a:5b:d1:02: f1:16:da:e3:41:37:41:5b:07:94:de:ff:2e:7a:14:d1: 02:27:e9:40:37:ed:4a:69:e8:ca:4b:87:7f:c4:47:34: 6c:7c:09:ee:04:4d:6d:0e:8d:b0:e2:7b:65:71:49:05: 00:40:9e:c5:84:66:4d:71:92:0a:5c:bc:5c:0e:91:61 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4f:0e:8c:84:35:aa:aa:2e:b8:59:ee:b0:75:ea:6a:99: ed:99:47:ff:37:44:b2:c8:95:b5:05:74:0f:34:b9:bc: 99:d8:65:06:4d:4d:12:c6:02:ae:fe:4b:65:fc:f2:f5: 12:9d:d9:cf:67:13:5a:5b:3a:e2:7c:92:52:b3:d1:18: 75:89:02:1a:af:2e:e5:68:0e:d1:5d:37:b4:98:ec:f7: 1f:9d:4a:6f:9b:93:6b:6a:c2:2f:24:ec:5b:bb:51:cf: bf:20:35:8c:40:c1:94:29:72:66:3b:aa:11:be:16:3c: ff:ea:4e:c9:81:9b:0c:fc:df:4d:3e:ae:7c:fd:38:0e: 90:7f:5d:b0:21:d1:5f:b5:3a:71:dd:21:68:62:c1:a3: 3f:ac:1c:7d:89:ba:14:d1:b9:93:61:d5:0b:be:b5:53: e6:15:2a:ff:3f:a8:10:a5:5d:4a:5d:2c:1f:95:3b:dc: c6:92:bf:5b:cf:cf:76:7b:3c:fa:99:a3:26:2c:2a:8f: 04:91:1d:09:25:b7:f4:1b:2e:0e:b9:21:5d:30:31:af: a2:b4:bf:42:71:0c:2d:fd:ec:16:35:b5:95:8f:d6:27: 2a:db:47:f0:50:4e:ed:96:57:16:30:0a:25:01:41:ec: fc:5d:b2:86:25:9a:f3:da:d9:22:1c:a7:1c:e5:f9:00 Fingerprint (SHA-256): C7:6A:03:E3:46:91:C1:8C:54:6B:89:8C:3C:14:E9:14:11:2A:94:4A:D8:2C:3C:ED:E9:ED:CB:A2:73:C3:8D:00 Fingerprint (SHA1): C2:AA:FB:84:2F:DA:8A:4D:65:40:06:6F:27:9A:AA:B3:9D:E7:BF:DC Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User2 EE,O=User2,C=US" Returned value is 0, expected result is pass chains.sh: #1223: Extension2: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t CA2 - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1224: AnyPolicy: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165134 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1225: AnyPolicy: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1226: AnyPolicy: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1227: AnyPolicy: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1228: AnyPolicy: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018165135 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1229: AnyPolicy: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1230: AnyPolicy: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1231: AnyPolicy: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1232: AnyPolicy: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018165136 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n 0 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1233: AnyPolicy: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1234: AnyPolicy: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1235: AnyPolicy: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1236: AnyPolicy: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA3Req.der -o CA3CA1.der -f CA1DB/dbpasswd -m 1018165137 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1237: AnyPolicy: Creating certficate CA3CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA3CA1.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1238: AnyPolicy: Importing certificate CA3CA1.der to CA3DB database - PASSED chains.sh: Creating DB User1DB certutil -N -d User1DB -f User1DB/dbpasswd chains.sh: #1239: AnyPolicy: Creating DB User1DB - PASSED chains.sh: Creating EE certifiate request User1Req.der certutil -s "CN=User1 EE, O=User1, C=US" -R -2 -d User1DB -f User1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o User1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1240: AnyPolicy: Creating EE certifiate request User1Req.der - PASSED chains.sh: Creating certficate User1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User1Req.der -o User1CA2.der -f CA2DB/dbpasswd -m 1018165138 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1241: AnyPolicy: Creating certficate User1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User1CA2.der to User1DB database certutil -A -n User1 -t u,u,u -d User1DB -f User1DB/dbpasswd -i User1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1242: AnyPolicy: Importing certificate User1CA2.der to User1DB database - PASSED chains.sh: Creating DB User2DB certutil -N -d User2DB -f User2DB/dbpasswd chains.sh: #1243: AnyPolicy: Creating DB User2DB - PASSED chains.sh: Creating EE certifiate request User2Req.der certutil -s "CN=User2 EE, O=User2, C=US" -R -2 -d User2DB -f User2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o User2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1244: AnyPolicy: Creating EE certifiate request User2Req.der - PASSED chains.sh: Creating certficate User2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i User2Req.der -o User2CA2.der -f CA2DB/dbpasswd -m 1018165139 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1245: AnyPolicy: Creating certficate User2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate User2CA2.der to User2DB database certutil -A -n User2 -t u,u,u -d User2DB -f User2DB/dbpasswd -i User2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1246: AnyPolicy: Importing certificate User2CA2.der to User2DB database - PASSED chains.sh: Creating DB User3DB certutil -N -d User3DB -f User3DB/dbpasswd chains.sh: #1247: AnyPolicy: Creating DB User3DB - PASSED chains.sh: Creating EE certifiate request User3Req.der certutil -s "CN=User3 EE, O=User3, C=US" -R -2 -d User3DB -f User3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o User3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1248: AnyPolicy: Creating EE certifiate request User3Req.der - PASSED chains.sh: Creating certficate User3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i User3Req.der -o User3CA3.der -f CA3DB/dbpasswd -m 1018165140 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1249: AnyPolicy: Creating certficate User3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate User3CA3.der to User3DB database certutil -A -n User3 -t u,u,u -d User3DB -f User3DB/dbpasswd -i User3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1250: AnyPolicy: Importing certificate User3CA3.der to User3DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1251: AnyPolicy: Creating DB AllDB - PASSED chains.sh: Importing certificate RootCA.der to AllDB database certutil -A -n RootCA -t "" -d AllDB -f AllDB/dbpasswd -i RootCA.der chains.sh: #1252: AnyPolicy: Importing certificate RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1RootCA.der chains.sh: #1253: AnyPolicy: Importing certificate CA1RootCA.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1254: AnyPolicy: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA1.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA1.der chains.sh: #1255: AnyPolicy: Importing certificate CA3CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User1CA2.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165134 (0x3caff78e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:02:19 2023 Not After : Wed Oct 18 17:02:19 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:5c:2c:af:61:a2:f9:5b:8e:9c:47:77:5c:e2:23:93: 0a:4b:91:ab:6e:53:fc:a6:0b:24:1b:20:a7:0a:25:64: 41:2f:98:a2:bc:cf:39:75:0e:e8:02:84:fe:9d:27:77: ec:81:e6:b8:3c:97:fa:67:f0:64:d4:3b:a8:7f:a4:6b: ae:1e:b8:f7:d8:d0:ca:9d:ed:0a:51:f0:4f:3d:30:57: fc:5e:b3:54:2e:38:b8:d1:bb:53:25:b5:9f:c8:b7:86: 1b:a0:aa:8b:12:df:7b:e3:54:00:37:71:bf:8e:69:4b: 2e:82:12:de:7b:45:18:f1:34:26:19:42:f1:a7:ee:14: 94:48:79:c0:b0:14:40:88:ba:84:cf:ee:b5:cf:6c:f0: 8a:b0:38:a0:0e:ad:8c:3c:29:64:60:20:4c:81:6f:99: 19:6a:c7:60:69:95:d1:e3:14:bc:e9:3d:93:10:d5:56: bc:41:5e:c2:d2:84:a7:5c:66:b2:27:42:d6:c6:5f:46: be:2e:10:18:10:bb:9d:0a:38:7b:33:9f:42:53:9d:bf: e6:33:d0:bc:d5:6c:82:b5:44:54:c3:f7:70:79:fd:8d: 4d:ac:87:79:53:fc:6a:b5:6d:3a:ad:21:fd:9a:6e:09: 70:ca:e3:da:ce:c3:ec:9f:87:52:2e:b2:06:8e:34:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:15:57:6f:d1:0f:51:63:94:1e:63:3c:db:1a:76:6c: 00:7f:28:87:f0:22:df:76:44:d4:aa:75:27:43:77:04: 09:31:76:a7:45:9f:73:4a:81:cb:aa:cb:cb:d0:38:e7: 74:bf:53:ce:11:57:9f:59:21:27:39:8a:9d:cb:7d:2e: eb:ce:ce:5f:e3:7c:b4:e3:cd:d8:b5:7e:10:ba:55:28: 6c:d2:b0:a6:ac:2f:c5:08:d4:da:c6:ed:66:46:a9:da: d4:b9:f4:e7:e2:60:eb:43:d8:c7:13:55:ff:f5:f3:98: 20:66:ac:3b:ef:ee:15:05:ad:9f:7f:11:94:78:6d:d9: 3c:83:98:1b:46:9d:79:79:67:6c:0a:fe:ff:7d:ac:b4: 68:42:82:26:32:8f:5c:96:18:05:86:f2:6a:e9:36:e8: 22:f0:11:ad:e4:08:c5:7b:58:62:cd:66:21:a4:8e:50: 42:1b:b4:18:2b:e0:f0:86:b5:9d:27:c4:ec:06:db:b9: 39:e3:18:66:99:ad:45:de:81:cd:57:bc:56:0e:be:12: 7a:db:c0:c8:2c:80:f4:18:f7:b0:31:46:2d:8f:e1:df: 8f:bc:3f:93:d2:8a:7b:12:7b:d7:60:43:58:86:a9:6e: 8e:3a:91:22:df:25:07:74:e6:e8:40:c7:81:d7:d0:4c Fingerprint (SHA-256): 9D:6C:7C:F7:A9:7D:6A:0A:F8:16:E5:2A:EE:F1:25:90:D8:1F:1A:DA:7E:FE:D9:E0:13:34:5F:C7:64:AB:9D:6C Fingerprint (SHA1): 7C:BC:B6:B5:A0:9D:B5:FF:40:F6:C7:E0:18:3C:84:24:31:37:73:C0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User1 EE,O=User1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1256: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User1CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1257: AnyPolicy: Verifying certificate(s) User1CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1258: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User2CA2.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1259: AnyPolicy: Verifying certificate(s) User2CA2.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.1.0 User3CA3.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165134 (0x3caff78e) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:02:19 2023 Not After : Wed Oct 18 17:02:19 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f1:5c:2c:af:61:a2:f9:5b:8e:9c:47:77:5c:e2:23:93: 0a:4b:91:ab:6e:53:fc:a6:0b:24:1b:20:a7:0a:25:64: 41:2f:98:a2:bc:cf:39:75:0e:e8:02:84:fe:9d:27:77: ec:81:e6:b8:3c:97:fa:67:f0:64:d4:3b:a8:7f:a4:6b: ae:1e:b8:f7:d8:d0:ca:9d:ed:0a:51:f0:4f:3d:30:57: fc:5e:b3:54:2e:38:b8:d1:bb:53:25:b5:9f:c8:b7:86: 1b:a0:aa:8b:12:df:7b:e3:54:00:37:71:bf:8e:69:4b: 2e:82:12:de:7b:45:18:f1:34:26:19:42:f1:a7:ee:14: 94:48:79:c0:b0:14:40:88:ba:84:cf:ee:b5:cf:6c:f0: 8a:b0:38:a0:0e:ad:8c:3c:29:64:60:20:4c:81:6f:99: 19:6a:c7:60:69:95:d1:e3:14:bc:e9:3d:93:10:d5:56: bc:41:5e:c2:d2:84:a7:5c:66:b2:27:42:d6:c6:5f:46: be:2e:10:18:10:bb:9d:0a:38:7b:33:9f:42:53:9d:bf: e6:33:d0:bc:d5:6c:82:b5:44:54:c3:f7:70:79:fd:8d: 4d:ac:87:79:53:fc:6a:b5:6d:3a:ad:21:fd:9a:6e:09: 70:ca:e3:da:ce:c3:ec:9f:87:52:2e:b2:06:8e:34:a1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 1e:15:57:6f:d1:0f:51:63:94:1e:63:3c:db:1a:76:6c: 00:7f:28:87:f0:22:df:76:44:d4:aa:75:27:43:77:04: 09:31:76:a7:45:9f:73:4a:81:cb:aa:cb:cb:d0:38:e7: 74:bf:53:ce:11:57:9f:59:21:27:39:8a:9d:cb:7d:2e: eb:ce:ce:5f:e3:7c:b4:e3:cd:d8:b5:7e:10:ba:55:28: 6c:d2:b0:a6:ac:2f:c5:08:d4:da:c6:ed:66:46:a9:da: d4:b9:f4:e7:e2:60:eb:43:d8:c7:13:55:ff:f5:f3:98: 20:66:ac:3b:ef:ee:15:05:ad:9f:7f:11:94:78:6d:d9: 3c:83:98:1b:46:9d:79:79:67:6c:0a:fe:ff:7d:ac:b4: 68:42:82:26:32:8f:5c:96:18:05:86:f2:6a:e9:36:e8: 22:f0:11:ad:e4:08:c5:7b:58:62:cd:66:21:a4:8e:50: 42:1b:b4:18:2b:e0:f0:86:b5:9d:27:c4:ec:06:db:b9: 39:e3:18:66:99:ad:45:de:81:cd:57:bc:56:0e:be:12: 7a:db:c0:c8:2c:80:f4:18:f7:b0:31:46:2d:8f:e1:df: 8f:bc:3f:93:d2:8a:7b:12:7b:d7:60:43:58:86:a9:6e: 8e:3a:91:22:df:25:07:74:e6:e8:40:c7:81:d7:d0:4c Fingerprint (SHA-256): 9D:6C:7C:F7:A9:7D:6A:0A:F8:16:E5:2A:EE:F1:25:90:D8:1F:1A:DA:7E:FE:D9:E0:13:34:5F:C7:64:AB:9D:6C Fingerprint (SHA1): 7C:BC:B6:B5:A0:9D:B5:FF:40:F6:C7:E0:18:3C:84:24:31:37:73:C0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User3 EE,O=User3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1260: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.1.0 -t RootCA - PASSED chains.sh: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA vfychain -d AllDB -pp -vv -o OID.2.0 User3CA3.der -t RootCA Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. RootCA [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1261: AnyPolicy: Verifying certificate(s) User3CA3.der with flags -d AllDB -pp -o OID.2.0 -t RootCA - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1262: AnyPolicyWithLevel: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165141 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1263: AnyPolicyWithLevel: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1264: AnyPolicyWithLevel: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1265: AnyPolicyWithLevel: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1266: AnyPolicyWithLevel: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018165142 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1267: AnyPolicyWithLevel: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1268: AnyPolicyWithLevel: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA12DB certutil -N -d CA12DB -f CA12DB/dbpasswd chains.sh: #1269: AnyPolicyWithLevel: Creating DB CA12DB - PASSED chains.sh: Creating Intermediate certifiate request CA12Req.der certutil -s "CN=CA12 Intermediate, O=CA12, C=US" -R -2 -d CA12DB -f CA12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1270: AnyPolicyWithLevel: Creating Intermediate certifiate request CA12Req.der - PASSED chains.sh: Creating certficate CA12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA12Req.der -o CA12CA1.der -f CA1DB/dbpasswd -m 1018165143 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1271: AnyPolicyWithLevel: Creating certficate CA12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA12CA1.der to CA12DB database certutil -A -n CA12 -t u,u,u -d CA12DB -f CA12DB/dbpasswd -i CA12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1272: AnyPolicyWithLevel: Importing certificate CA12CA1.der to CA12DB database - PASSED chains.sh: Creating DB CA13DB certutil -N -d CA13DB -f CA13DB/dbpasswd chains.sh: #1273: AnyPolicyWithLevel: Creating DB CA13DB - PASSED chains.sh: Creating Intermediate certifiate request CA13Req.der certutil -s "CN=CA13 Intermediate, O=CA13, C=US" -R -2 -d CA13DB -f CA13DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA13Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1274: AnyPolicyWithLevel: Creating Intermediate certifiate request CA13Req.der - PASSED chains.sh: Creating certficate CA13CA12.der signed by CA12 certutil -C -c CA12 -v 60 -d CA12DB -i CA13Req.der -o CA13CA12.der -f CA12DB/dbpasswd -m 1018165144 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1275: AnyPolicyWithLevel: Creating certficate CA13CA12.der signed by CA12 - PASSED chains.sh: Importing certificate CA13CA12.der to CA13DB database certutil -A -n CA13 -t u,u,u -d CA13DB -f CA13DB/dbpasswd -i CA13CA12.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1276: AnyPolicyWithLevel: Importing certificate CA13CA12.der to CA13DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1277: AnyPolicyWithLevel: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1278: AnyPolicyWithLevel: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA13.der signed by CA13 certutil -C -c CA13 -v 60 -d CA13DB -i EE1Req.der -o EE1CA13.der -f CA13DB/dbpasswd -m 1018165145 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1279: AnyPolicyWithLevel: Creating certficate EE1CA13.der signed by CA13 - PASSED chains.sh: Importing certificate EE1CA13.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA13.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1280: AnyPolicyWithLevel: Importing certificate EE1CA13.der to EE1DB database - PASSED chains.sh: Creating DB CA22DB certutil -N -d CA22DB -f CA22DB/dbpasswd chains.sh: #1281: AnyPolicyWithLevel: Creating DB CA22DB - PASSED chains.sh: Creating Intermediate certifiate request CA22Req.der certutil -s "CN=CA22 Intermediate, O=CA22, C=US" -R -2 -d CA22DB -f CA22DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA22Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1282: AnyPolicyWithLevel: Creating Intermediate certifiate request CA22Req.der - PASSED chains.sh: Creating certficate CA22CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA22Req.der -o CA22CA1.der -f CA1DB/dbpasswd -m 1018165146 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1283: AnyPolicyWithLevel: Creating certficate CA22CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA22CA1.der to CA22DB database certutil -A -n CA22 -t u,u,u -d CA22DB -f CA22DB/dbpasswd -i CA22CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1284: AnyPolicyWithLevel: Importing certificate CA22CA1.der to CA22DB database - PASSED chains.sh: Creating DB CA23DB certutil -N -d CA23DB -f CA23DB/dbpasswd chains.sh: #1285: AnyPolicyWithLevel: Creating DB CA23DB - PASSED chains.sh: Creating Intermediate certifiate request CA23Req.der certutil -s "CN=CA23 Intermediate, O=CA23, C=US" -R -2 -d CA23DB -f CA23DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA23Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1286: AnyPolicyWithLevel: Creating Intermediate certifiate request CA23Req.der - PASSED chains.sh: Creating certficate CA23CA22.der signed by CA22 certutil -C -c CA22 -v 60 -d CA22DB -i CA23Req.der -o CA23CA22.der -f CA22DB/dbpasswd -m 1018165147 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1287: AnyPolicyWithLevel: Creating certficate CA23CA22.der signed by CA22 - PASSED chains.sh: Importing certificate CA23CA22.der to CA23DB database certutil -A -n CA23 -t u,u,u -d CA23DB -f CA23DB/dbpasswd -i CA23CA22.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1288: AnyPolicyWithLevel: Importing certificate CA23CA22.der to CA23DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1289: AnyPolicyWithLevel: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1290: AnyPolicyWithLevel: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA23.der signed by CA23 certutil -C -c CA23 -v 60 -d CA23DB -i EE2Req.der -o EE2CA23.der -f CA23DB/dbpasswd -m 1018165148 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1291: AnyPolicyWithLevel: Creating certficate EE2CA23.der signed by CA23 - PASSED chains.sh: Importing certificate EE2CA23.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA23.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1292: AnyPolicyWithLevel: Importing certificate EE2CA23.der to EE2DB database - PASSED chains.sh: Creating DB CA32DB certutil -N -d CA32DB -f CA32DB/dbpasswd chains.sh: #1293: AnyPolicyWithLevel: Creating DB CA32DB - PASSED chains.sh: Creating Intermediate certifiate request CA32Req.der certutil -s "CN=CA32 Intermediate, O=CA32, C=US" -R -2 -d CA32DB -f CA32DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA32Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1294: AnyPolicyWithLevel: Creating Intermediate certifiate request CA32Req.der - PASSED chains.sh: Creating certficate CA32CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA32Req.der -o CA32CA1.der -f CA1DB/dbpasswd -m 1018165149 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 1 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1295: AnyPolicyWithLevel: Creating certficate CA32CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA32CA1.der to CA32DB database certutil -A -n CA32 -t u,u,u -d CA32DB -f CA32DB/dbpasswd -i CA32CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1296: AnyPolicyWithLevel: Importing certificate CA32CA1.der to CA32DB database - PASSED chains.sh: Creating DB CA33DB certutil -N -d CA33DB -f CA33DB/dbpasswd chains.sh: #1297: AnyPolicyWithLevel: Creating DB CA33DB - PASSED chains.sh: Creating Intermediate certifiate request CA33Req.der certutil -s "CN=CA33 Intermediate, O=CA33, C=US" -R -2 -d CA33DB -f CA33DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA33Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1298: AnyPolicyWithLevel: Creating Intermediate certifiate request CA33Req.der - PASSED chains.sh: Creating certficate CA33CA32.der signed by CA32 certutil -C -c CA32 -v 60 -d CA32DB -i CA33Req.der -o CA33CA32.der -f CA32DB/dbpasswd -m 1018165150 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1299: AnyPolicyWithLevel: Creating certficate CA33CA32.der signed by CA32 - PASSED chains.sh: Importing certificate CA33CA32.der to CA33DB database certutil -A -n CA33 -t u,u,u -d CA33DB -f CA33DB/dbpasswd -i CA33CA32.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1300: AnyPolicyWithLevel: Importing certificate CA33CA32.der to CA33DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1301: AnyPolicyWithLevel: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1302: AnyPolicyWithLevel: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA33.der signed by CA33 certutil -C -c CA33 -v 60 -d CA33DB -i EE3Req.der -o EE3CA33.der -f CA33DB/dbpasswd -m 1018165151 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1303: AnyPolicyWithLevel: Creating certficate EE3CA33.der signed by CA33 - PASSED chains.sh: Importing certificate EE3CA33.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA33.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1304: AnyPolicyWithLevel: Importing certificate EE3CA33.der to EE3DB database - PASSED chains.sh: Creating DB CA42DB certutil -N -d CA42DB -f CA42DB/dbpasswd chains.sh: #1305: AnyPolicyWithLevel: Creating DB CA42DB - PASSED chains.sh: Creating Intermediate certifiate request CA42Req.der certutil -s "CN=CA42 Intermediate, O=CA42, C=US" -R -2 -d CA42DB -f CA42DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA42Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1306: AnyPolicyWithLevel: Creating Intermediate certifiate request CA42Req.der - PASSED chains.sh: Creating certficate CA42CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA42Req.der -o CA42CA1.der -f CA1DB/dbpasswd -m 1018165152 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1307: AnyPolicyWithLevel: Creating certficate CA42CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA42CA1.der to CA42DB database certutil -A -n CA42 -t u,u,u -d CA42DB -f CA42DB/dbpasswd -i CA42CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1308: AnyPolicyWithLevel: Importing certificate CA42CA1.der to CA42DB database - PASSED chains.sh: Creating DB CA43DB certutil -N -d CA43DB -f CA43DB/dbpasswd chains.sh: #1309: AnyPolicyWithLevel: Creating DB CA43DB - PASSED chains.sh: Creating Intermediate certifiate request CA43Req.der certutil -s "CN=CA43 Intermediate, O=CA43, C=US" -R -2 -d CA43DB -f CA43DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA43Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1310: AnyPolicyWithLevel: Creating Intermediate certifiate request CA43Req.der - PASSED chains.sh: Creating certficate CA43CA42.der signed by CA42 certutil -C -c CA42 -v 60 -d CA42DB -i CA43Req.der -o CA43CA42.der -f CA42DB/dbpasswd -m 1018165153 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1311: AnyPolicyWithLevel: Creating certficate CA43CA42.der signed by CA42 - PASSED chains.sh: Importing certificate CA43CA42.der to CA43DB database certutil -A -n CA43 -t u,u,u -d CA43DB -f CA43DB/dbpasswd -i CA43CA42.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1312: AnyPolicyWithLevel: Importing certificate CA43CA42.der to CA43DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1313: AnyPolicyWithLevel: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1314: AnyPolicyWithLevel: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA43.der signed by CA43 certutil -C -c CA43 -v 60 -d CA43DB -i EE4Req.der -o EE4CA43.der -f CA43DB/dbpasswd -m 1018165154 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1315: AnyPolicyWithLevel: Creating certficate EE4CA43.der signed by CA43 - PASSED chains.sh: Importing certificate EE4CA43.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA43.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1316: AnyPolicyWithLevel: Importing certificate EE4CA43.der to EE4DB database - PASSED chains.sh: Creating DB CA52DB certutil -N -d CA52DB -f CA52DB/dbpasswd chains.sh: #1317: AnyPolicyWithLevel: Creating DB CA52DB - PASSED chains.sh: Creating Intermediate certifiate request CA52Req.der certutil -s "CN=CA52 Intermediate, O=CA52, C=US" -R -2 -d CA52DB -f CA52DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA52Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1318: AnyPolicyWithLevel: Creating Intermediate certifiate request CA52Req.der - PASSED chains.sh: Creating certficate CA52CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA52Req.der -o CA52CA1.der -f CA1DB/dbpasswd -m 1018165155 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n y OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1319: AnyPolicyWithLevel: Creating certficate CA52CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA52CA1.der to CA52DB database certutil -A -n CA52 -t u,u,u -d CA52DB -f CA52DB/dbpasswd -i CA52CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1320: AnyPolicyWithLevel: Importing certificate CA52CA1.der to CA52DB database - PASSED chains.sh: Creating DB CA53DB certutil -N -d CA53DB -f CA53DB/dbpasswd chains.sh: #1321: AnyPolicyWithLevel: Creating DB CA53DB - PASSED chains.sh: Creating Intermediate certifiate request CA53Req.der certutil -s "CN=CA53 Intermediate, O=CA53, C=US" -R -2 -d CA53DB -f CA53DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA53Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1322: AnyPolicyWithLevel: Creating Intermediate certifiate request CA53Req.der - PASSED chains.sh: Creating certficate CA53CA52.der signed by CA52 certutil -C -c CA52 -v 60 -d CA52DB -i CA53Req.der -o CA53CA52.der -f CA52DB/dbpasswd -m 1018165156 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1323: AnyPolicyWithLevel: Creating certficate CA53CA52.der signed by CA52 - PASSED chains.sh: Importing certificate CA53CA52.der to CA53DB database certutil -A -n CA53 -t u,u,u -d CA53DB -f CA53DB/dbpasswd -i CA53CA52.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1324: AnyPolicyWithLevel: Importing certificate CA53CA52.der to CA53DB database - PASSED chains.sh: Creating DB EE5DB certutil -N -d EE5DB -f EE5DB/dbpasswd chains.sh: #1325: AnyPolicyWithLevel: Creating DB EE5DB - PASSED chains.sh: Creating EE certifiate request EE5Req.der certutil -s "CN=EE5 EE, O=EE5, C=US" -R -2 -d EE5DB -f EE5DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE5Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1326: AnyPolicyWithLevel: Creating EE certifiate request EE5Req.der - PASSED chains.sh: Creating certficate EE5CA53.der signed by CA53 certutil -C -c CA53 -v 60 -d CA53DB -i EE5Req.der -o EE5CA53.der -f CA53DB/dbpasswd -m 1018165157 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1327: AnyPolicyWithLevel: Creating certficate EE5CA53.der signed by CA53 - PASSED chains.sh: Importing certificate EE5CA53.der to EE5DB database certutil -A -n EE5 -t u,u,u -d EE5DB -f EE5DB/dbpasswd -i EE5CA53.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1328: AnyPolicyWithLevel: Importing certificate EE5CA53.der to EE5DB database - PASSED chains.sh: Creating DB CA61DB certutil -N -d CA61DB -f CA61DB/dbpasswd chains.sh: #1329: AnyPolicyWithLevel: Creating DB CA61DB - PASSED chains.sh: Creating Intermediate certifiate request CA61Req.der certutil -s "CN=CA61 Intermediate, O=CA61, C=US" -R -2 -d CA61DB -f CA61DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA61Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1330: AnyPolicyWithLevel: Creating Intermediate certifiate request CA61Req.der - PASSED chains.sh: Creating certficate CA61RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA61Req.der -o CA61RootCA.der -f RootCADB/dbpasswd -m 1018165158 --extCP --extIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n 5 n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter the number of certs in the path permitted to use anyPolicy. (press Enter for 0) > Is this a critical extension [y/N]? chains.sh: #1331: AnyPolicyWithLevel: Creating certficate CA61RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA61RootCA.der to CA61DB database certutil -A -n CA61 -t u,u,u -d CA61DB -f CA61DB/dbpasswd -i CA61RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1332: AnyPolicyWithLevel: Importing certificate CA61RootCA.der to CA61DB database - PASSED chains.sh: Creating DB CA62DB certutil -N -d CA62DB -f CA62DB/dbpasswd chains.sh: #1333: AnyPolicyWithLevel: Creating DB CA62DB - PASSED chains.sh: Creating Intermediate certifiate request CA62Req.der certutil -s "CN=CA62 Intermediate, O=CA62, C=US" -R -2 -d CA62DB -f CA62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1334: AnyPolicyWithLevel: Creating Intermediate certifiate request CA62Req.der - PASSED chains.sh: Creating certficate CA62CA61.der signed by CA61 certutil -C -c CA61 -v 60 -d CA61DB -i CA62Req.der -o CA62CA61.der -f CA61DB/dbpasswd -m 1018165159 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1335: AnyPolicyWithLevel: Creating certficate CA62CA61.der signed by CA61 - PASSED chains.sh: Importing certificate CA62CA61.der to CA62DB database certutil -A -n CA62 -t u,u,u -d CA62DB -f CA62DB/dbpasswd -i CA62CA61.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1336: AnyPolicyWithLevel: Importing certificate CA62CA61.der to CA62DB database - PASSED chains.sh: Creating DB EE62DB certutil -N -d EE62DB -f EE62DB/dbpasswd chains.sh: #1337: AnyPolicyWithLevel: Creating DB EE62DB - PASSED chains.sh: Creating EE certifiate request EE62Req.der certutil -s "CN=EE62 EE, O=EE62, C=US" -R -2 -d EE62DB -f EE62DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE62Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1338: AnyPolicyWithLevel: Creating EE certifiate request EE62Req.der - PASSED chains.sh: Creating certficate EE62CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i EE62Req.der -o EE62CA62.der -f CA62DB/dbpasswd -m 1018165160 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1339: AnyPolicyWithLevel: Creating certficate EE62CA62.der signed by CA62 - PASSED chains.sh: Importing certificate EE62CA62.der to EE62DB database certutil -A -n EE62 -t u,u,u -d EE62DB -f EE62DB/dbpasswd -i EE62CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1340: AnyPolicyWithLevel: Importing certificate EE62CA62.der to EE62DB database - PASSED chains.sh: Creating DB CA63DB certutil -N -d CA63DB -f CA63DB/dbpasswd chains.sh: #1341: AnyPolicyWithLevel: Creating DB CA63DB - PASSED chains.sh: Creating Intermediate certifiate request CA63Req.der certutil -s "CN=CA63 Intermediate, O=CA63, C=US" -R -2 -d CA63DB -f CA63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1342: AnyPolicyWithLevel: Creating Intermediate certifiate request CA63Req.der - PASSED chains.sh: Creating certficate CA63CA62.der signed by CA62 certutil -C -c CA62 -v 60 -d CA62DB -i CA63Req.der -o CA63CA62.der -f CA62DB/dbpasswd -m 1018165161 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1343: AnyPolicyWithLevel: Creating certficate CA63CA62.der signed by CA62 - PASSED chains.sh: Importing certificate CA63CA62.der to CA63DB database certutil -A -n CA63 -t u,u,u -d CA63DB -f CA63DB/dbpasswd -i CA63CA62.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1344: AnyPolicyWithLevel: Importing certificate CA63CA62.der to CA63DB database - PASSED chains.sh: Creating DB EE63DB certutil -N -d EE63DB -f EE63DB/dbpasswd chains.sh: #1345: AnyPolicyWithLevel: Creating DB EE63DB - PASSED chains.sh: Creating EE certifiate request EE63Req.der certutil -s "CN=EE63 EE, O=EE63, C=US" -R -2 -d EE63DB -f EE63DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE63Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1346: AnyPolicyWithLevel: Creating EE certifiate request EE63Req.der - PASSED chains.sh: Creating certficate EE63CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i EE63Req.der -o EE63CA63.der -f CA63DB/dbpasswd -m 1018165162 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1347: AnyPolicyWithLevel: Creating certficate EE63CA63.der signed by CA63 - PASSED chains.sh: Importing certificate EE63CA63.der to EE63DB database certutil -A -n EE63 -t u,u,u -d EE63DB -f EE63DB/dbpasswd -i EE63CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1348: AnyPolicyWithLevel: Importing certificate EE63CA63.der to EE63DB database - PASSED chains.sh: Creating DB CA64DB certutil -N -d CA64DB -f CA64DB/dbpasswd chains.sh: #1349: AnyPolicyWithLevel: Creating DB CA64DB - PASSED chains.sh: Creating Intermediate certifiate request CA64Req.der certutil -s "CN=CA64 Intermediate, O=CA64, C=US" -R -2 -d CA64DB -f CA64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1350: AnyPolicyWithLevel: Creating Intermediate certifiate request CA64Req.der - PASSED chains.sh: Creating certficate CA64CA63.der signed by CA63 certutil -C -c CA63 -v 60 -d CA63DB -i CA64Req.der -o CA64CA63.der -f CA63DB/dbpasswd -m 1018165163 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1351: AnyPolicyWithLevel: Creating certficate CA64CA63.der signed by CA63 - PASSED chains.sh: Importing certificate CA64CA63.der to CA64DB database certutil -A -n CA64 -t u,u,u -d CA64DB -f CA64DB/dbpasswd -i CA64CA63.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1352: AnyPolicyWithLevel: Importing certificate CA64CA63.der to CA64DB database - PASSED chains.sh: Creating DB EE64DB certutil -N -d EE64DB -f EE64DB/dbpasswd chains.sh: #1353: AnyPolicyWithLevel: Creating DB EE64DB - PASSED chains.sh: Creating EE certifiate request EE64Req.der certutil -s "CN=EE64 EE, O=EE64, C=US" -R -2 -d EE64DB -f EE64DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE64Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1354: AnyPolicyWithLevel: Creating EE certifiate request EE64Req.der - PASSED chains.sh: Creating certficate EE64CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i EE64Req.der -o EE64CA64.der -f CA64DB/dbpasswd -m 1018165164 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1355: AnyPolicyWithLevel: Creating certficate EE64CA64.der signed by CA64 - PASSED chains.sh: Importing certificate EE64CA64.der to EE64DB database certutil -A -n EE64 -t u,u,u -d EE64DB -f EE64DB/dbpasswd -i EE64CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1356: AnyPolicyWithLevel: Importing certificate EE64CA64.der to EE64DB database - PASSED chains.sh: Creating DB CA65DB certutil -N -d CA65DB -f CA65DB/dbpasswd chains.sh: #1357: AnyPolicyWithLevel: Creating DB CA65DB - PASSED chains.sh: Creating Intermediate certifiate request CA65Req.der certutil -s "CN=CA65 Intermediate, O=CA65, C=US" -R -2 -d CA65DB -f CA65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1358: AnyPolicyWithLevel: Creating Intermediate certifiate request CA65Req.der - PASSED chains.sh: Creating certficate CA65CA64.der signed by CA64 certutil -C -c CA64 -v 60 -d CA64DB -i CA65Req.der -o CA65CA64.der -f CA64DB/dbpasswd -m 1018165165 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1359: AnyPolicyWithLevel: Creating certficate CA65CA64.der signed by CA64 - PASSED chains.sh: Importing certificate CA65CA64.der to CA65DB database certutil -A -n CA65 -t u,u,u -d CA65DB -f CA65DB/dbpasswd -i CA65CA64.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1360: AnyPolicyWithLevel: Importing certificate CA65CA64.der to CA65DB database - PASSED chains.sh: Creating DB EE65DB certutil -N -d EE65DB -f EE65DB/dbpasswd chains.sh: #1361: AnyPolicyWithLevel: Creating DB EE65DB - PASSED chains.sh: Creating EE certifiate request EE65Req.der certutil -s "CN=EE65 EE, O=EE65, C=US" -R -2 -d EE65DB -f EE65DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE65Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1362: AnyPolicyWithLevel: Creating EE certifiate request EE65Req.der - PASSED chains.sh: Creating certficate EE65CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i EE65Req.der -o EE65CA65.der -f CA65DB/dbpasswd -m 1018165166 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1363: AnyPolicyWithLevel: Creating certficate EE65CA65.der signed by CA65 - PASSED chains.sh: Importing certificate EE65CA65.der to EE65DB database certutil -A -n EE65 -t u,u,u -d EE65DB -f EE65DB/dbpasswd -i EE65CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1364: AnyPolicyWithLevel: Importing certificate EE65CA65.der to EE65DB database - PASSED chains.sh: Creating DB CA66DB certutil -N -d CA66DB -f CA66DB/dbpasswd chains.sh: #1365: AnyPolicyWithLevel: Creating DB CA66DB - PASSED chains.sh: Creating Intermediate certifiate request CA66Req.der certutil -s "CN=CA66 Intermediate, O=CA66, C=US" -R -2 -d CA66DB -f CA66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1366: AnyPolicyWithLevel: Creating Intermediate certifiate request CA66Req.der - PASSED chains.sh: Creating certficate CA66CA65.der signed by CA65 certutil -C -c CA65 -v 60 -d CA65DB -i CA66Req.der -o CA66CA65.der -f CA65DB/dbpasswd -m 1018165167 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1367: AnyPolicyWithLevel: Creating certficate CA66CA65.der signed by CA65 - PASSED chains.sh: Importing certificate CA66CA65.der to CA66DB database certutil -A -n CA66 -t u,u,u -d CA66DB -f CA66DB/dbpasswd -i CA66CA65.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1368: AnyPolicyWithLevel: Importing certificate CA66CA65.der to CA66DB database - PASSED chains.sh: Creating DB EE66DB certutil -N -d EE66DB -f EE66DB/dbpasswd chains.sh: #1369: AnyPolicyWithLevel: Creating DB EE66DB - PASSED chains.sh: Creating EE certifiate request EE66Req.der certutil -s "CN=EE66 EE, O=EE66, C=US" -R -2 -d EE66DB -f EE66DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE66Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1370: AnyPolicyWithLevel: Creating EE certifiate request EE66Req.der - PASSED chains.sh: Creating certficate EE66CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i EE66Req.der -o EE66CA66.der -f CA66DB/dbpasswd -m 1018165168 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1371: AnyPolicyWithLevel: Creating certficate EE66CA66.der signed by CA66 - PASSED chains.sh: Importing certificate EE66CA66.der to EE66DB database certutil -A -n EE66 -t u,u,u -d EE66DB -f EE66DB/dbpasswd -i EE66CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1372: AnyPolicyWithLevel: Importing certificate EE66CA66.der to EE66DB database - PASSED chains.sh: Creating DB CA67DB certutil -N -d CA67DB -f CA67DB/dbpasswd chains.sh: #1373: AnyPolicyWithLevel: Creating DB CA67DB - PASSED chains.sh: Creating Intermediate certifiate request CA67Req.der certutil -s "CN=CA67 Intermediate, O=CA67, C=US" -R -2 -d CA67DB -f CA67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1374: AnyPolicyWithLevel: Creating Intermediate certifiate request CA67Req.der - PASSED chains.sh: Creating certficate CA67CA66.der signed by CA66 certutil -C -c CA66 -v 60 -d CA66DB -i CA67Req.der -o CA67CA66.der -f CA66DB/dbpasswd -m 1018165169 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === any 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: Certificate Policies AnyPolicy 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1375: AnyPolicyWithLevel: Creating certficate CA67CA66.der signed by CA66 - PASSED chains.sh: Importing certificate CA67CA66.der to CA67DB database certutil -A -n CA67 -t u,u,u -d CA67DB -f CA67DB/dbpasswd -i CA67CA66.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1376: AnyPolicyWithLevel: Importing certificate CA67CA66.der to CA67DB database - PASSED chains.sh: Creating DB EE67DB certutil -N -d EE67DB -f EE67DB/dbpasswd chains.sh: #1377: AnyPolicyWithLevel: Creating DB EE67DB - PASSED chains.sh: Creating EE certifiate request EE67Req.der certutil -s "CN=EE67 EE, O=EE67, C=US" -R -2 -d EE67DB -f EE67DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE67Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1378: AnyPolicyWithLevel: Creating EE certifiate request EE67Req.der - PASSED chains.sh: Creating certficate EE67CA67.der signed by CA67 certutil -C -c CA67 -v 60 -d CA67DB -i EE67Req.der -o EE67CA67.der -f CA67DB/dbpasswd -m 1018165170 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1379: AnyPolicyWithLevel: Creating certficate EE67CA67.der signed by CA67 - PASSED chains.sh: Importing certificate EE67CA67.der to EE67DB database certutil -A -n EE67 -t u,u,u -d EE67DB -f EE67DB/dbpasswd -i EE67CA67.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1380: AnyPolicyWithLevel: Importing certificate EE67CA67.der to EE67DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1381: AnyPolicyWithLevel: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165141 (0x3caff795) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:02:45 2023 Not After : Wed Oct 18 17:02:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:fe:d0:fc:1c:5a:81:5a:4a:68:93:b4:02:bd:6a:11: 70:fa:6a:c8:63:6a:19:6f:ff:be:2d:6e:47:f1:39:b6: 0a:ee:40:d6:56:cb:92:f9:b5:3c:65:ca:e6:a5:ad:6b: 64:67:68:ea:27:dc:94:48:24:d1:14:de:c4:3c:b5:9a: 21:89:9e:a3:22:dd:a1:4e:1e:ea:e2:4a:f1:a4:5b:81: 0c:45:16:f3:64:98:26:96:2b:2d:1a:d0:2c:8b:c3:59: 17:21:ff:2e:b0:8f:31:84:60:a5:77:e9:3a:89:21:cf: b7:81:04:62:b5:76:9f:1d:6c:86:b9:1f:28:57:38:3a: b6:ba:2d:14:2d:58:79:3d:0d:88:bd:22:42:67:db:d8: 8f:f6:35:9f:6d:cb:eb:58:75:55:c1:e3:98:4b:0c:a3: 27:40:54:30:72:86:39:df:5c:77:57:89:35:df:46:e0: 09:48:c0:9f:1b:9a:04:74:1f:20:e9:7d:ff:59:4b:ac: 4d:e1:f4:ca:ae:e2:a8:c8:7c:2e:ca:15:b0:96:b7:57: 12:23:6c:62:05:ee:13:94:be:fa:c1:cd:ab:cc:9a:9d: 8e:c5:d6:aa:bd:0c:ef:1c:4c:ae:d1:4b:82:54:d4:46: d0:7a:02:81:aa:29:5d:8d:ed:8c:33:9c:a3:f9:8f:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:fa:40:a5:90:01:66:1a:53:bc:f7:75:08:78:20:56: 04:a8:03:bf:23:d2:4d:4f:8a:b5:e8:6f:85:8b:fc:12: e9:fd:fa:16:13:81:76:29:ba:24:b5:6f:30:6f:31:9b: 9f:b4:5b:25:a2:2a:9e:52:35:26:08:93:a7:2e:6b:40: fb:c6:1c:ef:56:8c:98:35:6b:49:e1:a5:ef:b2:bb:93: 3b:49:8d:35:30:be:14:f6:ef:15:f3:60:ec:56:4f:9f: 11:28:82:fd:cc:8c:03:64:77:80:37:0c:d3:84:71:b9: 71:00:6c:46:2e:e6:cd:b6:0d:a7:1c:ee:69:33:1c:12: ae:aa:be:28:47:59:55:bd:8a:1e:44:a3:a6:3b:a6:27: 2e:a5:90:f4:67:ab:16:10:7c:37:db:f3:2f:c4:91:dc: 67:a4:33:21:26:cd:1b:e6:22:a5:04:ac:59:df:dc:10: 93:fc:34:80:ec:87:c6:83:68:68:c3:f3:f5:01:d7:01: 8f:54:cf:3a:e0:6c:09:0a:93:c9:b8:7d:3c:26:1f:bf: 49:1b:62:b8:16:fe:fb:48:61:02:c5:f7:ff:66:36:eb: 0d:7d:25:74:6d:d5:e9:6f:3a:c1:42:fb:db:4e:a9:f1: 19:f8:b9:fd:7f:60:0e:0a:d2:5a:ba:06:ee:e8:a7:fa Fingerprint (SHA-256): 92:38:0E:17:E6:30:44:F1:83:F8:E4:08:8B:66:F4:E8:B2:CD:84:79:67:69:69:E9:E9:2F:4D:3D:AC:83:CD:C4 Fingerprint (SHA1): 10:D4:5E:5C:B9:8D:C8:79:7F:8F:39:5F:AD:CA:7D:A6:35:C6:50:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1382: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1383: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165141 (0x3caff795) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:02:45 2023 Not After : Wed Oct 18 17:02:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:fe:d0:fc:1c:5a:81:5a:4a:68:93:b4:02:bd:6a:11: 70:fa:6a:c8:63:6a:19:6f:ff:be:2d:6e:47:f1:39:b6: 0a:ee:40:d6:56:cb:92:f9:b5:3c:65:ca:e6:a5:ad:6b: 64:67:68:ea:27:dc:94:48:24:d1:14:de:c4:3c:b5:9a: 21:89:9e:a3:22:dd:a1:4e:1e:ea:e2:4a:f1:a4:5b:81: 0c:45:16:f3:64:98:26:96:2b:2d:1a:d0:2c:8b:c3:59: 17:21:ff:2e:b0:8f:31:84:60:a5:77:e9:3a:89:21:cf: b7:81:04:62:b5:76:9f:1d:6c:86:b9:1f:28:57:38:3a: b6:ba:2d:14:2d:58:79:3d:0d:88:bd:22:42:67:db:d8: 8f:f6:35:9f:6d:cb:eb:58:75:55:c1:e3:98:4b:0c:a3: 27:40:54:30:72:86:39:df:5c:77:57:89:35:df:46:e0: 09:48:c0:9f:1b:9a:04:74:1f:20:e9:7d:ff:59:4b:ac: 4d:e1:f4:ca:ae:e2:a8:c8:7c:2e:ca:15:b0:96:b7:57: 12:23:6c:62:05:ee:13:94:be:fa:c1:cd:ab:cc:9a:9d: 8e:c5:d6:aa:bd:0c:ef:1c:4c:ae:d1:4b:82:54:d4:46: d0:7a:02:81:aa:29:5d:8d:ed:8c:33:9c:a3:f9:8f:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:fa:40:a5:90:01:66:1a:53:bc:f7:75:08:78:20:56: 04:a8:03:bf:23:d2:4d:4f:8a:b5:e8:6f:85:8b:fc:12: e9:fd:fa:16:13:81:76:29:ba:24:b5:6f:30:6f:31:9b: 9f:b4:5b:25:a2:2a:9e:52:35:26:08:93:a7:2e:6b:40: fb:c6:1c:ef:56:8c:98:35:6b:49:e1:a5:ef:b2:bb:93: 3b:49:8d:35:30:be:14:f6:ef:15:f3:60:ec:56:4f:9f: 11:28:82:fd:cc:8c:03:64:77:80:37:0c:d3:84:71:b9: 71:00:6c:46:2e:e6:cd:b6:0d:a7:1c:ee:69:33:1c:12: ae:aa:be:28:47:59:55:bd:8a:1e:44:a3:a6:3b:a6:27: 2e:a5:90:f4:67:ab:16:10:7c:37:db:f3:2f:c4:91:dc: 67:a4:33:21:26:cd:1b:e6:22:a5:04:ac:59:df:dc:10: 93:fc:34:80:ec:87:c6:83:68:68:c3:f3:f5:01:d7:01: 8f:54:cf:3a:e0:6c:09:0a:93:c9:b8:7d:3c:26:1f:bf: 49:1b:62:b8:16:fe:fb:48:61:02:c5:f7:ff:66:36:eb: 0d:7d:25:74:6d:d5:e9:6f:3a:c1:42:fb:db:4e:a9:f1: 19:f8:b9:fd:7f:60:0e:0a:d2:5a:ba:06:ee:e8:a7:fa Fingerprint (SHA-256): 92:38:0E:17:E6:30:44:F1:83:F8:E4:08:8B:66:F4:E8:B2:CD:84:79:67:69:69:E9:E9:2F:4D:3D:AC:83:CD:C4 Fingerprint (SHA1): 10:D4:5E:5C:B9:8D:C8:79:7F:8F:39:5F:AD:CA:7D:A6:35:C6:50:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA13 Intermediate,O=CA13,C=US" Certificate 3 Subject: "CN=CA12 Intermediate,O=CA12,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1384: AnyPolicyWithLevel: Verifying certificate(s) EE1CA13.der RootCA.der CA1RootCA.der CA12CA1.der CA13CA12.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1385: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1386: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1387: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165141 (0x3caff795) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:02:45 2023 Not After : Wed Oct 18 17:02:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:fe:d0:fc:1c:5a:81:5a:4a:68:93:b4:02:bd:6a:11: 70:fa:6a:c8:63:6a:19:6f:ff:be:2d:6e:47:f1:39:b6: 0a:ee:40:d6:56:cb:92:f9:b5:3c:65:ca:e6:a5:ad:6b: 64:67:68:ea:27:dc:94:48:24:d1:14:de:c4:3c:b5:9a: 21:89:9e:a3:22:dd:a1:4e:1e:ea:e2:4a:f1:a4:5b:81: 0c:45:16:f3:64:98:26:96:2b:2d:1a:d0:2c:8b:c3:59: 17:21:ff:2e:b0:8f:31:84:60:a5:77:e9:3a:89:21:cf: b7:81:04:62:b5:76:9f:1d:6c:86:b9:1f:28:57:38:3a: b6:ba:2d:14:2d:58:79:3d:0d:88:bd:22:42:67:db:d8: 8f:f6:35:9f:6d:cb:eb:58:75:55:c1:e3:98:4b:0c:a3: 27:40:54:30:72:86:39:df:5c:77:57:89:35:df:46:e0: 09:48:c0:9f:1b:9a:04:74:1f:20:e9:7d:ff:59:4b:ac: 4d:e1:f4:ca:ae:e2:a8:c8:7c:2e:ca:15:b0:96:b7:57: 12:23:6c:62:05:ee:13:94:be:fa:c1:cd:ab:cc:9a:9d: 8e:c5:d6:aa:bd:0c:ef:1c:4c:ae:d1:4b:82:54:d4:46: d0:7a:02:81:aa:29:5d:8d:ed:8c:33:9c:a3:f9:8f:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:fa:40:a5:90:01:66:1a:53:bc:f7:75:08:78:20:56: 04:a8:03:bf:23:d2:4d:4f:8a:b5:e8:6f:85:8b:fc:12: e9:fd:fa:16:13:81:76:29:ba:24:b5:6f:30:6f:31:9b: 9f:b4:5b:25:a2:2a:9e:52:35:26:08:93:a7:2e:6b:40: fb:c6:1c:ef:56:8c:98:35:6b:49:e1:a5:ef:b2:bb:93: 3b:49:8d:35:30:be:14:f6:ef:15:f3:60:ec:56:4f:9f: 11:28:82:fd:cc:8c:03:64:77:80:37:0c:d3:84:71:b9: 71:00:6c:46:2e:e6:cd:b6:0d:a7:1c:ee:69:33:1c:12: ae:aa:be:28:47:59:55:bd:8a:1e:44:a3:a6:3b:a6:27: 2e:a5:90:f4:67:ab:16:10:7c:37:db:f3:2f:c4:91:dc: 67:a4:33:21:26:cd:1b:e6:22:a5:04:ac:59:df:dc:10: 93:fc:34:80:ec:87:c6:83:68:68:c3:f3:f5:01:d7:01: 8f:54:cf:3a:e0:6c:09:0a:93:c9:b8:7d:3c:26:1f:bf: 49:1b:62:b8:16:fe:fb:48:61:02:c5:f7:ff:66:36:eb: 0d:7d:25:74:6d:d5:e9:6f:3a:c1:42:fb:db:4e:a9:f1: 19:f8:b9:fd:7f:60:0e:0a:d2:5a:ba:06:ee:e8:a7:fa Fingerprint (SHA-256): 92:38:0E:17:E6:30:44:F1:83:F8:E4:08:8B:66:F4:E8:B2:CD:84:79:67:69:69:E9:E9:2F:4D:3D:AC:83:CD:C4 Fingerprint (SHA1): 10:D4:5E:5C:B9:8D:C8:79:7F:8F:39:5F:AD:CA:7D:A6:35:C6:50:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA23 Intermediate,O=CA23,C=US" Certificate 3 Subject: "CN=CA22 Intermediate,O=CA22,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1388: AnyPolicyWithLevel: Verifying certificate(s) EE2CA23.der RootCA.der CA1RootCA.der CA22CA1.der CA23CA22.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1389: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1390: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1391: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165141 (0x3caff795) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:02:45 2023 Not After : Wed Oct 18 17:02:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:fe:d0:fc:1c:5a:81:5a:4a:68:93:b4:02:bd:6a:11: 70:fa:6a:c8:63:6a:19:6f:ff:be:2d:6e:47:f1:39:b6: 0a:ee:40:d6:56:cb:92:f9:b5:3c:65:ca:e6:a5:ad:6b: 64:67:68:ea:27:dc:94:48:24:d1:14:de:c4:3c:b5:9a: 21:89:9e:a3:22:dd:a1:4e:1e:ea:e2:4a:f1:a4:5b:81: 0c:45:16:f3:64:98:26:96:2b:2d:1a:d0:2c:8b:c3:59: 17:21:ff:2e:b0:8f:31:84:60:a5:77:e9:3a:89:21:cf: b7:81:04:62:b5:76:9f:1d:6c:86:b9:1f:28:57:38:3a: b6:ba:2d:14:2d:58:79:3d:0d:88:bd:22:42:67:db:d8: 8f:f6:35:9f:6d:cb:eb:58:75:55:c1:e3:98:4b:0c:a3: 27:40:54:30:72:86:39:df:5c:77:57:89:35:df:46:e0: 09:48:c0:9f:1b:9a:04:74:1f:20:e9:7d:ff:59:4b:ac: 4d:e1:f4:ca:ae:e2:a8:c8:7c:2e:ca:15:b0:96:b7:57: 12:23:6c:62:05:ee:13:94:be:fa:c1:cd:ab:cc:9a:9d: 8e:c5:d6:aa:bd:0c:ef:1c:4c:ae:d1:4b:82:54:d4:46: d0:7a:02:81:aa:29:5d:8d:ed:8c:33:9c:a3:f9:8f:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:fa:40:a5:90:01:66:1a:53:bc:f7:75:08:78:20:56: 04:a8:03:bf:23:d2:4d:4f:8a:b5:e8:6f:85:8b:fc:12: e9:fd:fa:16:13:81:76:29:ba:24:b5:6f:30:6f:31:9b: 9f:b4:5b:25:a2:2a:9e:52:35:26:08:93:a7:2e:6b:40: fb:c6:1c:ef:56:8c:98:35:6b:49:e1:a5:ef:b2:bb:93: 3b:49:8d:35:30:be:14:f6:ef:15:f3:60:ec:56:4f:9f: 11:28:82:fd:cc:8c:03:64:77:80:37:0c:d3:84:71:b9: 71:00:6c:46:2e:e6:cd:b6:0d:a7:1c:ee:69:33:1c:12: ae:aa:be:28:47:59:55:bd:8a:1e:44:a3:a6:3b:a6:27: 2e:a5:90:f4:67:ab:16:10:7c:37:db:f3:2f:c4:91:dc: 67:a4:33:21:26:cd:1b:e6:22:a5:04:ac:59:df:dc:10: 93:fc:34:80:ec:87:c6:83:68:68:c3:f3:f5:01:d7:01: 8f:54:cf:3a:e0:6c:09:0a:93:c9:b8:7d:3c:26:1f:bf: 49:1b:62:b8:16:fe:fb:48:61:02:c5:f7:ff:66:36:eb: 0d:7d:25:74:6d:d5:e9:6f:3a:c1:42:fb:db:4e:a9:f1: 19:f8:b9:fd:7f:60:0e:0a:d2:5a:ba:06:ee:e8:a7:fa Fingerprint (SHA-256): 92:38:0E:17:E6:30:44:F1:83:F8:E4:08:8B:66:F4:E8:B2:CD:84:79:67:69:69:E9:E9:2F:4D:3D:AC:83:CD:C4 Fingerprint (SHA1): 10:D4:5E:5C:B9:8D:C8:79:7F:8F:39:5F:AD:CA:7D:A6:35:C6:50:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA33 Intermediate,O=CA33,C=US" Certificate 3 Subject: "CN=CA32 Intermediate,O=CA32,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1392: AnyPolicyWithLevel: Verifying certificate(s) EE3CA33.der RootCA.der CA1RootCA.der CA32CA1.der CA33CA32.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165141 (0x3caff795) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:02:45 2023 Not After : Wed Oct 18 17:02:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:fe:d0:fc:1c:5a:81:5a:4a:68:93:b4:02:bd:6a:11: 70:fa:6a:c8:63:6a:19:6f:ff:be:2d:6e:47:f1:39:b6: 0a:ee:40:d6:56:cb:92:f9:b5:3c:65:ca:e6:a5:ad:6b: 64:67:68:ea:27:dc:94:48:24:d1:14:de:c4:3c:b5:9a: 21:89:9e:a3:22:dd:a1:4e:1e:ea:e2:4a:f1:a4:5b:81: 0c:45:16:f3:64:98:26:96:2b:2d:1a:d0:2c:8b:c3:59: 17:21:ff:2e:b0:8f:31:84:60:a5:77:e9:3a:89:21:cf: b7:81:04:62:b5:76:9f:1d:6c:86:b9:1f:28:57:38:3a: b6:ba:2d:14:2d:58:79:3d:0d:88:bd:22:42:67:db:d8: 8f:f6:35:9f:6d:cb:eb:58:75:55:c1:e3:98:4b:0c:a3: 27:40:54:30:72:86:39:df:5c:77:57:89:35:df:46:e0: 09:48:c0:9f:1b:9a:04:74:1f:20:e9:7d:ff:59:4b:ac: 4d:e1:f4:ca:ae:e2:a8:c8:7c:2e:ca:15:b0:96:b7:57: 12:23:6c:62:05:ee:13:94:be:fa:c1:cd:ab:cc:9a:9d: 8e:c5:d6:aa:bd:0c:ef:1c:4c:ae:d1:4b:82:54:d4:46: d0:7a:02:81:aa:29:5d:8d:ed:8c:33:9c:a3:f9:8f:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:fa:40:a5:90:01:66:1a:53:bc:f7:75:08:78:20:56: 04:a8:03:bf:23:d2:4d:4f:8a:b5:e8:6f:85:8b:fc:12: e9:fd:fa:16:13:81:76:29:ba:24:b5:6f:30:6f:31:9b: 9f:b4:5b:25:a2:2a:9e:52:35:26:08:93:a7:2e:6b:40: fb:c6:1c:ef:56:8c:98:35:6b:49:e1:a5:ef:b2:bb:93: 3b:49:8d:35:30:be:14:f6:ef:15:f3:60:ec:56:4f:9f: 11:28:82:fd:cc:8c:03:64:77:80:37:0c:d3:84:71:b9: 71:00:6c:46:2e:e6:cd:b6:0d:a7:1c:ee:69:33:1c:12: ae:aa:be:28:47:59:55:bd:8a:1e:44:a3:a6:3b:a6:27: 2e:a5:90:f4:67:ab:16:10:7c:37:db:f3:2f:c4:91:dc: 67:a4:33:21:26:cd:1b:e6:22:a5:04:ac:59:df:dc:10: 93:fc:34:80:ec:87:c6:83:68:68:c3:f3:f5:01:d7:01: 8f:54:cf:3a:e0:6c:09:0a:93:c9:b8:7d:3c:26:1f:bf: 49:1b:62:b8:16:fe:fb:48:61:02:c5:f7:ff:66:36:eb: 0d:7d:25:74:6d:d5:e9:6f:3a:c1:42:fb:db:4e:a9:f1: 19:f8:b9:fd:7f:60:0e:0a:d2:5a:ba:06:ee:e8:a7:fa Fingerprint (SHA-256): 92:38:0E:17:E6:30:44:F1:83:F8:E4:08:8B:66:F4:E8:B2:CD:84:79:67:69:69:E9:E9:2F:4D:3D:AC:83:CD:C4 Fingerprint (SHA1): 10:D4:5E:5C:B9:8D:C8:79:7F:8F:39:5F:AD:CA:7D:A6:35:C6:50:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1393: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1394: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165141 (0x3caff795) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:02:45 2023 Not After : Wed Oct 18 17:02:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:fe:d0:fc:1c:5a:81:5a:4a:68:93:b4:02:bd:6a:11: 70:fa:6a:c8:63:6a:19:6f:ff:be:2d:6e:47:f1:39:b6: 0a:ee:40:d6:56:cb:92:f9:b5:3c:65:ca:e6:a5:ad:6b: 64:67:68:ea:27:dc:94:48:24:d1:14:de:c4:3c:b5:9a: 21:89:9e:a3:22:dd:a1:4e:1e:ea:e2:4a:f1:a4:5b:81: 0c:45:16:f3:64:98:26:96:2b:2d:1a:d0:2c:8b:c3:59: 17:21:ff:2e:b0:8f:31:84:60:a5:77:e9:3a:89:21:cf: b7:81:04:62:b5:76:9f:1d:6c:86:b9:1f:28:57:38:3a: b6:ba:2d:14:2d:58:79:3d:0d:88:bd:22:42:67:db:d8: 8f:f6:35:9f:6d:cb:eb:58:75:55:c1:e3:98:4b:0c:a3: 27:40:54:30:72:86:39:df:5c:77:57:89:35:df:46:e0: 09:48:c0:9f:1b:9a:04:74:1f:20:e9:7d:ff:59:4b:ac: 4d:e1:f4:ca:ae:e2:a8:c8:7c:2e:ca:15:b0:96:b7:57: 12:23:6c:62:05:ee:13:94:be:fa:c1:cd:ab:cc:9a:9d: 8e:c5:d6:aa:bd:0c:ef:1c:4c:ae:d1:4b:82:54:d4:46: d0:7a:02:81:aa:29:5d:8d:ed:8c:33:9c:a3:f9:8f:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:fa:40:a5:90:01:66:1a:53:bc:f7:75:08:78:20:56: 04:a8:03:bf:23:d2:4d:4f:8a:b5:e8:6f:85:8b:fc:12: e9:fd:fa:16:13:81:76:29:ba:24:b5:6f:30:6f:31:9b: 9f:b4:5b:25:a2:2a:9e:52:35:26:08:93:a7:2e:6b:40: fb:c6:1c:ef:56:8c:98:35:6b:49:e1:a5:ef:b2:bb:93: 3b:49:8d:35:30:be:14:f6:ef:15:f3:60:ec:56:4f:9f: 11:28:82:fd:cc:8c:03:64:77:80:37:0c:d3:84:71:b9: 71:00:6c:46:2e:e6:cd:b6:0d:a7:1c:ee:69:33:1c:12: ae:aa:be:28:47:59:55:bd:8a:1e:44:a3:a6:3b:a6:27: 2e:a5:90:f4:67:ab:16:10:7c:37:db:f3:2f:c4:91:dc: 67:a4:33:21:26:cd:1b:e6:22:a5:04:ac:59:df:dc:10: 93:fc:34:80:ec:87:c6:83:68:68:c3:f3:f5:01:d7:01: 8f:54:cf:3a:e0:6c:09:0a:93:c9:b8:7d:3c:26:1f:bf: 49:1b:62:b8:16:fe:fb:48:61:02:c5:f7:ff:66:36:eb: 0d:7d:25:74:6d:d5:e9:6f:3a:c1:42:fb:db:4e:a9:f1: 19:f8:b9:fd:7f:60:0e:0a:d2:5a:ba:06:ee:e8:a7:fa Fingerprint (SHA-256): 92:38:0E:17:E6:30:44:F1:83:F8:E4:08:8B:66:F4:E8:B2:CD:84:79:67:69:69:E9:E9:2F:4D:3D:AC:83:CD:C4 Fingerprint (SHA1): 10:D4:5E:5C:B9:8D:C8:79:7F:8F:39:5F:AD:CA:7D:A6:35:C6:50:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA43 Intermediate,O=CA43,C=US" Certificate 3 Subject: "CN=CA42 Intermediate,O=CA42,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1395: AnyPolicyWithLevel: Verifying certificate(s) EE4CA43.der RootCA.der CA1RootCA.der CA42CA1.der CA43CA42.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1396: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1397: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.2.5.29.32.0 EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1398: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -o OID.2.5.29.32.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der vfychain -d AllDB -pp -vv EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165141 (0x3caff795) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:02:45 2023 Not After : Wed Oct 18 17:02:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:fe:d0:fc:1c:5a:81:5a:4a:68:93:b4:02:bd:6a:11: 70:fa:6a:c8:63:6a:19:6f:ff:be:2d:6e:47:f1:39:b6: 0a:ee:40:d6:56:cb:92:f9:b5:3c:65:ca:e6:a5:ad:6b: 64:67:68:ea:27:dc:94:48:24:d1:14:de:c4:3c:b5:9a: 21:89:9e:a3:22:dd:a1:4e:1e:ea:e2:4a:f1:a4:5b:81: 0c:45:16:f3:64:98:26:96:2b:2d:1a:d0:2c:8b:c3:59: 17:21:ff:2e:b0:8f:31:84:60:a5:77:e9:3a:89:21:cf: b7:81:04:62:b5:76:9f:1d:6c:86:b9:1f:28:57:38:3a: b6:ba:2d:14:2d:58:79:3d:0d:88:bd:22:42:67:db:d8: 8f:f6:35:9f:6d:cb:eb:58:75:55:c1:e3:98:4b:0c:a3: 27:40:54:30:72:86:39:df:5c:77:57:89:35:df:46:e0: 09:48:c0:9f:1b:9a:04:74:1f:20:e9:7d:ff:59:4b:ac: 4d:e1:f4:ca:ae:e2:a8:c8:7c:2e:ca:15:b0:96:b7:57: 12:23:6c:62:05:ee:13:94:be:fa:c1:cd:ab:cc:9a:9d: 8e:c5:d6:aa:bd:0c:ef:1c:4c:ae:d1:4b:82:54:d4:46: d0:7a:02:81:aa:29:5d:8d:ed:8c:33:9c:a3:f9:8f:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:fa:40:a5:90:01:66:1a:53:bc:f7:75:08:78:20:56: 04:a8:03:bf:23:d2:4d:4f:8a:b5:e8:6f:85:8b:fc:12: e9:fd:fa:16:13:81:76:29:ba:24:b5:6f:30:6f:31:9b: 9f:b4:5b:25:a2:2a:9e:52:35:26:08:93:a7:2e:6b:40: fb:c6:1c:ef:56:8c:98:35:6b:49:e1:a5:ef:b2:bb:93: 3b:49:8d:35:30:be:14:f6:ef:15:f3:60:ec:56:4f:9f: 11:28:82:fd:cc:8c:03:64:77:80:37:0c:d3:84:71:b9: 71:00:6c:46:2e:e6:cd:b6:0d:a7:1c:ee:69:33:1c:12: ae:aa:be:28:47:59:55:bd:8a:1e:44:a3:a6:3b:a6:27: 2e:a5:90:f4:67:ab:16:10:7c:37:db:f3:2f:c4:91:dc: 67:a4:33:21:26:cd:1b:e6:22:a5:04:ac:59:df:dc:10: 93:fc:34:80:ec:87:c6:83:68:68:c3:f3:f5:01:d7:01: 8f:54:cf:3a:e0:6c:09:0a:93:c9:b8:7d:3c:26:1f:bf: 49:1b:62:b8:16:fe:fb:48:61:02:c5:f7:ff:66:36:eb: 0d:7d:25:74:6d:d5:e9:6f:3a:c1:42:fb:db:4e:a9:f1: 19:f8:b9:fd:7f:60:0e:0a:d2:5a:ba:06:ee:e8:a7:fa Fingerprint (SHA-256): 92:38:0E:17:E6:30:44:F1:83:F8:E4:08:8B:66:F4:E8:B2:CD:84:79:67:69:69:E9:E9:2F:4D:3D:AC:83:CD:C4 Fingerprint (SHA1): 10:D4:5E:5C:B9:8D:C8:79:7F:8F:39:5F:AD:CA:7D:A6:35:C6:50:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE5 EE,O=EE5,C=US" Certificate 2 Subject: "CN=CA53 Intermediate,O=CA53,C=US" Certificate 3 Subject: "CN=CA52 Intermediate,O=CA52,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1399: AnyPolicyWithLevel: Verifying certificate(s) EE5CA53.der RootCA.der CA1RootCA.der CA52CA1.der CA53CA52.der with flags -d AllDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165141 (0x3caff795) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:02:45 2023 Not After : Wed Oct 18 17:02:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:fe:d0:fc:1c:5a:81:5a:4a:68:93:b4:02:bd:6a:11: 70:fa:6a:c8:63:6a:19:6f:ff:be:2d:6e:47:f1:39:b6: 0a:ee:40:d6:56:cb:92:f9:b5:3c:65:ca:e6:a5:ad:6b: 64:67:68:ea:27:dc:94:48:24:d1:14:de:c4:3c:b5:9a: 21:89:9e:a3:22:dd:a1:4e:1e:ea:e2:4a:f1:a4:5b:81: 0c:45:16:f3:64:98:26:96:2b:2d:1a:d0:2c:8b:c3:59: 17:21:ff:2e:b0:8f:31:84:60:a5:77:e9:3a:89:21:cf: b7:81:04:62:b5:76:9f:1d:6c:86:b9:1f:28:57:38:3a: b6:ba:2d:14:2d:58:79:3d:0d:88:bd:22:42:67:db:d8: 8f:f6:35:9f:6d:cb:eb:58:75:55:c1:e3:98:4b:0c:a3: 27:40:54:30:72:86:39:df:5c:77:57:89:35:df:46:e0: 09:48:c0:9f:1b:9a:04:74:1f:20:e9:7d:ff:59:4b:ac: 4d:e1:f4:ca:ae:e2:a8:c8:7c:2e:ca:15:b0:96:b7:57: 12:23:6c:62:05:ee:13:94:be:fa:c1:cd:ab:cc:9a:9d: 8e:c5:d6:aa:bd:0c:ef:1c:4c:ae:d1:4b:82:54:d4:46: d0:7a:02:81:aa:29:5d:8d:ed:8c:33:9c:a3:f9:8f:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:fa:40:a5:90:01:66:1a:53:bc:f7:75:08:78:20:56: 04:a8:03:bf:23:d2:4d:4f:8a:b5:e8:6f:85:8b:fc:12: e9:fd:fa:16:13:81:76:29:ba:24:b5:6f:30:6f:31:9b: 9f:b4:5b:25:a2:2a:9e:52:35:26:08:93:a7:2e:6b:40: fb:c6:1c:ef:56:8c:98:35:6b:49:e1:a5:ef:b2:bb:93: 3b:49:8d:35:30:be:14:f6:ef:15:f3:60:ec:56:4f:9f: 11:28:82:fd:cc:8c:03:64:77:80:37:0c:d3:84:71:b9: 71:00:6c:46:2e:e6:cd:b6:0d:a7:1c:ee:69:33:1c:12: ae:aa:be:28:47:59:55:bd:8a:1e:44:a3:a6:3b:a6:27: 2e:a5:90:f4:67:ab:16:10:7c:37:db:f3:2f:c4:91:dc: 67:a4:33:21:26:cd:1b:e6:22:a5:04:ac:59:df:dc:10: 93:fc:34:80:ec:87:c6:83:68:68:c3:f3:f5:01:d7:01: 8f:54:cf:3a:e0:6c:09:0a:93:c9:b8:7d:3c:26:1f:bf: 49:1b:62:b8:16:fe:fb:48:61:02:c5:f7:ff:66:36:eb: 0d:7d:25:74:6d:d5:e9:6f:3a:c1:42:fb:db:4e:a9:f1: 19:f8:b9:fd:7f:60:0e:0a:d2:5a:ba:06:ee:e8:a7:fa Fingerprint (SHA-256): 92:38:0E:17:E6:30:44:F1:83:F8:E4:08:8B:66:F4:E8:B2:CD:84:79:67:69:69:E9:E9:2F:4D:3D:AC:83:CD:C4 Fingerprint (SHA1): 10:D4:5E:5C:B9:8D:C8:79:7F:8F:39:5F:AD:CA:7D:A6:35:C6:50:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE62 EE,O=EE62,C=US" Certificate 2 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 3 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1400: AnyPolicyWithLevel: Verifying certificate(s) EE62CA62.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165141 (0x3caff795) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:02:45 2023 Not After : Wed Oct 18 17:02:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:fe:d0:fc:1c:5a:81:5a:4a:68:93:b4:02:bd:6a:11: 70:fa:6a:c8:63:6a:19:6f:ff:be:2d:6e:47:f1:39:b6: 0a:ee:40:d6:56:cb:92:f9:b5:3c:65:ca:e6:a5:ad:6b: 64:67:68:ea:27:dc:94:48:24:d1:14:de:c4:3c:b5:9a: 21:89:9e:a3:22:dd:a1:4e:1e:ea:e2:4a:f1:a4:5b:81: 0c:45:16:f3:64:98:26:96:2b:2d:1a:d0:2c:8b:c3:59: 17:21:ff:2e:b0:8f:31:84:60:a5:77:e9:3a:89:21:cf: b7:81:04:62:b5:76:9f:1d:6c:86:b9:1f:28:57:38:3a: b6:ba:2d:14:2d:58:79:3d:0d:88:bd:22:42:67:db:d8: 8f:f6:35:9f:6d:cb:eb:58:75:55:c1:e3:98:4b:0c:a3: 27:40:54:30:72:86:39:df:5c:77:57:89:35:df:46:e0: 09:48:c0:9f:1b:9a:04:74:1f:20:e9:7d:ff:59:4b:ac: 4d:e1:f4:ca:ae:e2:a8:c8:7c:2e:ca:15:b0:96:b7:57: 12:23:6c:62:05:ee:13:94:be:fa:c1:cd:ab:cc:9a:9d: 8e:c5:d6:aa:bd:0c:ef:1c:4c:ae:d1:4b:82:54:d4:46: d0:7a:02:81:aa:29:5d:8d:ed:8c:33:9c:a3:f9:8f:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:fa:40:a5:90:01:66:1a:53:bc:f7:75:08:78:20:56: 04:a8:03:bf:23:d2:4d:4f:8a:b5:e8:6f:85:8b:fc:12: e9:fd:fa:16:13:81:76:29:ba:24:b5:6f:30:6f:31:9b: 9f:b4:5b:25:a2:2a:9e:52:35:26:08:93:a7:2e:6b:40: fb:c6:1c:ef:56:8c:98:35:6b:49:e1:a5:ef:b2:bb:93: 3b:49:8d:35:30:be:14:f6:ef:15:f3:60:ec:56:4f:9f: 11:28:82:fd:cc:8c:03:64:77:80:37:0c:d3:84:71:b9: 71:00:6c:46:2e:e6:cd:b6:0d:a7:1c:ee:69:33:1c:12: ae:aa:be:28:47:59:55:bd:8a:1e:44:a3:a6:3b:a6:27: 2e:a5:90:f4:67:ab:16:10:7c:37:db:f3:2f:c4:91:dc: 67:a4:33:21:26:cd:1b:e6:22:a5:04:ac:59:df:dc:10: 93:fc:34:80:ec:87:c6:83:68:68:c3:f3:f5:01:d7:01: 8f:54:cf:3a:e0:6c:09:0a:93:c9:b8:7d:3c:26:1f:bf: 49:1b:62:b8:16:fe:fb:48:61:02:c5:f7:ff:66:36:eb: 0d:7d:25:74:6d:d5:e9:6f:3a:c1:42:fb:db:4e:a9:f1: 19:f8:b9:fd:7f:60:0e:0a:d2:5a:ba:06:ee:e8:a7:fa Fingerprint (SHA-256): 92:38:0E:17:E6:30:44:F1:83:F8:E4:08:8B:66:F4:E8:B2:CD:84:79:67:69:69:E9:E9:2F:4D:3D:AC:83:CD:C4 Fingerprint (SHA1): 10:D4:5E:5C:B9:8D:C8:79:7F:8F:39:5F:AD:CA:7D:A6:35:C6:50:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE63 EE,O=EE63,C=US" Certificate 2 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 3 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 4 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1401: AnyPolicyWithLevel: Verifying certificate(s) EE63CA63.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165141 (0x3caff795) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:02:45 2023 Not After : Wed Oct 18 17:02:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:fe:d0:fc:1c:5a:81:5a:4a:68:93:b4:02:bd:6a:11: 70:fa:6a:c8:63:6a:19:6f:ff:be:2d:6e:47:f1:39:b6: 0a:ee:40:d6:56:cb:92:f9:b5:3c:65:ca:e6:a5:ad:6b: 64:67:68:ea:27:dc:94:48:24:d1:14:de:c4:3c:b5:9a: 21:89:9e:a3:22:dd:a1:4e:1e:ea:e2:4a:f1:a4:5b:81: 0c:45:16:f3:64:98:26:96:2b:2d:1a:d0:2c:8b:c3:59: 17:21:ff:2e:b0:8f:31:84:60:a5:77:e9:3a:89:21:cf: b7:81:04:62:b5:76:9f:1d:6c:86:b9:1f:28:57:38:3a: b6:ba:2d:14:2d:58:79:3d:0d:88:bd:22:42:67:db:d8: 8f:f6:35:9f:6d:cb:eb:58:75:55:c1:e3:98:4b:0c:a3: 27:40:54:30:72:86:39:df:5c:77:57:89:35:df:46:e0: 09:48:c0:9f:1b:9a:04:74:1f:20:e9:7d:ff:59:4b:ac: 4d:e1:f4:ca:ae:e2:a8:c8:7c:2e:ca:15:b0:96:b7:57: 12:23:6c:62:05:ee:13:94:be:fa:c1:cd:ab:cc:9a:9d: 8e:c5:d6:aa:bd:0c:ef:1c:4c:ae:d1:4b:82:54:d4:46: d0:7a:02:81:aa:29:5d:8d:ed:8c:33:9c:a3:f9:8f:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:fa:40:a5:90:01:66:1a:53:bc:f7:75:08:78:20:56: 04:a8:03:bf:23:d2:4d:4f:8a:b5:e8:6f:85:8b:fc:12: e9:fd:fa:16:13:81:76:29:ba:24:b5:6f:30:6f:31:9b: 9f:b4:5b:25:a2:2a:9e:52:35:26:08:93:a7:2e:6b:40: fb:c6:1c:ef:56:8c:98:35:6b:49:e1:a5:ef:b2:bb:93: 3b:49:8d:35:30:be:14:f6:ef:15:f3:60:ec:56:4f:9f: 11:28:82:fd:cc:8c:03:64:77:80:37:0c:d3:84:71:b9: 71:00:6c:46:2e:e6:cd:b6:0d:a7:1c:ee:69:33:1c:12: ae:aa:be:28:47:59:55:bd:8a:1e:44:a3:a6:3b:a6:27: 2e:a5:90:f4:67:ab:16:10:7c:37:db:f3:2f:c4:91:dc: 67:a4:33:21:26:cd:1b:e6:22:a5:04:ac:59:df:dc:10: 93:fc:34:80:ec:87:c6:83:68:68:c3:f3:f5:01:d7:01: 8f:54:cf:3a:e0:6c:09:0a:93:c9:b8:7d:3c:26:1f:bf: 49:1b:62:b8:16:fe:fb:48:61:02:c5:f7:ff:66:36:eb: 0d:7d:25:74:6d:d5:e9:6f:3a:c1:42:fb:db:4e:a9:f1: 19:f8:b9:fd:7f:60:0e:0a:d2:5a:ba:06:ee:e8:a7:fa Fingerprint (SHA-256): 92:38:0E:17:E6:30:44:F1:83:F8:E4:08:8B:66:F4:E8:B2:CD:84:79:67:69:69:E9:E9:2F:4D:3D:AC:83:CD:C4 Fingerprint (SHA1): 10:D4:5E:5C:B9:8D:C8:79:7F:8F:39:5F:AD:CA:7D:A6:35:C6:50:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE64 EE,O=EE64,C=US" Certificate 2 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 3 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 4 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 5 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1402: AnyPolicyWithLevel: Verifying certificate(s) EE64CA64.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165141 (0x3caff795) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:02:45 2023 Not After : Wed Oct 18 17:02:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:fe:d0:fc:1c:5a:81:5a:4a:68:93:b4:02:bd:6a:11: 70:fa:6a:c8:63:6a:19:6f:ff:be:2d:6e:47:f1:39:b6: 0a:ee:40:d6:56:cb:92:f9:b5:3c:65:ca:e6:a5:ad:6b: 64:67:68:ea:27:dc:94:48:24:d1:14:de:c4:3c:b5:9a: 21:89:9e:a3:22:dd:a1:4e:1e:ea:e2:4a:f1:a4:5b:81: 0c:45:16:f3:64:98:26:96:2b:2d:1a:d0:2c:8b:c3:59: 17:21:ff:2e:b0:8f:31:84:60:a5:77:e9:3a:89:21:cf: b7:81:04:62:b5:76:9f:1d:6c:86:b9:1f:28:57:38:3a: b6:ba:2d:14:2d:58:79:3d:0d:88:bd:22:42:67:db:d8: 8f:f6:35:9f:6d:cb:eb:58:75:55:c1:e3:98:4b:0c:a3: 27:40:54:30:72:86:39:df:5c:77:57:89:35:df:46:e0: 09:48:c0:9f:1b:9a:04:74:1f:20:e9:7d:ff:59:4b:ac: 4d:e1:f4:ca:ae:e2:a8:c8:7c:2e:ca:15:b0:96:b7:57: 12:23:6c:62:05:ee:13:94:be:fa:c1:cd:ab:cc:9a:9d: 8e:c5:d6:aa:bd:0c:ef:1c:4c:ae:d1:4b:82:54:d4:46: d0:7a:02:81:aa:29:5d:8d:ed:8c:33:9c:a3:f9:8f:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:fa:40:a5:90:01:66:1a:53:bc:f7:75:08:78:20:56: 04:a8:03:bf:23:d2:4d:4f:8a:b5:e8:6f:85:8b:fc:12: e9:fd:fa:16:13:81:76:29:ba:24:b5:6f:30:6f:31:9b: 9f:b4:5b:25:a2:2a:9e:52:35:26:08:93:a7:2e:6b:40: fb:c6:1c:ef:56:8c:98:35:6b:49:e1:a5:ef:b2:bb:93: 3b:49:8d:35:30:be:14:f6:ef:15:f3:60:ec:56:4f:9f: 11:28:82:fd:cc:8c:03:64:77:80:37:0c:d3:84:71:b9: 71:00:6c:46:2e:e6:cd:b6:0d:a7:1c:ee:69:33:1c:12: ae:aa:be:28:47:59:55:bd:8a:1e:44:a3:a6:3b:a6:27: 2e:a5:90:f4:67:ab:16:10:7c:37:db:f3:2f:c4:91:dc: 67:a4:33:21:26:cd:1b:e6:22:a5:04:ac:59:df:dc:10: 93:fc:34:80:ec:87:c6:83:68:68:c3:f3:f5:01:d7:01: 8f:54:cf:3a:e0:6c:09:0a:93:c9:b8:7d:3c:26:1f:bf: 49:1b:62:b8:16:fe:fb:48:61:02:c5:f7:ff:66:36:eb: 0d:7d:25:74:6d:d5:e9:6f:3a:c1:42:fb:db:4e:a9:f1: 19:f8:b9:fd:7f:60:0e:0a:d2:5a:ba:06:ee:e8:a7:fa Fingerprint (SHA-256): 92:38:0E:17:E6:30:44:F1:83:F8:E4:08:8B:66:F4:E8:B2:CD:84:79:67:69:69:E9:E9:2F:4D:3D:AC:83:CD:C4 Fingerprint (SHA1): 10:D4:5E:5C:B9:8D:C8:79:7F:8F:39:5F:AD:CA:7D:A6:35:C6:50:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE65 EE,O=EE65,C=US" Certificate 2 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 3 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 4 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 5 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 6 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1403: AnyPolicyWithLevel: Verifying certificate(s) EE65CA65.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165141 (0x3caff795) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:02:45 2023 Not After : Wed Oct 18 17:02:45 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:fe:d0:fc:1c:5a:81:5a:4a:68:93:b4:02:bd:6a:11: 70:fa:6a:c8:63:6a:19:6f:ff:be:2d:6e:47:f1:39:b6: 0a:ee:40:d6:56:cb:92:f9:b5:3c:65:ca:e6:a5:ad:6b: 64:67:68:ea:27:dc:94:48:24:d1:14:de:c4:3c:b5:9a: 21:89:9e:a3:22:dd:a1:4e:1e:ea:e2:4a:f1:a4:5b:81: 0c:45:16:f3:64:98:26:96:2b:2d:1a:d0:2c:8b:c3:59: 17:21:ff:2e:b0:8f:31:84:60:a5:77:e9:3a:89:21:cf: b7:81:04:62:b5:76:9f:1d:6c:86:b9:1f:28:57:38:3a: b6:ba:2d:14:2d:58:79:3d:0d:88:bd:22:42:67:db:d8: 8f:f6:35:9f:6d:cb:eb:58:75:55:c1:e3:98:4b:0c:a3: 27:40:54:30:72:86:39:df:5c:77:57:89:35:df:46:e0: 09:48:c0:9f:1b:9a:04:74:1f:20:e9:7d:ff:59:4b:ac: 4d:e1:f4:ca:ae:e2:a8:c8:7c:2e:ca:15:b0:96:b7:57: 12:23:6c:62:05:ee:13:94:be:fa:c1:cd:ab:cc:9a:9d: 8e:c5:d6:aa:bd:0c:ef:1c:4c:ae:d1:4b:82:54:d4:46: d0:7a:02:81:aa:29:5d:8d:ed:8c:33:9c:a3:f9:8f:57 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:fa:40:a5:90:01:66:1a:53:bc:f7:75:08:78:20:56: 04:a8:03:bf:23:d2:4d:4f:8a:b5:e8:6f:85:8b:fc:12: e9:fd:fa:16:13:81:76:29:ba:24:b5:6f:30:6f:31:9b: 9f:b4:5b:25:a2:2a:9e:52:35:26:08:93:a7:2e:6b:40: fb:c6:1c:ef:56:8c:98:35:6b:49:e1:a5:ef:b2:bb:93: 3b:49:8d:35:30:be:14:f6:ef:15:f3:60:ec:56:4f:9f: 11:28:82:fd:cc:8c:03:64:77:80:37:0c:d3:84:71:b9: 71:00:6c:46:2e:e6:cd:b6:0d:a7:1c:ee:69:33:1c:12: ae:aa:be:28:47:59:55:bd:8a:1e:44:a3:a6:3b:a6:27: 2e:a5:90:f4:67:ab:16:10:7c:37:db:f3:2f:c4:91:dc: 67:a4:33:21:26:cd:1b:e6:22:a5:04:ac:59:df:dc:10: 93:fc:34:80:ec:87:c6:83:68:68:c3:f3:f5:01:d7:01: 8f:54:cf:3a:e0:6c:09:0a:93:c9:b8:7d:3c:26:1f:bf: 49:1b:62:b8:16:fe:fb:48:61:02:c5:f7:ff:66:36:eb: 0d:7d:25:74:6d:d5:e9:6f:3a:c1:42:fb:db:4e:a9:f1: 19:f8:b9:fd:7f:60:0e:0a:d2:5a:ba:06:ee:e8:a7:fa Fingerprint (SHA-256): 92:38:0E:17:E6:30:44:F1:83:F8:E4:08:8B:66:F4:E8:B2:CD:84:79:67:69:69:E9:E9:2F:4D:3D:AC:83:CD:C4 Fingerprint (SHA1): 10:D4:5E:5C:B9:8D:C8:79:7F:8F:39:5F:AD:CA:7D:A6:35:C6:50:18 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE66 EE,O=EE66,C=US" Certificate 2 Subject: "CN=CA66 Intermediate,O=CA66,C=US" Certificate 3 Subject: "CN=CA65 Intermediate,O=CA65,C=US" Certificate 4 Subject: "CN=CA64 Intermediate,O=CA64,C=US" Certificate 5 Subject: "CN=CA63 Intermediate,O=CA63,C=US" Certificate 6 Subject: "CN=CA62 Intermediate,O=CA62,C=US" Certificate 7 Subject: "CN=CA61 Intermediate,O=CA61,C=US" Returned value is 0, expected result is pass chains.sh: #1404: AnyPolicyWithLevel: Verifying certificate(s) EE66CA66.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der vfychain -d AllDB -pp -vv -o OID.1.0 EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der -t RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 8. CN=RootCA ROOT CA,O=RootCA,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1405: AnyPolicyWithLevel: Verifying certificate(s) EE67CA67.der RootCA.der CA61RootCA.der CA62CA61.der CA63CA62.der CA64CA63.der CA65CA64.der CA66CA65.der CA67CA66.der with flags -d AllDB -pp -o OID.1.0 -t RootCA.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1406: explicitPolicy: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165171 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1407: explicitPolicy: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1408: explicitPolicy: Exporting Root CA Root.der - PASSED chains.sh: Creating DB nonEVCADB certutil -N -d nonEVCADB -f nonEVCADB/dbpasswd chains.sh: #1409: explicitPolicy: Creating DB nonEVCADB - PASSED chains.sh: Creating Intermediate certifiate request nonEVCAReq.der certutil -s "CN=nonEVCA Intermediate, O=nonEVCA, C=US" -R -2 -d nonEVCADB -f nonEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o nonEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1410: explicitPolicy: Creating Intermediate certifiate request nonEVCAReq.der - PASSED chains.sh: Creating certficate nonEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i nonEVCAReq.der -o nonEVCARoot.der -f RootDB/dbpasswd -m 1018165172 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1411: explicitPolicy: Creating certficate nonEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate nonEVCARoot.der to nonEVCADB database certutil -A -n nonEVCA -t u,u,u -d nonEVCADB -f nonEVCADB/dbpasswd -i nonEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1412: explicitPolicy: Importing certificate nonEVCARoot.der to nonEVCADB database - PASSED chains.sh: Creating DB EVCADB certutil -N -d EVCADB -f EVCADB/dbpasswd chains.sh: #1413: explicitPolicy: Creating DB EVCADB - PASSED chains.sh: Creating Intermediate certifiate request EVCAReq.der certutil -s "CN=EVCA Intermediate, O=EVCA, C=US" -R -2 -d EVCADB -f EVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1414: explicitPolicy: Creating Intermediate certifiate request EVCAReq.der - PASSED chains.sh: Creating certficate EVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i EVCAReq.der -o EVCARoot.der -f RootDB/dbpasswd -m 1018165173 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1415: explicitPolicy: Creating certficate EVCARoot.der signed by Root - PASSED chains.sh: Importing certificate EVCARoot.der to EVCADB database certutil -A -n EVCA -t u,u,u -d EVCADB -f EVCADB/dbpasswd -i EVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1416: explicitPolicy: Importing certificate EVCARoot.der to EVCADB database - PASSED chains.sh: Creating DB otherEVCADB certutil -N -d otherEVCADB -f otherEVCADB/dbpasswd chains.sh: #1417: explicitPolicy: Creating DB otherEVCADB - PASSED chains.sh: Creating Intermediate certifiate request otherEVCAReq.der certutil -s "CN=otherEVCA Intermediate, O=otherEVCA, C=US" -R -2 -d otherEVCADB -f otherEVCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o otherEVCAReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1418: explicitPolicy: Creating Intermediate certifiate request otherEVCAReq.der - PASSED chains.sh: Creating certficate otherEVCARoot.der signed by Root certutil -C -c Root -v 60 -d RootDB -i otherEVCAReq.der -o otherEVCARoot.der -f RootDB/dbpasswd -m 1018165174 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1419: explicitPolicy: Creating certficate otherEVCARoot.der signed by Root - PASSED chains.sh: Importing certificate otherEVCARoot.der to otherEVCADB database certutil -A -n otherEVCA -t u,u,u -d otherEVCADB -f otherEVCADB/dbpasswd -i otherEVCARoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1420: explicitPolicy: Importing certificate otherEVCARoot.der to otherEVCADB database - PASSED chains.sh: Creating DB validEVDB certutil -N -d validEVDB -f validEVDB/dbpasswd chains.sh: #1421: explicitPolicy: Creating DB validEVDB - PASSED chains.sh: Creating EE certifiate request validEVReq.der certutil -s "CN=validEV EE, O=validEV, C=US" -R -2 -d validEVDB -f validEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o validEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1422: explicitPolicy: Creating EE certifiate request validEVReq.der - PASSED chains.sh: Creating certficate validEVEVCA.der signed by EVCA certutil -C -c EVCA -v 60 -d EVCADB -i validEVReq.der -o validEVEVCA.der -f EVCADB/dbpasswd -m 1018165175 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1423: explicitPolicy: Creating certficate validEVEVCA.der signed by EVCA - PASSED chains.sh: Importing certificate validEVEVCA.der to validEVDB database certutil -A -n validEV -t u,u,u -d validEVDB -f validEVDB/dbpasswd -i validEVEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1424: explicitPolicy: Importing certificate validEVEVCA.der to validEVDB database - PASSED chains.sh: Creating DB invalidEVDB certutil -N -d invalidEVDB -f invalidEVDB/dbpasswd chains.sh: #1425: explicitPolicy: Creating DB invalidEVDB - PASSED chains.sh: Creating EE certifiate request invalidEVReq.der certutil -s "CN=invalidEV EE, O=invalidEV, C=US" -R -2 -d invalidEVDB -f invalidEVDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o invalidEVReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1426: explicitPolicy: Creating EE certifiate request invalidEVReq.der - PASSED chains.sh: Creating certficate invalidEVnonEVCA.der signed by nonEVCA certutil -C -c nonEVCA -v 60 -d nonEVCADB -i invalidEVReq.der -o invalidEVnonEVCA.der -f nonEVCADB/dbpasswd -m 1018165176 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1427: explicitPolicy: Creating certficate invalidEVnonEVCA.der signed by nonEVCA - PASSED chains.sh: Importing certificate invalidEVnonEVCA.der to invalidEVDB database certutil -A -n invalidEV -t u,u,u -d invalidEVDB -f invalidEVDB/dbpasswd -i invalidEVnonEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1428: explicitPolicy: Importing certificate invalidEVnonEVCA.der to invalidEVDB database - PASSED chains.sh: Creating DB wrongEVOIDDB certutil -N -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd chains.sh: #1429: explicitPolicy: Creating DB wrongEVOIDDB - PASSED chains.sh: Creating EE certifiate request wrongEVOIDReq.der certutil -s "CN=wrongEVOID EE, O=wrongEVOID, C=US" -R -2 -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o wrongEVOIDReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1430: explicitPolicy: Creating EE certifiate request wrongEVOIDReq.der - PASSED chains.sh: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA certutil -C -c otherEVCA -v 60 -d otherEVCADB -i wrongEVOIDReq.der -o wrongEVOIDotherEVCA.der -f otherEVCADB/dbpasswd -m 1018165177 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1431: explicitPolicy: Creating certficate wrongEVOIDotherEVCA.der signed by otherEVCA - PASSED chains.sh: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database certutil -A -n wrongEVOID -t u,u,u -d wrongEVOIDDB -f wrongEVOIDDB/dbpasswd -i wrongEVOIDotherEVCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1432: explicitPolicy: Importing certificate wrongEVOIDotherEVCA.der to wrongEVOIDDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1433: explicitPolicy: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165171 (0x3caff7b3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:04:25 2023 Not After : Wed Oct 18 17:04:25 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:9b:ea:02:8d:cb:a9:07:0a:52:bd:25:51:ba:4c:01: 30:a8:91:0b:d5:df:67:8f:4a:9d:57:6e:a8:a6:52:0a: 55:f1:b6:ce:c9:78:23:2d:21:f5:88:c7:1f:33:ad:c2: 5d:08:98:16:88:f8:4b:3a:09:a8:4f:07:5d:c1:5e:88: 07:c8:52:aa:5c:5d:a7:49:78:6c:03:8f:bf:14:2e:71: 2c:81:ff:9e:2e:c8:27:95:7a:4c:3f:1f:e9:59:3f:b6: f9:61:0f:ad:d0:e5:bd:d8:f4:94:f2:4e:c8:b8:d2:53: 86:1e:38:6e:6a:ce:d2:34:ce:82:20:f8:d2:91:97:42: 79:06:43:81:07:7e:58:22:76:de:8e:cc:5d:49:71:96: 4f:89:bb:aa:ac:bd:c3:c2:fd:92:ac:ba:c1:45:f6:56: 19:d8:5c:bb:c1:32:82:59:85:81:d4:16:04:c1:9c:56: 94:61:dd:9c:af:8d:75:97:26:7c:c7:40:98:97:11:7a: 79:73:9c:97:73:c4:f6:df:7e:b7:c0:2b:0d:85:b6:82: dd:9e:6a:86:e7:04:69:f8:88:3a:2f:80:b8:1d:49:53: ff:e1:a4:33:09:75:5d:e9:11:d5:fa:5b:c2:81:f2:9f: f0:f6:1e:a4:2b:88:d8:c0:66:6e:9b:77:0e:94:93:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:d9:bb:9d:79:2b:50:b1:20:26:b3:fa:6e:bb:70:15: d9:ab:34:bd:fb:29:d9:19:c7:c0:00:71:b5:5b:39:25: a0:63:12:68:29:4e:80:81:df:af:0a:85:a2:66:e1:b3: 15:6f:37:2b:1b:f7:87:16:19:8d:ac:4a:ed:c1:6a:86: 01:22:9b:e6:a8:5c:72:91:54:9a:b8:e1:ef:12:d6:5c: 5d:a9:22:27:b8:8e:7d:55:c1:c2:6c:96:6e:0a:44:fd: 49:46:7f:57:f3:83:f4:c7:3b:4f:ef:df:0a:47:9d:49: 66:21:88:a3:8a:78:c7:54:6f:73:10:d4:dc:8e:1e:14: 00:68:2d:0e:3d:a8:f4:82:ca:dc:ab:cb:29:ac:c5:ca: cd:23:37:0e:cf:a3:45:fe:08:f3:07:48:55:8f:11:b2: 6a:42:c8:94:b2:d8:f2:89:59:0d:f2:f8:11:32:df:46: 12:eb:38:4c:93:11:3e:c3:49:2e:a7:bd:4b:39:72:8d: 96:19:6e:af:9a:a6:3a:e5:8d:b9:fb:26:89:88:1a:cf: f1:54:05:cc:c6:9a:12:d7:fa:11:4b:49:cf:25:a8:c8: 69:a8:49:c6:15:37:1c:d4:56:4e:1e:4b:db:dd:d5:6b: 23:8b:04:30:41:20:16:72:1b:d3:56:bb:96:f7:b1:18 Fingerprint (SHA-256): 42:A1:CD:94:4F:93:F0:E9:FF:01:2D:E8:78:4F:E3:45:B6:80:79:D9:A0:63:EB:B7:CD:F5:E6:57:43:48:1F:DD Fingerprint (SHA1): C3:84:88:0A:70:A7:17:70:E4:07:18:AB:11:99:19:AF:43:BD:48:4C Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1434: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1435: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CN=Root ROOT CA,O=Root,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1436: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der Root.der with flags -d AllDB -pp -o OID.1.0 -t Root.der - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "C,C,C" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1437: explicitPolicy: Importing certificate Root.der to AllDB database - PASSED chains.sh: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 validEVEVCA.der EVCARoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165171 (0x3caff7b3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:04:25 2023 Not After : Wed Oct 18 17:04:25 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e3:9b:ea:02:8d:cb:a9:07:0a:52:bd:25:51:ba:4c:01: 30:a8:91:0b:d5:df:67:8f:4a:9d:57:6e:a8:a6:52:0a: 55:f1:b6:ce:c9:78:23:2d:21:f5:88:c7:1f:33:ad:c2: 5d:08:98:16:88:f8:4b:3a:09:a8:4f:07:5d:c1:5e:88: 07:c8:52:aa:5c:5d:a7:49:78:6c:03:8f:bf:14:2e:71: 2c:81:ff:9e:2e:c8:27:95:7a:4c:3f:1f:e9:59:3f:b6: f9:61:0f:ad:d0:e5:bd:d8:f4:94:f2:4e:c8:b8:d2:53: 86:1e:38:6e:6a:ce:d2:34:ce:82:20:f8:d2:91:97:42: 79:06:43:81:07:7e:58:22:76:de:8e:cc:5d:49:71:96: 4f:89:bb:aa:ac:bd:c3:c2:fd:92:ac:ba:c1:45:f6:56: 19:d8:5c:bb:c1:32:82:59:85:81:d4:16:04:c1:9c:56: 94:61:dd:9c:af:8d:75:97:26:7c:c7:40:98:97:11:7a: 79:73:9c:97:73:c4:f6:df:7e:b7:c0:2b:0d:85:b6:82: dd:9e:6a:86:e7:04:69:f8:88:3a:2f:80:b8:1d:49:53: ff:e1:a4:33:09:75:5d:e9:11:d5:fa:5b:c2:81:f2:9f: f0:f6:1e:a4:2b:88:d8:c0:66:6e:9b:77:0e:94:93:e3 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8b:d9:bb:9d:79:2b:50:b1:20:26:b3:fa:6e:bb:70:15: d9:ab:34:bd:fb:29:d9:19:c7:c0:00:71:b5:5b:39:25: a0:63:12:68:29:4e:80:81:df:af:0a:85:a2:66:e1:b3: 15:6f:37:2b:1b:f7:87:16:19:8d:ac:4a:ed:c1:6a:86: 01:22:9b:e6:a8:5c:72:91:54:9a:b8:e1:ef:12:d6:5c: 5d:a9:22:27:b8:8e:7d:55:c1:c2:6c:96:6e:0a:44:fd: 49:46:7f:57:f3:83:f4:c7:3b:4f:ef:df:0a:47:9d:49: 66:21:88:a3:8a:78:c7:54:6f:73:10:d4:dc:8e:1e:14: 00:68:2d:0e:3d:a8:f4:82:ca:dc:ab:cb:29:ac:c5:ca: cd:23:37:0e:cf:a3:45:fe:08:f3:07:48:55:8f:11:b2: 6a:42:c8:94:b2:d8:f2:89:59:0d:f2:f8:11:32:df:46: 12:eb:38:4c:93:11:3e:c3:49:2e:a7:bd:4b:39:72:8d: 96:19:6e:af:9a:a6:3a:e5:8d:b9:fb:26:89:88:1a:cf: f1:54:05:cc:c6:9a:12:d7:fa:11:4b:49:cf:25:a8:c8: 69:a8:49:c6:15:37:1c:d4:56:4e:1e:4b:db:dd:d5:6b: 23:8b:04:30:41:20:16:72:1b:d3:56:bb:96:f7:b1:18 Fingerprint (SHA-256): 42:A1:CD:94:4F:93:F0:E9:FF:01:2D:E8:78:4F:E3:45:B6:80:79:D9:A0:63:EB:B7:CD:F5:E6:57:43:48:1F:DD Fingerprint (SHA1): C3:84:88:0A:70:A7:17:70:E4:07:18:AB:11:99:19:AF:43:BD:48:4C Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=validEV EE,O=validEV,C=US" Certificate 2 Subject: "CN=EVCA Intermediate,O=EVCA,C=US" Returned value is 0, expected result is pass chains.sh: #1438: explicitPolicy: Verifying certificate(s) validEVEVCA.der EVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 invalidEVnonEVCA.der nonEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1439: explicitPolicy: Verifying certificate(s) invalidEVnonEVCA.der nonEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 vfychain -d AllDB -pp -vv -o OID.1.0 wrongEVOIDotherEVCA.der otherEVCARoot.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1440: explicitPolicy: Verifying certificate(s) wrongEVOIDotherEVCA.der otherEVCARoot.der with flags -d AllDB -pp -o OID.1.0 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1441: Mapping: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165178 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1442: Mapping: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1443: Mapping: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1444: Mapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1445: Mapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018165179 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1446: Mapping: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1447: Mapping: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1448: Mapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1449: Mapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018165180 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1450: Mapping: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1451: Mapping: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1452: Mapping: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1453: Mapping: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018165181 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1454: Mapping: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1455: Mapping: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1456: Mapping: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1457: Mapping: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1458: Mapping: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1459: Mapping: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165178 (0x3caff7ba) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:04:49 2023 Not After : Wed Oct 18 17:04:49 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:e6:46:d4:89:44:ae:19:e7:20:3a:84:87:93:f3:5d: 93:37:9a:29:6c:86:32:f6:af:7a:3e:97:88:cb:f2:eb: 12:5d:39:d1:6a:56:d1:28:94:64:cf:51:53:53:c8:96: 72:7e:9e:ff:a9:f9:71:c8:64:fd:d0:b3:e0:42:f1:f8: 05:a6:8e:30:1c:4c:9e:67:02:24:81:70:2a:53:da:3a: 75:9b:57:3e:a3:95:0e:15:3a:ee:ae:6f:ee:9f:a9:05: 6c:c0:d7:4a:e8:5d:7d:09:08:e2:ed:dd:86:85:bd:13: 51:12:c6:f7:2d:03:92:0b:29:09:c7:51:5c:99:f7:a6: e4:6f:be:8b:2b:ed:6b:45:ef:69:f7:57:b9:a0:9d:6b: 49:a2:8e:86:be:6f:97:1a:b6:b5:61:53:8d:58:1d:ec: bd:40:a7:6e:89:77:cc:5f:8a:f4:b6:0c:28:a0:48:55: 80:51:df:19:07:7d:cb:8a:36:64:d4:87:cc:ab:e7:32: d6:6c:95:f4:d9:fb:1e:09:e1:4b:b8:cf:28:6b:2a:46: 7d:69:b9:35:80:0e:56:e4:2f:5c:2e:bd:81:24:c3:49: 4e:60:8a:7c:02:ad:d8:de:80:1c:7f:28:42:5b:ed:90: 14:f3:5f:b3:a9:cb:54:fc:3d:71:38:f3:77:0e:36:1f Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: bc:a8:39:c6:37:f2:96:1e:1f:4b:72:24:c8:79:76:db: ed:9e:5a:89:90:99:72:04:6d:6e:c1:df:bb:ae:8a:22: 7c:98:79:14:0e:8b:34:15:87:46:08:e4:f3:70:cf:8c: 7a:9a:50:7b:33:de:43:4c:9a:dd:79:d3:9b:29:71:e2: 11:73:f0:11:60:e7:99:fe:49:66:ae:37:3a:99:c8:60: 2e:9e:44:54:8f:cd:5f:10:3b:49:d5:4f:1c:14:2e:ec: 57:dd:c9:47:b2:38:9b:1c:e3:97:bc:32:e0:50:2e:a5: aa:7d:c4:bc:ba:ba:d1:6d:18:d2:9d:6f:a1:6a:12:d2: b5:fd:a0:86:63:20:3a:39:d3:68:c9:fc:fe:ef:9a:df: 88:58:4b:15:5a:10:f0:6a:75:36:d4:39:db:a8:fd:54: 08:43:12:a8:b1:be:64:fb:47:26:bc:dd:ed:53:24:3a: e5:13:82:a8:c2:25:7d:2d:86:34:bc:ef:76:f0:59:0c: cd:c1:c5:85:6c:56:f6:21:7d:ef:22:96:53:b8:18:41: 71:fb:15:f8:ca:6b:6d:93:75:d7:3c:b9:48:4b:23:3e: d3:32:e6:b8:39:83:bf:cb:16:64:ac:96:f5:2c:cd:69: 8f:ed:a8:8d:b7:1d:6a:c0:46:c3:fd:16:4f:dc:52:50 Fingerprint (SHA-256): 14:51:50:97:C9:26:2B:D5:A1:B8:0E:FA:6F:D4:22:6B:D6:D5:90:E3:62:5D:53:38:A6:28:C2:F8:83:AC:91:82 Fingerprint (SHA1): CA:67:4A:79:27:DB:18:0C:5D:21:A3:D8:CC:D2:BE:71:78:92:A4:65 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1460: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1461: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1462: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165179 (0x3caff7bb) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:04:52 2023 Not After : Wed Oct 18 17:04:52 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: f5:26:a6:fd:38:5e:5f:c0:c5:8c:49:77:59:81:1a:6d: 96:db:6e:e7:b2:84:da:33:ee:ff:be:78:5a:30:bd:e9: 70:cb:d0:e9:39:30:f7:08:90:35:fd:ba:b4:71:4b:53: 45:dd:25:31:ea:be:d7:87:00:a3:03:54:9f:60:62:f2: 39:91:63:08:77:64:95:c6:ad:97:a5:5c:47:a0:5f:04: dd:87:36:b1:ac:67:d2:1b:d0:a1:c4:b1:f8:25:f6:0f: 62:8d:db:78:33:63:17:06:0e:08:cc:9f:f9:82:ae:22: b5:7b:b4:91:af:1b:cc:5e:03:72:d3:78:d7:f9:62:09: 61:22:90:63:8d:e1:bb:f3:0c:f7:b9:80:6a:d8:e6:55: c6:ab:ba:5d:04:62:e3:f5:f6:b7:58:f7:4e:2c:fc:ba: 90:97:aa:54:36:00:19:76:cf:0f:e7:54:bd:f9:11:82: 79:6b:cb:dd:c6:6b:2f:fe:18:11:8e:44:e9:f8:67:2a: 6f:62:9d:1f:3e:75:24:df:5c:c0:85:e6:02:bb:cc:26: 1a:a3:8e:9f:b7:cc:38:70:46:5d:92:4d:d7:69:e1:13: a2:70:d9:ba:59:6d:41:29:0f:f4:29:44:f1:ee:e9:eb: ca:90:ff:a5:75:d5:79:bd:dd:ac:7d:33:5e:c7:8b:4d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 40:21:ec:a1:fd:23:db:46:2c:42:f4:7a:fd:d0:28:de: 90:01:c7:61:b6:6f:90:e2:e9:fe:c8:f9:a4:ca:c3:01: 7e:5c:60:9c:b7:a3:c4:b8:9e:d2:a4:d3:9c:66:f7:70: 2d:98:ea:83:d5:e3:b5:80:de:64:9c:20:63:78:81:2c: 82:0c:ba:3b:11:40:60:2e:47:b5:71:d2:3b:7a:5a:bf: 32:89:54:c9:ff:14:40:cc:ed:c9:91:b2:71:b0:3c:c1: 0b:eb:5c:47:54:4a:2e:f0:e5:ce:d1:e9:41:d4:ec:74: a9:73:4d:b0:0c:1b:f1:69:18:c0:b2:1f:9b:b2:e6:67: 4a:be:89:54:55:e0:d5:c5:2d:9f:bb:7b:82:a2:b7:e5: 9c:0f:43:42:19:90:ce:9b:1c:9b:81:55:c2:27:8f:ce: 82:21:1a:74:34:22:8c:20:ab:22:7f:f1:18:5e:2d:2e: 14:f5:1e:dc:8d:cc:04:be:73:c1:23:1c:6c:58:cd:06: 8e:2f:15:d2:78:39:ec:b1:a5:69:79:e4:ac:07:f8:1c: 66:c1:05:f7:da:31:83:a8:9b:59:3c:d0:e6:a4:8c:7a: e7:c1:0b:ae:fd:8d:06:85:a8:d2:24:43:c1:8c:75:bc: 37:51:b5:84:1c:6a:41:93:96:a8:3e:f5:7e:da:9a:23 Fingerprint (SHA-256): 96:C4:6F:51:2B:A6:5A:71:DC:9C:1F:28:15:1B:EB:DB:59:DC:BC:18:06:5A:C4:F8:10:40:E2:F1:9E:24:06:64 Fingerprint (SHA1): 37:74:4F:A7:4E:76:5A:60:DA:EA:19:A0:DD:18:86:32:54:09:4E:60 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1463: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA2.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1464: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA2.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165180 (0x3caff7bc) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:04:55 2023 Not After : Wed Oct 18 17:04:55 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ca:40:f6:b7:4c:98:d7:51:0d:98:ea:fd:8a:f7:46:16: 21:a7:29:cc:78:7b:14:16:01:8d:53:fe:72:31:19:4c: 29:5a:0a:c4:f4:5a:df:4d:b0:bf:9d:ed:8b:f7:8f:b0: 32:12:e0:8c:63:dc:0f:c0:9e:db:d3:55:ef:64:24:72: c3:e8:7d:c4:07:c6:48:80:6c:4f:f9:fd:63:4d:c2:19: 8f:bc:62:13:47:3f:92:e0:5d:4b:d5:36:b8:f4:05:3c: 42:33:fa:e4:a6:3f:c2:eb:5a:15:17:a3:3c:fb:fa:bf: 9b:1b:b8:5a:38:7d:39:16:69:3e:89:84:10:ea:b9:07: a9:69:95:42:70:85:d5:5c:78:d6:0e:b7:ac:ad:af:02: 6f:ab:ba:bb:84:84:62:70:e9:aa:72:33:25:fb:d7:93: 1d:b1:e4:88:b4:6f:d2:9a:41:d4:1a:b9:c4:d5:47:18: 3d:f8:ea:da:fd:bf:7e:c0:c0:df:e7:b5:db:d9:3d:29: 41:84:1d:68:08:32:2d:4e:34:c8:e8:da:5f:a8:85:9b: 58:df:5f:f4:75:8b:92:b8:d9:e6:ef:89:58:12:fc:69: 5c:b5:19:e9:11:a0:d1:9d:9a:db:ce:c2:bc:6b:ab:af: fd:86:f1:0e:60:c6:7e:46:a6:53:48:50:95:37:b3:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9d:be:c2:da:7e:84:f7:c0:f2:59:03:61:51:39:7c:26: b4:ea:3d:16:e9:2f:1c:1a:0e:5d:b7:d5:63:4d:69:b3: 1d:d7:bc:5d:f6:91:d3:8a:18:33:b2:c3:b3:5b:76:26: 29:81:49:d1:68:98:8e:38:a8:b6:a5:2b:e7:79:a0:b9: f6:4e:10:25:a5:de:4c:9c:16:67:01:fa:e5:97:a4:5d: 9c:1a:1c:ce:52:b2:e6:c6:08:2b:e9:10:3a:fe:7b:f9: a5:24:90:0e:40:05:9f:57:bd:d6:fa:fd:48:8c:69:3a: 01:cf:0d:11:02:79:c0:84:b4:62:28:3a:ce:8e:35:41: 66:c3:43:60:b2:76:7e:8f:78:ab:28:e9:65:d4:28:0b: 5b:50:96:2e:8e:4e:73:ed:70:76:aa:75:e6:a1:a2:1d: 7b:ae:04:66:83:c4:c2:ea:cf:36:4b:72:71:64:49:9a: d6:ec:ab:3d:f6:ba:c3:99:5d:b0:01:40:8d:c8:21:a5: ad:49:2e:fe:c2:3e:44:45:f3:d4:d9:69:b4:f4:28:bb: 5e:3c:89:7f:08:c2:e2:a8:35:06:a4:c1:d5:9a:8e:42: a8:eb:f4:f6:81:4e:bb:81:1e:c4:9a:fb:f6:ed:34:bb: 2c:00:a2:74:e7:9a:96:00:1c:49:ec:03:3e:13:e8:14 Fingerprint (SHA-256): 6F:38:93:37:43:DB:AF:32:EE:00:29:50:EF:D4:E0:C1:A2:50:43:A7:55:BE:E1:EF:1B:12:2B:83:E0:37:71:56 Fingerprint (SHA1): B4:C7:D8:5D:73:A5:A2:29:6C:F2:E7:94:2E:F6:67:04:CD:A6:01:2B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Returned value is 0, expected result is pass chains.sh: #1465: Mapping: Verifying certificate(s) UserCA2.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1466: Mapping2: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165182 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1467: Mapping2: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1468: Mapping2: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1469: Mapping2: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1470: Mapping2: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018165183 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1471: Mapping2: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1472: Mapping2: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1473: Mapping2: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1474: Mapping2: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018165184 --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n n n OID.1.0 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1475: Mapping2: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1476: Mapping2: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1477: Mapping2: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1478: Mapping2: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i CA3Req.der -o CA3CA2.der -f CA2DB/dbpasswd -m 1018165185 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1479: Mapping2: Creating certficate CA3CA2.der signed by CA2 - PASSED chains.sh: Importing certificate CA3CA2.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1480: Mapping2: Importing certificate CA3CA2.der to CA3DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1481: Mapping2: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1482: Mapping2: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i UserReq.der -o UserCA3.der -f CA3DB/dbpasswd -m 1018165186 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1483: Mapping2: Creating certficate UserCA3.der signed by CA3 - PASSED chains.sh: Importing certificate UserCA3.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1484: Mapping2: Importing certificate UserCA3.der to UserDB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1485: Mapping2: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "" -d AllDB -f AllDB/dbpasswd -i Root.der chains.sh: #1486: Mapping2: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing certificate CA1Root.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1Root.der chains.sh: #1487: Mapping2: Importing certificate CA1Root.der to AllDB database - PASSED chains.sh: Importing certificate CA2CA1.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA1.der chains.sh: #1488: Mapping2: Importing certificate CA2CA1.der to AllDB database - PASSED chains.sh: Importing certificate CA3CA2.der to AllDB database certutil -A -n CA3 -t "" -d AllDB -f AllDB/dbpasswd -i CA3CA2.der chains.sh: #1489: Mapping2: Importing certificate CA3CA2.der to AllDB database - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t Root Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165182 (0x3caff7be) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:05:03 2023 Not After : Wed Oct 18 17:05:03 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:2c:3b:15:22:4a:74:60:f3:98:a9:bc:b9:c3:f8:a1: a4:66:01:d9:3f:ef:d8:dc:e7:8b:63:80:4f:a2:3c:0e: 8c:fb:a7:52:92:ec:61:c4:d8:ba:e8:b5:f4:5e:42:6c: ee:4d:52:e8:a9:18:10:c3:f0:f6:65:70:84:b0:8d:bf: 84:ac:98:6c:19:c0:2e:f9:c7:5f:f1:00:cb:61:d7:bd: 8e:6b:53:4a:7a:ba:f6:3f:21:67:69:cd:82:37:66:11: d1:f6:b3:e2:b2:ed:11:83:47:9d:a8:48:74:e2:77:0d: 13:32:42:cd:f9:7d:98:c5:47:38:72:5e:64:75:e2:41: c3:bc:19:66:f3:01:1c:48:c6:6a:03:0f:37:7c:2b:97: 84:39:5a:29:2d:62:b5:80:04:c0:4b:de:3a:11:1c:9a: 7b:5f:f3:83:3c:fe:33:dc:f2:15:a8:d3:56:47:c4:a8: ed:32:66:99:92:42:14:ad:f7:d4:9e:d3:3e:f5:e0:e5: 97:a7:99:3c:1a:0d:8a:c4:18:5f:93:64:c6:cb:8c:82: 66:69:96:6e:e2:f6:98:78:6f:32:8c:8f:50:67:96:e6: 10:5c:fd:84:e2:88:ab:15:08:57:fd:9e:3f:99:68:ed: 31:f8:fc:7a:65:df:ee:e5:27:b7:23:14:b7:88:c2:83 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 62:d1:94:3d:11:87:94:8f:95:0a:b7:94:bd:76:a6:da: e1:1a:7e:72:01:d1:16:33:1f:c6:9c:af:e5:b9:c0:f7: 4b:60:8b:99:be:02:50:d9:43:63:06:5b:a3:18:77:a0: 94:7d:5d:0e:a2:53:37:02:61:c1:b4:2c:7c:c5:b7:72: c2:68:15:8a:c9:b7:89:3c:cd:2c:79:a0:ba:a6:87:57: 79:53:5f:b6:c7:06:ef:8f:da:bf:d2:f6:1a:49:d2:31: f6:43:e3:8e:28:9b:28:26:0e:07:1b:b6:06:a0:3b:8c: 80:01:c0:07:96:56:34:fd:0e:36:79:4a:ff:ff:b9:52: 33:42:18:49:fb:ce:d3:3f:9d:4b:dc:25:57:f6:43:92: 9c:60:23:ae:41:07:0a:ae:8a:95:a6:a5:52:cf:33:00: b2:98:b2:b9:97:de:bd:34:66:11:42:cf:82:fe:67:6a: a4:c1:04:61:9b:6f:44:57:75:33:56:18:3d:3e:9a:96: eb:1d:9f:01:be:7f:c6:f6:0f:19:6a:7b:00:cf:e0:e1: 04:08:0a:9d:8c:64:32:fe:90:fb:9d:5e:f2:6d:42:1a: fe:bd:20:53:5f:cc:75:19:f5:f1:4f:70:51:a9:98:88: 8c:d9:f6:8c:2d:84:6c:ac:cd:79:91:ea:94:e0:00:b8 Fingerprint (SHA-256): 90:2C:6A:D1:E5:2B:6C:48:AC:6C:2C:B5:E5:1C:2A:98:07:F8:B0:49:64:34:94:E1:89:73:6E:CF:9B:49:BE:7A Fingerprint (SHA1): 25:5D:69:28:23:30:93:73:E2:1A:D1:84:34:B0:4C:CB:47:F7:62:43 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 4 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1490: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t Root Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. Root [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1491: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t Root - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA1 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165183 (0x3caff7bf) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:05:06 2023 Not After : Wed Oct 18 17:05:06 2028 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:cb:36:8c:e7:0c:16:9e:11:58:2d:a1:e3:e3:16:2d: df:9b:e8:62:1d:aa:9a:19:43:0e:f7:10:73:fa:9a:54: 0a:d7:0b:fb:de:19:7a:90:bf:09:f5:e3:d3:27:cb:ee: 07:31:bb:a4:8e:5c:97:e2:82:f9:27:cb:bf:85:d0:9e: 21:18:3e:b8:cb:78:cf:4d:7d:57:07:f6:3b:30:8a:b3: 53:a8:43:8a:80:a9:3f:e3:c1:36:43:3f:eb:90:bd:90: d5:3a:84:ab:4c:cb:e7:1e:9a:32:a8:4a:e0:29:ad:0f: 7c:5f:95:ce:69:1c:76:08:b0:63:6f:2f:15:e0:72:2f: 44:f9:71:c6:89:fd:b6:65:e0:a4:97:bf:ec:3e:a4:d4: 1e:b6:8f:d4:39:5a:2a:bb:66:2f:4b:30:71:84:35:df: 30:ca:d1:18:b0:73:44:79:6f:43:a3:48:ff:27:37:f2: 15:3d:95:5f:27:e4:28:82:5c:0e:5f:6d:4d:34:f8:8f: 6a:9c:d2:d0:37:34:dc:46:3b:a2:9a:c3:09:ae:1b:31: 6a:0e:d5:8e:ed:a2:03:d1:99:9e:f5:3d:81:d1:3c:f0: 6b:88:8d:88:ba:02:8d:dc:ec:ac:a2:d0:94:8c:7d:9d: 21:d2:8e:1a:6c:3e:d5:f4:89:bc:54:94:03:8e:c1:31 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policies Data: Policy Name: User Defined Policy OID Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: a8:55:7a:0c:82:3a:7d:f2:f9:41:76:cf:e7:4a:a7:35: e2:0c:ba:0c:d7:1e:43:ca:02:28:ae:c7:a0:74:cc:a4: 04:43:de:75:7f:d4:ba:7e:b6:2a:9a:28:dc:b3:1a:1c: 1f:f4:1e:d9:3b:f3:1f:6f:e5:62:71:f9:18:2d:c3:70: af:91:d2:34:fa:cd:8d:39:ed:ca:91:dc:d1:93:bb:dd: b3:71:f5:bc:75:55:03:95:12:17:f7:4c:b6:65:77:da: 9c:7e:fe:e0:fa:b9:5a:5f:21:a9:0b:6b:f9:f3:93:53: c5:24:6c:97:0b:9f:c2:53:45:4f:d0:43:02:cb:96:0d: 59:73:61:36:66:94:44:a1:55:c0:e0:cc:2e:21:45:4b: 8a:02:cc:81:ea:36:6d:a5:ff:46:42:1b:9c:58:ab:c9: b5:9c:d5:98:f9:9d:08:9d:9c:cf:1a:81:0b:32:42:c4: 57:5e:40:75:93:2d:41:e5:00:a9:85:d1:6d:1d:71:65: 0a:16:82:81:72:cf:7e:4f:7f:74:29:36:87:8b:24:62: ea:b7:42:a9:bc:d6:59:65:00:c2:77:ee:0c:48:f8:36: 8a:fb:3d:45:53:ba:f2:83:1d:28:0a:e1:bc:09:4f:3f: 31:ce:4b:cc:bc:47:35:5f:b8:60:0a:f9:5c:70:30:d1 Fingerprint (SHA-256): 82:53:23:EF:FB:8D:FB:F1:09:1D:26:F0:68:59:63:E7:32:63:F0:35:B7:E6:C9:F5:30:B4:B9:8C:66:56:51:A2 Fingerprint (SHA1): 2B:8E:1D:FD:86:C1:99:2E:EB:CB:A9:C2:4A:1C:B9:BB:AF:33:A2:B2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Certificate 3 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1492: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA1 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. CA1 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1493: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA1 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.0 UserCA3.der -t CA2 Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA2 [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1494: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.0 -t CA2 - PASSED chains.sh: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 vfychain -d AllDB -pp -vv -o OID.1.1 UserCA3.der -t CA2 Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165184 (0x3caff7c0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:05:09 2023 Not After : Wed Oct 18 17:05:09 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a3:ba:f3:dd:ee:5b:02:bf:fd:1a:d7:95:fc:6d:4b:ca: 11:b2:ac:30:e0:86:79:c0:79:ee:93:32:37:c1:26:77: 35:5a:93:17:9e:00:61:2a:53:d6:90:4b:e8:df:44:7c: dc:5d:f9:d5:80:1f:8a:40:48:8d:5e:db:41:c8:45:09: ca:b3:19:13:ed:ea:ec:54:9e:1f:f9:4e:ee:0d:76:90: 41:17:f0:7b:38:bf:b4:86:23:dc:fc:93:ab:53:4a:77: e6:3e:d9:28:12:1c:1c:ac:50:63:d1:92:a7:3a:72:85: fb:e3:13:16:de:21:08:5f:30:21:65:ae:77:7b:87:b2: b4:4e:c5:79:7c:31:cb:e8:6b:25:a4:73:66:64:e2:38: 79:5c:61:9a:32:66:02:0b:33:6f:0a:0f:bb:fc:c0:db: 4a:e3:09:67:cc:70:9b:20:e8:fb:ec:2a:26:bc:ba:f5: 2a:4d:25:b3:d0:7b:52:c6:10:62:dd:43:57:cd:bb:ee: 10:89:ec:a8:49:bb:ae:f4:f4:fc:58:a5:54:06:f7:a9: e4:83:6c:f8:ec:76:f0:6a:63:bd:d5:36:80:8b:f5:31: 08:fe:d4:1f:94:14:9b:71:6e:9e:e7:81:db:c5:86:68: f5:1f:6c:1b:19:ac:47:94:12:be:1c:84:1a:18:5c:d1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Policy Mappings Data: Sequence { Sequence { 28 ( User Defined Policy OID } } Name: Certificate Policies Data: Policy Name: 28 ( Policy Qualifier Name: PKIX CPS Pointer Qualifier Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 53:c4:e2:b9:95:57:99:84:7f:15:d3:f7:27:7b:fe:67: 76:54:fe:56:43:da:84:9d:2f:ae:23:e7:d9:33:1e:f6: dc:48:b6:c3:fb:e5:cf:ce:32:f9:04:e8:8f:48:88:c3: 2b:6c:c5:3b:44:95:51:a8:7f:ee:bd:a1:48:36:ad:07: 3e:48:4d:cb:b8:d8:50:76:45:2d:43:bd:70:84:2f:6d: 73:73:2b:79:b6:7f:90:bb:52:4e:a2:a0:d9:f2:fc:df: f3:32:14:6f:77:c9:e2:5c:32:03:08:e1:84:56:de:3d: 73:3e:e2:04:a0:c6:1b:62:8e:52:c6:e1:92:c7:58:b4: df:f0:9e:d2:6f:b7:16:cc:b6:35:1d:06:d6:8e:a9:98: 8a:8a:97:d5:b7:d3:4d:d1:21:b4:e5:a5:af:4e:28:e5: b1:2b:fe:a0:7c:6a:bb:c5:c2:82:1a:d7:78:1e:5d:75: 00:b8:06:36:cd:a9:c5:54:f6:22:20:34:2c:5d:82:6d: d6:f9:45:06:fe:b9:17:78:e6:0f:b3:5e:3e:61:94:07: db:86:58:8f:00:aa:92:75:15:5b:82:5a:04:32:c2:e2: 33:0d:ef:d3:9e:ad:3e:72:74:5a:d1:2b:49:62:3e:ef: 95:7e:0e:6b:39:a3:10:42:7a:c0:01:eb:32:4b:a4:18 Fingerprint (SHA-256): B2:96:A0:90:C3:79:E9:40:C2:D2:CF:E2:8D:49:AD:E9:CB:D6:CC:30:11:7D:97:7C:CF:8B:2E:6D:7E:44:1A:B0 Fingerprint (SHA1): A4:A3:A1:DD:D8:09:6F:3C:FE:1A:CB:B2:F3:59:29:CA:1B:C1:53:0E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Email Flags: Object Signing Flags: Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1495: Mapping2: Verifying certificate(s) UserCA3.der with flags -d AllDB -pp -o OID.1.1 -t CA2 - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1496: AIA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165187 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1497: AIA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1498: AIA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1499: AIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1500: AIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018165188 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1501: AIA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1502: AIA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1503: AIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1504: AIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018165189 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA1Root-1018164950.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1505: AIA: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1506: AIA: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB UserDB certutil -N -d UserDB -f UserDB/dbpasswd chains.sh: #1507: AIA: Creating DB UserDB - PASSED chains.sh: Creating EE certifiate request UserReq.der certutil -s "CN=User EE, O=User, C=US" -R -2 -d UserDB -f UserDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o UserReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1508: AIA: Creating EE certifiate request UserReq.der - PASSED chains.sh: Creating certficate UserCA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i UserReq.der -o UserCA2.der -f CA2DB/dbpasswd -m 1018165190 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1509: AIA: Creating certficate UserCA2.der signed by CA2 - PASSED chains.sh: Importing certificate UserCA2.der to UserDB database certutil -A -n User -t u,u,u -d UserDB -f UserDB/dbpasswd -i UserCA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1510: AIA: Importing certificate UserCA2.der to UserDB database - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der vfychain -d UserDB -pp -vv UserCA2.der CA2CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA2 Intermediate,O=CA2,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA1 Intermediate,O=CA1,C=US Returned value is 1, expected result is fail chains.sh: #1511: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der vfychain -d UserDB -pp -vv -f UserCA2.der CA2CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165187 (0x3caff7c3) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:05:20 2023 Not After : Wed Oct 18 17:05:20 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:4e:93:6e:e8:f5:b0:6c:6d:c5:f3:fe:28:13:73:99: 28:c0:5e:a0:3b:bf:df:be:ef:7e:bb:6f:e1:6a:68:64: 84:64:9d:23:08:f6:a6:ef:28:5f:28:9f:13:bf:1b:9f: 4f:5d:f9:98:48:ad:d9:25:52:8f:6f:65:be:ea:45:65: a1:4f:5f:ac:61:e9:a7:55:2b:01:67:e1:04:02:11:d1: fa:9e:26:cc:ba:cb:8d:ce:cd:22:0a:f6:5d:0a:cf:26: c4:5a:03:d4:ec:ac:e8:1d:91:d5:16:3c:5d:64:8c:3a: db:f2:b9:d5:60:cc:9a:56:f5:4e:3b:f6:ba:12:27:6c: 08:66:23:f8:a9:29:3a:5b:fe:27:6a:36:6f:1a:74:2c: 05:80:d3:40:e6:d1:eb:33:37:1e:22:40:58:f6:72:e6: 73:2a:69:27:b3:f0:a4:3e:bd:c4:da:e3:9b:5b:c0:fc: 88:0f:0d:db:65:09:49:d7:4e:0f:5c:7a:e8:5b:72:3a: 09:74:a2:8d:93:5e:ce:be:dd:e3:12:69:a1:8f:9b:59: e8:d6:82:06:c5:81:02:60:1b:3c:d4:62:ca:9a:1d:ce: d4:2a:76:70:69:8e:3f:56:f3:d4:c9:98:7b:8e:d9:be: f4:ff:61:1f:24:53:85:8a:49:4d:9b:25:32:c8:21:3b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3d:8e:41:f5:f3:c6:f1:09:71:bd:e6:2d:8f:5e:cc:13: 2b:ef:01:18:39:df:09:df:26:06:db:1c:6f:60:2f:18: ce:4b:f8:0c:b9:36:45:8b:d3:cd:b8:18:0b:d0:32:47: 34:a9:55:32:b2:5f:e1:77:62:70:07:af:6b:04:5a:87: b2:7e:51:22:4c:34:cf:2f:5c:77:c2:de:0a:05:15:f5: 84:44:e3:4c:27:9e:0b:d8:9c:aa:f4:95:bd:b1:01:e7: 37:a2:c6:3e:c7:d2:98:59:ce:44:56:67:9b:90:21:44: f9:c3:ec:f4:50:98:d4:28:60:50:8a:5f:ca:81:bd:31: 74:bc:ca:21:7b:59:71:e1:19:9a:e9:43:0b:a9:ca:bc: 7e:52:c6:61:2b:4c:11:a2:e6:b2:61:df:6d:96:a8:00: 58:a5:11:7d:5a:29:f6:64:85:1d:5c:6d:5c:12:f2:2b: 32:de:37:0e:72:40:8a:71:c6:06:1e:19:d2:55:56:0c: 3a:f3:16:b3:fa:d3:df:83:fc:53:4e:3a:38:91:79:ca: 14:b4:72:3e:35:74:9d:be:8f:c5:7e:dc:cd:7d:dd:ce: 0d:b1:4b:4f:38:c3:4a:e5:74:55:9f:f1:d0:7c:ab:48: b5:a4:11:b5:bc:23:f1:49:52:7d:bd:bf:74:10:dd:3c Fingerprint (SHA-256): A3:59:A5:FE:9C:60:47:D7:A2:09:A6:50:A8:D3:C4:40:A3:EF:2F:BF:49:77:DD:75:D6:9D:13:3F:2D:25:46:D5 Fingerprint (SHA1): BC:CB:AC:FF:4D:D2:58:12:24:54:8A:33:59:CD:6B:F5:27:37:EB:4D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=User EE,O=User,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1512: AIA: Verifying certificate(s) UserCA2.der CA2CA1.der with flags -d UserDB -pp -f -t Root.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1513: BridgeWithAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165191 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1514: BridgeWithAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1515: BridgeWithAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1516: BridgeWithAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165192 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1517: BridgeWithAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1518: BridgeWithAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1519: BridgeWithAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1520: BridgeWithAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018165193 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1521: BridgeWithAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1522: BridgeWithAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018165194 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1523: BridgeWithAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1524: BridgeWithAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1525: BridgeWithAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1526: BridgeWithAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1527: BridgeWithAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018165195 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-Bridge-1018164951.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1528: BridgeWithAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1529: BridgeWithAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1530: BridgeWithAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1531: BridgeWithAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018165196 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1532: BridgeWithAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1533: BridgeWithAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1534: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165191 (0x3caff7c7) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:05:33 2023 Not After : Wed Oct 18 17:05:33 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b2:a0:41:51:f8:d5:21:d2:a5:b3:f5:60:09:93:4a:30: cc:2c:25:95:06:7d:0d:09:27:19:75:26:59:10:82:94: 8b:b9:b7:bf:f4:b7:b3:ca:f1:20:be:08:7c:fd:60:89: 62:be:4b:cb:ce:43:94:dd:dd:f4:2c:3d:38:37:8c:b9: be:da:92:ec:51:ff:a9:5f:4a:71:5a:27:99:55:44:f6: ba:f2:66:06:be:b4:b4:91:cc:32:d6:da:d0:b3:31:32: 4a:37:3c:e4:fa:bc:c2:35:ed:a7:bd:9c:60:d9:4e:8a: 6d:11:69:69:5a:b0:86:0b:d4:da:d5:83:a2:0c:30:64: d5:70:4e:97:6c:27:1e:16:cf:48:df:c1:51:e9:42:e1: b6:70:89:5d:11:b7:72:95:06:59:11:36:7c:12:1c:86: e3:68:45:46:0c:5f:92:a8:7d:35:bb:0f:f8:b8:d8:14: c1:bf:18:06:80:ee:e0:8f:6c:e3:91:b7:92:70:5f:2f: 9a:92:85:5a:75:58:79:3b:4c:5a:ec:dc:8e:da:a1:70: 8e:0f:6a:96:42:24:91:cf:46:05:cf:42:da:3b:9c:25: e5:b5:17:fe:49:9a:9c:2b:8c:2f:56:fc:0d:66:bf:1b: dd:82:37:c6:56:a6:a4:a8:ba:c9:a0:4c:ca:cb:93:97 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 5c:04:67:69:7b:b1:96:d4:31:47:a6:c0:54:60:29:8b: e9:46:ef:16:41:02:6d:a7:13:67:ae:5f:6c:03:d3:df: 4a:fa:4f:32:d0:31:e6:e4:3c:02:a5:bf:3d:5b:78:da: 13:90:28:11:6a:f7:8c:ad:8a:72:16:dd:9b:6e:98:99: 44:4e:49:2a:73:9a:84:45:cd:02:5e:af:bf:df:41:c9: 27:90:b7:bb:f0:31:a4:80:dc:55:ec:d7:67:55:d9:1f: 5f:f8:ce:0c:97:41:d6:3a:44:ad:5d:df:40:f9:6f:7d: cb:8a:cb:28:65:e2:71:69:ec:87:a8:c7:83:2f:b5:e7: 5f:ea:3e:53:fe:3a:fb:2d:7b:32:fe:43:ba:01:ed:db: d7:b8:24:72:2f:b8:59:03:6d:93:d1:a2:aa:5d:08:4d: 6f:22:ed:46:ee:d4:08:fc:a4:f2:c2:3b:7e:12:f0:68: e8:f8:5f:00:c1:04:ae:bd:a3:15:02:01:e0:28:75:fa: 8f:4c:17:0d:43:f2:90:9a:57:2e:13:a5:ca:c2:c6:1e: 7d:c8:15:dd:d9:c8:dc:b3:30:88:64:e6:93:83:5b:32: 7c:82:4a:50:f5:3d:91:c0:6a:fa:84:d4:d1:2c:cb:e0: 0b:a2:98:c2:70:c2:5b:81:c9:1d:f7:c8:ca:97:43:d4 Fingerprint (SHA-256): 55:01:D7:7D:5A:CC:C0:AB:56:FD:F2:B9:6F:2B:C7:96:C9:DC:F2:0E:84:58:00:98:A2:06:C3:A9:2A:B2:1B:F9 Fingerprint (SHA1): B2:65:C8:66:A5:C1:49:4C:AA:E5:15:89:CC:E9:B8:20:68:AA:E9:37 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1535: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165192 (0x3caff7c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:05:36 2023 Not After : Wed Oct 18 17:05:36 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c8:e9:e7:02:e7:b9:5a:3a:0a:96:19:50:c1:3a:61: 04:64:d3:2a:61:9e:1f:33:3e:a2:4b:35:bc:8b:9a:3c: 73:44:e5:1c:3a:f8:d8:5c:f7:f9:44:fb:4f:dd:18:72: bc:dd:90:08:62:64:c6:5a:58:88:98:e2:0b:06:98:c5: d4:06:a7:18:89:7a:8d:62:ee:f5:75:f3:81:0a:4a:26: 18:e5:80:8b:e0:a7:18:3f:63:8f:ac:99:7b:5d:05:f7: b0:e5:ad:55:14:c7:1f:03:f1:34:ea:ce:d3:81:46:7e: 46:56:90:d8:79:56:a6:c1:f6:ac:b6:00:47:16:a1:2b: c5:d3:4e:78:f7:16:7e:79:2c:48:87:b9:73:84:b0:d7: a9:70:cd:b1:1e:6c:72:1c:29:63:6e:c7:c4:5c:24:88: 7d:7b:f6:2d:b6:e3:33:d4:e7:ae:4e:e1:c4:d2:fd:2b: 74:ca:8a:de:2c:47:4a:07:3a:23:d6:b6:74:1b:d0:55: d0:55:0b:a1:59:8d:65:7c:8a:19:31:63:0c:eb:3b:53: 88:f8:9f:0d:b0:69:7e:20:34:30:a1:b8:f3:37:b8:00: 53:67:b2:83:5d:be:4c:07:ce:77:f2:7e:bd:c7:61:c2: f4:92:42:99:af:1e:cd:2d:d1:69:c1:03:34:e2:34:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:eb:57:07:3b:ad:bf:cb:99:1e:6a:45:fe:48:fa:e0: 0f:0d:52:f2:3c:17:28:93:fc:e5:fe:c9:bb:da:3b:1c: 45:6c:e0:3c:1c:63:b1:7e:06:be:d8:02:a3:d1:de:9b: f7:7e:ae:b5:df:53:52:a8:6d:22:3f:b3:b5:82:16:53: f0:31:b0:f2:8f:24:e2:e9:52:c8:31:97:52:32:67:20: 4c:38:b4:73:58:7a:64:74:ef:da:48:85:18:c4:18:cc: dd:93:db:02:4e:8a:e9:fe:b3:92:c8:34:e4:21:1a:75: 09:35:8b:51:f6:1d:09:d5:c4:22:d7:db:6a:9a:91:b8: 9b:02:23:dd:e8:95:5f:e8:21:f0:8d:d1:00:2e:0f:b4: 81:46:5c:ea:04:46:12:11:ce:fb:c9:fb:6a:7f:4e:19: aa:3c:f7:c1:15:b1:5e:93:4a:86:8c:08:27:3e:ea:aa: 7b:fc:6a:c7:65:da:b5:dd:01:a9:50:0d:e3:00:ef:40: 51:cd:47:37:3f:22:26:df:c6:0c:f4:a9:ee:9b:05:73: 49:ea:5e:6b:be:0c:c0:06:d1:0a:b6:20:37:b2:03:49: 83:4f:77:30:3a:00:d6:f7:2d:24:c5:35:c5:ec:f5:59: f8:f4:5f:ed:7e:8d:32:fb:e2:be:02:dd:6a:72:a6:f2 Fingerprint (SHA-256): DE:91:EE:DB:FD:F8:3C:9E:FC:9D:50:3D:0D:F9:8E:77:4B:9A:87:A8:55:FE:87:33:40:41:65:D5:67:01:6E:C4 Fingerprint (SHA1): C1:C9:63:61:E8:F1:68:F8:D3:07:9B:2A:61:D7:BF:10:BF:54:06:8D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1536: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165192 (0x3caff7c8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:05:36 2023 Not After : Wed Oct 18 17:05:36 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b8:c8:e9:e7:02:e7:b9:5a:3a:0a:96:19:50:c1:3a:61: 04:64:d3:2a:61:9e:1f:33:3e:a2:4b:35:bc:8b:9a:3c: 73:44:e5:1c:3a:f8:d8:5c:f7:f9:44:fb:4f:dd:18:72: bc:dd:90:08:62:64:c6:5a:58:88:98:e2:0b:06:98:c5: d4:06:a7:18:89:7a:8d:62:ee:f5:75:f3:81:0a:4a:26: 18:e5:80:8b:e0:a7:18:3f:63:8f:ac:99:7b:5d:05:f7: b0:e5:ad:55:14:c7:1f:03:f1:34:ea:ce:d3:81:46:7e: 46:56:90:d8:79:56:a6:c1:f6:ac:b6:00:47:16:a1:2b: c5:d3:4e:78:f7:16:7e:79:2c:48:87:b9:73:84:b0:d7: a9:70:cd:b1:1e:6c:72:1c:29:63:6e:c7:c4:5c:24:88: 7d:7b:f6:2d:b6:e3:33:d4:e7:ae:4e:e1:c4:d2:fd:2b: 74:ca:8a:de:2c:47:4a:07:3a:23:d6:b6:74:1b:d0:55: d0:55:0b:a1:59:8d:65:7c:8a:19:31:63:0c:eb:3b:53: 88:f8:9f:0d:b0:69:7e:20:34:30:a1:b8:f3:37:b8:00: 53:67:b2:83:5d:be:4c:07:ce:77:f2:7e:bd:c7:61:c2: f4:92:42:99:af:1e:cd:2d:d1:69:c1:03:34:e2:34:cf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 59:eb:57:07:3b:ad:bf:cb:99:1e:6a:45:fe:48:fa:e0: 0f:0d:52:f2:3c:17:28:93:fc:e5:fe:c9:bb:da:3b:1c: 45:6c:e0:3c:1c:63:b1:7e:06:be:d8:02:a3:d1:de:9b: f7:7e:ae:b5:df:53:52:a8:6d:22:3f:b3:b5:82:16:53: f0:31:b0:f2:8f:24:e2:e9:52:c8:31:97:52:32:67:20: 4c:38:b4:73:58:7a:64:74:ef:da:48:85:18:c4:18:cc: dd:93:db:02:4e:8a:e9:fe:b3:92:c8:34:e4:21:1a:75: 09:35:8b:51:f6:1d:09:d5:c4:22:d7:db:6a:9a:91:b8: 9b:02:23:dd:e8:95:5f:e8:21:f0:8d:d1:00:2e:0f:b4: 81:46:5c:ea:04:46:12:11:ce:fb:c9:fb:6a:7f:4e:19: aa:3c:f7:c1:15:b1:5e:93:4a:86:8c:08:27:3e:ea:aa: 7b:fc:6a:c7:65:da:b5:dd:01:a9:50:0d:e3:00:ef:40: 51:cd:47:37:3f:22:26:df:c6:0c:f4:a9:ee:9b:05:73: 49:ea:5e:6b:be:0c:c0:06:d1:0a:b6:20:37:b2:03:49: 83:4f:77:30:3a:00:d6:f7:2d:24:c5:35:c5:ec:f5:59: f8:f4:5f:ed:7e:8d:32:fb:e2:be:02:dd:6a:72:a6:f2 Fingerprint (SHA-256): DE:91:EE:DB:FD:F8:3C:9E:FC:9D:50:3D:0D:F9:8E:77:4B:9A:87:A8:55:FE:87:33:40:41:65:D5:67:01:6E:C4 Fingerprint (SHA1): C1:C9:63:61:E8:F1:68:F8:D3:07:9B:2A:61:D7:BF:10:BF:54:06:8D Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1537: BridgeWithAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1538: BridgeWithHalfAIA: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165197 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1539: BridgeWithHalfAIA: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1540: BridgeWithHalfAIA: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1541: BridgeWithHalfAIA: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165198 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1542: BridgeWithHalfAIA: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1543: BridgeWithHalfAIA: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1544: BridgeWithHalfAIA: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1545: BridgeWithHalfAIA: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i BridgeReq.der -o BridgeArmy.der -f ArmyDB/dbpasswd -m 1018165199 -7 Bridge@Army < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1546: BridgeWithHalfAIA: Creating certficate BridgeArmy.der signed by Army - PASSED chains.sh: Importing certificate BridgeArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1547: BridgeWithHalfAIA: Importing certificate BridgeArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i BridgeReq.der -o BridgeNavy.der -f NavyDB/dbpasswd -m 1018165200 -7 Bridge@Navy < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1548: BridgeWithHalfAIA: Creating certficate BridgeNavy.der signed by Navy - PASSED chains.sh: Importing certificate BridgeNavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1549: BridgeWithHalfAIA: Importing certificate BridgeNavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@Army,Bridge@Navy" -d BridgeDB > Bridge.p7 chains.sh: #1550: BridgeWithHalfAIA: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1551: BridgeWithHalfAIA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1552: BridgeWithHalfAIA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018165201 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-Bridge-1018164952.p7 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1553: BridgeWithHalfAIA: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1554: BridgeWithHalfAIA: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1555: BridgeWithHalfAIA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1556: BridgeWithHalfAIA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018165202 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1557: BridgeWithHalfAIA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1558: BridgeWithHalfAIA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1559: BridgeWithHalfAIA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1560: BridgeWithHalfAIA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018165203 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-BridgeNavy-1018164953.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1561: BridgeWithHalfAIA: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1562: BridgeWithHalfAIA: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1563: BridgeWithHalfAIA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1564: BridgeWithHalfAIA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018165204 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1565: BridgeWithHalfAIA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1566: BridgeWithHalfAIA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der vfychain -d EE1DB -pp -vv EE1CA1.der CA1Bridge.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. CN=CA1 Intermediate,O=CA1,C=US [Certificate Authority]: ERROR -8179: Peer's Certificate issuer is not recognized. CN=Bridge Bridge,O=Bridge,C=US Returned value is 1, expected result is fail chains.sh: #1567: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165197 (0x3caff7cd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:05:50 2023 Not After : Wed Oct 18 17:05:50 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:c9:91:d9:14:96:a2:02:2d:50:f9:3a:8d:8b:85:32: 4b:0c:cd:b4:57:93:72:10:43:74:19:2f:60:f3:fa:cc: e2:8f:5b:e0:60:0c:86:3d:c7:4b:09:37:f3:c5:ec:0e: ae:6c:fd:c0:93:11:8d:f9:9c:c2:cc:75:5f:2c:24:46: 43:3b:77:be:d9:b7:22:46:1a:80:61:66:e9:0b:69:61: f3:88:d4:ae:95:75:6b:cd:de:e0:99:f8:8e:d2:dc:39: 44:94:ba:38:82:75:6c:b0:10:93:0f:33:83:dd:d6:44: f7:93:13:75:ef:ee:05:1a:e9:16:4f:cc:b4:39:ed:5a: b8:e0:67:f4:d8:bd:ed:b5:32:71:6f:1e:50:e0:cb:c6: 55:8a:61:1e:2e:b4:d1:2b:ac:04:e3:d9:45:6d:09:f0: d7:32:cb:38:52:6e:2a:d4:fa:c1:9c:7e:df:e0:0a:89: d8:58:33:46:a5:d8:e8:d5:9d:7d:25:16:8f:9a:a0:65: 63:b2:d7:40:fe:c9:28:5f:88:35:2b:c3:f1:47:e1:18: 55:a5:2c:f0:d9:31:63:34:5c:ee:8a:a6:f6:58:4b:53: e0:58:41:ca:0d:7b:14:5f:80:55:d6:ba:06:6c:ba:5b: 49:0e:f6:d2:50:d0:25:75:4b:6c:fd:db:27:d3:96:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:99:4d:03:ac:56:47:44:9e:bd:ba:ba:a3:b3:16:6f: 95:3b:9f:9d:a5:1d:35:33:ed:d7:93:6b:f2:6b:8d:aa: b0:3f:88:46:11:ba:90:26:10:78:1f:60:09:16:2d:85: cf:7c:e6:82:d2:fa:1a:ba:c3:13:83:db:70:5f:10:e2: 8c:23:0d:06:62:51:b0:b4:33:d7:92:56:fc:1d:b4:3c: ed:13:ff:81:7c:77:a2:a4:bc:d5:e1:ce:14:f8:55:4f: 59:95:a3:c3:c1:8e:d0:f0:2b:30:68:3f:60:d2:77:a9: 93:e6:a5:66:d2:ac:bd:96:7f:7c:5f:58:5e:0f:cc:9c: ed:f1:1b:07:1a:c7:2b:0f:a9:98:99:79:ef:a1:d7:d8: 74:18:d7:d9:1b:08:bf:e4:be:0c:cf:45:71:20:0d:db: 3f:7c:41:f4:93:30:df:67:f4:cc:56:a4:23:ee:ed:30: 8e:ad:e4:c5:e0:8c:91:de:8c:f7:91:a7:e4:4a:a5:a3: 7f:37:c3:19:90:f1:83:ce:7a:54:ab:27:0c:4f:a9:fe: 54:4b:91:a3:5d:62:2b:77:2d:6a:3c:08:b1:60:22:d6: 75:2d:67:69:ec:41:22:51:02:ab:eb:ad:7e:4c:41:69: f7:40:9d:e9:66:95:20:a3:d1:e2:2c:ed:26:ce:aa:72 Fingerprint (SHA-256): 08:43:C9:04:4B:D1:13:6E:49:2A:FF:F7:F2:55:A7:92:59:F4:56:23:7C:A7:CF:C6:43:37:CA:78:E8:65:44:15 Fingerprint (SHA1): 23:11:DE:70:A2:9E:11:33:5E:4C:42:54:77:8B:D2:42:B5:9C:E5:BF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1568: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165198 (0x3caff7ce) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:05:53 2023 Not After : Wed Oct 18 17:05:53 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:56:3d:8b:9d:7a:2f:0b:19:ed:ab:3d:1f:5b:39:83: 25:41:c8:9b:ca:58:22:6e:0e:7d:b2:d4:cf:76:37:ee: 49:a0:ac:cb:96:3f:36:d7:2c:e5:3d:d6:b9:f3:2e:8c: 4c:79:7a:9e:9f:16:26:84:0c:2b:ea:79:d5:ed:85:20: fd:b6:7e:60:f9:a1:9f:1d:1d:34:be:da:1b:95:a5:e1: c2:16:54:a2:a8:7b:4f:10:ff:41:1c:d4:53:f4:c8:dd: 6a:0f:75:02:26:d0:b8:a8:0d:57:11:02:46:9c:6d:37: ce:12:92:85:18:f8:ae:a8:8d:69:e7:fc:7c:15:0d:3e: 9d:bd:39:1c:ab:78:f0:1f:b6:73:ce:02:54:4a:68:34: 60:3f:5c:ad:fd:62:a2:30:26:93:b4:62:e2:16:8f:89: 1d:34:7d:6b:fa:44:48:e2:0b:be:19:cb:f3:0d:b3:20: 12:1c:b0:d8:bd:35:96:be:bf:43:43:ca:0b:dd:c6:31: 62:f2:a3:18:b2:fd:25:c9:47:b2:94:47:5a:2b:c7:80: dc:f4:8f:f3:82:c1:77:c4:a7:c0:a2:26:5e:4f:8d:bd: fc:32:8b:21:e5:f4:96:c5:be:95:ca:5a:79:e5:f7:14: de:66:7e:97:b9:58:cc:2d:86:da:41:9f:19:07:b3:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:a1:ca:47:06:7a:84:e8:c2:24:5a:ae:e3:8f:05:3d: 53:e9:08:e3:ce:6b:a4:af:0f:7c:34:92:ff:c1:23:92: 89:b7:8f:6f:13:49:94:97:4d:00:a8:1f:9e:8f:2a:b2: 26:73:63:01:58:6a:dd:4e:ae:d3:d9:a8:4b:0e:08:c6: f6:b1:16:be:00:8e:b0:2f:5a:38:35:1a:b6:18:8a:f3: 9b:06:c8:06:ab:99:e8:f8:ae:08:6a:40:c1:ad:6e:c9: 91:d4:d1:2c:1e:8f:c4:bb:44:63:6b:a5:b6:2b:23:56: 0b:e2:24:d2:2d:23:a5:9f:06:b2:53:b2:27:80:6b:b5: 68:47:d4:37:f9:d8:33:28:52:a0:cc:f9:fb:6a:94:6d: e4:b7:1f:38:04:8a:2e:24:ba:36:35:e3:ec:d6:e6:d2: 8b:08:65:42:42:bb:eb:18:de:b5:29:e1:b7:7e:76:b4: b5:a7:4a:15:80:4d:ea:81:b3:a0:01:fa:45:a6:87:73: cc:2e:fc:35:62:ce:8a:9d:c6:15:75:46:3b:a2:a6:f4: d9:cc:7c:e0:31:22:13:e3:9c:8a:5e:11:a3:07:43:47: b4:8d:04:e6:f7:e2:aa:85:6a:74:8c:c0:de:f6:b8:3e: 39:22:f7:1a:da:e8:0d:f2:88:55:54:27:7f:fd:6c:d6 Fingerprint (SHA-256): 79:ED:1B:09:AF:84:A5:F7:9A:BC:2A:63:FE:F0:F5:FB:16:C1:7B:08:5B:01:76:AA:30:53:93:E2:79:5C:30:BA Fingerprint (SHA1): 72:CF:5D:9C:92:E6:49:C2:79:4E:1F:83:BF:55:76:ED:82:33:98:F2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1569: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE1CA1.der CA1Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165198 (0x3caff7ce) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:05:53 2023 Not After : Wed Oct 18 17:05:53 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:56:3d:8b:9d:7a:2f:0b:19:ed:ab:3d:1f:5b:39:83: 25:41:c8:9b:ca:58:22:6e:0e:7d:b2:d4:cf:76:37:ee: 49:a0:ac:cb:96:3f:36:d7:2c:e5:3d:d6:b9:f3:2e:8c: 4c:79:7a:9e:9f:16:26:84:0c:2b:ea:79:d5:ed:85:20: fd:b6:7e:60:f9:a1:9f:1d:1d:34:be:da:1b:95:a5:e1: c2:16:54:a2:a8:7b:4f:10:ff:41:1c:d4:53:f4:c8:dd: 6a:0f:75:02:26:d0:b8:a8:0d:57:11:02:46:9c:6d:37: ce:12:92:85:18:f8:ae:a8:8d:69:e7:fc:7c:15:0d:3e: 9d:bd:39:1c:ab:78:f0:1f:b6:73:ce:02:54:4a:68:34: 60:3f:5c:ad:fd:62:a2:30:26:93:b4:62:e2:16:8f:89: 1d:34:7d:6b:fa:44:48:e2:0b:be:19:cb:f3:0d:b3:20: 12:1c:b0:d8:bd:35:96:be:bf:43:43:ca:0b:dd:c6:31: 62:f2:a3:18:b2:fd:25:c9:47:b2:94:47:5a:2b:c7:80: dc:f4:8f:f3:82:c1:77:c4:a7:c0:a2:26:5e:4f:8d:bd: fc:32:8b:21:e5:f4:96:c5:be:95:ca:5a:79:e5:f7:14: de:66:7e:97:b9:58:cc:2d:86:da:41:9f:19:07:b3:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:a1:ca:47:06:7a:84:e8:c2:24:5a:ae:e3:8f:05:3d: 53:e9:08:e3:ce:6b:a4:af:0f:7c:34:92:ff:c1:23:92: 89:b7:8f:6f:13:49:94:97:4d:00:a8:1f:9e:8f:2a:b2: 26:73:63:01:58:6a:dd:4e:ae:d3:d9:a8:4b:0e:08:c6: f6:b1:16:be:00:8e:b0:2f:5a:38:35:1a:b6:18:8a:f3: 9b:06:c8:06:ab:99:e8:f8:ae:08:6a:40:c1:ad:6e:c9: 91:d4:d1:2c:1e:8f:c4:bb:44:63:6b:a5:b6:2b:23:56: 0b:e2:24:d2:2d:23:a5:9f:06:b2:53:b2:27:80:6b:b5: 68:47:d4:37:f9:d8:33:28:52:a0:cc:f9:fb:6a:94:6d: e4:b7:1f:38:04:8a:2e:24:ba:36:35:e3:ec:d6:e6:d2: 8b:08:65:42:42:bb:eb:18:de:b5:29:e1:b7:7e:76:b4: b5:a7:4a:15:80:4d:ea:81:b3:a0:01:fa:45:a6:87:73: cc:2e:fc:35:62:ce:8a:9d:c6:15:75:46:3b:a2:a6:f4: d9:cc:7c:e0:31:22:13:e3:9c:8a:5e:11:a3:07:43:47: b4:8d:04:e6:f7:e2:aa:85:6a:74:8c:c0:de:f6:b8:3e: 39:22:f7:1a:da:e8:0d:f2:88:55:54:27:7f:fd:6c:d6 Fingerprint (SHA-256): 79:ED:1B:09:AF:84:A5:F7:9A:BC:2A:63:FE:F0:F5:FB:16:C1:7B:08:5B:01:76:AA:30:53:93:E2:79:5C:30:BA Fingerprint (SHA1): 72:CF:5D:9C:92:E6:49:C2:79:4E:1F:83:BF:55:76:ED:82:33:98:F2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1570: BridgeWithHalfAIA: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der BridgeArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=EE2 EE,O=EE2,C=US : ERROR -8179: Peer's Certificate issuer is not recognized. CN=CA2 Intermediate,O=CA2,C=US Returned value is 1, expected result is fail chains.sh: #1571: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165197 (0x3caff7cd) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:05:50 2023 Not After : Wed Oct 18 17:05:50 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:c9:91:d9:14:96:a2:02:2d:50:f9:3a:8d:8b:85:32: 4b:0c:cd:b4:57:93:72:10:43:74:19:2f:60:f3:fa:cc: e2:8f:5b:e0:60:0c:86:3d:c7:4b:09:37:f3:c5:ec:0e: ae:6c:fd:c0:93:11:8d:f9:9c:c2:cc:75:5f:2c:24:46: 43:3b:77:be:d9:b7:22:46:1a:80:61:66:e9:0b:69:61: f3:88:d4:ae:95:75:6b:cd:de:e0:99:f8:8e:d2:dc:39: 44:94:ba:38:82:75:6c:b0:10:93:0f:33:83:dd:d6:44: f7:93:13:75:ef:ee:05:1a:e9:16:4f:cc:b4:39:ed:5a: b8:e0:67:f4:d8:bd:ed:b5:32:71:6f:1e:50:e0:cb:c6: 55:8a:61:1e:2e:b4:d1:2b:ac:04:e3:d9:45:6d:09:f0: d7:32:cb:38:52:6e:2a:d4:fa:c1:9c:7e:df:e0:0a:89: d8:58:33:46:a5:d8:e8:d5:9d:7d:25:16:8f:9a:a0:65: 63:b2:d7:40:fe:c9:28:5f:88:35:2b:c3:f1:47:e1:18: 55:a5:2c:f0:d9:31:63:34:5c:ee:8a:a6:f6:58:4b:53: e0:58:41:ca:0d:7b:14:5f:80:55:d6:ba:06:6c:ba:5b: 49:0e:f6:d2:50:d0:25:75:4b:6c:fd:db:27:d3:96:c9 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 66:99:4d:03:ac:56:47:44:9e:bd:ba:ba:a3:b3:16:6f: 95:3b:9f:9d:a5:1d:35:33:ed:d7:93:6b:f2:6b:8d:aa: b0:3f:88:46:11:ba:90:26:10:78:1f:60:09:16:2d:85: cf:7c:e6:82:d2:fa:1a:ba:c3:13:83:db:70:5f:10:e2: 8c:23:0d:06:62:51:b0:b4:33:d7:92:56:fc:1d:b4:3c: ed:13:ff:81:7c:77:a2:a4:bc:d5:e1:ce:14:f8:55:4f: 59:95:a3:c3:c1:8e:d0:f0:2b:30:68:3f:60:d2:77:a9: 93:e6:a5:66:d2:ac:bd:96:7f:7c:5f:58:5e:0f:cc:9c: ed:f1:1b:07:1a:c7:2b:0f:a9:98:99:79:ef:a1:d7:d8: 74:18:d7:d9:1b:08:bf:e4:be:0c:cf:45:71:20:0d:db: 3f:7c:41:f4:93:30:df:67:f4:cc:56:a4:23:ee:ed:30: 8e:ad:e4:c5:e0:8c:91:de:8c:f7:91:a7:e4:4a:a5:a3: 7f:37:c3:19:90:f1:83:ce:7a:54:ab:27:0c:4f:a9:fe: 54:4b:91:a3:5d:62:2b:77:2d:6a:3c:08:b1:60:22:d6: 75:2d:67:69:ec:41:22:51:02:ab:eb:ad:7e:4c:41:69: f7:40:9d:e9:66:95:20:a3:d1:e2:2c:ed:26:ce:aa:72 Fingerprint (SHA-256): 08:43:C9:04:4B:D1:13:6E:49:2A:FF:F7:F2:55:A7:92:59:F4:56:23:7C:A7:CF:C6:43:37:CA:78:E8:65:44:15 Fingerprint (SHA1): 23:11:DE:70:A2:9E:11:33:5E:4C:42:54:77:8B:D2:42:B5:9C:E5:BF Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1572: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165198 (0x3caff7ce) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:05:53 2023 Not After : Wed Oct 18 17:05:53 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:56:3d:8b:9d:7a:2f:0b:19:ed:ab:3d:1f:5b:39:83: 25:41:c8:9b:ca:58:22:6e:0e:7d:b2:d4:cf:76:37:ee: 49:a0:ac:cb:96:3f:36:d7:2c:e5:3d:d6:b9:f3:2e:8c: 4c:79:7a:9e:9f:16:26:84:0c:2b:ea:79:d5:ed:85:20: fd:b6:7e:60:f9:a1:9f:1d:1d:34:be:da:1b:95:a5:e1: c2:16:54:a2:a8:7b:4f:10:ff:41:1c:d4:53:f4:c8:dd: 6a:0f:75:02:26:d0:b8:a8:0d:57:11:02:46:9c:6d:37: ce:12:92:85:18:f8:ae:a8:8d:69:e7:fc:7c:15:0d:3e: 9d:bd:39:1c:ab:78:f0:1f:b6:73:ce:02:54:4a:68:34: 60:3f:5c:ad:fd:62:a2:30:26:93:b4:62:e2:16:8f:89: 1d:34:7d:6b:fa:44:48:e2:0b:be:19:cb:f3:0d:b3:20: 12:1c:b0:d8:bd:35:96:be:bf:43:43:ca:0b:dd:c6:31: 62:f2:a3:18:b2:fd:25:c9:47:b2:94:47:5a:2b:c7:80: dc:f4:8f:f3:82:c1:77:c4:a7:c0:a2:26:5e:4f:8d:bd: fc:32:8b:21:e5:f4:96:c5:be:95:ca:5a:79:e5:f7:14: de:66:7e:97:b9:58:cc:2d:86:da:41:9f:19:07:b3:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:a1:ca:47:06:7a:84:e8:c2:24:5a:ae:e3:8f:05:3d: 53:e9:08:e3:ce:6b:a4:af:0f:7c:34:92:ff:c1:23:92: 89:b7:8f:6f:13:49:94:97:4d:00:a8:1f:9e:8f:2a:b2: 26:73:63:01:58:6a:dd:4e:ae:d3:d9:a8:4b:0e:08:c6: f6:b1:16:be:00:8e:b0:2f:5a:38:35:1a:b6:18:8a:f3: 9b:06:c8:06:ab:99:e8:f8:ae:08:6a:40:c1:ad:6e:c9: 91:d4:d1:2c:1e:8f:c4:bb:44:63:6b:a5:b6:2b:23:56: 0b:e2:24:d2:2d:23:a5:9f:06:b2:53:b2:27:80:6b:b5: 68:47:d4:37:f9:d8:33:28:52:a0:cc:f9:fb:6a:94:6d: e4:b7:1f:38:04:8a:2e:24:ba:36:35:e3:ec:d6:e6:d2: 8b:08:65:42:42:bb:eb:18:de:b5:29:e1:b7:7e:76:b4: b5:a7:4a:15:80:4d:ea:81:b3:a0:01:fa:45:a6:87:73: cc:2e:fc:35:62:ce:8a:9d:c6:15:75:46:3b:a2:a6:f4: d9:cc:7c:e0:31:22:13:e3:9c:8a:5e:11:a3:07:43:47: b4:8d:04:e6:f7:e2:aa:85:6a:74:8c:c0:de:f6:b8:3e: 39:22:f7:1a:da:e8:0d:f2:88:55:54:27:7f:fd:6c:d6 Fingerprint (SHA-256): 79:ED:1B:09:AF:84:A5:F7:9A:BC:2A:63:FE:F0:F5:FB:16:C1:7B:08:5B:01:76:AA:30:53:93:E2:79:5C:30:BA Fingerprint (SHA1): 72:CF:5D:9C:92:E6:49:C2:79:4E:1F:83:BF:55:76:ED:82:33:98:F2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1573: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der vfychain -d EE1DB -pp -vv -f EE2CA2.der CA2Bridge.der BridgeArmy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165198 (0x3caff7ce) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:05:53 2023 Not After : Wed Oct 18 17:05:53 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:56:3d:8b:9d:7a:2f:0b:19:ed:ab:3d:1f:5b:39:83: 25:41:c8:9b:ca:58:22:6e:0e:7d:b2:d4:cf:76:37:ee: 49:a0:ac:cb:96:3f:36:d7:2c:e5:3d:d6:b9:f3:2e:8c: 4c:79:7a:9e:9f:16:26:84:0c:2b:ea:79:d5:ed:85:20: fd:b6:7e:60:f9:a1:9f:1d:1d:34:be:da:1b:95:a5:e1: c2:16:54:a2:a8:7b:4f:10:ff:41:1c:d4:53:f4:c8:dd: 6a:0f:75:02:26:d0:b8:a8:0d:57:11:02:46:9c:6d:37: ce:12:92:85:18:f8:ae:a8:8d:69:e7:fc:7c:15:0d:3e: 9d:bd:39:1c:ab:78:f0:1f:b6:73:ce:02:54:4a:68:34: 60:3f:5c:ad:fd:62:a2:30:26:93:b4:62:e2:16:8f:89: 1d:34:7d:6b:fa:44:48:e2:0b:be:19:cb:f3:0d:b3:20: 12:1c:b0:d8:bd:35:96:be:bf:43:43:ca:0b:dd:c6:31: 62:f2:a3:18:b2:fd:25:c9:47:b2:94:47:5a:2b:c7:80: dc:f4:8f:f3:82:c1:77:c4:a7:c0:a2:26:5e:4f:8d:bd: fc:32:8b:21:e5:f4:96:c5:be:95:ca:5a:79:e5:f7:14: de:66:7e:97:b9:58:cc:2d:86:da:41:9f:19:07:b3:e1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2a:a1:ca:47:06:7a:84:e8:c2:24:5a:ae:e3:8f:05:3d: 53:e9:08:e3:ce:6b:a4:af:0f:7c:34:92:ff:c1:23:92: 89:b7:8f:6f:13:49:94:97:4d:00:a8:1f:9e:8f:2a:b2: 26:73:63:01:58:6a:dd:4e:ae:d3:d9:a8:4b:0e:08:c6: f6:b1:16:be:00:8e:b0:2f:5a:38:35:1a:b6:18:8a:f3: 9b:06:c8:06:ab:99:e8:f8:ae:08:6a:40:c1:ad:6e:c9: 91:d4:d1:2c:1e:8f:c4:bb:44:63:6b:a5:b6:2b:23:56: 0b:e2:24:d2:2d:23:a5:9f:06:b2:53:b2:27:80:6b:b5: 68:47:d4:37:f9:d8:33:28:52:a0:cc:f9:fb:6a:94:6d: e4:b7:1f:38:04:8a:2e:24:ba:36:35:e3:ec:d6:e6:d2: 8b:08:65:42:42:bb:eb:18:de:b5:29:e1:b7:7e:76:b4: b5:a7:4a:15:80:4d:ea:81:b3:a0:01:fa:45:a6:87:73: cc:2e:fc:35:62:ce:8a:9d:c6:15:75:46:3b:a2:a6:f4: d9:cc:7c:e0:31:22:13:e3:9c:8a:5e:11:a3:07:43:47: b4:8d:04:e6:f7:e2:aa:85:6a:74:8c:c0:de:f6:b8:3e: 39:22:f7:1a:da:e8:0d:f2:88:55:54:27:7f:fd:6c:d6 Fingerprint (SHA-256): 79:ED:1B:09:AF:84:A5:F7:9A:BC:2A:63:FE:F0:F5:FB:16:C1:7B:08:5B:01:76:AA:30:53:93:E2:79:5C:30:BA Fingerprint (SHA1): 72:CF:5D:9C:92:E6:49:C2:79:4E:1F:83:BF:55:76:ED:82:33:98:F2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Returned value is 0, expected result is pass chains.sh: #1574: BridgeWithHalfAIA: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeArmy.der with flags -d EE1DB -pp -f -t Navy.der - PASSED chains.sh: Creating DB ArmyDB certutil -N -d ArmyDB -f ArmyDB/dbpasswd chains.sh: #1575: BridgeWithPolicyExtensionAndMapping: Creating DB ArmyDB - PASSED chains.sh: Creating Root CA Army certutil -s "CN=Army ROOT CA, O=Army, C=US" -S -n Army -t CTu,CTu,CTu -v 600 -x -d ArmyDB -1 -2 -5 -f ArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165205 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1576: BridgeWithPolicyExtensionAndMapping: Creating Root CA Army - PASSED chains.sh: Exporting Root CA Army.der certutil -L -d ArmyDB -r -n Army -o Army.der chains.sh: #1577: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Army.der - PASSED chains.sh: Creating DB NavyDB certutil -N -d NavyDB -f NavyDB/dbpasswd chains.sh: #1578: BridgeWithPolicyExtensionAndMapping: Creating DB NavyDB - PASSED chains.sh: Creating Root CA Navy certutil -s "CN=Navy ROOT CA, O=Navy, C=US" -S -n Navy -t CTu,CTu,CTu -v 600 -x -d NavyDB -1 -2 -5 -f NavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165206 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1579: BridgeWithPolicyExtensionAndMapping: Creating Root CA Navy - PASSED chains.sh: Exporting Root CA Navy.der certutil -L -d NavyDB -r -n Navy -o Navy.der chains.sh: #1580: BridgeWithPolicyExtensionAndMapping: Exporting Root CA Navy.der - PASSED chains.sh: Creating DB CAArmyDB certutil -N -d CAArmyDB -f CAArmyDB/dbpasswd chains.sh: #1581: BridgeWithPolicyExtensionAndMapping: Creating DB CAArmyDB - PASSED chains.sh: Creating Intermediate certifiate request CAArmyReq.der certutil -s "CN=CAArmy Intermediate, O=CAArmy, C=US" -R -2 -d CAArmyDB -f CAArmyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CAArmyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1582: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CAArmyReq.der - PASSED chains.sh: Creating certficate CAArmyArmy.der signed by Army certutil -C -c Army -v 60 -d ArmyDB -i CAArmyReq.der -o CAArmyArmy.der -f ArmyDB/dbpasswd -m 1018165207 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1583: BridgeWithPolicyExtensionAndMapping: Creating certficate CAArmyArmy.der signed by Army - PASSED chains.sh: Importing certificate CAArmyArmy.der to CAArmyDB database certutil -A -n CAArmy -t u,u,u -d CAArmyDB -f CAArmyDB/dbpasswd -i CAArmyArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1584: BridgeWithPolicyExtensionAndMapping: Importing certificate CAArmyArmy.der to CAArmyDB database - PASSED chains.sh: Creating DB CANavyDB certutil -N -d CANavyDB -f CANavyDB/dbpasswd chains.sh: #1585: BridgeWithPolicyExtensionAndMapping: Creating DB CANavyDB - PASSED chains.sh: Creating Intermediate certifiate request CANavyReq.der certutil -s "CN=CANavy Intermediate, O=CANavy, C=US" -R -2 -d CANavyDB -f CANavyDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CANavyReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1586: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CANavyReq.der - PASSED chains.sh: Creating certficate CANavyNavy.der signed by Navy certutil -C -c Navy -v 60 -d NavyDB -i CANavyReq.der -o CANavyNavy.der -f NavyDB/dbpasswd -m 1018165208 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1587: BridgeWithPolicyExtensionAndMapping: Creating certficate CANavyNavy.der signed by Navy - PASSED chains.sh: Importing certificate CANavyNavy.der to CANavyDB database certutil -A -n CANavy -t u,u,u -d CANavyDB -f CANavyDB/dbpasswd -i CANavyNavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1588: BridgeWithPolicyExtensionAndMapping: Importing certificate CANavyNavy.der to CANavyDB database - PASSED chains.sh: Creating DB BridgeDB certutil -N -d BridgeDB -f BridgeDB/dbpasswd chains.sh: #1589: BridgeWithPolicyExtensionAndMapping: Creating DB BridgeDB - PASSED chains.sh: Creating Bridge certifiate request BridgeReq.der certutil -s "CN=Bridge Bridge, O=Bridge, C=US" -R -2 -d BridgeDB -f BridgeDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o BridgeReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1590: BridgeWithPolicyExtensionAndMapping: Creating Bridge certifiate request BridgeReq.der - PASSED chains.sh: Creating certficate BridgeCAArmy.der signed by CAArmy certutil -C -c CAArmy -v 60 -d CAArmyDB -i BridgeReq.der -o BridgeCAArmy.der -f CAArmyDB/dbpasswd -m 1018165209 -7 Bridge@CAArmy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.1.1 1 n n n OID.1.1 OID.2.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1591: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCAArmy.der signed by CAArmy - PASSED chains.sh: Importing certificate BridgeCAArmy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCAArmy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1592: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCAArmy.der to BridgeDB database - PASSED chains.sh: Creating certficate BridgeCANavy.der signed by CANavy certutil -C -c CANavy -v 60 -d CANavyDB -i BridgeReq.der -o BridgeCANavy.der -f CANavyDB/dbpasswd -m 1018165210 -7 Bridge@CANavy --extCP --extPM < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n y OID.2.1 1 n n n OID.2.1 OID.1.1 n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? Enter an Object Identifier (dotted decimal format) for Issuer Domain Policy > Enter an Object Identifier for Subject Domain Policy > Enter another Policy Mapping [y/N] Is this a critical extension [y/N]? chains.sh: #1593: BridgeWithPolicyExtensionAndMapping: Creating certficate BridgeCANavy.der signed by CANavy - PASSED chains.sh: Importing certificate BridgeCANavy.der to BridgeDB database certutil -A -n Bridge -t u,u,u -d BridgeDB -f BridgeDB/dbpasswd -i BridgeCANavy.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1594: BridgeWithPolicyExtensionAndMapping: Importing certificate BridgeCANavy.der to BridgeDB database - PASSED chains.sh: Generating PKCS7 package from BridgeDB database cmsutil -O -r "Bridge@CAArmy,Bridge@CANavy" -d BridgeDB > Bridge.p7 chains.sh: #1595: BridgeWithPolicyExtensionAndMapping: Generating PKCS7 package from BridgeDB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1596: BridgeWithPolicyExtensionAndMapping: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1597: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA1Req.der -o CA1Bridge.der -f BridgeDB/dbpasswd -m 1018165211 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.1 1 n y OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 29 ) 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1598: BridgeWithPolicyExtensionAndMapping: Creating certficate CA1Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA1Bridge.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1599: BridgeWithPolicyExtensionAndMapping: Importing certificate CA1Bridge.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1600: BridgeWithPolicyExtensionAndMapping: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1601: BridgeWithPolicyExtensionAndMapping: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Bridge.der signed by Bridge certutil -C -c Bridge -v 60 -d BridgeDB -i CA2Req.der -o CA2Bridge.der -f BridgeDB/dbpasswd -m 1018165212 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.1.0 1 n y OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 28 ( 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1602: BridgeWithPolicyExtensionAndMapping: Creating certficate CA2Bridge.der signed by Bridge - PASSED chains.sh: Importing certificate CA2Bridge.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Bridge.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1603: BridgeWithPolicyExtensionAndMapping: Importing certificate CA2Bridge.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1604: BridgeWithPolicyExtensionAndMapping: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1605: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018165213 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.1 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 51 Q 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1606: BridgeWithPolicyExtensionAndMapping: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1607: BridgeWithPolicyExtensionAndMapping: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1608: BridgeWithPolicyExtensionAndMapping: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1609: BridgeWithPolicyExtensionAndMapping: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018165214 --extCP < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === OID.2.0 1 n n n === Enter a CertPolicy Object Identifier (dotted decimal format) or "any" for AnyPolicy: > Choose the type of qualifier for policy: 50 P 1 - CPS Pointer qualifier 2 - User notice qualifier Any other number to finish Choice: > Enter CPS pointer URI: > Enter another policy qualifier [y/N] Enter another PolicyInformation field [y/N]? Is this a critical extension [y/N]? chains.sh: #1610: BridgeWithPolicyExtensionAndMapping: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1611: BridgeWithPolicyExtensionAndMapping: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1612: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165205 (0x3caff7d5) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Army ROOT CA,O=Army,C=US" Validity: Not Before: Wed Oct 18 17:06:14 2023 Not After : Wed Oct 18 17:06:14 2073 Subject: "CN=Army ROOT CA,O=Army,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b5:49:6a:12:19:41:5e:a8:cd:09:65:b0:4c:28:85:51: 66:d8:40:f9:99:a2:9a:63:8e:f9:1c:36:18:0a:99:b7: 98:c7:eb:fb:45:37:60:96:9c:17:e4:22:29:10:02:71: 8b:9c:ff:58:e2:23:28:8b:85:97:70:28:24:09:17:da: 8b:18:ab:d5:5d:ca:89:3b:81:c5:a2:ad:00:6b:d0:91: 2f:68:ba:9b:7e:ae:21:ae:47:78:d6:ae:7e:d7:fc:80: c2:81:be:7e:64:74:3d:b2:52:5d:1f:33:3c:a8:19:80: c2:db:18:56:d8:ea:51:df:d9:c5:be:d6:c2:2a:31:a9: d7:eb:aa:23:6d:5d:7a:e3:ec:76:2d:f8:1a:a1:9d:79: b4:64:ea:9a:37:4c:64:9d:91:d6:21:66:30:2d:20:07: db:c1:90:26:44:33:b8:54:23:05:30:f1:b0:63:d2:6c: 4d:1d:cb:57:04:2a:ed:a9:56:d4:81:da:fc:f2:17:f3: 88:c0:28:95:6a:21:b1:3a:18:77:bf:47:8d:49:40:62: f7:65:96:87:12:09:fb:38:73:d9:bd:b6:98:a8:31:4a: fb:c8:97:cb:71:ed:d4:1b:e0:40:a7:c0:22:a0:59:aa: bb:b7:77:e6:5a:b8:63:7f:3b:a8:8c:4a:c4:e3:1b:51 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 0a:21:3e:97:01:96:ac:5c:f7:9d:63:00:3f:c0:05:df: 1f:39:f6:ee:53:44:2c:93:f9:b2:90:ef:e0:1a:7f:64: aa:b2:77:cc:eb:81:ce:63:58:75:68:8e:28:e7:2d:75: b4:da:fe:01:18:2d:35:90:7e:2a:9e:03:d1:00:e3:71: 4c:1b:6e:bc:0a:ea:47:bf:4f:80:bd:d2:7f:02:c1:e8: a0:cf:04:b0:3a:ae:1c:d1:ff:82:c4:5a:50:f7:77:3d: 12:42:84:c3:71:81:87:58:e4:16:40:9b:f5:e6:62:7b: c8:a0:f0:c0:49:ee:d9:94:34:05:2b:ce:28:de:1d:9f: d6:d7:c9:d5:ba:05:0e:e9:bc:39:b8:be:16:41:a7:d8: 8b:c3:9d:cf:9b:33:06:c0:40:50:85:00:8c:07:55:17: a8:8b:ce:85:5b:6c:d7:4b:ff:4f:2f:19:88:1e:b4:11: 6b:ce:ca:ce:5d:17:db:0f:80:20:77:ae:f6:ab:c9:38: 5c:3a:fe:ba:29:12:02:0e:90:9e:2e:fa:d2:4e:42:53: d9:27:0c:ee:28:f0:65:ef:70:a9:63:02:2a:7b:df:6f: 6d:d8:cd:49:56:7d:04:f2:a0:1a:75:33:1b:9a:fd:28: 94:1b:d4:12:1a:b6:9c:9a:6b:2c:03:db:ec:89:9f:f3 Fingerprint (SHA-256): BB:61:34:83:1E:81:AF:18:FC:90:C2:6D:0B:58:49:74:AA:2B:7F:19:90:5D:E0:38:B9:CD:31:08:7E:05:7D:F3 Fingerprint (SHA1): 49:4E:EE:6B:EF:CE:80:80:20:CB:1C:8D:1C:F8:E2:44:A2:B5:18:A4 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CAArmy Intermediate,O=CAArmy,C=US" Returned value is 0, expected result is pass chains.sh: #1613: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1614: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1615: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1616: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1617: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1618: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1619: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE1CA1.der CA1Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1620: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1621: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.1.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165206 (0x3caff7d6) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Navy ROOT CA,O=Navy,C=US" Validity: Not Before: Wed Oct 18 17:06:18 2023 Not After : Wed Oct 18 17:06:18 2073 Subject: "CN=Navy ROOT CA,O=Navy,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b4:af:a2:1e:f9:a5:f6:f8:84:c1:9d:06:b3:e3:93:c9: bc:c8:0d:dc:99:94:a2:45:17:55:e8:3c:0a:6d:60:a8: 53:f3:8e:fc:43:01:f8:d2:1b:2e:b4:61:f7:b1:30:48: eb:9e:67:4f:0d:f3:8a:d0:4b:ec:ca:ff:74:25:93:a4: dc:01:c9:af:01:6f:96:8d:cf:90:5a:32:64:c8:c6:c1: 69:9e:b3:44:ab:e9:56:fc:72:a7:41:f7:fb:44:87:78: 71:c3:fb:9e:87:f4:c0:d7:af:e5:b5:ac:98:29:25:33: 6c:f8:0e:ce:92:78:e6:75:a5:ae:53:46:aa:1e:b2:2f: 7a:aa:48:33:e4:0d:89:54:f5:96:bd:84:9a:e1:2d:1b: e3:01:82:54:0a:53:97:c2:be:4f:67:e2:f7:4c:1f:b8: 10:b1:dc:5c:ff:f4:65:b9:89:02:37:ab:cf:73:25:84: 51:dc:a5:cf:9c:72:01:9f:35:31:ce:7a:e1:60:1e:49: 3d:5a:06:32:ab:92:d2:d6:e6:59:05:5b:28:82:ba:81: b2:8c:5b:6e:87:f3:df:5c:c0:ff:1f:e9:11:86:72:f7: b4:37:1f:6b:a0:db:40:3a:16:d6:3e:7e:04:68:d0:f4: cc:e2:1d:b7:6b:f5:00:e4:96:fa:70:f4:0b:89:71:db Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 67:05:ac:6d:16:51:fe:1c:82:8f:05:12:21:2c:35:e8: da:86:db:f1:91:00:18:24:3d:74:6c:a6:3e:a3:c9:36: 75:50:80:ad:93:f3:d6:08:76:bd:14:fe:b3:39:54:b5: 6c:6f:a2:2a:c6:bf:cb:e0:96:28:6c:a8:af:0d:9e:5a: a9:1b:26:d7:35:0e:a0:bb:9c:e1:ee:9b:93:24:ce:06: 6d:da:8b:65:8a:7d:be:8a:7b:6e:d8:d1:0a:10:3d:10: 49:b5:fd:c0:29:2c:e8:e5:21:fc:6a:d5:a9:a3:ec:33: 0c:e4:d9:52:1e:ab:df:fa:9a:20:f0:ca:b1:54:23:52: 49:85:ba:d0:ef:c6:df:5a:9e:73:9f:9b:27:7a:58:c8: 8e:5f:ad:54:76:b2:2b:2a:1f:26:68:73:0e:d6:08:fa: e3:81:50:92:c2:3f:ab:54:20:11:41:a3:59:b4:08:c4: 90:fe:ce:5a:2a:01:ce:ca:c3:2e:ac:1b:1d:f0:65:73: 3c:5e:78:e3:3d:bc:97:b2:76:87:2f:1c:04:88:bf:a8: 2e:88:66:b9:fd:c7:50:dd:0c:5c:8c:56:e3:40:8b:16: 0f:e2:38:d3:a3:b8:a7:95:ec:de:06:f2:13:10:00:fa: d3:1e:22:67:1d:56:ab:e3:f9:a7:16:76:56:1b:2d:4e Fingerprint (SHA-256): 99:88:A8:E9:59:14:C3:D8:FE:A7:DB:2D:C3:C4:D5:96:2F:90:9D:29:C8:F3:BF:10:77:7A:B3:E0:6C:A8:32:22 Fingerprint (SHA1): 04:B6:27:B0:1C:23:8A:43:F8:A4:01:0F:BA:2C:F1:60:F4:0B:38:54 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=Bridge Bridge,O=Bridge,C=US" Certificate 4 Subject: "CN=CANavy Intermediate,O=CANavy,C=US" Returned value is 0, expected result is pass chains.sh: #1622: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.0 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der -t Navy.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Navy ROOT CA,O=Navy,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1623: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCANavy.der CANavyNavy.der with flags -pp -o OID.2.1 -t Navy.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der vfychain -pp -vv -o OID.1.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1624: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der vfychain -pp -vv -o OID.1.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1625: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.1.1 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der vfychain -pp -vv -o OID.2.0 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1626: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.0 -t Army.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der vfychain -pp -vv -o OID.2.1 EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der -t Army.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 4. CN=Army ROOT CA,O=Army,C=US [Certificate Authority]: ERROR -8032: Cert chain fails policy validation Returned value is 1, expected result is fail chains.sh: #1627: BridgeWithPolicyExtensionAndMapping: Verifying certificate(s) EE2CA2.der CA2Bridge.der BridgeCAArmy.der CAArmyArmy.der with flags -pp -o OID.2.1 -t Army.der - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1628: RealCerts: Creating DB AllDB - PASSED chains.sh: Importing certificate TestCA.ca.cert to AllDB database certutil -A -n TestCA.ca -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestCA.ca.cert chains.sh: #1629: RealCerts: Importing certificate TestCA.ca.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser50.cert to AllDB database certutil -A -n TestUser50 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert chains.sh: #1630: RealCerts: Importing certificate TestUser50.cert to AllDB database - PASSED chains.sh: Importing certificate TestUser51.cert to AllDB database certutil -A -n TestUser51 -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert chains.sh: #1631: RealCerts: Importing certificate TestUser51.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalRootCA.cert to AllDB database certutil -A -n PayPalRootCA -t "CT,C,C" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalRootCA.cert chains.sh: #1632: RealCerts: Importing certificate PayPalRootCA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalICA.cert to AllDB database certutil -A -n PayPalICA -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalICA.cert chains.sh: #1633: RealCerts: Importing certificate PayPalICA.cert to AllDB database - PASSED chains.sh: Importing certificate PayPalEE.cert to AllDB database certutil -A -n PayPalEE -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert chains.sh: #1634: RealCerts: Importing certificate PayPalEE.cert to AllDB database - PASSED chains.sh: Importing certificate BrAirWaysBadSig.cert to AllDB database certutil -A -n BrAirWaysBadSig -t "" -d AllDB -f AllDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert chains.sh: #1635: RealCerts: Importing certificate BrAirWaysBadSig.cert to AllDB database - PASSED chains.sh: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser50.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser50,E=TestUser50@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1636: RealCerts: Verifying certificate(s) TestUser50.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/TestUser51.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=U S" Validity: Not Before: Mon Feb 04 19:52:53 2019 Not After : Mon Feb 04 19:52:53 2069 Subject: "CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C= US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ad:c0:dd:8a:01:8d:97:4c:ab:2e:f1:fe:2a:40:c0:7f: 0c:10:51:0d:5b:aa:26:84:9a:67:6b:82:c6:fc:b2:4f: 9b:8b:f6:ce:96:ee:9b:c8:05:74:48:8a:63:67:ac:d5: 88:1c:8d:c5:70:9e:9d:07:5a:d8:fe:05:6f:a1:51:58: b2:0c:42:da:71:c2:87:47:0a:cd:4a:fb:34:e2:1f:84: 8c:81:c9:14:48:4b:f6:e8:1f:31:1e:d8:e6:38:3a:57: 36:38:91:3c:86:33:ec:8d:2f:b4:16:66:bb:88:3d:d9: 9d:a8:55:21:8e:56:a4:d8:52:65:c3:54:7a:f3:a5:df Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 06:1f:35:21:7c:dc:15:57:14:4b:bf:ef:87:4d:a0:c6: 80:bb:2d:4d:bd:40:22:6c:75:80:54:07:65:6c:7b:4c: 40:a5:2f:a2:de:fa:89:eb:fa:be:5a:7c:13:73:a4:25: 7b:5e:7c:20:57:b6:67:a6:a5:c5:c2:00:47:8f:aa:97: 78:93:38:79:68:35:ef:9e:ff:cb:4d:1b:11:1b:8f:a6: 9b:8c:fb:f9:7f:08:71:4b:7c:e6:2c:7b:e9:cd:41:9e: 8c:68:a9:64:99:6a:36:83:d9:16:b7:fb:97:e5:de:f5: e5:69:99:e8:8b:bd:a0:84:4d:87:41:3d:97:cb:fc:6b Fingerprint (SHA-256): 44:A1:3C:76:77:A7:44:4F:28:8F:55:E5:14:23:7F:11:47:BE:DE:88:EF:FF:86:2E:50:09:AF:72:83:E5:A3:7C Fingerprint (SHA1): B1:55:97:11:C5:02:85:BC:AB:6F:DC:03:06:CD:3B:2B:8A:E7:27:9A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=TestUser51,E=TestUser51@example.com,O=BOGUS NSS,L= Mountain View,ST=California,C=US" Returned value is 0, expected result is pass chains.sh: #1637: RealCerts: Verifying certificate(s) TestUser51.cert with flags -d AllDB -pp - PASSED chains.sh: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 vfychain -d AllDB -pp -vv -b 2201010000Z -o OID.2.16.840.1.114412.2.1 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/PayPalEE.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 02:ac:5c:26:6a:0b:40:9b:8f:0b:79:f2:ae:46:25:77 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O= DigiCert Inc,C=US" Validity: Not Before: Fri Nov 10 00:00:00 2006 Not After : Mon Nov 10 00:00:00 2031 Subject: "CN=DigiCert High Assurance EV Root CA,OU=www.digicert.com,O =DigiCert Inc,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c6:cc:e5:73:e6:fb:d4:bb:e5:2d:2d:32:a6:df:e5:81: 3f:c9:cd:25:49:b6:71:2a:c3:d5:94:34:67:a2:0a:1c: b0:5f:69:a6:40:b1:c4:b7:b2:8f:d0:98:a4:a9:41:59: 3a:d3:dc:94:d6:3c:db:74:38:a4:4a:cc:4d:25:82:f7: 4a:a5:53:12:38:ee:f3:49:6d:71:91:7e:63:b6:ab:a6: 5f:c3:a4:84:f8:4f:62:51:be:f8:c5:ec:db:38:92:e3: 06:e5:08:91:0c:c4:28:41:55:fb:cb:5a:89:15:7e:71: e8:35:bf:4d:72:09:3d:be:3a:38:50:5b:77:31:1b:8d: b3:c7:24:45:9a:a7:ac:6d:00:14:5a:04:b7:ba:13:eb: 51:0a:98:41:41:22:4e:65:61:87:81:41:50:a6:79:5c: 89:de:19:4a:57:d5:2e:e6:5d:1c:53:2c:7e:98:cd:1a: 06:16:a4:68:73:d0:34:04:13:5c:a1:71:d3:5a:7c:55: db:5e:64:e1:37:87:30:56:04:e5:11:b4:29:80:12:f1: 79:39:88:a2:02:11:7c:27:66:b7:88:b7:78:f2:ca:0a: a8:38:ab:0a:64:c2:bf:66:5d:95:84:c1:a1:25:1e:87: 5d:1a:50:0b:20:12:cc:41:bb:6e:0b:51:38:b8:4b:cb Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Certificate Signing CRL Signing Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Name: Certificate Authority Key Identifier Key ID: b1:3e:c3:69:03:f8:bf:47:01:d4:98:26:1a:08:02:ef: 63:64:2b:c3 Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 1c:1a:06:97:dc:d7:9c:9f:3c:88:66:06:08:57:21:db: 21:47:f8:2a:67:aa:bf:18:32:76:40:10:57:c1:8a:f3: 7a:d9:11:65:8e:35:fa:9e:fc:45:b5:9e:d9:4c:31:4b: b8:91:e8:43:2c:8e:b3:78:ce:db:e3:53:79:71:d6:e5: 21:94:01:da:55:87:9a:24:64:f6:8a:66:cc:de:9c:37: cd:a8:34:b1:69:9b:23:c8:9e:78:22:2b:70:43:e3:55: 47:31:61:19:ef:58:c5:85:2f:4e:30:f6:a0:31:16:23: c8:e7:e2:65:16:33:cb:bf:1a:1b:a0:3d:f8:ca:5e:8b: 31:8b:60:08:89:2d:0c:06:5c:52:b7:c4:f9:0a:98:d1: 15:5f:9f:12:be:7c:36:63:38:bd:44:a4:7f:e4:26:2b: 0a:c4:97:69:0d:e9:8c:e2:c0:10:57:b8:c8:76:12:91: 55:f2:48:69:d8:bc:2a:02:5b:0f:44:d4:20:31:db:f4: ba:70:26:5d:90:60:9e:bc:4b:17:09:2f:b4:cb:1e:43: 68:c9:07:27:c1:d2:5c:f7:ea:21:b9:68:12:9c:3c:9c: bf:9e:fc:80:5c:9b:63:cd:ec:47:aa:25:27:67:a0:37: f3:00:82:7d:54:d7:a9:f8:e9:2e:13:a3:77:e8:1f:4a Fingerprint (SHA-256): 74:31:E5:F4:C3:C1:CE:46:90:77:4F:0B:61:E0:54:40:88:3B:A9:A0:1E:D0:0B:A6:AB:D7:80:6E:D3:B1:18:CF Fingerprint (SHA1): 5F:B7:EE:06:33:E2:59:DB:AD:0C:4C:9A:E6:D3:8F:1A:61:C7:DC:25 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=www.paypal.com,OU=CDN Support,O="PayPal, Inc.",L=S an Jose,ST=California,C=US,serialNumber=3014267,incorporationState=Delawa re,incorporationCountry=US,businessCategory=Private Organization" Certificate 2 Subject: "CN=DigiCert SHA2 Extended Validation Server CA,OU=www .digicert.com,O=DigiCert Inc,C=US" Returned value is 0, expected result is pass chains.sh: #1638: RealCerts: Verifying certificate(s) PayPalEE.cert with flags -d AllDB -pp -o OID.2.16.840.1.114412.2.1 - PASSED chains.sh: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp vfychain -d AllDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/BrAirWaysBadSig.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. BrAirWaysBadSig : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1639: RealCerts: Verifying certificate(s) BrAirWaysBadSig.cert with flags -d AllDB -pp - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1640: DSA: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -k dsa -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165215 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1641: DSA: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1642: DSA: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1643: DSA: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -k dsa -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1644: DSA: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA1Req.der -o CA1Root.der -f RootDB/dbpasswd -m 1018165216 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1645: DSA: Creating certficate CA1Root.der signed by Root - PASSED chains.sh: Importing certificate CA1Root.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1646: DSA: Importing certificate CA1Root.der to CA1DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1647: DSA: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -k dsa -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1648: DSA: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE1Req.der -o EE1CA1.der -f CA1DB/dbpasswd -m 1018165217 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1649: DSA: Creating certficate EE1CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE1CA1.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1650: DSA: Importing certificate EE1CA1.der to EE1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1651: DSA: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -k dsa -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1652: DSA: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA2Req.der -o CA2Root.der -f RootDB/dbpasswd -m 1018165218 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1653: DSA: Creating certficate CA2Root.der signed by Root - PASSED chains.sh: Importing certificate CA2Root.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1654: DSA: Importing certificate CA2Root.der to CA2DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1655: DSA: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -k rsa -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1656: DSA: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE2Req.der -o EE2CA2.der -f CA2DB/dbpasswd -m 1018165219 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1657: DSA: Creating certficate EE2CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE2CA2.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1658: DSA: Importing certificate EE2CA2.der to EE2DB database - PASSED chains.sh: Creating DB CA3DB certutil -N -d CA3DB -f CA3DB/dbpasswd chains.sh: #1659: DSA: Creating DB CA3DB - PASSED chains.sh: Creating Intermediate certifiate request CA3Req.der certutil -s "CN=CA3 Intermediate, O=CA3, C=US" -k rsa -R -2 -d CA3DB -f CA3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1660: DSA: Creating Intermediate certifiate request CA3Req.der - PASSED chains.sh: Creating certficate CA3Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA3Req.der -o CA3Root.der -f RootDB/dbpasswd -m 1018165220 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1661: DSA: Creating certficate CA3Root.der signed by Root - PASSED chains.sh: Importing certificate CA3Root.der to CA3DB database certutil -A -n CA3 -t u,u,u -d CA3DB -f CA3DB/dbpasswd -i CA3Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1662: DSA: Importing certificate CA3Root.der to CA3DB database - PASSED chains.sh: Creating DB EE3DB certutil -N -d EE3DB -f EE3DB/dbpasswd chains.sh: #1663: DSA: Creating DB EE3DB - PASSED chains.sh: Creating EE certifiate request EE3Req.der certutil -s "CN=EE3 EE, O=EE3, C=US" -k dsa -R -2 -d EE3DB -f EE3DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE3Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1664: DSA: Creating EE certifiate request EE3Req.der - PASSED chains.sh: Creating certficate EE3CA3.der signed by CA3 certutil -C -c CA3 -v 60 -d CA3DB -i EE3Req.der -o EE3CA3.der -f CA3DB/dbpasswd -m 1018165221 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1665: DSA: Creating certficate EE3CA3.der signed by CA3 - PASSED chains.sh: Importing certificate EE3CA3.der to EE3DB database certutil -A -n EE3 -t u,u,u -d EE3DB -f EE3DB/dbpasswd -i EE3CA3.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1666: DSA: Importing certificate EE3CA3.der to EE3DB database - PASSED chains.sh: Creating DB CA4DB certutil -N -d CA4DB -f CA4DB/dbpasswd chains.sh: #1667: DSA: Creating DB CA4DB - PASSED chains.sh: Creating Intermediate certifiate request CA4Req.der certutil -s "CN=CA4 Intermediate, O=CA4, C=US" -k rsa -R -2 -d CA4DB -f CA4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1668: DSA: Creating Intermediate certifiate request CA4Req.der - PASSED chains.sh: Creating certficate CA4Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA4Req.der -o CA4Root.der -f RootDB/dbpasswd -m 1018165222 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1669: DSA: Creating certficate CA4Root.der signed by Root - PASSED chains.sh: Importing certificate CA4Root.der to CA4DB database certutil -A -n CA4 -t u,u,u -d CA4DB -f CA4DB/dbpasswd -i CA4Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1670: DSA: Importing certificate CA4Root.der to CA4DB database - PASSED chains.sh: Creating DB EE4DB certutil -N -d EE4DB -f EE4DB/dbpasswd chains.sh: #1671: DSA: Creating DB EE4DB - PASSED chains.sh: Creating EE certifiate request EE4Req.der certutil -s "CN=EE4 EE, O=EE4, C=US" -k rsa -R -2 -d EE4DB -f EE4DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE4Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1672: DSA: Creating EE certifiate request EE4Req.der - PASSED chains.sh: Creating certficate EE4CA4.der signed by CA4 certutil -C -c CA4 -v 60 -d CA4DB -i EE4Req.der -o EE4CA4.der -f CA4DB/dbpasswd -m 1018165223 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1673: DSA: Creating certficate EE4CA4.der signed by CA4 - PASSED chains.sh: Importing certificate EE4CA4.der to EE4DB database certutil -A -n EE4 -t u,u,u -d EE4DB -f EE4DB/dbpasswd -i EE4CA4.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1674: DSA: Importing certificate EE4CA4.der to EE4DB database - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1675: DSA: Creating DB AllDB - PASSED chains.sh: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE1CA1.der CA1Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165215 (0x3caff7df) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:06:45 2023 Not After : Wed Oct 18 17:06:45 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 28:42:36:dc:2b:d6:c9:23:7a:ce:6d:2a:16:0b:31:03: b3:1d:ab:4a:13:9e:19:53:6d:48:a5:b0:af:7b:76:d1: bd:0f:34:f7:4d:ba:e2:9c:60:45:27:ff:05:44:ce:72: 4d:60:df:6a:25:7a:69:a8:a7:95:a5:d4:5f:42:3d:8d: f6:0a:9d:58:28:b1:6c:55:e0:7b:e2:3a:6d:47:ba:f5: 6b:21:e6:3b:1a:c4:81:9e:2c:a0:f4:e3:bd:45:32:e8: c6:ba:96:75:44:b5:b4:80:00:cf:5c:95:e4:15:b0:a6: 65:65:73:d9:59:9d:57:f4:f2:f9:3c:b6:ea:4f:1f:43: 21:e9:b5:54:81:43:64:fc:d4:17:28:b2:7c:05:4b:1a: 21:b8:70:ed:8b:8a:76:06:5a:05:27:11:e4:a2:c0:a4: 7d:61:58:cd:52:ac:9d:19:54:87:9f:4a:49:05:83:60: 3e:ba:4e:0d:b6:f1:e9:e3:cf:91:67:96:51:51:fe:0c: 84:9e:10:a7:ae:b5:8a:87:4d:7c:96:23:b8:f3:63:d7: eb:fc:98:59:26:53:7c:d1:8e:d9:54:a5:d2:75:fd:23: e7:a4:09:75:a8:2f:af:c0:f2:f8:b4:50:d8:52:26:30: d7:ad:5b:87:85:d9:9e:90:2f:ee:50:28:08:65:fc:01 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3e:02:1d:00:81:52:e4:8f:d8:35:9a:9a:52:d1:a7: b4:c6:60:a3:35:ef:e9:78:89:b5:ed:7c:60:27:36:21: c0:02:1d:00:ae:15:87:d0:60:7c:8e:eb:56:48:1d:f1: ee:04:90:fb:08:57:ca:9b:43:c8:e4:bc:74:dc:79:2f Fingerprint (SHA-256): F9:5C:E7:20:87:28:4C:DF:7B:58:95:9A:F0:8D:BA:A3:52:FA:C4:A7:0A:7A:4B:00:8E:24:7B:DD:11:E4:6D:0E Fingerprint (SHA1): C1:CE:90:D3:BD:ED:FC:44:D5:B2:2F:44:85:B2:8A:97:8C:AA:37:4B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1676: DSA: Verifying certificate(s) EE1CA1.der CA1Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE2CA2.der CA2Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165215 (0x3caff7df) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:06:45 2023 Not After : Wed Oct 18 17:06:45 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 28:42:36:dc:2b:d6:c9:23:7a:ce:6d:2a:16:0b:31:03: b3:1d:ab:4a:13:9e:19:53:6d:48:a5:b0:af:7b:76:d1: bd:0f:34:f7:4d:ba:e2:9c:60:45:27:ff:05:44:ce:72: 4d:60:df:6a:25:7a:69:a8:a7:95:a5:d4:5f:42:3d:8d: f6:0a:9d:58:28:b1:6c:55:e0:7b:e2:3a:6d:47:ba:f5: 6b:21:e6:3b:1a:c4:81:9e:2c:a0:f4:e3:bd:45:32:e8: c6:ba:96:75:44:b5:b4:80:00:cf:5c:95:e4:15:b0:a6: 65:65:73:d9:59:9d:57:f4:f2:f9:3c:b6:ea:4f:1f:43: 21:e9:b5:54:81:43:64:fc:d4:17:28:b2:7c:05:4b:1a: 21:b8:70:ed:8b:8a:76:06:5a:05:27:11:e4:a2:c0:a4: 7d:61:58:cd:52:ac:9d:19:54:87:9f:4a:49:05:83:60: 3e:ba:4e:0d:b6:f1:e9:e3:cf:91:67:96:51:51:fe:0c: 84:9e:10:a7:ae:b5:8a:87:4d:7c:96:23:b8:f3:63:d7: eb:fc:98:59:26:53:7c:d1:8e:d9:54:a5:d2:75:fd:23: e7:a4:09:75:a8:2f:af:c0:f2:f8:b4:50:d8:52:26:30: d7:ad:5b:87:85:d9:9e:90:2f:ee:50:28:08:65:fc:01 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3e:02:1d:00:81:52:e4:8f:d8:35:9a:9a:52:d1:a7: b4:c6:60:a3:35:ef:e9:78:89:b5:ed:7c:60:27:36:21: c0:02:1d:00:ae:15:87:d0:60:7c:8e:eb:56:48:1d:f1: ee:04:90:fb:08:57:ca:9b:43:c8:e4:bc:74:dc:79:2f Fingerprint (SHA-256): F9:5C:E7:20:87:28:4C:DF:7B:58:95:9A:F0:8D:BA:A3:52:FA:C4:A7:0A:7A:4B:00:8E:24:7B:DD:11:E4:6D:0E Fingerprint (SHA1): C1:CE:90:D3:BD:ED:FC:44:D5:B2:2F:44:85:B2:8A:97:8C:AA:37:4B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Returned value is 0, expected result is pass chains.sh: #1677: DSA: Verifying certificate(s) EE2CA2.der CA2Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE3CA3.der CA3Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165215 (0x3caff7df) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:06:45 2023 Not After : Wed Oct 18 17:06:45 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 28:42:36:dc:2b:d6:c9:23:7a:ce:6d:2a:16:0b:31:03: b3:1d:ab:4a:13:9e:19:53:6d:48:a5:b0:af:7b:76:d1: bd:0f:34:f7:4d:ba:e2:9c:60:45:27:ff:05:44:ce:72: 4d:60:df:6a:25:7a:69:a8:a7:95:a5:d4:5f:42:3d:8d: f6:0a:9d:58:28:b1:6c:55:e0:7b:e2:3a:6d:47:ba:f5: 6b:21:e6:3b:1a:c4:81:9e:2c:a0:f4:e3:bd:45:32:e8: c6:ba:96:75:44:b5:b4:80:00:cf:5c:95:e4:15:b0:a6: 65:65:73:d9:59:9d:57:f4:f2:f9:3c:b6:ea:4f:1f:43: 21:e9:b5:54:81:43:64:fc:d4:17:28:b2:7c:05:4b:1a: 21:b8:70:ed:8b:8a:76:06:5a:05:27:11:e4:a2:c0:a4: 7d:61:58:cd:52:ac:9d:19:54:87:9f:4a:49:05:83:60: 3e:ba:4e:0d:b6:f1:e9:e3:cf:91:67:96:51:51:fe:0c: 84:9e:10:a7:ae:b5:8a:87:4d:7c:96:23:b8:f3:63:d7: eb:fc:98:59:26:53:7c:d1:8e:d9:54:a5:d2:75:fd:23: e7:a4:09:75:a8:2f:af:c0:f2:f8:b4:50:d8:52:26:30: d7:ad:5b:87:85:d9:9e:90:2f:ee:50:28:08:65:fc:01 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3e:02:1d:00:81:52:e4:8f:d8:35:9a:9a:52:d1:a7: b4:c6:60:a3:35:ef:e9:78:89:b5:ed:7c:60:27:36:21: c0:02:1d:00:ae:15:87:d0:60:7c:8e:eb:56:48:1d:f1: ee:04:90:fb:08:57:ca:9b:43:c8:e4:bc:74:dc:79:2f Fingerprint (SHA-256): F9:5C:E7:20:87:28:4C:DF:7B:58:95:9A:F0:8D:BA:A3:52:FA:C4:A7:0A:7A:4B:00:8E:24:7B:DD:11:E4:6D:0E Fingerprint (SHA1): C1:CE:90:D3:BD:ED:FC:44:D5:B2:2F:44:85:B2:8A:97:8C:AA:37:4B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE3 EE,O=EE3,C=US" Certificate 2 Subject: "CN=CA3 Intermediate,O=CA3,C=US" Returned value is 0, expected result is pass chains.sh: #1678: DSA: Verifying certificate(s) EE3CA3.der CA3Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der vfychain -d AllDB -pp -vv EE4CA4.der CA4Root.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165215 (0x3caff7df) Signature Algorithm: DSA with SHA-256 Signature Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:06:45 2023 Not After : Wed Oct 18 17:06:45 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: ANSI X9.57 DSA Signature Args: 30:82:02:28:02:82:01:01:00:c6:2a:47:73:ea:78:fa: 65:47:69:39:10:08:55:6a:dd:bf:77:e1:9a:69:73:ba: 66:37:08:93:9e:db:5d:01:08:b8:3a:73:e9:85:5f:a7: 2b:63:7f:d0:c6:4c:dc:fc:8b:a6:03:c9:9c:80:5e:ec: c6:21:23:f7:8e:a4:7b:77:83:02:44:f8:05:d7:36:52: 13:57:78:97:f3:7b:cf:1f:c9:2a:a4:71:9d:a8:d8:5d: c5:3b:64:3a:72:60:62:b0:b8:f3:b1:e7:b9:76:df:74: be:87:6a:d2:f1:a9:44:8b:63:76:4f:5d:21:63:b5:4f: 3c:7b:61:b2:f3:ea:c5:d8:ef:30:50:59:33:61:c0:f3: 6e:21:cf:15:35:4a:87:2b:c3:f6:5a:1f:24:22:c5:eb: 47:34:4a:1b:b5:2e:71:52:8f:2d:7d:a9:96:8a:7c:61: db:c0:dc:f1:ca:28:69:1c:97:ad:ea:0d:9e:02:e6:e5: 7d:ad:e0:42:91:4d:fa:e2:81:16:2b:c2:96:3b:32:8c: 20:69:8b:5b:17:3c:f9:13:6c:98:27:1c:ca:cf:33:aa: 93:21:af:17:6e:5e:00:37:d9:34:8a:47:d2:1c:67:32: 60:b6:c7:b0:fd:32:90:93:32:aa:11:ba:23:19:39:6a: 42:7c:1f:b7:28:db:64:ad:d9:02:1d:00:e6:a3:c9:c6: 51:92:8b:b3:98:8f:97:b8:31:0d:4a:03:1e:ba:4e:e6: c8:90:98:1d:3a:95:f4:f1:02:82:01:00:70:32:58:5d: b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79:ac:18:41:64: b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc:1f:38:63:5e: 0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e:92:16:06:59: 29:89:6f:54:ff:c5:71:c8:3a:95:84:b6:7e:7b:1e:8b: 47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8:3a:41:d4:f3: 1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93:ed:6f:67:b0: c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae:1c:6e:2e:48: ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb:f5:39:d8:92: 90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4:89:ea:94:2b: 56:33:73:58:48:bf:23:72:19:5f:19:ac:ff:09:c8:cd: ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1:85:cd:88:fe: d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c:c6:70:6b:ba: 77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03:be:bd:71:ba: 0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac:cd:bb:65:12: cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa:57:dd:77:32: f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 DSA Public Key: Prime: c6:2a:47:73:ea:78:fa:65:47:69:39:10:08:55:6a:dd: bf:77:e1:9a:69:73:ba:66:37:08:93:9e:db:5d:01:08: b8:3a:73:e9:85:5f:a7:2b:63:7f:d0:c6:4c:dc:fc:8b: a6:03:c9:9c:80:5e:ec:c6:21:23:f7:8e:a4:7b:77:83: 02:44:f8:05:d7:36:52:13:57:78:97:f3:7b:cf:1f:c9: 2a:a4:71:9d:a8:d8:5d:c5:3b:64:3a:72:60:62:b0:b8: f3:b1:e7:b9:76:df:74:be:87:6a:d2:f1:a9:44:8b:63: 76:4f:5d:21:63:b5:4f:3c:7b:61:b2:f3:ea:c5:d8:ef: 30:50:59:33:61:c0:f3:6e:21:cf:15:35:4a:87:2b:c3: f6:5a:1f:24:22:c5:eb:47:34:4a:1b:b5:2e:71:52:8f: 2d:7d:a9:96:8a:7c:61:db:c0:dc:f1:ca:28:69:1c:97: ad:ea:0d:9e:02:e6:e5:7d:ad:e0:42:91:4d:fa:e2:81: 16:2b:c2:96:3b:32:8c:20:69:8b:5b:17:3c:f9:13:6c: 98:27:1c:ca:cf:33:aa:93:21:af:17:6e:5e:00:37:d9: 34:8a:47:d2:1c:67:32:60:b6:c7:b0:fd:32:90:93:32: aa:11:ba:23:19:39:6a:42:7c:1f:b7:28:db:64:ad:d9 Subprime: e6:a3:c9:c6:51:92:8b:b3:98:8f:97:b8:31:0d:4a:03: 1e:ba:4e:e6:c8:90:98:1d:3a:95:f4:f1 Base: 70:32:58:5d:b3:bf:c3:62:63:0b:f8:a5:e1:ed:eb:79: ac:18:41:64:b3:da:4c:a7:92:63:b1:33:7c:cb:43:dc: 1f:38:63:5e:0e:6d:45:d1:c9:67:f3:cf:3d:2d:16:4e: 92:16:06:59:29:89:6f:54:ff:c5:71:c8:3a:95:84:b6: 7e:7b:1e:8b:47:9d:7a:3a:36:9b:70:2f:d1:bd:ef:e8: 3a:41:d4:f3:1f:81:c7:1f:96:7c:30:ab:f4:7a:ac:93: ed:6f:67:b0:c9:5b:f3:83:9d:a0:d7:b9:01:ed:28:ae: 1c:6e:2e:48:ac:9f:7d:f3:00:48:ee:0e:fb:7e:5e:cb: f5:39:d8:92:90:61:2d:1e:3c:d3:55:0d:34:d1:81:c4: 89:ea:94:2b:56:33:73:58:48:bf:23:72:19:5f:19:ac: ff:09:c8:cd:ab:71:ef:9e:20:fd:e3:b8:27:9e:65:b1: 85:cd:88:fe:d4:d7:64:4d:e1:e8:a6:e5:96:c8:5d:9c: c6:70:6b:ba:77:4e:90:4a:b0:96:c5:a0:9e:2c:01:03: be:bd:71:ba:0a:6f:9f:e5:db:04:08:f2:9e:0f:1b:ac: cd:bb:65:12:cf:77:c9:7d:be:94:4b:9c:5b:de:0d:fa: 57:dd:77:32:f0:5b:34:fd:19:95:33:60:87:e2:a2:f4 PublicValue: 28:42:36:dc:2b:d6:c9:23:7a:ce:6d:2a:16:0b:31:03: b3:1d:ab:4a:13:9e:19:53:6d:48:a5:b0:af:7b:76:d1: bd:0f:34:f7:4d:ba:e2:9c:60:45:27:ff:05:44:ce:72: 4d:60:df:6a:25:7a:69:a8:a7:95:a5:d4:5f:42:3d:8d: f6:0a:9d:58:28:b1:6c:55:e0:7b:e2:3a:6d:47:ba:f5: 6b:21:e6:3b:1a:c4:81:9e:2c:a0:f4:e3:bd:45:32:e8: c6:ba:96:75:44:b5:b4:80:00:cf:5c:95:e4:15:b0:a6: 65:65:73:d9:59:9d:57:f4:f2:f9:3c:b6:ea:4f:1f:43: 21:e9:b5:54:81:43:64:fc:d4:17:28:b2:7c:05:4b:1a: 21:b8:70:ed:8b:8a:76:06:5a:05:27:11:e4:a2:c0:a4: 7d:61:58:cd:52:ac:9d:19:54:87:9f:4a:49:05:83:60: 3e:ba:4e:0d:b6:f1:e9:e3:cf:91:67:96:51:51:fe:0c: 84:9e:10:a7:ae:b5:8a:87:4d:7c:96:23:b8:f3:63:d7: eb:fc:98:59:26:53:7c:d1:8e:d9:54:a5:d2:75:fd:23: e7:a4:09:75:a8:2f:af:c0:f2:f8:b4:50:d8:52:26:30: d7:ad:5b:87:85:d9:9e:90:2f:ee:50:28:08:65:fc:01 Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: DSA with SHA-256 Signature Signature: 30:3e:02:1d:00:81:52:e4:8f:d8:35:9a:9a:52:d1:a7: b4:c6:60:a3:35:ef:e9:78:89:b5:ed:7c:60:27:36:21: c0:02:1d:00:ae:15:87:d0:60:7c:8e:eb:56:48:1d:f1: ee:04:90:fb:08:57:ca:9b:43:c8:e4:bc:74:dc:79:2f Fingerprint (SHA-256): F9:5C:E7:20:87:28:4C:DF:7B:58:95:9A:F0:8D:BA:A3:52:FA:C4:A7:0A:7A:4B:00:8E:24:7B:DD:11:E4:6D:0E Fingerprint (SHA1): C1:CE:90:D3:BD:ED:FC:44:D5:B2:2F:44:85:B2:8A:97:8C:AA:37:4B Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE4 EE,O=EE4,C=US" Certificate 2 Subject: "CN=CA4 Intermediate,O=CA4,C=US" Returned value is 0, expected result is pass chains.sh: #1679: DSA: Verifying certificate(s) EE4CA4.der CA4Root.der with flags -d AllDB -pp -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1680: Revocation: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 10 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1681: Revocation: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1682: Revocation: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1683: Revocation: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1684: Revocation: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 11 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1685: Revocation: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1686: Revocation: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1687: Revocation: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1688: Revocation: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 12 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1689: Revocation: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1690: Revocation: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1691: Revocation: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1692: Revocation: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 13 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1693: Revocation: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1694: Revocation: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB EE12DB certutil -N -d EE12DB -f EE12DB/dbpasswd chains.sh: #1695: Revocation: Creating DB EE12DB - PASSED chains.sh: Creating EE certifiate request EE12Req.der certutil -s "CN=EE12 EE, O=EE12, C=US" -R -2 -d EE12DB -f EE12DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE12Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1696: Revocation: Creating EE certifiate request EE12Req.der - PASSED chains.sh: Creating certficate EE12CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE12Req.der -o EE12CA1.der -f CA1DB/dbpasswd -m 14 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1697: Revocation: Creating certficate EE12CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE12CA1.der to EE12DB database certutil -A -n EE12 -t u,u,u -d EE12DB -f EE12DB/dbpasswd -i EE12CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1698: Revocation: Importing certificate EE12CA1.der to EE12DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1699: Revocation: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1700: Revocation: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 15 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1701: Revocation: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1702: Revocation: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1703: Revocation: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1704: Revocation: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 16 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1705: Revocation: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1706: Revocation: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018170722Z nextupdate=20241018170722Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 17:07:22 2023 Next Update: Fri Oct 18 17:07:22 2024 CRL Extensions: chains.sh: #1707: Revocation: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018170723Z nextupdate=20241018170723Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 17:07:23 2023 Next Update: Fri Oct 18 17:07:23 2024 CRL Extensions: chains.sh: #1708: Revocation: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018170724Z nextupdate=20241018170724Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 17:07:24 2023 Next Update: Fri Oct 18 17:07:24 2024 CRL Extensions: chains.sh: #1709: Revocation: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018170724Z nextupdate=20241018170724Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 17:07:24 2023 Next Update: Fri Oct 18 17:07:24 2024 CRL Extensions: chains.sh: #1710: Revocation: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 14 issued by CA1 crlutil -M -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018170725Z addcert 14 20231018170725Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 17:07:25 2023 Next Update: Fri Oct 18 17:07:24 2024 Entry 1 (0x1): Serial Number: 14 (0xe) Revocation Date: Wed Oct 18 17:07:25 2023 CRL Extensions: chains.sh: #1711: Revocation: Revoking certificate with SN 14 issued by CA1 - PASSED chains.sh: Revoking certificate with SN 15 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018170726Z addcert 15 20231018170726Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 17:07:26 2023 Next Update: Fri Oct 18 17:07:23 2024 Entry 1 (0x1): Serial Number: 15 (0xf) Revocation Date: Wed Oct 18 17:07:26 2023 CRL Extensions: chains.sh: #1712: Revocation: Revoking certificate with SN 15 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1713: Revocation: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1714: Revocation: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1715: Revocation: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Importing certificate CA0Root.der to AllDB database certutil -A -n CA0 -t "" -d AllDB -f AllDB/dbpasswd -i CA0Root.der chains.sh: #1716: Revocation: Importing certificate CA0Root.der to AllDB database - PASSED chains.sh: Importing CRL CA0.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA0.crl chains.sh: #1717: Revocation: Importing CRL CA0.crl to AllDB database - PASSED chains.sh: Importing certificate CA1CA0.der to AllDB database certutil -A -n CA1 -t "" -d AllDB -f AllDB/dbpasswd -i CA1CA0.der chains.sh: #1718: Revocation: Importing certificate CA1CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA1.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA1.crl chains.sh: #1719: Revocation: Importing CRL CA1.crl to AllDB database - PASSED chains.sh: Importing certificate CA2CA0.der to AllDB database certutil -A -n CA2 -t "" -d AllDB -f AllDB/dbpasswd -i CA2CA0.der chains.sh: #1720: Revocation: Importing certificate CA2CA0.der to AllDB database - PASSED chains.sh: Importing CRL CA2.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i CA2.crl chains.sh: #1721: Revocation: Importing CRL CA2.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:07:05 2023 Not After : Wed Oct 18 17:07:05 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:ac:ed:2a:84:1e:36:96:3b:68:d6:bb:0e:98:21:1c: 15:4c:a1:48:46:37:61:f5:b4:37:63:46:85:93:fe:ff: 00:00:e1:7c:e2:89:1d:7a:10:10:25:1a:45:ed:e3:df: 52:53:7d:84:f4:54:ec:39:1d:eb:bf:33:80:be:18:41: 11:18:1f:02:99:dd:06:d9:b4:d2:81:ed:9c:d7:9f:5d: a6:20:49:47:32:95:15:c6:f0:07:3f:9b:d4:bc:29:ef: 37:9d:fd:72:e2:96:a8:a9:c5:e1:32:9d:14:e8:c3:01: 3e:a6:a2:4a:34:63:f3:21:d2:cf:c6:96:13:3f:7e:5e: 2f:c0:6f:8c:16:99:40:68:1c:94:f9:1c:91:48:27:54: d9:c8:f2:a5:7b:65:f6:a8:f5:88:6d:c5:f6:c9:42:e5: 40:17:99:13:dd:6f:3b:cd:d9:cd:94:66:dd:ef:6e:ce: e4:86:5a:80:8f:af:e0:9d:84:bf:2f:e8:70:0b:9b:bb: 20:1e:7e:0d:41:51:9d:40:6e:22:2c:f6:7d:f7:0d:62: eb:94:16:a4:9f:a4:bb:59:f1:ae:d8:5c:0f:e5:14:a5: d3:88:58:e2:82:ef:dc:fa:ea:41:2f:37:88:a8:8d:da: 5a:f8:2c:6c:ae:7b:d9:9a:9d:4d:09:1c:f6:8c:f2:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:b2:5b:de:23:4a:e9:52:85:59:6b:d2:01:57:55:a7: 31:c4:ab:f3:4e:00:6c:56:97:5b:d6:7c:d1:9c:78:8e: f2:59:55:e3:58:59:d6:e4:b7:cf:c7:42:b6:b0:b5:b1: 7d:13:47:9f:86:63:58:bc:42:8f:a8:11:f0:0d:6a:73: 2d:83:8b:37:07:bb:98:c3:b8:ff:cf:be:91:49:6d:2e: dd:ad:54:ef:fd:a2:8a:7b:a6:85:14:02:ac:36:e0:44: aa:4e:d4:77:86:58:75:1a:e0:b3:c4:76:05:7f:df:cc: 1e:e6:ff:2c:fc:76:15:f3:44:8a:25:be:59:af:f3:10: eb:9f:37:2a:9e:aa:82:75:c1:f5:94:66:a0:28:a3:4e: a9:cd:44:90:ba:65:56:c1:bc:ff:32:be:e8:68:60:e3: 08:80:96:e9:0c:2a:62:ea:e7:8a:04:19:05:da:75:5b: c0:fa:36:c5:f6:62:9b:cd:7c:91:f5:fe:d2:82:91:cc: dd:b5:f9:f3:3c:19:4a:bd:2c:39:cf:9e:8a:88:6e:6b: f2:0e:2d:b2:f7:b0:f5:3d:73:fa:38:a4:0c:b7:01:7f: 62:1d:83:7c:ec:6e:9b:d0:1d:aa:3a:c1:71:c6:08:21: 3a:59:d6:7e:35:f8:43:e3:94:9e:4f:65:8d:95:a0:52 Fingerprint (SHA-256): BB:96:93:38:06:A7:69:37:EA:B2:94:85:BB:76:21:7B:6B:38:F3:F6:9D:92:D7:BC:A5:FD:A9:B2:0A:B1:96:56 Fingerprint (SHA1): 51:C7:F3:49:B9:F9:E6:A3:53:51:2C:9C:27:A0:B6:19:72:73:F5:C2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1722: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der vfychain -d AllDB -pp -vv -g leaf -m crl EE12CA1.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1723: Revocation: Verifying certificate(s) EE12CA1.der with flags -d AllDB -pp -g leaf -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE11CA1.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 10 (0xa) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:07:05 2023 Not After : Wed Oct 18 17:07:05 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d0:ac:ed:2a:84:1e:36:96:3b:68:d6:bb:0e:98:21:1c: 15:4c:a1:48:46:37:61:f5:b4:37:63:46:85:93:fe:ff: 00:00:e1:7c:e2:89:1d:7a:10:10:25:1a:45:ed:e3:df: 52:53:7d:84:f4:54:ec:39:1d:eb:bf:33:80:be:18:41: 11:18:1f:02:99:dd:06:d9:b4:d2:81:ed:9c:d7:9f:5d: a6:20:49:47:32:95:15:c6:f0:07:3f:9b:d4:bc:29:ef: 37:9d:fd:72:e2:96:a8:a9:c5:e1:32:9d:14:e8:c3:01: 3e:a6:a2:4a:34:63:f3:21:d2:cf:c6:96:13:3f:7e:5e: 2f:c0:6f:8c:16:99:40:68:1c:94:f9:1c:91:48:27:54: d9:c8:f2:a5:7b:65:f6:a8:f5:88:6d:c5:f6:c9:42:e5: 40:17:99:13:dd:6f:3b:cd:d9:cd:94:66:dd:ef:6e:ce: e4:86:5a:80:8f:af:e0:9d:84:bf:2f:e8:70:0b:9b:bb: 20:1e:7e:0d:41:51:9d:40:6e:22:2c:f6:7d:f7:0d:62: eb:94:16:a4:9f:a4:bb:59:f1:ae:d8:5c:0f:e5:14:a5: d3:88:58:e2:82:ef:dc:fa:ea:41:2f:37:88:a8:8d:da: 5a:f8:2c:6c:ae:7b:d9:9a:9d:4d:09:1c:f6:8c:f2:ab Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 32:b2:5b:de:23:4a:e9:52:85:59:6b:d2:01:57:55:a7: 31:c4:ab:f3:4e:00:6c:56:97:5b:d6:7c:d1:9c:78:8e: f2:59:55:e3:58:59:d6:e4:b7:cf:c7:42:b6:b0:b5:b1: 7d:13:47:9f:86:63:58:bc:42:8f:a8:11:f0:0d:6a:73: 2d:83:8b:37:07:bb:98:c3:b8:ff:cf:be:91:49:6d:2e: dd:ad:54:ef:fd:a2:8a:7b:a6:85:14:02:ac:36:e0:44: aa:4e:d4:77:86:58:75:1a:e0:b3:c4:76:05:7f:df:cc: 1e:e6:ff:2c:fc:76:15:f3:44:8a:25:be:59:af:f3:10: eb:9f:37:2a:9e:aa:82:75:c1:f5:94:66:a0:28:a3:4e: a9:cd:44:90:ba:65:56:c1:bc:ff:32:be:e8:68:60:e3: 08:80:96:e9:0c:2a:62:ea:e7:8a:04:19:05:da:75:5b: c0:fa:36:c5:f6:62:9b:cd:7c:91:f5:fe:d2:82:91:cc: dd:b5:f9:f3:3c:19:4a:bd:2c:39:cf:9e:8a:88:6e:6b: f2:0e:2d:b2:f7:b0:f5:3d:73:fa:38:a4:0c:b7:01:7f: 62:1d:83:7c:ec:6e:9b:d0:1d:aa:3a:c1:71:c6:08:21: 3a:59:d6:7e:35:f8:43:e3:94:9e:4f:65:8d:95:a0:52 Fingerprint (SHA-256): BB:96:93:38:06:A7:69:37:EA:B2:94:85:BB:76:21:7B:6B:38:F3:F6:9D:92:D7:BC:A5:FD:A9:B2:0A:B1:96:56 Fingerprint (SHA1): 51:C7:F3:49:B9:F9:E6:A3:53:51:2C:9C:27:A0:B6:19:72:73:F5:C2 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1724: Revocation: Verifying certificate(s) EE11CA1.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der vfychain -d AllDB -pp -vv -g chain -m crl EE21CA2.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1725: Revocation: Verifying certificate(s) EE21CA2.der with flags -d AllDB -pp -g chain -m crl -t Root.der - PASSED chains.sh: Creating DB RootDB certutil -N -d RootDB -f RootDB/dbpasswd chains.sh: #1726: CRLDP: Creating DB RootDB - PASSED chains.sh: Creating Root CA Root certutil -s "CN=Root ROOT CA, O=Root, C=US" -S -n Root -t CTu,CTu,CTu -v 600 -x -d RootDB -1 -2 -5 -f RootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165224 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1727: CRLDP: Creating Root CA Root - PASSED chains.sh: Exporting Root CA Root.der certutil -L -d RootDB -r -n Root -o Root.der chains.sh: #1728: CRLDP: Exporting Root CA Root.der - PASSED chains.sh: Creating DB CA0DB certutil -N -d CA0DB -f CA0DB/dbpasswd chains.sh: #1729: CRLDP: Creating DB CA0DB - PASSED chains.sh: Creating Intermediate certifiate request CA0Req.der certutil -s "CN=CA0 Intermediate, O=CA0, C=US" -R -2 -d CA0DB -f CA0DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA0Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1730: CRLDP: Creating Intermediate certifiate request CA0Req.der - PASSED chains.sh: Creating certficate CA0Root.der signed by Root certutil -C -c Root -v 60 -d RootDB -i CA0Req.der -o CA0Root.der -f RootDB/dbpasswd -m 1018165225 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1731: CRLDP: Creating certficate CA0Root.der signed by Root - PASSED chains.sh: Importing certificate CA0Root.der to CA0DB database certutil -A -n CA0 -t u,u,u -d CA0DB -f CA0DB/dbpasswd -i CA0Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1732: CRLDP: Importing certificate CA0Root.der to CA0DB database - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1733: CRLDP: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018164981.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1734: CRLDP: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA1Req.der -o CA1CA0.der -f CA0DB/dbpasswd -m 10 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018164954.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1735: CRLDP: Creating certficate CA1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA1CA0.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1736: CRLDP: Importing certificate CA1CA0.der to CA1DB database - PASSED chains.sh: Creating DB EE11DB certutil -N -d EE11DB -f EE11DB/dbpasswd chains.sh: #1737: CRLDP: Creating DB EE11DB - PASSED chains.sh: Creating EE certifiate request EE11Req.der certutil -s "CN=EE11 EE, O=EE11, C=US" -R -2 -d EE11DB -f EE11DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE11Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018164981.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1738: CRLDP: Creating EE certifiate request EE11Req.der - PASSED chains.sh: Creating certficate EE11CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i EE11Req.der -o EE11CA1.der -f CA1DB/dbpasswd -m 1018165226 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1739: CRLDP: Creating certficate EE11CA1.der signed by CA1 - PASSED chains.sh: Importing certificate EE11CA1.der to EE11DB database certutil -A -n EE11 -t u,u,u -d EE11DB -f EE11DB/dbpasswd -i EE11CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1740: CRLDP: Importing certificate EE11CA1.der to EE11DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1741: CRLDP: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018164981.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1742: CRLDP: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i CA2Req.der -o CA2CA0.der -f CA0DB/dbpasswd -m 20 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018164955.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1743: CRLDP: Creating certficate CA2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate CA2CA0.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1744: CRLDP: Importing certificate CA2CA0.der to CA2DB database - PASSED chains.sh: Creating DB EE21DB certutil -N -d EE21DB -f EE21DB/dbpasswd chains.sh: #1745: CRLDP: Creating DB EE21DB - PASSED chains.sh: Creating EE certifiate request EE21Req.der certutil -s "CN=EE21 EE, O=EE21, C=US" -R -2 -d EE21DB -f EE21DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE21Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1746: CRLDP: Creating EE certifiate request EE21Req.der - PASSED chains.sh: Creating certficate EE21CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE21Req.der -o EE21CA2.der -f CA2DB/dbpasswd -m 1018165227 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1747: CRLDP: Creating certficate EE21CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE21CA2.der to EE21DB database certutil -A -n EE21 -t u,u,u -d EE21DB -f EE21DB/dbpasswd -i EE21CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1748: CRLDP: Importing certificate EE21CA2.der to EE21DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1749: CRLDP: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018164981.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1750: CRLDP: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE1Req.der -o EE1CA0.der -f CA0DB/dbpasswd -m 30 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018164956.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1751: CRLDP: Creating certficate EE1CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE1CA0.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1752: CRLDP: Importing certificate EE1CA0.der to EE1DB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1753: CRLDP: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y 1 7 http://localhost.localdomain:10007/localhost-17687-CA0-1018164981.crl -1 -1 -1 n n === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? chains.sh: #1754: CRLDP: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2CA0.der signed by CA0 certutil -C -c CA0 -v 60 -d CA0DB -i EE2Req.der -o EE2CA0.der -f CA0DB/dbpasswd -m 40 --extAIA < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 1 7 http://localhost.localdomain:10007/localhost-17687-CA0Root-1018164957.der 0 n n === Enter access method type for Authority Information Access extension: 1 - CA Issuers 2 - OCSP Anyother number to finish Choice > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Add another location to the Authority Information Access extension [y/N] Is this a critical extension [y/N]? chains.sh: #1755: CRLDP: Creating certficate EE2CA0.der signed by CA0 - PASSED chains.sh: Importing certificate EE2CA0.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2CA0.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1756: CRLDP: Importing certificate EE2CA0.der to EE2DB database - PASSED chains.sh: Create CRL for RootDB crlutil -G -d RootDB -n Root -f RootDB/dbpasswd -o Root.crl === Crlutil input data === update=20231018170751Z nextupdate=20241018170751Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" This Update: Wed Oct 18 17:07:51 2023 Next Update: Fri Oct 18 17:07:51 2024 CRL Extensions: chains.sh: #1757: CRLDP: Create CRL for RootDB - PASSED chains.sh: Create CRL for CA0DB crlutil -G -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018170752Z nextupdate=20241018170752Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 17:07:52 2023 Next Update: Fri Oct 18 17:07:52 2024 CRL Extensions: chains.sh: #1758: CRLDP: Create CRL for CA0DB - PASSED chains.sh: Create CRL for CA1DB crlutil -G -d CA1DB -n CA1 -f CA1DB/dbpasswd -o CA1.crl === Crlutil input data === update=20231018170753Z nextupdate=20241018170753Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" This Update: Wed Oct 18 17:07:53 2023 Next Update: Fri Oct 18 17:07:53 2024 CRL Extensions: chains.sh: #1759: CRLDP: Create CRL for CA1DB - PASSED chains.sh: Create CRL for CA2DB crlutil -G -d CA2DB -n CA2 -f CA2DB/dbpasswd -o CA2.crl === Crlutil input data === update=20231018170753Z nextupdate=20241018170753Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA2 Intermediate,O=CA2,C=US" This Update: Wed Oct 18 17:07:53 2023 Next Update: Fri Oct 18 17:07:53 2024 CRL Extensions: chains.sh: #1760: CRLDP: Create CRL for CA2DB - PASSED chains.sh: Revoking certificate with SN 20 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018170754Z addcert 20 20231018170754Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 17:07:54 2023 Next Update: Fri Oct 18 17:07:52 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 17:07:54 2023 CRL Extensions: chains.sh: #1761: CRLDP: Revoking certificate with SN 20 issued by CA0 - PASSED chains.sh: Revoking certificate with SN 40 issued by CA0 crlutil -M -d CA0DB -n CA0 -f CA0DB/dbpasswd -o CA0.crl === Crlutil input data === update=20231018170755Z addcert 40 20231018170755Z === CRL Info: : Version: 2 (0x1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA0 Intermediate,O=CA0,C=US" This Update: Wed Oct 18 17:07:55 2023 Next Update: Fri Oct 18 17:07:52 2024 Entry 1 (0x1): Serial Number: 20 (0x14) Revocation Date: Wed Oct 18 17:07:54 2023 Entry 2 (0x2): Serial Number: 40 (0x28) Revocation Date: Wed Oct 18 17:07:55 2023 CRL Extensions: chains.sh: #1762: CRLDP: Revoking certificate with SN 40 issued by CA0 - PASSED chains.sh: Creating DB AllDB certutil -N -d AllDB -f AllDB/dbpasswd chains.sh: #1763: CRLDP: Creating DB AllDB - PASSED chains.sh: Importing certificate Root.der to AllDB database certutil -A -n Root -t "CTu,CTu,CTu" -d AllDB -f AllDB/dbpasswd -i Root.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1764: CRLDP: Importing certificate Root.der to AllDB database - PASSED chains.sh: Importing CRL Root.crl to AllDB database crlutil -I -d AllDB -f AllDB/dbpasswd -i Root.crl chains.sh: #1765: CRLDP: Importing CRL Root.crl to AllDB database - PASSED chains.sh: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE11CA1.der CA1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165224 (0x3caff7e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:07:32 2023 Not After : Wed Oct 18 17:07:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:a5:6d:c1:5c:14:db:bd:27:3c:a2:6f:89:d8:b0:ec: 28:e2:c7:8c:4e:87:7c:a3:bc:f6:37:fe:83:76:f2:5d: 66:92:b3:d9:80:5b:9e:9d:2f:d1:7b:ff:4c:83:5e:fd: 67:bc:a9:25:39:41:36:50:fa:4b:79:96:ad:df:36:12: 66:0e:b6:ea:6b:42:ad:cf:d1:ab:3d:8a:7f:aa:db:dd: 3f:b4:99:e1:8e:e3:b2:0a:cb:42:2e:a3:f4:7a:40:29: 16:c0:42:b1:4c:a0:ab:d3:22:82:77:71:df:ac:68:fa: 78:62:17:f8:41:67:bb:6b:26:70:09:0e:07:89:55:90: bf:6d:f2:fd:2c:ec:1b:b0:33:f9:2e:5e:0d:b2:ed:b4: a5:61:59:d2:24:cd:01:84:95:82:e8:40:b4:c3:c2:a8: bd:9d:90:df:2c:3b:c8:4b:06:fc:52:6f:99:b0:a1:d7: c8:0b:21:68:d6:0d:cf:a8:80:c9:18:a8:82:d0:77:a7: df:f5:57:36:2b:1d:80:de:0d:70:e8:87:38:37:e8:3e: 28:79:f4:b0:9b:49:03:f6:24:69:df:7f:e5:48:2b:19: f1:47:ba:08:11:a2:8c:68:0f:88:41:1c:76:48:a0:9d: cb:13:0c:bf:3a:17:4a:81:31:0d:7c:07:7c:ab:7c:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:20:58:1a:17:74:61:07:f2:fd:3a:cf:ec:13:74:c8: e9:7a:c9:66:30:4f:53:8e:38:7a:f0:82:24:e8:ab:74: 8c:cc:9e:42:91:2c:df:1f:ac:b0:51:41:3b:7a:61:e5: 33:05:d8:c2:e0:bb:77:36:0f:66:7f:66:a3:85:1d:7b: 5c:55:d5:f9:db:f0:fc:10:5f:e3:f3:af:ce:27:25:f6: 4c:2d:3c:2d:51:15:c6:64:f3:06:34:d6:64:55:2f:24: e5:ef:55:d9:a6:e5:27:df:b3:e2:d5:51:37:a8:3c:a9: 47:4e:8e:a8:4f:84:1e:11:46:3c:6c:ef:5d:9a:45:8b: 1a:27:b8:23:a8:b3:2a:e4:ce:0a:0b:7f:8c:48:63:07: c8:96:0f:d8:e8:23:15:0d:8f:2b:c3:6f:11:3a:16:94: 62:bf:fc:f9:dc:69:18:61:ab:e8:39:62:09:27:00:48: 65:bf:54:32:23:d7:ed:78:c3:77:42:2b:7b:da:ac:0c: b8:c7:64:9f:48:af:cb:5d:c4:5b:ca:f6:75:5e:41:32: 15:36:ba:e4:fb:2d:6f:10:11:b0:49:64:81:82:ef:d2: df:bd:e5:f4:10:f6:08:db:4a:9c:3e:d7:50:d9:97:bf: fe:1f:8b:35:7d:8b:ee:f3:11:53:ce:1d:c6:fc:a7:d6 Fingerprint (SHA-256): 44:C6:1A:56:75:78:86:57:1C:A1:38:F3:D1:18:F4:A7:84:72:C9:3B:7F:33:3D:76:74:66:9A:CA:19:59:8B:0F Fingerprint (SHA1): 7E:11:FA:47:04:39:19:7B:60:E3:D4:51:F8:49:10:68:5F:C9:53:16 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE11 EE,O=EE11,C=US" Certificate 2 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Certificate 3 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1766: CRLDP: Verifying certificate(s) EE11CA1.der CA1CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g chain -h requireFreshInfo -m crl -f EE21CA2.der CA2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 3. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1767: CRLDP: Verifying certificate(s) EE21CA2.der CA2CA0.der with flags -d AllDB -pp -g chain -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE1CA0.der -t Root.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165224 (0x3caff7e8) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Root ROOT CA,O=Root,C=US" Validity: Not Before: Wed Oct 18 17:07:32 2023 Not After : Wed Oct 18 17:07:32 2073 Subject: "CN=Root ROOT CA,O=Root,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d1:a5:6d:c1:5c:14:db:bd:27:3c:a2:6f:89:d8:b0:ec: 28:e2:c7:8c:4e:87:7c:a3:bc:f6:37:fe:83:76:f2:5d: 66:92:b3:d9:80:5b:9e:9d:2f:d1:7b:ff:4c:83:5e:fd: 67:bc:a9:25:39:41:36:50:fa:4b:79:96:ad:df:36:12: 66:0e:b6:ea:6b:42:ad:cf:d1:ab:3d:8a:7f:aa:db:dd: 3f:b4:99:e1:8e:e3:b2:0a:cb:42:2e:a3:f4:7a:40:29: 16:c0:42:b1:4c:a0:ab:d3:22:82:77:71:df:ac:68:fa: 78:62:17:f8:41:67:bb:6b:26:70:09:0e:07:89:55:90: bf:6d:f2:fd:2c:ec:1b:b0:33:f9:2e:5e:0d:b2:ed:b4: a5:61:59:d2:24:cd:01:84:95:82:e8:40:b4:c3:c2:a8: bd:9d:90:df:2c:3b:c8:4b:06:fc:52:6f:99:b0:a1:d7: c8:0b:21:68:d6:0d:cf:a8:80:c9:18:a8:82:d0:77:a7: df:f5:57:36:2b:1d:80:de:0d:70:e8:87:38:37:e8:3e: 28:79:f4:b0:9b:49:03:f6:24:69:df:7f:e5:48:2b:19: f1:47:ba:08:11:a2:8c:68:0f:88:41:1c:76:48:a0:9d: cb:13:0c:bf:3a:17:4a:81:31:0d:7c:07:7c:ab:7c:bf Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:20:58:1a:17:74:61:07:f2:fd:3a:cf:ec:13:74:c8: e9:7a:c9:66:30:4f:53:8e:38:7a:f0:82:24:e8:ab:74: 8c:cc:9e:42:91:2c:df:1f:ac:b0:51:41:3b:7a:61:e5: 33:05:d8:c2:e0:bb:77:36:0f:66:7f:66:a3:85:1d:7b: 5c:55:d5:f9:db:f0:fc:10:5f:e3:f3:af:ce:27:25:f6: 4c:2d:3c:2d:51:15:c6:64:f3:06:34:d6:64:55:2f:24: e5:ef:55:d9:a6:e5:27:df:b3:e2:d5:51:37:a8:3c:a9: 47:4e:8e:a8:4f:84:1e:11:46:3c:6c:ef:5d:9a:45:8b: 1a:27:b8:23:a8:b3:2a:e4:ce:0a:0b:7f:8c:48:63:07: c8:96:0f:d8:e8:23:15:0d:8f:2b:c3:6f:11:3a:16:94: 62:bf:fc:f9:dc:69:18:61:ab:e8:39:62:09:27:00:48: 65:bf:54:32:23:d7:ed:78:c3:77:42:2b:7b:da:ac:0c: b8:c7:64:9f:48:af:cb:5d:c4:5b:ca:f6:75:5e:41:32: 15:36:ba:e4:fb:2d:6f:10:11:b0:49:64:81:82:ef:d2: df:bd:e5:f4:10:f6:08:db:4a:9c:3e:d7:50:d9:97:bf: fe:1f:8b:35:7d:8b:ee:f3:11:53:ce:1d:c6:fc:a7:d6 Fingerprint (SHA-256): 44:C6:1A:56:75:78:86:57:1C:A1:38:F3:D1:18:F4:A7:84:72:C9:3B:7F:33:3D:76:74:66:9A:CA:19:59:8B:0F Fingerprint (SHA1): 7E:11:FA:47:04:39:19:7B:60:E3:D4:51:F8:49:10:68:5F:C9:53:16 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA0 Intermediate,O=CA0,C=US" Returned value is 0, expected result is pass chains.sh: #1768: CRLDP: Verifying certificate(s) EE1CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der vfychain -d AllDB -pp -vv -g leaf -h requireFreshInfo -m crl -f EE2CA0.der -t Root.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. Root [Certificate Authority]: ERROR -8180: Peer's Certificate has been revoked. ERROR -8180: Peer's Certificate has been revoked. Returned value is 1, expected result is fail chains.sh: #1769: CRLDP: Verifying certificate(s) EE2CA0.der with flags -d AllDB -pp -g leaf -h requireFreshInfo -m crl -f -t Root.der - PASSED chains.sh: Creating DB RootCADB certutil -N -d RootCADB -f RootCADB/dbpasswd chains.sh: #1770: TrustAnchors: Creating DB RootCADB - PASSED chains.sh: Creating Root CA RootCA certutil -s "CN=RootCA ROOT CA, O=RootCA, C=US" -S -n RootCA -t CTu,CTu,CTu -v 600 -x -d RootCADB -1 -2 -5 -f RootCADB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165228 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1771: TrustAnchors: Creating Root CA RootCA - PASSED chains.sh: Exporting Root CA RootCA.der certutil -L -d RootCADB -r -n RootCA -o RootCA.der chains.sh: #1772: TrustAnchors: Exporting Root CA RootCA.der - PASSED chains.sh: Creating DB CA1DB certutil -N -d CA1DB -f CA1DB/dbpasswd chains.sh: #1773: TrustAnchors: Creating DB CA1DB - PASSED chains.sh: Creating Intermediate certifiate request CA1Req.der certutil -s "CN=CA1 Intermediate, O=CA1, C=US" -R -2 -d CA1DB -f CA1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1774: TrustAnchors: Creating Intermediate certifiate request CA1Req.der - PASSED chains.sh: Creating certficate CA1RootCA.der signed by RootCA certutil -C -c RootCA -v 60 -d RootCADB -i CA1Req.der -o CA1RootCA.der -f RootCADB/dbpasswd -m 1018165229 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1775: TrustAnchors: Creating certficate CA1RootCA.der signed by RootCA - PASSED chains.sh: Importing certificate CA1RootCA.der to CA1DB database certutil -A -n CA1 -t u,u,u -d CA1DB -f CA1DB/dbpasswd -i CA1RootCA.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1776: TrustAnchors: Importing certificate CA1RootCA.der to CA1DB database - PASSED chains.sh: Creating DB CA2DB certutil -N -d CA2DB -f CA2DB/dbpasswd chains.sh: #1777: TrustAnchors: Creating DB CA2DB - PASSED chains.sh: Creating Intermediate certifiate request CA2Req.der certutil -s "CN=CA2 Intermediate, O=CA2, C=US" -R -2 -d CA2DB -f CA2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o CA2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1778: TrustAnchors: Creating Intermediate certifiate request CA2Req.der - PASSED chains.sh: Creating certficate CA2CA1.der signed by CA1 certutil -C -c CA1 -v 60 -d CA1DB -i CA2Req.der -o CA2CA1.der -f CA1DB/dbpasswd -m 1018165230 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1779: TrustAnchors: Creating certficate CA2CA1.der signed by CA1 - PASSED chains.sh: Importing certificate CA2CA1.der to CA2DB database certutil -A -n CA2 -t u,u,u -d CA2DB -f CA2DB/dbpasswd -i CA2CA1.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1780: TrustAnchors: Importing certificate CA2CA1.der to CA2DB database - PASSED chains.sh: Creating DB EE1DB certutil -N -d EE1DB -f EE1DB/dbpasswd chains.sh: #1781: TrustAnchors: Creating DB EE1DB - PASSED chains.sh: Creating EE certifiate request EE1Req.der certutil -s "CN=EE1 EE, O=EE1, C=US" -R -2 -d EE1DB -f EE1DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE1Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1782: TrustAnchors: Creating EE certifiate request EE1Req.der - PASSED chains.sh: Creating certficate EE1CA2.der signed by CA2 certutil -C -c CA2 -v 60 -d CA2DB -i EE1Req.der -o EE1CA2.der -f CA2DB/dbpasswd -m 1018165231 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1783: TrustAnchors: Creating certficate EE1CA2.der signed by CA2 - PASSED chains.sh: Importing certificate EE1CA2.der to EE1DB database certutil -A -n EE1 -t u,u,u -d EE1DB -f EE1DB/dbpasswd -i EE1CA2.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1784: TrustAnchors: Importing certificate EE1CA2.der to EE1DB database - PASSED chains.sh: Creating DB OtherRootDB certutil -N -d OtherRootDB -f OtherRootDB/dbpasswd chains.sh: #1785: TrustAnchors: Creating DB OtherRootDB - PASSED chains.sh: Creating Root CA OtherRoot certutil -s "CN=OtherRoot ROOT CA, O=OtherRoot, C=US" -S -n OtherRoot -t CTu,CTu,CTu -v 600 -x -d OtherRootDB -1 -2 -5 -f OtherRootDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -m 1018165232 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === 5 6 9 n y -1 n 5 6 7 9 n === Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? chains.sh: #1786: TrustAnchors: Creating Root CA OtherRoot - PASSED chains.sh: Exporting Root CA OtherRoot.der certutil -L -d OtherRootDB -r -n OtherRoot -o OtherRoot.der chains.sh: #1787: TrustAnchors: Exporting Root CA OtherRoot.der - PASSED chains.sh: Creating DB OtherIntermediateDB certutil -N -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd chains.sh: #1788: TrustAnchors: Creating DB OtherIntermediateDB - PASSED chains.sh: Creating Intermediate certifiate request OtherIntermediateReq.der certutil -s "CN=OtherIntermediate Intermediate, O=OtherIntermediate, C=US" -R -2 -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o OtherIntermediateReq.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === y -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1789: TrustAnchors: Creating Intermediate certifiate request OtherIntermediateReq.der - PASSED chains.sh: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot certutil -C -c OtherRoot -v 60 -d OtherRootDB -i OtherIntermediateReq.der -o OtherIntermediateOtherRoot.der -f OtherRootDB/dbpasswd -m 1018165233 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1790: TrustAnchors: Creating certficate OtherIntermediateOtherRoot.der signed by OtherRoot - PASSED chains.sh: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database certutil -A -n OtherIntermediate -t u,u,u -d OtherIntermediateDB -f OtherIntermediateDB/dbpasswd -i OtherIntermediateOtherRoot.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1791: TrustAnchors: Importing certificate OtherIntermediateOtherRoot.der to OtherIntermediateDB database - PASSED chains.sh: Creating DB EE2DB certutil -N -d EE2DB -f EE2DB/dbpasswd chains.sh: #1792: TrustAnchors: Creating DB EE2DB - PASSED chains.sh: Creating EE certifiate request EE2Req.der certutil -s "CN=EE2 EE, O=EE2, C=US" -R -2 -d EE2DB -f EE2DB/dbpasswd -z /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/tests_noise -o EE2Req.der < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === n -1 y === Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? chains.sh: #1793: TrustAnchors: Creating EE certifiate request EE2Req.der - PASSED chains.sh: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate certutil -C -c OtherIntermediate -v 60 -d OtherIntermediateDB -i EE2Req.der -o EE2OtherIntermediate.der -f OtherIntermediateDB/dbpasswd -m 1018165234 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/sharedb/cu_data === Certutil input data === === chains.sh: #1794: TrustAnchors: Creating certficate EE2OtherIntermediate.der signed by OtherIntermediate - PASSED chains.sh: Importing certificate EE2OtherIntermediate.der to EE2DB database certutil -A -n EE2 -t u,u,u -d EE2DB -f EE2DB/dbpasswd -i EE2OtherIntermediate.der Notice: Trust flag u is set automatically if the private key is present. chains.sh: #1795: TrustAnchors: Importing certificate EE2OtherIntermediate.der to EE2DB database - PASSED chains.sh: Creating DB DBOnlyDB certutil -N -d DBOnlyDB -f DBOnlyDB/dbpasswd chains.sh: #1796: TrustAnchors: Creating DB DBOnlyDB - PASSED chains.sh: Importing certificate RootCA.der to DBOnlyDB database certutil -A -n RootCA -t "CT,C,C" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i RootCA.der chains.sh: #1797: TrustAnchors: Importing certificate RootCA.der to DBOnlyDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to DBOnlyDB database certutil -A -n CA1 -t "" -d DBOnlyDB -f DBOnlyDB/dbpasswd -i CA1RootCA.der chains.sh: #1798: TrustAnchors: Importing certificate CA1RootCA.der to DBOnlyDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165228 (0x3caff7ec) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:07:59 2023 Not After : Wed Oct 18 17:07:59 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:fc:43:41:6c:37:ef:cb:43:fa:63:7f:40:97:e7:a2: af:97:a6:71:aa:27:61:25:26:e8:d8:2c:96:2a:e2:e0: 96:31:c7:53:05:f3:88:93:fe:e5:4a:87:10:1a:e0:12: 5d:21:f1:68:bb:6e:57:d8:8c:30:5c:73:6f:a0:8e:a8: fd:0c:06:ec:13:84:09:7c:1c:3d:b1:a3:c1:15:78:db: 44:a6:49:ae:9c:db:d2:cf:0c:94:03:b0:55:94:a4:19: d1:55:c9:77:8e:30:6e:2b:d6:fc:0e:73:c8:38:56:5a: 75:ae:0e:8d:e8:a6:05:3c:80:a2:0c:ca:c7:0b:9f:92: a5:19:9e:e5:d8:90:43:7b:cc:d4:03:8c:b4:cc:ad:73: 17:b6:5b:b3:c8:76:e7:46:de:d7:4a:42:2a:b0:92:81: 16:65:d7:64:cc:98:62:fb:b5:41:9d:29:cb:96:8a:4a: 5d:59:28:9f:37:e2:4f:5f:5b:8a:91:a2:7d:81:2f:7c: 41:b5:86:f6:e1:01:c8:be:68:a1:3d:8e:56:20:96:3f: 33:56:8d:65:49:9f:d2:c7:0c:ee:45:d5:aa:b9:02:28: b4:e3:e7:d4:77:a4:09:25:41:c9:18:f1:9b:bb:87:05: 45:75:c4:50:b3:95:85:4e:37:83:f1:6c:01:97:92:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:78:83:4a:6f:96:3e:56:b0:35:a4:8f:0b:67:9b:19: 7e:9b:18:95:b5:33:b2:68:d9:af:e5:d7:9c:f8:22:82: b2:ef:2c:a6:69:73:60:ae:a4:98:7f:56:11:4d:c4:d3: 3c:38:50:16:93:0f:5e:f8:e7:33:43:f2:37:b5:16:e8: 6c:b6:d6:5b:6b:fe:09:e7:c3:67:9d:9a:90:20:51:61: 2d:aa:9a:48:98:b4:96:e4:b9:cd:d9:e9:54:f7:26:1d: c8:d6:b7:28:c3:28:3e:64:e2:02:71:06:8c:57:39:55: 6f:9e:a7:03:5d:60:98:00:a5:08:b0:be:16:d4:cd:37: 7f:9b:98:71:8d:e7:1f:a2:f0:de:55:4d:8d:f7:88:b5: 0a:4c:3d:91:56:b8:39:29:7b:f9:b8:21:5c:d5:67:bd: 35:5b:8b:bb:09:8b:d0:2b:b4:7c:af:7c:a8:0a:d6:dc: ff:05:df:b4:21:28:ec:26:1a:94:1e:27:45:be:42:f4: 57:81:b6:0d:15:4e:6f:27:54:60:40:3d:85:7c:b4:f8: a3:20:f8:f1:52:55:dd:db:6f:19:41:68:a0:5a:be:cf: 0b:d2:98:a8:48:78:e8:17:bf:6e:a8:19:82:1c:27:da: cb:36:15:6e:be:49:1b:0f:39:e0:0c:05:33:47:1b:58 Fingerprint (SHA-256): B3:09:DC:65:7E:C9:0B:CF:A5:F6:D9:44:90:90:FA:F2:A7:96:1C:8F:8A:EE:C2:FE:32:E4:8C:5E:54:D1:CB:10 Fingerprint (SHA1): 74:72:92:E8:F8:21:BC:FB:16:04:3E:1B:6A:96:86:38:99:FF:E8:AD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1799: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der vfychain -d DBOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165230 (0x3caff7ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:08:05 2023 Not After : Wed Oct 18 17:08:05 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:ad:9c:89:ef:c6:56:92:a1:de:a6:03:46:4e:db:85: f0:a7:d5:8c:ca:f3:57:44:c8:bf:1d:1e:75:6b:9d:fd: 55:61:11:de:82:31:20:45:0f:0b:55:ce:c4:28:02:8b: 4c:98:0b:cc:a7:9a:01:26:7f:13:d0:61:30:40:60:3b: 28:f4:aa:3d:0a:f0:24:33:57:d9:cd:3d:6d:4c:88:f6: f7:49:43:0a:09:f3:c0:88:a9:6b:9b:52:5a:27:06:59: dc:01:3e:e5:93:bd:bf:73:30:fc:22:b2:1d:ae:87:77: c4:a5:ff:59:c1:f6:be:36:4b:ef:a5:36:1c:6d:4d:13: 86:b1:09:4f:e6:04:1b:7f:22:fb:4e:2c:a7:8a:a9:e6: 80:c1:80:72:f4:77:c2:0c:50:f9:60:3a:2f:14:2a:f5: b7:8b:db:d4:8e:eb:46:b2:80:df:e5:86:1f:59:93:25: 85:d8:b1:8e:f9:d4:95:db:39:e7:3b:6c:51:2a:47:db: 38:04:52:3f:7d:2a:20:4f:b2:21:e3:fd:1f:26:81:d7: 47:8d:12:df:bc:5e:52:c1:2d:49:29:8e:91:f1:f6:da: 7c:49:ae:f4:5a:bc:91:35:77:2a:6e:69:6f:23:96:3b: fb:9e:15:09:32:9c:ba:b2:ca:7e:4d:1a:97:c6:a5:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9b:53:be:37:ba:70:35:2b:74:14:26:a6:a0:3a:f6:c5: 8d:e8:79:bc:87:f2:fa:25:1d:a2:7f:f1:de:af:2b:22: 15:88:70:0b:67:55:ac:93:f1:65:f6:db:a8:3f:3a:7d: a1:2b:df:62:0e:4f:30:00:8f:4a:33:2c:d5:45:c6:a5: 01:32:02:3d:a0:b1:1e:49:e1:54:50:b3:af:06:1c:b4: 8d:ce:00:c1:12:05:c1:96:1c:8e:af:90:06:36:c0:cc: 1f:1b:42:57:cf:23:ec:90:fa:80:c8:1f:0b:0a:c3:39: fb:63:d4:f2:f5:e7:36:0f:b3:98:da:c3:bb:c6:ee:b1: 7e:d6:2f:59:a1:e6:28:0c:3e:6b:fd:51:3b:a0:d8:66: 6e:dd:de:1e:5c:a9:1b:f9:f5:77:3b:15:85:c0:0f:82: 96:9a:83:4e:32:9c:15:32:dc:73:cd:6f:77:eb:69:8a: b1:bb:03:17:39:93:8d:dc:31:7b:11:4f:0b:32:a9:7b: a2:48:2d:91:8b:08:bf:16:78:a3:ff:2b:47:37:40:bc: 4b:2f:a2:cb:f0:b8:ef:6f:7c:2e:94:08:16:a7:19:e8: 02:f4:35:3d:f2:10:34:fa:f1:15:6b:7f:2d:a6:03:dd: ef:6a:08:8c:67:f2:fb:67:49:ce:48:f3:c2:66:3b:fc Fingerprint (SHA-256): AE:25:81:53:0A:8B:C4:37:C7:A0:77:2B:C4:A1:DF:A9:1D:AA:38:CB:88:D4:3E:B1:3A:F6:31:08:4D:17:65:FA Fingerprint (SHA1): 46:FB:49:1D:2D:30:90:84:42:01:7C:05:D3:E0:8D:4E:22:1C:BF:F8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1800: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d DBOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA vfychain -d DBOnlyDB -pp -vv EE1CA2.der CA2CA1.der -t RootCA Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165228 (0x3caff7ec) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:07:59 2023 Not After : Wed Oct 18 17:07:59 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:fc:43:41:6c:37:ef:cb:43:fa:63:7f:40:97:e7:a2: af:97:a6:71:aa:27:61:25:26:e8:d8:2c:96:2a:e2:e0: 96:31:c7:53:05:f3:88:93:fe:e5:4a:87:10:1a:e0:12: 5d:21:f1:68:bb:6e:57:d8:8c:30:5c:73:6f:a0:8e:a8: fd:0c:06:ec:13:84:09:7c:1c:3d:b1:a3:c1:15:78:db: 44:a6:49:ae:9c:db:d2:cf:0c:94:03:b0:55:94:a4:19: d1:55:c9:77:8e:30:6e:2b:d6:fc:0e:73:c8:38:56:5a: 75:ae:0e:8d:e8:a6:05:3c:80:a2:0c:ca:c7:0b:9f:92: a5:19:9e:e5:d8:90:43:7b:cc:d4:03:8c:b4:cc:ad:73: 17:b6:5b:b3:c8:76:e7:46:de:d7:4a:42:2a:b0:92:81: 16:65:d7:64:cc:98:62:fb:b5:41:9d:29:cb:96:8a:4a: 5d:59:28:9f:37:e2:4f:5f:5b:8a:91:a2:7d:81:2f:7c: 41:b5:86:f6:e1:01:c8:be:68:a1:3d:8e:56:20:96:3f: 33:56:8d:65:49:9f:d2:c7:0c:ee:45:d5:aa:b9:02:28: b4:e3:e7:d4:77:a4:09:25:41:c9:18:f1:9b:bb:87:05: 45:75:c4:50:b3:95:85:4e:37:83:f1:6c:01:97:92:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:78:83:4a:6f:96:3e:56:b0:35:a4:8f:0b:67:9b:19: 7e:9b:18:95:b5:33:b2:68:d9:af:e5:d7:9c:f8:22:82: b2:ef:2c:a6:69:73:60:ae:a4:98:7f:56:11:4d:c4:d3: 3c:38:50:16:93:0f:5e:f8:e7:33:43:f2:37:b5:16:e8: 6c:b6:d6:5b:6b:fe:09:e7:c3:67:9d:9a:90:20:51:61: 2d:aa:9a:48:98:b4:96:e4:b9:cd:d9:e9:54:f7:26:1d: c8:d6:b7:28:c3:28:3e:64:e2:02:71:06:8c:57:39:55: 6f:9e:a7:03:5d:60:98:00:a5:08:b0:be:16:d4:cd:37: 7f:9b:98:71:8d:e7:1f:a2:f0:de:55:4d:8d:f7:88:b5: 0a:4c:3d:91:56:b8:39:29:7b:f9:b8:21:5c:d5:67:bd: 35:5b:8b:bb:09:8b:d0:2b:b4:7c:af:7c:a8:0a:d6:dc: ff:05:df:b4:21:28:ec:26:1a:94:1e:27:45:be:42:f4: 57:81:b6:0d:15:4e:6f:27:54:60:40:3d:85:7c:b4:f8: a3:20:f8:f1:52:55:dd:db:6f:19:41:68:a0:5a:be:cf: 0b:d2:98:a8:48:78:e8:17:bf:6e:a8:19:82:1c:27:da: cb:36:15:6e:be:49:1b:0f:39:e0:0c:05:33:47:1b:58 Fingerprint (SHA-256): B3:09:DC:65:7E:C9:0B:CF:A5:F6:D9:44:90:90:FA:F2:A7:96:1C:8F:8A:EE:C2:FE:32:E4:8C:5E:54:D1:CB:10 Fingerprint (SHA1): 74:72:92:E8:F8:21:BC:FB:16:04:3E:1B:6A:96:86:38:99:FF:E8:AD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1801: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d DBOnlyDB -pp -t RootCA - PASSED chains.sh: Creating DB TrustOnlyDB certutil -N -d TrustOnlyDB -f TrustOnlyDB/dbpasswd chains.sh: #1802: TrustAnchors: Creating DB TrustOnlyDB - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der CA2CA1.der CA1RootCA.der -t RootCA.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165228 (0x3caff7ec) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:07:59 2023 Not After : Wed Oct 18 17:07:59 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:fc:43:41:6c:37:ef:cb:43:fa:63:7f:40:97:e7:a2: af:97:a6:71:aa:27:61:25:26:e8:d8:2c:96:2a:e2:e0: 96:31:c7:53:05:f3:88:93:fe:e5:4a:87:10:1a:e0:12: 5d:21:f1:68:bb:6e:57:d8:8c:30:5c:73:6f:a0:8e:a8: fd:0c:06:ec:13:84:09:7c:1c:3d:b1:a3:c1:15:78:db: 44:a6:49:ae:9c:db:d2:cf:0c:94:03:b0:55:94:a4:19: d1:55:c9:77:8e:30:6e:2b:d6:fc:0e:73:c8:38:56:5a: 75:ae:0e:8d:e8:a6:05:3c:80:a2:0c:ca:c7:0b:9f:92: a5:19:9e:e5:d8:90:43:7b:cc:d4:03:8c:b4:cc:ad:73: 17:b6:5b:b3:c8:76:e7:46:de:d7:4a:42:2a:b0:92:81: 16:65:d7:64:cc:98:62:fb:b5:41:9d:29:cb:96:8a:4a: 5d:59:28:9f:37:e2:4f:5f:5b:8a:91:a2:7d:81:2f:7c: 41:b5:86:f6:e1:01:c8:be:68:a1:3d:8e:56:20:96:3f: 33:56:8d:65:49:9f:d2:c7:0c:ee:45:d5:aa:b9:02:28: b4:e3:e7:d4:77:a4:09:25:41:c9:18:f1:9b:bb:87:05: 45:75:c4:50:b3:95:85:4e:37:83:f1:6c:01:97:92:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:78:83:4a:6f:96:3e:56:b0:35:a4:8f:0b:67:9b:19: 7e:9b:18:95:b5:33:b2:68:d9:af:e5:d7:9c:f8:22:82: b2:ef:2c:a6:69:73:60:ae:a4:98:7f:56:11:4d:c4:d3: 3c:38:50:16:93:0f:5e:f8:e7:33:43:f2:37:b5:16:e8: 6c:b6:d6:5b:6b:fe:09:e7:c3:67:9d:9a:90:20:51:61: 2d:aa:9a:48:98:b4:96:e4:b9:cd:d9:e9:54:f7:26:1d: c8:d6:b7:28:c3:28:3e:64:e2:02:71:06:8c:57:39:55: 6f:9e:a7:03:5d:60:98:00:a5:08:b0:be:16:d4:cd:37: 7f:9b:98:71:8d:e7:1f:a2:f0:de:55:4d:8d:f7:88:b5: 0a:4c:3d:91:56:b8:39:29:7b:f9:b8:21:5c:d5:67:bd: 35:5b:8b:bb:09:8b:d0:2b:b4:7c:af:7c:a8:0a:d6:dc: ff:05:df:b4:21:28:ec:26:1a:94:1e:27:45:be:42:f4: 57:81:b6:0d:15:4e:6f:27:54:60:40:3d:85:7c:b4:f8: a3:20:f8:f1:52:55:dd:db:6f:19:41:68:a0:5a:be:cf: 0b:d2:98:a8:48:78:e8:17:bf:6e:a8:19:82:1c:27:da: cb:36:15:6e:be:49:1b:0f:39:e0:0c:05:33:47:1b:58 Fingerprint (SHA-256): B3:09:DC:65:7E:C9:0B:CF:A5:F6:D9:44:90:90:FA:F2:A7:96:1C:8F:8A:EE:C2:FE:32:E4:8C:5E:54:D1:CB:10 Fingerprint (SHA1): 74:72:92:E8:F8:21:BC:FB:16:04:3E:1B:6A:96:86:38:99:FF:E8:AD Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1803: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der CA1RootCA.der with flags -d TrustOnlyDB -pp -t RootCA.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der vfychain -d TrustOnlyDB -pp -vv EE1CA2.der -t CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165230 (0x3caff7ee) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=CA1 Intermediate,O=CA1,C=US" Validity: Not Before: Wed Oct 18 17:08:05 2023 Not After : Wed Oct 18 17:08:05 2028 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e0:ad:9c:89:ef:c6:56:92:a1:de:a6:03:46:4e:db:85: f0:a7:d5:8c:ca:f3:57:44:c8:bf:1d:1e:75:6b:9d:fd: 55:61:11:de:82:31:20:45:0f:0b:55:ce:c4:28:02:8b: 4c:98:0b:cc:a7:9a:01:26:7f:13:d0:61:30:40:60:3b: 28:f4:aa:3d:0a:f0:24:33:57:d9:cd:3d:6d:4c:88:f6: f7:49:43:0a:09:f3:c0:88:a9:6b:9b:52:5a:27:06:59: dc:01:3e:e5:93:bd:bf:73:30:fc:22:b2:1d:ae:87:77: c4:a5:ff:59:c1:f6:be:36:4b:ef:a5:36:1c:6d:4d:13: 86:b1:09:4f:e6:04:1b:7f:22:fb:4e:2c:a7:8a:a9:e6: 80:c1:80:72:f4:77:c2:0c:50:f9:60:3a:2f:14:2a:f5: b7:8b:db:d4:8e:eb:46:b2:80:df:e5:86:1f:59:93:25: 85:d8:b1:8e:f9:d4:95:db:39:e7:3b:6c:51:2a:47:db: 38:04:52:3f:7d:2a:20:4f:b2:21:e3:fd:1f:26:81:d7: 47:8d:12:df:bc:5e:52:c1:2d:49:29:8e:91:f1:f6:da: 7c:49:ae:f4:5a:bc:91:35:77:2a:6e:69:6f:23:96:3b: fb:9e:15:09:32:9c:ba:b2:ca:7e:4d:1a:97:c6:a5:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 9b:53:be:37:ba:70:35:2b:74:14:26:a6:a0:3a:f6:c5: 8d:e8:79:bc:87:f2:fa:25:1d:a2:7f:f1:de:af:2b:22: 15:88:70:0b:67:55:ac:93:f1:65:f6:db:a8:3f:3a:7d: a1:2b:df:62:0e:4f:30:00:8f:4a:33:2c:d5:45:c6:a5: 01:32:02:3d:a0:b1:1e:49:e1:54:50:b3:af:06:1c:b4: 8d:ce:00:c1:12:05:c1:96:1c:8e:af:90:06:36:c0:cc: 1f:1b:42:57:cf:23:ec:90:fa:80:c8:1f:0b:0a:c3:39: fb:63:d4:f2:f5:e7:36:0f:b3:98:da:c3:bb:c6:ee:b1: 7e:d6:2f:59:a1:e6:28:0c:3e:6b:fd:51:3b:a0:d8:66: 6e:dd:de:1e:5c:a9:1b:f9:f5:77:3b:15:85:c0:0f:82: 96:9a:83:4e:32:9c:15:32:dc:73:cd:6f:77:eb:69:8a: b1:bb:03:17:39:93:8d:dc:31:7b:11:4f:0b:32:a9:7b: a2:48:2d:91:8b:08:bf:16:78:a3:ff:2b:47:37:40:bc: 4b:2f:a2:cb:f0:b8:ef:6f:7c:2e:94:08:16:a7:19:e8: 02:f4:35:3d:f2:10:34:fa:f1:15:6b:7f:2d:a6:03:dd: ef:6a:08:8c:67:f2:fb:67:49:ce:48:f3:c2:66:3b:fc Fingerprint (SHA-256): AE:25:81:53:0A:8B:C4:37:C7:A0:77:2B:C4:A1:DF:A9:1D:AA:38:CB:88:D4:3E:B1:3A:F6:31:08:4D:17:65:FA Fingerprint (SHA1): 46:FB:49:1D:2D:30:90:84:42:01:7C:05:D3:E0:8D:4E:22:1C:BF:F8 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Returned value is 0, expected result is pass chains.sh: #1804: TrustAnchors: Verifying certificate(s) EE1CA2.der with flags -d TrustOnlyDB -pp -t CA2CA1.der - PASSED chains.sh: Creating DB TrustAndDBDB certutil -N -d TrustAndDBDB -f TrustAndDBDB/dbpasswd chains.sh: #1805: TrustAnchors: Creating DB TrustAndDBDB - PASSED chains.sh: Importing certificate RootCA.der to TrustAndDBDB database certutil -A -n RootCA -t "CT,C,C" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i RootCA.der chains.sh: #1806: TrustAnchors: Importing certificate RootCA.der to TrustAndDBDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to TrustAndDBDB database certutil -A -n CA1 -t "" -d TrustAndDBDB -f TrustAndDBDB/dbpasswd -i CA1RootCA.der chains.sh: #1807: TrustAnchors: Importing certificate CA1RootCA.der to TrustAndDBDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp vfychain -d TrustAndDBDB -pp -vv EE1CA2.der CA2CA1.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165228 (0x3caff7ec) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:07:59 2023 Not After : Wed Oct 18 17:07:59 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:fc:43:41:6c:37:ef:cb:43:fa:63:7f:40:97:e7:a2: af:97:a6:71:aa:27:61:25:26:e8:d8:2c:96:2a:e2:e0: 96:31:c7:53:05:f3:88:93:fe:e5:4a:87:10:1a:e0:12: 5d:21:f1:68:bb:6e:57:d8:8c:30:5c:73:6f:a0:8e:a8: fd:0c:06:ec:13:84:09:7c:1c:3d:b1:a3:c1:15:78:db: 44:a6:49:ae:9c:db:d2:cf:0c:94:03:b0:55:94:a4:19: d1:55:c9:77:8e:30:6e:2b:d6:fc:0e:73:c8:38:56:5a: 75:ae:0e:8d:e8:a6:05:3c:80:a2:0c:ca:c7:0b:9f:92: a5:19:9e:e5:d8:90:43:7b:cc:d4:03:8c:b4:cc:ad:73: 17:b6:5b:b3:c8:76:e7:46:de:d7:4a:42:2a:b0:92:81: 16:65:d7:64:cc:98:62:fb:b5:41:9d:29:cb:96:8a:4a: 5d:59:28:9f:37:e2:4f:5f:5b:8a:91:a2:7d:81:2f:7c: 41:b5:86:f6:e1:01:c8:be:68:a1:3d:8e:56:20:96:3f: 33:56:8d:65:49:9f:d2:c7:0c:ee:45:d5:aa:b9:02:28: b4:e3:e7:d4:77:a4:09:25:41:c9:18:f1:9b:bb:87:05: 45:75:c4:50:b3:95:85:4e:37:83:f1:6c:01:97:92:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:78:83:4a:6f:96:3e:56:b0:35:a4:8f:0b:67:9b:19: 7e:9b:18:95:b5:33:b2:68:d9:af:e5:d7:9c:f8:22:82: b2:ef:2c:a6:69:73:60:ae:a4:98:7f:56:11:4d:c4:d3: 3c:38:50:16:93:0f:5e:f8:e7:33:43:f2:37:b5:16:e8: 6c:b6:d6:5b:6b:fe:09:e7:c3:67:9d:9a:90:20:51:61: 2d:aa:9a:48:98:b4:96:e4:b9:cd:d9:e9:54:f7:26:1d: c8:d6:b7:28:c3:28:3e:64:e2:02:71:06:8c:57:39:55: 6f:9e:a7:03:5d:60:98:00:a5:08:b0:be:16:d4:cd:37: 7f:9b:98:71:8d:e7:1f:a2:f0:de:55:4d:8d:f7:88:b5: 0a:4c:3d:91:56:b8:39:29:7b:f9:b8:21:5c:d5:67:bd: 35:5b:8b:bb:09:8b:d0:2b:b4:7c:af:7c:a8:0a:d6:dc: ff:05:df:b4:21:28:ec:26:1a:94:1e:27:45:be:42:f4: 57:81:b6:0d:15:4e:6f:27:54:60:40:3d:85:7c:b4:f8: a3:20:f8:f1:52:55:dd:db:6f:19:41:68:a0:5a:be:cf: 0b:d2:98:a8:48:78:e8:17:bf:6e:a8:19:82:1c:27:da: cb:36:15:6e:be:49:1b:0f:39:e0:0c:05:33:47:1b:58 Fingerprint (SHA-256): B3:09:DC:65:7E:C9:0B:CF:A5:F6:D9:44:90:90:FA:F2:A7:96:1C:8F:8A:EE:C2:FE:32:E4:8C:5E:54:D1:CB:10 Fingerprint (SHA1): 74:72:92:E8:F8:21:BC:FB:16:04:3E:1B:6A:96:86:38:99:FF:E8:AD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1808: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv EE2OtherIntermediate.der OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165232 (0x3caff7f0) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 17:08:10 2023 Not After : Wed Oct 18 17:08:10 2073 Subject: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:61:f3:53:d1:8f:c2:d5:58:9a:6a:32:5b:00:df:38: 30:89:ae:41:c0:20:78:e1:07:8e:fe:b8:ba:f6:e4:6f: 44:f3:2d:b4:8e:63:3c:8c:f2:00:32:6e:5e:4a:c9:a0: 71:f0:31:db:16:5a:96:9f:59:fe:c4:1a:31:4a:69:8b: d9:73:6c:4b:2e:8a:69:01:ae:ac:1b:10:b5:b1:2f:24: a1:a3:56:a5:9e:d7:c8:c1:e0:17:a0:87:67:7c:9c:ea: 56:02:0e:9c:8e:ec:08:05:7a:1b:80:30:60:1d:d3:52: f0:02:b6:81:d8:e7:01:d8:6b:99:9e:cf:a3:68:dc:e8: 72:1a:18:24:0e:62:68:f1:a4:c3:af:86:78:b9:38:c1: 49:e0:7c:b3:79:f8:6e:76:db:15:85:c4:c1:de:53:81: 75:dc:e1:7a:98:60:31:83:02:02:3a:fb:1d:f9:53:00: a3:bd:2c:18:34:f8:44:7e:e8:88:3e:d3:bf:0b:6f:72: 82:11:a7:17:62:02:e0:8c:92:99:f3:41:41:14:5d:f9: 0b:d5:7f:88:ce:52:ba:76:d2:6d:6c:9d:5d:36:e5:b1: f0:a6:57:59:4d:20:12:55:cb:ab:15:79:5c:59:3a:03: 43:8f:c6:4d:b1:08:aa:ed:e8:29:37:72:a9:44:cf:47 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: ae:89:3f:03:56:0c:d4:f3:af:6e:17:54:2e:07:1d:55: 07:f3:d4:cf:e6:b8:8d:bc:44:ba:8f:3b:87:08:0b:ab: 65:82:fe:cf:f8:f6:a5:b3:57:1b:34:59:e9:dc:b8:e8: 58:d9:9d:38:73:f9:0e:13:f8:97:5c:2f:8f:ec:f0:83: 68:5c:6c:2d:02:ce:86:6c:d7:7f:78:ef:05:54:17:1c: e7:8b:fc:88:67:04:ec:51:a7:f2:43:af:b7:d8:df:d2: b8:28:b1:2b:de:e6:7f:72:18:75:99:19:cb:5d:ae:f6: 85:d2:ef:95:96:a0:eb:34:26:c4:38:e5:32:37:84:fd: 55:2b:87:8e:55:d6:92:f1:db:54:c4:78:63:89:85:cb: 24:2c:57:ac:93:5e:19:82:ee:6c:0f:a5:30:6d:98:b3: 25:07:25:52:20:95:e5:38:91:ab:5d:55:b1:66:ae:7b: 01:1a:3d:09:ab:a7:6e:ed:f4:1c:66:b6:ed:6e:87:2e: 43:6f:2c:e9:f5:00:3d:ee:a8:fc:4c:48:98:54:ee:b1: 0f:05:c8:d8:7e:89:f1:6f:e4:5b:82:c1:e9:d0:70:d3: 29:7f:5d:9a:ef:cb:a8:ec:38:dd:1f:0a:4f:e5:2c:fd: f5:9e:fb:a3:55:ab:c6:00:ff:d1:41:b2:2f:29:af:f4 Fingerprint (SHA-256): E5:EF:EE:B5:EF:EB:77:3B:2A:9C:FF:B0:81:0F:08:82:1D:CF:77:B0:67:A0:DA:28:EC:CE:46:90:BB:E2:60:92 Fingerprint (SHA1): 73:90:D5:E9:B3:7E:E2:04:E6:D6:B5:33:EE:96:A3:D2:0A:0A:88:25 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Certificate 2 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate ,C=US" Returned value is 0, expected result is pass chains.sh: #1809: TrustAnchors: Verifying certificate(s) EE2OtherIntermediate.der OtherIntermediateOtherRoot.der with flags -d TrustAndDBDB -pp -t OtherRoot.der - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der vfychain -d TrustAndDBDB -pp -vv -T EE1CA2.der CA2CA1.der -t OtherIntermediateOtherRoot.der -t OtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165228 (0x3caff7ec) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=RootCA ROOT CA,O=RootCA,C=US" Validity: Not Before: Wed Oct 18 17:07:59 2023 Not After : Wed Oct 18 17:07:59 2073 Subject: "CN=RootCA ROOT CA,O=RootCA,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e9:fc:43:41:6c:37:ef:cb:43:fa:63:7f:40:97:e7:a2: af:97:a6:71:aa:27:61:25:26:e8:d8:2c:96:2a:e2:e0: 96:31:c7:53:05:f3:88:93:fe:e5:4a:87:10:1a:e0:12: 5d:21:f1:68:bb:6e:57:d8:8c:30:5c:73:6f:a0:8e:a8: fd:0c:06:ec:13:84:09:7c:1c:3d:b1:a3:c1:15:78:db: 44:a6:49:ae:9c:db:d2:cf:0c:94:03:b0:55:94:a4:19: d1:55:c9:77:8e:30:6e:2b:d6:fc:0e:73:c8:38:56:5a: 75:ae:0e:8d:e8:a6:05:3c:80:a2:0c:ca:c7:0b:9f:92: a5:19:9e:e5:d8:90:43:7b:cc:d4:03:8c:b4:cc:ad:73: 17:b6:5b:b3:c8:76:e7:46:de:d7:4a:42:2a:b0:92:81: 16:65:d7:64:cc:98:62:fb:b5:41:9d:29:cb:96:8a:4a: 5d:59:28:9f:37:e2:4f:5f:5b:8a:91:a2:7d:81:2f:7c: 41:b5:86:f6:e1:01:c8:be:68:a1:3d:8e:56:20:96:3f: 33:56:8d:65:49:9f:d2:c7:0c:ee:45:d5:aa:b9:02:28: b4:e3:e7:d4:77:a4:09:25:41:c9:18:f1:9b:bb:87:05: 45:75:c4:50:b3:95:85:4e:37:83:f1:6c:01:97:92:37 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4e:78:83:4a:6f:96:3e:56:b0:35:a4:8f:0b:67:9b:19: 7e:9b:18:95:b5:33:b2:68:d9:af:e5:d7:9c:f8:22:82: b2:ef:2c:a6:69:73:60:ae:a4:98:7f:56:11:4d:c4:d3: 3c:38:50:16:93:0f:5e:f8:e7:33:43:f2:37:b5:16:e8: 6c:b6:d6:5b:6b:fe:09:e7:c3:67:9d:9a:90:20:51:61: 2d:aa:9a:48:98:b4:96:e4:b9:cd:d9:e9:54:f7:26:1d: c8:d6:b7:28:c3:28:3e:64:e2:02:71:06:8c:57:39:55: 6f:9e:a7:03:5d:60:98:00:a5:08:b0:be:16:d4:cd:37: 7f:9b:98:71:8d:e7:1f:a2:f0:de:55:4d:8d:f7:88:b5: 0a:4c:3d:91:56:b8:39:29:7b:f9:b8:21:5c:d5:67:bd: 35:5b:8b:bb:09:8b:d0:2b:b4:7c:af:7c:a8:0a:d6:dc: ff:05:df:b4:21:28:ec:26:1a:94:1e:27:45:be:42:f4: 57:81:b6:0d:15:4e:6f:27:54:60:40:3d:85:7c:b4:f8: a3:20:f8:f1:52:55:dd:db:6f:19:41:68:a0:5a:be:cf: 0b:d2:98:a8:48:78:e8:17:bf:6e:a8:19:82:1c:27:da: cb:36:15:6e:be:49:1b:0f:39:e0:0c:05:33:47:1b:58 Fingerprint (SHA-256): B3:09:DC:65:7E:C9:0B:CF:A5:F6:D9:44:90:90:FA:F2:A7:96:1C:8F:8A:EE:C2:FE:32:E4:8C:5E:54:D1:CB:10 Fingerprint (SHA1): 74:72:92:E8:F8:21:BC:FB:16:04:3E:1B:6A:96:86:38:99:FF:E8:AD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=EE1 EE,O=EE1,C=US" Certificate 2 Subject: "CN=CA2 Intermediate,O=CA2,C=US" Certificate 3 Subject: "CN=CA1 Intermediate,O=CA1,C=US" Returned value is 0, expected result is pass chains.sh: #1810: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d TrustAndDBDB -pp -T -t OtherIntermediateOtherRoot.der -t OtherRoot.der - PASSED chains.sh: Creating DB ExplicitDistrustDB certutil -N -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd chains.sh: #1811: TrustAnchors: Creating DB ExplicitDistrustDB - PASSED chains.sh: Importing certificate RootCA.der to ExplicitDistrustDB database certutil -A -n RootCA -t "CT,C,C" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i RootCA.der chains.sh: #1812: TrustAnchors: Importing certificate RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate CA1RootCA.der to ExplicitDistrustDB database certutil -A -n CA1 -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i CA1RootCA.der chains.sh: #1813: TrustAnchors: Importing certificate CA1RootCA.der to ExplicitDistrustDB database - PASSED chains.sh: Importing certificate OtherRoot.der to ExplicitDistrustDB database certutil -A -n OtherRoot -t "p,p,p" -d ExplicitDistrustDB -f ExplicitDistrustDB/dbpasswd -i OtherRoot.der chains.sh: #1814: TrustAnchors: Importing certificate OtherRoot.der to ExplicitDistrustDB database - PASSED chains.sh: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der vfychain -d ExplicitDistrustDB -pp -vv EE1CA2.der CA2CA1.der -t CA1RootCA.der Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 2. CA1 [Certificate Authority]: ERROR -8171: Peer's certificate has been marked as not trusted by the user. Returned value is 1, expected result is fail chains.sh: #1815: TrustAnchors: Verifying certificate(s) EE1CA2.der CA2CA1.der with flags -d ExplicitDistrustDB -pp -t CA1RootCA.der - PASSED chains.sh: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der vfychain -d ExplicitDistrustDB -pp -vv EE2OtherIntermediate.der -t OtherIntermediateOtherRoot.der Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 1018165233 (0x3caff7f1) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=OtherRoot ROOT CA,O=OtherRoot,C=US" Validity: Not Before: Wed Oct 18 17:08:13 2023 Not After : Wed Oct 18 17:08:13 2028 Subject: "CN=OtherIntermediate Intermediate,O=OtherIntermediate,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a8:22:39:db:fe:a2:3c:d4:43:1e:4b:e0:98:58:6a:2e: 17:2f:c8:55:8b:33:98:45:ab:93:5a:6c:14:09:bb:9d: 7a:cd:26:0e:9d:a6:67:13:e3:e7:93:2d:bc:fc:90:10: 44:48:8d:0e:fe:81:ef:70:27:25:b1:6c:39:b4:de:32: 7d:9f:77:f2:62:6a:a3:81:e7:4e:51:13:67:12:33:8d: 2d:2a:a9:13:1e:ae:6d:30:65:e1:40:c7:20:08:6f:5e: 97:f1:0f:06:31:4e:b8:b3:70:b7:94:2c:27:e3:70:b5: fc:b8:f1:5a:39:6d:ae:a4:0a:08:90:f9:e2:ac:04:12: 7a:32:44:48:51:e8:80:a0:38:55:65:6b:fd:1c:c2:ca: 10:c6:86:f5:36:e3:02:49:a8:bf:87:7f:75:68:a7:df: 21:be:82:b5:9f:86:f6:14:a8:da:d4:68:fc:ad:3e:d7: e3:bd:96:fd:9c:dd:58:3c:b1:44:6f:1f:c5:56:7e:0b: 77:e4:c4:56:6f:df:2c:86:69:1b:dd:82:6d:92:73:08: 05:9a:37:88:a0:15:40:3e:d9:98:fc:ba:c8:9b:7c:ed: 57:db:25:b1:46:4d:4a:91:e3:1a:e1:47:d0:48:54:dd: be:1b:d4:51:6f:2a:73:26:3d:08:30:7f:56:d6:4f:79 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 19:e1:24:7d:ad:62:2e:52:e7:91:02:c1:a0:33:57:e5: 56:1d:84:10:7d:d7:eb:84:94:3d:ec:33:22:e3:1a:66: b5:fa:86:da:ae:21:46:b6:20:37:57:33:33:c7:64:60: 2d:e3:fd:d4:ed:1a:a8:63:1f:91:7e:51:ae:d1:ab:95: 02:52:1d:4e:ed:b1:0d:3a:59:81:c0:dc:59:72:7f:3d: 89:88:6b:b1:c5:67:e0:b1:01:42:63:73:d2:d1:56:aa: 9d:56:c2:e7:46:a1:9d:19:70:52:3c:a7:49:71:02:9b: 42:39:97:c7:f3:04:58:d3:4c:93:55:b1:73:c9:74:a5: a3:78:25:fb:dd:d3:a1:94:cc:0f:08:d9:ce:bb:8d:b9: 20:61:92:67:be:19:ec:42:47:e0:ff:f5:e1:73:ef:5b: a0:6e:cb:29:79:10:da:01:5f:e6:3d:ea:e3:3e:e6:d6: a7:c2:62:33:89:13:84:c5:71:34:22:5d:14:0d:2b:63: 9b:80:d0:89:90:78:6c:b7:21:79:53:42:00:10:89:f1: 34:0f:ac:94:92:19:76:53:dc:39:7c:18:18:74:d9:6d: 19:9f:44:71:0f:e7:7e:2c:b4:d7:33:53:b7:99:42:64: d8:33:56:ae:3f:45:24:86:41:f5:d6:9e:f7:da:cf:e9 Fingerprint (SHA-256): E0:72:31:2A:39:1D:60:3F:6C:6E:77:1B:DD:B4:8E:E2:CD:63:36:C3:75:5E:DC:7B:EE:AD:29:E7:6E:00:2A:8E Fingerprint (SHA1): D0:2E:4C:D5:78:BA:AE:CF:A7:7A:3E:97:F4:D3:5E:E9:94:F9:66:D2 Mozilla-CA-Policy: false (attribute missing) Certificate 1 Subject: "CN=EE2 EE,O=EE2,C=US" Returned value is 0, expected result is pass chains.sh: #1816: Verifying certificate(s) EE2OtherIntermediate.der with flags -d ExplicitDistrustDB -pp -t OtherIntermediateOtherRoot.der - PASSED chains.sh: Creating DB trustanchorsDB certutil -N -d trustanchorsDB -f trustanchorsDB/dbpasswd chains.sh: #1817: TrustAnchors: Creating DB trustanchorsDB - PASSED chains.sh: Importing certificate NameConstraints.ca.cert to trustanchorsDB database certutil -A -n NameConstraints.ca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ca.cert chains.sh: #1818: TrustAnchors: Importing certificate NameConstraints.ca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database certutil -A -n NameConstraints.ncca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ncca.cert chains.sh: #1819: TrustAnchors: Importing certificate NameConstraints.ncca.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database certutil -A -n NameConstraints.dcisscopy -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcisscopy.cert chains.sh: #1820: TrustAnchors: Importing certificate NameConstraints.dcisscopy.cert to trustanchorsDB database - PASSED chains.sh: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database certutil -A -n NameConstraints.ipaca -t "CT,C,C" -d trustanchorsDB -f trustanchorsDB/dbpasswd -i /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ipaca.cert chains.sh: #1821: TrustAnchors: Importing certificate NameConstraints.ipaca.cert to trustanchorsDB database - PASSED chains.sh: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server1.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1822: TrustAnchors: Verifying certificate(s) NameConstraints.server1.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1823: TrustAnchors: Verifying certificate(s) NameConstraints.server2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server3.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1824: TrustAnchors: Verifying certificate(s) NameConstraints.server3.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1825: TrustAnchors: Verifying certificate(s) NameConstraints.server4.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test2.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1826: TrustAnchors: Verifying certificate(s) NameConstraints.server5.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server6.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate2.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test2.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1827: TrustAnchors: Verifying certificate(s) NameConstraints.server6.cert NameConstraints.intermediate2.cert NameConstraints.intermediate.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server7.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,OU=bar,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1828: TrustAnchors: Verifying certificate(s) NameConstraints.server7.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server8.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1829: TrustAnchors: Verifying certificate(s) NameConstraints.server8.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server9.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=Foo,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1830: TrustAnchors: Verifying certificate(s) NameConstraints.server9.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server10.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bar.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1831: TrustAnchors: Verifying certificate(s) NameConstraints.server10.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server11.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=site.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1832: TrustAnchors: Verifying certificate(s) NameConstraints.server11.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server12.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate4.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=Honest Achmed,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1833: TrustAnchors: Verifying certificate(s) NameConstraints.server12.cert NameConstraints.intermediate4.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server13.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=bat.foo.example,O=OtherOrg,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1834: TrustAnchors: Verifying certificate(s) NameConstraints.server13.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server14.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate5.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate3.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another.foo.example,O=Foo,ST=CA,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1835: TrustAnchors: Verifying certificate(s) NameConstraints.server14.cert NameConstraints.intermediate5.cert NameConstraints.intermediate3.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server15.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=testfoo.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1836: TrustAnchors: Verifying certificate(s) NameConstraints.server15.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server16.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=another_test3.invalid,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is fail chains.sh: #1837: TrustAnchors: Verifying certificate(s) NameConstraints.server16.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.server17.cert /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.intermediate6.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=test4.example,O=BOGUS NSS,L=Mountain View,ST=California,C=US : ERROR -8181: Peer's Certificate has expired. Returned value is 1, expected result is pass chains.sh: #1838: TrustAnchors: Verifying certificate(s) NameConstraints.server17.cert NameConstraints.intermediate6.cert with flags -d trustanchorsDB -pp - FAILED chains.sh: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissblocked.cert Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 1. NameConstraints.dcisscopy [Certificate Authority]: Email Address(es): igca@sgdn.pm.gouv.fr ERROR -8080: The Certifying Authority for this certificate is not permitted to issue a certificate with this name. Returned value is 1, expected result is fail chains.sh: #1839: TrustAnchors: Verifying certificate(s) NameConstraints.dcissblocked.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp vfychain -d trustanchorsDB -pp -vv /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.dcissallowed.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 998899 (0xf3df3) Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Issuer: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris,S T=France,C=FR" Validity: Not Before: Sun Feb 02 17:21:27 2014 Not After : Fri Feb 02 17:21:27 2024 Subject: "E=igca@sgdn.pm.gouv.fr,CN=IGC/A,OU=DCSSI,O=PM/SGDN,L=Paris, ST=France,C=FR" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c0:e2:f3:2e:4e:9b:5e:f8:e5:17:d3:51:71:0f:9f:b7: bb:4b:3d:e1:33:a6:f9:d1:ad:5a:31:ca:6d:ad:5b:ed: 19:5a:32:1d:a9:31:5b:83:ee:3b:19:83:92:b4:5c:0f: 1c:74:e5:f5:ef:22:a3:d8:22:a8:13:0e:18:37:26:54: ab:ee:7a:d6:d5:4c:42:67:6c:81:fd:0c:46:7d:d8:d9: b7:8d:b6:1c:76:13:10:06:aa:b3:18:74:2e:09:95:3a: a1:a1:98:8c:ff:26:23:95:5d:87:a1:a8:6d:ea:8d:66: de:ab:17:43:1c:3d:14:20:10:2f:c6:ff:c2:96:d3:ce: 5f:9f:0f:d4:88:1d:b5:d1:b1:f6:c0:ae:1f:0a:1c:bf: b4:97:11:7f:6d:5b:a6:e3:f6:fc:db:bd:c1:3a:82:01: 5c:17:31:f5:28:35:fc:44:f0:2f:e3:08:f5:db:b3:10: 10:5e:73:7d:ef:79:9b:50:9c:f2:54:32:ea:17:59:73: 29:fe:d2:19:9e:d8:b7:23:b2:3e:f6:4f:e6:25:b3:f0: e5:f3:19:32:ae:e8:a1:ed:33:f9:9c:bd:b8:47:49:26: 82:b4:92:53:66:da:41:e2:af:60:90:74:d3:07:95:6c: 65:79:25:15:95:9e:31:77:2e:e5:ff:ce:04:db:a9:01 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Key Usage Usages: Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-1 With RSA Encryption Signature: 3f:c0:72:d5:d7:cb:fa:59:84:d5:df:5e:41:5d:8f:d9: c1:20:44:21:29:68:bd:e3:b0:d0:42:23:64:2a:82:6a: b2:0b:35:82:76:71:94:fe:ba:aa:ea:bc:94:81:0f:1f: f7:aa:81:9d:88:ea:9d:ab:4d:52:ae:fc:1e:a8:bc:43: 2e:2d:9a:25:e8:5a:c0:53:ea:ea:e4:33:f1:fa:dc:4d: f0:1f:68:fa:6b:60:f3:75:a7:44:66:07:41:59:be:a3: a0:a1:aa:fc:39:b5:3b:b1:47:f4:9a:71:bf:ff:6e:c4: 9b:b7:e7:8f:fc:ef:ea:98:bc:f7:07:73:8f:d8:08:04: 82:f3:16:30:3a:a2:57:12:4b:7c:41:b6:94:96:fa:8c: 5c:8f:64:21:21:fd:36:cb:e9:4e:98:88:7c:99:6c:4e: bc:1c:77:73:a3:ed:86:47:fb:e8:5c:5f:59:92:bf:d2: 18:95:35:d6:f5:e8:7e:0e:71:3e:fa:21:1f:11:8a:a1: f0:f4:e7:e1:2d:c2:49:cb:c2:ab:56:b8:87:b2:1d:6d: b5:74:65:7e:13:cb:c8:07:f6:ee:b7:d0:cc:b8:40:db: 9b:65:c9:c0:f5:62:90:62:61:7a:5a:c7:73:ca:e1:65: 2a:43:6b:62:0b:10:ad:20:29:a3:4f:73:9f:a0:7a:5b Fingerprint (SHA-256): C1:CB:93:FA:F9:26:39:68:57:0E:02:E7:5A:65:20:37:9F:F4:72:57:F1:C5:A8:08:72:6A:F0:4D:59:40:D9:6C Fingerprint (SHA1): 48:FA:DF:4D:92:76:B9:29:EC:A0:EC:31:53:A9:1C:B9:C0:C1:E6:55 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=foo.example.fr,O=Foo,ST=CA,C=US" Returned value is 0, expected result is pass chains.sh: #1840: TrustAnchors: Verifying certificate(s) NameConstraints.dcissallowed.cert with flags -d trustanchorsDB -pp - PASSED chains.sh: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 vfychain -d trustanchorsDB -pp -vv -u 10 /builddir/build/BUILD/nss-3.90/nss/tests/libpkix/certs/NameConstraints.ocsp1.cert Chain is good! Root Certificate: Data: Version: 3 (0x2) Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Validity: Not Before: Fri Jan 22 00:19:34 2021 Not After : Sun Dec 29 00:19:34 2120 Subject: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20210120" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: e6:6f:f7:7c:67:4c:b7:97:6b:42:5a:ee:87:97:ed:5f: 67:c7:b9:00:04:1c:79:68:95:ff:81:5d:31:4f:64:96: ba:88:9c:7b:73:7f:0b:cd:01:73:32:1a:ab:43:c7:70: 34:06:31:16:b1:f3:4c:04:df:a4:85:e5:1a:71:ef:b2: e1:fc:51:6f:43:94:0f:84:63:01:49:9a:5a:cc:31:cc: 04:7f:db:90:cd:53:98:51:47:98:64:a9:7e:6b:0c:5f: cc:52:85:f8:39:a9:e8:8d:54:ed:92:81:03:e7:20:f3: e0:2d:d8:6e:fe:cf:7f:33:29:a5:cc:ca:af:c5:59:5b: 5a:56:f0:58:a9:1c:4c:ca:b9:3e:c7:f0:e8:22:ec:26: 20:3a:26:8f:3f:8d:5f:92:f7:d0:30:15:55:51:34:d4: 69:1c:b7:cb:8d:23:d3:53:34:66:76:18:46:a6:45:42: e6:83:cd:85:4b:97:a2:d2:0f:08:70:c8:64:6c:9f:82: 0b:90:a9:1c:78:07:fd:10:f0:7b:53:64:62:9e:70:4f: 06:7c:75:cc:f6:62:3c:3a:cd:ad:12:f1:fd:05:e2:af: 61:a4:05:0d:bb:f1:27:d5:27:d9:af:27:a1:4a:67:04: f1:c2:65:d7:60:7e:f9:ed:6b:e4:b1:1f:29:e6:9f:85 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Name: Certificate Subject Key ID Data: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Name: Certificate Authority Key Identifier Key ID: 3c:90:d1:e9:8a:85:46:e8:18:c8:74:fd:32:05:41:81: 79:51:fe:85 Issuer: Directory Name: "CN=Certificate Authority,C=US,O=IPA.LOCAL 20 210120" Serial Number: 00:bf:67:e6:2c:9f:8b:b1:32 Name: Certificate Name Constraints Critical: True Permitted Subtree: DNS name: ".ipa.local" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:10:67:7b:90:ba:82:ba:a4:da:04:9e:aa:5a:a8:89: 60:e7:5c:c7:8b:a9:3f:b9:0b:51:40:91:68:02:68:26: 51:a6:49:9b:0b:29:1c:7a:65:0f:d6:9e:96:50:c0:02: 34:3b:a9:5d:3f:a2:4d:fb:84:80:8e:a2:34:76:2b:a7: fa:f4:ea:b8:ce:d1:99:31:2e:6c:00:7d:51:36:d5:36: 61:94:67:22:39:24:af:d2:18:2b:db:6f:b7:e8:29:c6: 08:43:34:ed:77:d0:04:67:a4:dc:02:ba:29:5e:2a:ba: 7e:e4:d5:29:0d:c2:fb:0d:ef:bb:aa:f2:ff:72:93:a6: 24:17:7f:6e:ae:72:1d:1b:49:b7:9f:96:22:54:f8:f3: 63:45:81:70:f7:33:ab:e9:ee:89:32:b3:a4:9b:0b:c4: 6a:14:77:93:c2:78:55:6e:76:94:fa:9f:5a:25:b1:b8: c3:d6:23:69:74:d3:58:a3:89:58:4a:d2:14:15:8a:ca: fc:db:e8:14:94:ce:67:b5:c2:39:99:72:d3:51:ca:63: 15:2e:b6:31:9a:2f:f2:1c:8d:b6:81:93:3d:38:fc:53: 33:80:2b:20:b8:ad:13:f1:9b:14:0e:f0:ba:22:4f:10: a0:9e:1b:a3:47:65:92:dd:4a:59:16:eb:28:60:41:7c Fingerprint (SHA-256): 9E:8A:5A:63:46:99:EE:C7:A2:71:C1:B0:DE:82:16:A7:14:55:F9:A7:74:9C:F8:E4:27:5E:5F:B4:15:CD:C3:5C Fingerprint (SHA1): 25:E1:8D:5B:68:E0:A1:F3:32:1F:BA:8F:71:92:02:E2:4A:4C:AF:FD Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: Valid CA Trusted CA Trusted Client CA Email Flags: Valid CA Trusted CA Object Signing Flags: Valid CA Trusted CA Certificate 1 Subject: "CN=OCSP and IPSEC,O=IPA.LOCAL 20210120,C=US" Returned value is 0, expected result is pass chains.sh: #1841: TrustAnchors: Verifying certificate(s) NameConstraints.ocsp1.cert with flags -d trustanchorsDB -pp -u 10 - PASSED trying to kill httpserv with PID 23411 at Wed Oct 18 17:08:29 UTC 2023 kill -USR1 23411 httpserv: normal termination httpserv -b -p 10007 2>/dev/null; httpserv with PID 23411 killed at Wed Oct 18 17:08:29 UTC 2023 TIMESTAMP chains END: Wed Oct 18 17:08:29 UTC 2023 Running tests for ec TIMESTAMP ec BEGIN: Wed Oct 18 17:08:29 UTC 2023 Running ec tests for ecperf TIMESTAMP ecperf BEGIN: Wed Oct 18 17:08:29 UTC 2023 ecperf.sh: ecperf test =============================== ./ecperf.sh: line 43: ecperf: command not found ecperf.sh: #1: ec(perf) test - PASSED TIMESTAMP ecperf END: Wed Oct 18 17:08:29 UTC 2023 Running ec tests for ectest TIMESTAMP ectest BEGIN: Wed Oct 18 17:08:29 UTC 2023 ectest.sh: freebl and pk11 ectest tests =============================== No password file "../tests.pw" exists. Test curve25519 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #1: ec test certutil keygen - curve25519 - PASSED Test secp256r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #2: ec test certutil keygen - secp256r1 - PASSED Test secp384r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #3: ec test certutil keygen - secp384r1 - PASSED Test secp521r1 key generation using certutil ... Generating key. This may take a few moments... ectest.sh: #4: ec test certutil keygen - secp521r1 - PASSED Test sect571r1 key generation using certutil that should fail because it's not implemented ... Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_KEY: The key does not support the requested operation. ectest.sh: #5: ec test certutil keygen - secp521r1 - PASSED ectest.sh: #6: pk11 ec tests - PASSED TIMESTAMP ectest END: Wed Oct 18 17:08:32 UTC 2023 TIMESTAMP ec END: Wed Oct 18 17:08:32 UTC 2023 Running tests for %{do_gtests} TIMESTAMP %{do_gtests} BEGIN: Wed Oct 18 17:08:32 UTC 2023 ./all.sh: line 134: ./%{do_gtests}.sh: No such file or directory ./all.sh: line 134: cd: /builddir/build/BUILD/nss-3.90/nss/tests/%{do_gtests}: No such file or directory TIMESTAMP %{do_gtests} END: Wed Oct 18 17:08:32 UTC 2023 Running tests for %{do_ssl_gtests} TIMESTAMP %{do_ssl_gtests} BEGIN: Wed Oct 18 17:08:32 UTC 2023 ./all.sh: line 134: ./%{do_ssl_gtests}.sh: No such file or directory ./all.sh: line 134: cd: /builddir/build/BUILD/nss-3.90/nss/tests/%{do_ssl_gtests}: No such file or directory TIMESTAMP %{do_ssl_gtests} END: Wed Oct 18 17:08:32 UTC 2023 %{do_ssl_gtests}.sh: Testing with non-threadsafe softoken =============================== Running tests for ssl TIMESTAMP ssl BEGIN: Wed Oct 18 17:08:32 UTC 2023 cert.sh: Certutil and Crlutil Tests =============================== cert.sh: #1: Looking for root certs module. - PASSED cert.sh: Creating a CA Certificate TestCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -f ../tests.pw cert.sh: #2: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #3: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert TestCA -------------------------- certutil -s "CN=NSS Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #4: Creating CA Cert TestCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n TestCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -o root.cert cert.sh: #5: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -f ../tests.pw cert.sh: #6: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #7: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert serverCA -------------------------- certutil -s "CN=NSS Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA -t Cu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #8: Creating CA Cert serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -o root.cert cert.sh: #9: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating CA Cert chain-1-serverCA -------------------------- certutil -s "CN=NSS Chain1 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA -t u,u,u -v 600 -c serverCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #10: Creating CA Cert chain-1-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -o root.cert cert.sh: #11: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-serverCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating CA Cert chain-2-serverCA -------------------------- certutil -s "CN=NSS Chain2 Server Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA -t u,u,u -v 600 -c chain-1-serverCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #12: Creating CA Cert chain-2-serverCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-serverCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -o root.cert cert.sh: #13: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating CA Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -f ../tests.pw cert.sh: #14: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #15: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert clientCA -------------------------- certutil -s "CN=NSS Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA -t Tu,Cu,Cu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #16: Creating CA Cert clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -o root.cert cert.sh: #17: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-1-clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating CA Cert chain-1-clientCA -------------------------- certutil -s "CN=NSS Chain1 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA -t u,u,u -v 600 -c clientCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #18: Creating CA Cert chain-1-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-1-clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -o root.cert cert.sh: #19: Exporting Root Cert - PASSED cert.sh: Creating a CA Certificate chain-2-clientCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating CA Cert chain-2-clientCA -------------------------- certutil -s "CN=NSS Chain2 Client Test CA, O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA -t u,u,u -v 600 -c chain-1-clientCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #20: Creating CA Cert chain-2-clientCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n chain-2-clientCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -o root.cert cert.sh: #21: Exporting Root Cert - PASSED cert.sh: Creating a DSA CA Certificate TestCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating DSA CA Cert TestCA-dsa -------------------------- certutil -s "CN=NSS Test CA (DSA), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-dsa -k dsa -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #22: Creating DSA CA Cert TestCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n TestCA-dsa -r -d . -o dsaroot.cert cert.sh: #23: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating DSA CA Cert serverCA-dsa -------------------------- certutil -s "CN=NSS Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-dsa -k dsa -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #24: Creating DSA CA Cert serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #25: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating DSA CA Cert chain-1-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-dsa -k dsa -t u,u,u -v 600 -c serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #26: Creating DSA CA Cert chain-1-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #27: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-serverCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating DSA CA Cert chain-2-serverCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-serverCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #28: Creating DSA CA Cert chain-2-serverCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-serverCA-dsa -r -d . -o dsaroot.cert cert.sh: #29: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating DSA CA Cert clientCA-dsa -------------------------- certutil -s "CN=NSS Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-dsa -k dsa -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #30: Creating DSA CA Cert clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #31: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-1-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating DSA CA Cert chain-1-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-dsa -k dsa -t u,u,u -v 600 -c clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #32: Creating DSA CA Cert chain-1-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-1-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #33: Exporting DSA Root Cert - PASSED cert.sh: Creating a DSA CA Certificate chain-2-clientCA-dsa ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating DSA CA Cert chain-2-clientCA-dsa -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (DSA), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-dsa -k dsa -t u,u,u -v 600 -c chain-1-clientCA-dsa -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #34: Creating DSA CA Cert chain-2-clientCA-dsa - PASSED cert.sh: Exporting DSA Root Cert -------------------------- certutil -L -n chain-2-clientCA-dsa -r -d . -o dsaroot.cert cert.sh: #35: Exporting DSA Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss -k rsa --pss -Z SHA256 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #36: Creating RSA-PSS CA Cert TestCA-rsa-pss - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss -r -d . -o rsapssroot.cert cert.sh: #37: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an RSA-PSS CA Certificate TestCA-rsa-pss-sha1 ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 -------------------------- certutil -s "CN=NSS Test CA (RSA-PSS-SHA1), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-rsa-pss-sha1 -k rsa --pss -Z SHA1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #38: Creating RSA-PSS CA Cert TestCA-rsa-pss-sha1 - PASSED cert.sh: Exporting RSA-PSS Root Cert -------------------------- certutil -L -n TestCA-rsa-pss-sha1 -r -d . -o rsapssroot.cert cert.sh: #39: Exporting RSA-PSS Root Cert - PASSED cert.sh: Creating an EC CA Certificate TestCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating EC CA Cert TestCA-ec -------------------------- certutil -s "CN=NSS Test CA (ECC), O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n TestCA-ec -k ec -q secp521r1 -t CTu,CTu,CTu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #40: Creating EC CA Cert TestCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n TestCA-ec -r -d . -o ecroot.cert cert.sh: #41: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating EC CA Cert serverCA-ec -------------------------- certutil -s "CN=NSS Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n serverCA-ec -k ec -q secp521r1 -t Cu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #42: Creating EC CA Cert serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n serverCA-ec -r -d . -o ecroot.cert cert.sh: #43: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating EC CA Cert chain-1-serverCA-ec -------------------------- certutil -s "CN=NSS Chain1 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 3 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #44: Creating EC CA Cert chain-1-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-serverCA-ec -r -d . -o ecroot.cert cert.sh: #45: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-serverCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA cert.sh: Creating EC CA Cert chain-2-serverCA-ec -------------------------- certutil -s "CN=NSS Chain2 Server Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-serverCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-serverCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 4 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #46: Creating EC CA Cert chain-2-serverCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-serverCA-ec -r -d . -o ecroot.cert cert.sh: #47: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating EC CA Cert clientCA-ec -------------------------- certutil -s "CN=NSS Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n clientCA-ec -k ec -q secp521r1 -t Tu,Cu,Cu -v 600 -x -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 5 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #48: Creating EC CA Cert clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n clientCA-ec -r -d . -o ecroot.cert cert.sh: #49: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-1-clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating EC CA Cert chain-1-clientCA-ec -------------------------- certutil -s "CN=NSS Chain1 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-1-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 6 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #50: Creating EC CA Cert chain-1-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-1-clientCA-ec -r -d . -o ecroot.cert cert.sh: #51: Exporting EC Root Cert - PASSED cert.sh: Creating an EC CA Certificate chain-2-clientCA-ec ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA cert.sh: Creating EC CA Cert chain-2-clientCA-ec -------------------------- certutil -s "CN=NSS Chain2 Client Test CA (ECC), O=BOGUS NSS, L=Santa Clara, ST=California, C=US" -S -n chain-2-clientCA-ec -k ec -q secp521r1 -t u,u,u -v 600 -c chain-1-clientCA-ec -d . -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 7 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #52: Creating EC CA Cert chain-2-clientCA-ec - PASSED cert.sh: Exporting EC Root Cert -------------------------- certutil -L -n chain-2-clientCA-ec -r -d . -o ecroot.cert cert.sh: #53: Exporting EC Root Cert - PASSED cert.sh: test implicit database init cert.sh: Add cert with trust flags to db with implicit init -------------------------- certutil -A -n ca -t C,C,C -d ../implicit_init -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA.ca.cert cert.sh: #54: Add cert with trust flags to db with implicit init - PASSED cert.sh: Creating Certificates, issued by the last =============== of a chain of CA's which are not in the same database============ Server Cert cert.sh: Initializing localhost.localdomain's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw cert.sh: #55: Initializing localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #56: Loading root cert module to localhost.localdomain's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #57: Generate Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #58: Sign localhost.localdomain's Request (ext) - PASSED cert.sh: Import localhost.localdomain's Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #59: Import localhost.localdomain's Cert -t u,u,u (ext) - PASSED cert.sh: Import Client Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA.ca.cert cert.sh: #60: Import Client Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #61: Generate DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA-dsa -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #62: Sign localhost.localdomain's DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #63: Import localhost.localdomain's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-dsa.ca.cert cert.sh: #64: Import Client DSA Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #65: Generate mixed DSA Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 202 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #66: Sign localhost.localdomain's mixed DSA Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #67: Import localhost.localdomain's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #68: Generate EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA-ec -m 200 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #69: Sign localhost.localdomain's EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #70: Import localhost.localdomain's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) -------------------------- certutil -A -n clientCA-ec -t T,, -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-ec.ca.cert cert.sh: #71: Import Client EC Root CA -t T,, for localhost.localdomain (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for localhost.localdomain (ext) -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #72: Generate mixed EC Cert Request for localhost.localdomain (ext) - PASSED cert.sh: Sign localhost.localdomain's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-serverCA -m 201 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #73: Sign localhost.localdomain's mixed EC Request (ext) - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #74: Import localhost.localdomain's mixed EC Cert -t u,u,u (ext) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #75: Ensure there's exactly one match for localhost.localdomain-dsamixed - PASSED cert.sh: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname -------------------------- certutil -A -n localhost.localdomain-repeated-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #76: Repeated import of localhost.localdomain's mixed DSA Cert with different nickname - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #77: Ensure there's still exactly one match for localhost.localdomain-dsamixed - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -f ../tests.pw -L Certificate Nickname Trust Attributes SSL,S/MIME,JAR/XPI localhost.localdomain u,u,u clientCA T,, localhost.localdomain-dsamixed u,u,u localhost.localdomain-ec u,u,u clientCA-ec T,, localhost.localdomain-dsa u,u,u clientCA-dsa T,, localhost.localdomain-ecmixed u,u,u cert.sh: #78: Ensure there's zero matches for localhost.localdomain-repeated-dsamixed - PASSED Importing all the server's own CA chain into the servers DB cert.sh: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA.ca.cert cert.sh: #79: Import serverCA CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/chain-2-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #80: Import chain-2-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/chain-1-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #81: Import chain-1-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/chain-1-serverCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #82: Import chain-1-serverCA-dsa CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/chain-2-serverCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #83: Import chain-2-serverCA CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-dsa.ca.cert cert.sh: #84: Import serverCA-dsa CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-2-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/chain-2-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #85: Import chain-2-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED cert.sh: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-ec.ca.cert cert.sh: #86: Import serverCA-ec CA -t C,C,C for localhost.localdomain (ext.) - PASSED cert.sh: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) -------------------------- certutil -A -n chain-1-serverCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/chain-1-serverCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #87: Import chain-1-serverCA-ec CA -t u,u,u for localhost.localdomain (ext.) - PASSED Client Cert cert.sh: Initializing ExtendedSSLUser's Cert DB (ext.) -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw cert.sh: #88: Initializing ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #89: Loading root cert module to ExtendedSSLUser's Cert DB (ext.) - PASSED cert.sh: Generate Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #90: Generate Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser.cert -f ../tests.pw cert.sh: #91: Sign ExtendedSSLUser's Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #92: Import ExtendedSSLUser's Cert -t u,u,u (ext) - PASSED cert.sh: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA.ca.cert cert.sh: #93: Import Server Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #94: Generate DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA-dsa -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-dsa.cert -f ../tests.pw cert.sh: #95: Sign ExtendedSSLUser's DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #96: Import ExtendedSSLUser's DSA Cert -t u,u,u (ext) - PASSED cert.sh: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-dsa -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-dsa.ca.cert cert.sh: #97: Import Server DSA Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -k dsa -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #98: Generate mixed DSA Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed DSA Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 302 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-dsamixed.cert -f ../tests.pw cert.sh: #99: Sign ExtendedSSLUser's mixed DSA Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #100: Import ExtendedSSLUser's mixed DSA Cert -t u,u,u (ext) - PASSED cert.sh: Generate EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #101: Generate EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA-ec -m 300 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-ec.cert -f ../tests.pw cert.sh: #102: Sign ExtendedSSLUser's EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #103: Import ExtendedSSLUser's EC Cert -t u,u,u (ext) - PASSED cert.sh: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n serverCA-ec -t C,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA/serverCA-ec.ca.cert cert.sh: #104: Import Server EC Root CA -t C,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Generate mixed EC Cert Request for ExtendedSSLUser (ext) -------------------------- certutil -s "CN=ExtendedSSLUser, E=ExtendedSSLUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -k ec -q secp256r1 -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #105: Generate mixed EC Cert Request for ExtendedSSLUser (ext) - PASSED cert.sh: Sign ExtendedSSLUser's mixed EC Request (ext) -------------------------- certutil -C -c chain-2-clientCA -m 301 -v 60 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA -i req -o ExtendedSSLUser-ecmixed.cert -f ../tests.pw cert.sh: #106: Sign ExtendedSSLUser's mixed EC Request (ext) - PASSED cert.sh: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) -------------------------- certutil -A -n ExtendedSSLUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -f ../tests.pw -i ExtendedSSLUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #107: Import ExtendedSSLUser's mixed EC Cert -t u,u,u (ext) - PASSED Importing all the client's own CA chain into the servers DB cert.sh: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/chain-2-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #108: Import chain-2-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/chain-2-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #109: Import chain-2-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-ec -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-ec.ca.cert cert.sh: #110: Import clientCA-ec CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA-dsa -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA-dsa.ca.cert cert.sh: #111: Import clientCA-dsa CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-dsa -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/chain-1-clientCA-dsa.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #112: Import chain-1-clientCA-dsa CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-2-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/chain-2-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #113: Import chain-2-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/chain-1-clientCA.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #114: Import chain-1-clientCA CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) -------------------------- certutil -A -n clientCA -t T,C,C -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/clientCA.ca.cert cert.sh: #115: Import clientCA CA -t T,C,C for ExtendedSSLUser (ext.) - PASSED cert.sh: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) -------------------------- certutil -A -n chain-1-clientCA-ec -t u,u,u -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -i /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/clientCA/chain-1-clientCA-ec.ca.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #116: Import chain-1-clientCA-ec CA -t u,u,u for ExtendedSSLUser (ext.) - PASSED cert.sh SUCCESS: EXT passed cert.sh: Creating Client CA Issued Certificates =============== cert.sh: Initializing TestUser's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw cert.sh: #117: Initializing TestUser's Cert DB - PASSED cert.sh: Loading root cert module to TestUser's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #118: Loading root cert module to TestUser's Cert DB - PASSED cert.sh: Import Root CA for TestUser -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -i ../CA/TestCA.ca.cert cert.sh: #119: Import Root CA for TestUser - PASSED cert.sh: Import DSA Root CA for TestUser -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -i ../CA/TestCA-dsa.ca.cert cert.sh: #120: Import DSA Root CA for TestUser - PASSED cert.sh: Import EC Root CA for TestUser -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -i ../CA/TestCA-ec.ca.cert cert.sh: #121: Import EC Root CA for TestUser - PASSED cert.sh: Generate Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #122: Generate Cert Request for TestUser - PASSED cert.sh: Sign TestUser's Request -------------------------- certutil -C -c TestCA -m 70 -v 60 -d ../CA -i req -o TestUser.cert -f ../tests.pw cert.sh: #123: Sign TestUser's Request - PASSED cert.sh: Import TestUser's Cert -------------------------- certutil -A -n TestUser -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #124: Import TestUser's Cert - PASSED cert.sh SUCCESS: TestUser's Cert Created cert.sh: Generate DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #125: Generate DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 70 -v 60 -d ../CA -i req -o TestUser-dsa.cert -f ../tests.pw cert.sh: #126: Sign TestUser's DSA Request - PASSED cert.sh: Import TestUser's DSA Cert -------------------------- certutil -A -n TestUser-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #127: Import TestUser's DSA Cert - PASSED cert.sh SUCCESS: TestUser's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #128: Generate mixed DSA Cert Request for TestUser - PASSED cert.sh: Sign TestUser's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20070 -v 60 -d ../CA -i req -o TestUser-dsamixed.cert -f ../tests.pw cert.sh: #129: Sign TestUser's DSA Request with RSA - PASSED cert.sh: Import TestUser's mixed DSA Cert -------------------------- certutil -A -n TestUser-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #130: Import TestUser's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #131: Generate EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request -------------------------- certutil -C -c TestCA-ec -m 70 -v 60 -d ../CA -i req -o TestUser-ec.cert -f ../tests.pw cert.sh: #132: Sign TestUser's EC Request - PASSED cert.sh: Import TestUser's EC Cert -------------------------- certutil -A -n TestUser-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #133: Import TestUser's EC Cert - PASSED cert.sh SUCCESS: TestUser's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #134: Generate mixed EC Cert Request for TestUser - PASSED cert.sh: Sign TestUser's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10070 -v 60 -d ../CA -i req -o TestUser-ecmixed.cert -f ../tests.pw cert.sh: #135: Sign TestUser's EC Request with RSA - PASSED cert.sh: Import TestUser's mixed EC Cert -------------------------- certutil -A -n TestUser-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #136: Import TestUser's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser -------------------------- certutil -s "CN=TestUser, E=TestUser-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #137: Generate RSA-PSS Cert Request for TestUser - PASSED cert.sh: Sign TestUser's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30070 -v 60 -d ../CA -i req -o TestUser-rsa-pss.cert -f ../tests.pw cert.sh: #138: Sign TestUser's RSA-PSS Request - PASSED cert.sh: Import TestUser's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #139: Import TestUser's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain ------------------------------------ cert.sh: Initializing localhost.localdomain's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #140: Initializing localhost.localdomain's Cert DB - PASSED cert.sh: Loading root cert module to localhost.localdomain's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #141: Loading root cert module to localhost.localdomain's Cert DB - PASSED cert.sh: Import Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -i ../CA/TestCA.ca.cert cert.sh: #142: Import Root CA for localhost.localdomain - PASSED cert.sh: Import DSA Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -i ../CA/TestCA-dsa.ca.cert cert.sh: #143: Import DSA Root CA for localhost.localdomain - PASSED cert.sh: Import EC Root CA for localhost.localdomain -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -i ../CA/TestCA-ec.ca.cert cert.sh: #144: Import EC Root CA for localhost.localdomain - PASSED cert.sh: Generate Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #145: Generate Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's Request -------------------------- certutil -C -c TestCA -m 100 -v 60 -d ../CA -i req -o localhost.localdomain.cert -f ../tests.pw cert.sh: #146: Sign localhost.localdomain's Request - PASSED cert.sh: Import localhost.localdomain's Cert -------------------------- certutil -A -n localhost.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #147: Import localhost.localdomain's Cert - PASSED cert.sh SUCCESS: localhost.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #148: Generate DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-dsa.cert -f ../tests.pw cert.sh: #149: Sign localhost.localdomain's DSA Request - PASSED cert.sh: Import localhost.localdomain's DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #150: Import localhost.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #151: Generate mixed DSA Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20100 -v 60 -d ../CA -i req -o localhost.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #152: Sign localhost.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #153: Import localhost.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #154: Generate EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 100 -v 60 -d ../CA -i req -o localhost.localdomain-ec.cert -f ../tests.pw cert.sh: #155: Sign localhost.localdomain's EC Request - PASSED cert.sh: Import localhost.localdomain's EC Cert -------------------------- certutil -A -n localhost.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #156: Import localhost.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #157: Generate mixed EC Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10100 -v 60 -d ../CA -i req -o localhost.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #158: Sign localhost.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #159: Import localhost.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost.localdomain -------------------------- certutil -s "CN=localhost.localdomain, E=localhost.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #160: Generate RSA-PSS Cert Request for localhost.localdomain - PASSED cert.sh: Sign localhost.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30100 -v 60 -d ../CA -i req -o localhost.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #161: Sign localhost.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #162: Import localhost.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost.localdomain's RSA-PSS Cert Created cert.sh: Creating Server CA Issued Certificate for \ localhost.localdomain-sni -------------------------------- cert.sh: Generate Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #163: Generate Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's Request -------------------------- certutil -C -c TestCA -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain.cert -f ../tests.pw cert.sh: #164: Sign localhost-sni.localdomain's Request - PASSED cert.sh: Import localhost-sni.localdomain's Cert -------------------------- certutil -A -n localhost-sni.localdomain -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #165: Import localhost-sni.localdomain's Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's Cert Created cert.sh: Generate DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #166: Generate DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsa.cert -f ../tests.pw cert.sh: #167: Sign localhost-sni.localdomain's DSA Request - PASSED cert.sh: Import localhost-sni.localdomain's DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #168: Import localhost-sni.localdomain's DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #169: Generate mixed DSA Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-dsamixed.cert -f ../tests.pw cert.sh: #170: Sign localhost-sni.localdomain's DSA Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed DSA Cert -------------------------- certutil -A -n localhost-sni.localdomain-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #171: Import localhost-sni.localdomain's mixed DSA Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed DSA Cert Created cert.sh: Generate EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #172: Generate EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request -------------------------- certutil -C -c TestCA-ec -m 101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ec.cert -f ../tests.pw cert.sh: #173: Sign localhost-sni.localdomain's EC Request - PASSED cert.sh: Import localhost-sni.localdomain's EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #174: Import localhost-sni.localdomain's EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's EC Cert Created cert.sh: Generate mixed EC Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #175: Generate mixed EC Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-ecmixed.cert -f ../tests.pw cert.sh: #176: Sign localhost-sni.localdomain's EC Request with RSA - PASSED cert.sh: Import localhost-sni.localdomain's mixed EC Cert -------------------------- certutil -A -n localhost-sni.localdomain-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #177: Import localhost-sni.localdomain's mixed EC Cert - PASSED cert.sh SUCCESS: localhost-sni.localdomain's mixed EC Cert Created Importing RSA-PSS server certificate Import localhost-sni.localdomain's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for localhost-sni.localdomain -------------------------- certutil -s "CN=localhost-sni.localdomain, E=localhost-sni.localdomain-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #178: Generate RSA-PSS Cert Request for localhost-sni.localdomain - PASSED cert.sh: Sign localhost-sni.localdomain's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30101 -v 60 -d ../CA -i req -o localhost-sni.localdomain-rsa-pss.cert -f ../tests.pw cert.sh: #179: Sign localhost-sni.localdomain's RSA-PSS Request - PASSED cert.sh: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n localhost-sni.localdomain-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw -i localhost-sni.localdomain-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #180: Import localhost-sni.localdomain's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: localhost-sni.localdomain's RSA-PSS Cert Created cert.sh: Modify trust attributes of Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #181: Modify trust attributes of Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of DSA Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-dsa -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #182: Modify trust attributes of DSA Root CA -t TC,TC,TC - PASSED cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -M -n TestCA-ec -t TC,TC,TC -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -f ../tests.pw cert.sh: #183: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh SUCCESS: SSL passed cert.sh: Creating database for OCSP stapling tests =============== cp -r /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/stapling Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -o ../stapling/ca.p12 -n TestCA -k ../tests.pw -w ../tests.pw -d ../CA pk12util: PKCS12 EXPORT SUCCESSFUL Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- pk12util -i ../stapling/ca.p12 -k ../tests.pw -w ../tests.pw -d ../stapling pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Creating database for strsclnt no login tests =============== cp -r /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/nologin cert.sh: Modify trust attributes of EC Root CA -t TC,TC,TC -------------------------- certutil -W -d ../nologin -f ../tests.pw -@ ../tests_empty Password changed successfully. cert.sh: #184: Modify trust attributes of EC Root CA -t TC,TC,TC - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -k ec -q nistp256 -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server Generating key. This may take a few moments... cert.sh: #185: Create orphan key in serverdir - PASSED cert.sh: Delete orphan key -------------------------- certutil -F -f ../tests.pw -k 90bcfe70432a5dbe0a425c5788dfe8ff2db5367c -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server cert.sh: #186: Delete orphan key - PASSED cert.sh: Create orphan key in serverdir -------------------------- certutil -G -f ../tests.pw -z ../tests_noise -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server Generating key. This may take a few moments... cert.sh: #187: Create orphan key in serverdir - PASSED cert.sh: Create cert request for orphan key -------------------------- certutil -R -f ../tests.pw -k 6d90f0b7140a73b9907ece4ab1c233a14307704d -s CN=orphan -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/orphan.req cert.sh: #188: Create cert request for orphan key - PASSED Certificate Request: Data: Version: 0 (0x0) Subject: "CN=orphan" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d9:a0:8f:bf:fd:58:74:98:c2:da:48:5a:0b:1c:26:3c: b0:e2:ac:af:b1:53:0f:30:6b:d6:8e:2a:9f:8c:28:e2: 01:89:28:c9:00:84:c0:2a:0a:d2:47:29:ec:11:50:7e: 7b:72:a8:37:e0:e7:31:b5:3c:2b:e2:22:08:a3:ba:6e: a6:dd:49:89:d6:f3:bd:11:52:35:68:84:8c:ae:8f:f7: bb:40:46:d0:7f:22:86:10:e0:8f:3d:4c:bb:4c:69:a8: b0:45:76:d5:b6:b7:2d:dd:c2:12:7c:40:4a:4c:bc:df: 5b:94:04:c4:bf:28:2b:1c:ce:df:4b:96:d7:2f:28:c1: 03:56:74:f5:2b:63:6c:aa:74:72:ce:09:00:1d:b2:e5: be:59:14:96:2d:d9:09:99:f5:c9:96:fb:f3:f0:6d:97: 21:ac:4b:98:0a:b2:ef:22:40:07:c4:d9:91:a1:dd:d2: ba:8b:e7:8d:51:d8:a1:9a:d5:fe:66:04:be:74:df:dd: 01:c1:ad:2b:f0:d4:99:6c:c0:94:85:54:7e:86:48:90: ee:8c:a4:29:30:a2:e3:22:ae:38:e8:f5:1d:d4:e6:2e: b4:8a:37:fa:be:da:91:12:e7:eb:37:9a:2a:ec:f4:a6: ec:09:c5:d6:83:1e:19:c7:98:e0:8a:44:05:ae:97:23 Exponent: 65537 (0x10001) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 85:24:8e:3d:31:16:53:33:67:7e:45:c5:c6:f2:69:4a: d0:21:d0:25:e0:07:34:12:c5:a1:22:12:eb:3e:ff:57: 3d:80:a6:31:2b:60:22:5f:7d:17:03:ab:07:df:52:f6: db:46:49:8e:4a:f1:58:e4:03:8a:3e:c0:f1:94:9c:e1: 17:d7:e3:56:6a:73:32:8e:58:16:3b:c6:0f:20:2a:61: 64:b7:0e:4b:64:22:0a:80:ab:1c:55:b2:c5:75:3e:e9: 36:ec:1d:60:b6:7c:fd:7f:19:49:6b:a1:ab:58:a6:d5: f1:59:8b:3f:5f:69:2d:65:12:6e:35:ef:be:49:6c:81: 3a:01:13:c9:95:07:c8:a7:38:34:92:c7:ee:e8:df:10: 00:32:11:28:3f:72:7f:6d:d1:7b:f7:d0:09:e1:ff:e0: 0a:0c:e7:92:e3:99:79:86:f0:cb:6e:b8:43:4e:93:e0: 80:ab:90:c7:4d:2d:2b:62:a1:13:63:12:c7:ec:c8:ba: d4:f7:cc:36:2c:4e:2a:9f:ad:c4:3a:f4:14:83:f6:16: 5d:6f:1c:17:5c:74:d6:3a:cf:16:2a:e6:90:c5:1d:f6: 55:66:26:5d:de:50:28:7e:bc:ff:07:b9:7c:d1:e9:a3: ec:6d:03:c4:17:ae:2e:1e:64:55:da:13:9e:d8:13:e8 Fingerprint (SHA-256): 28:24:8D:DE:A0:3B:0A:B6:1C:6E:BC:34:5C:AE:8B:89:54:B5:7B:81:F6:07:5C:B5:20:E3:17:77:73:E1:62:A5 Fingerprint (SHA1): 62:C1:77:04:2C:2B:DD:D9:68:E4:90:5B:1C:60:47:62:90:D9:8E:F3 cert.sh: Creating Client CA Issued Certificates ============== cert.sh: Initializing Alice's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw cert.sh: #189: Initializing Alice's Cert DB - PASSED cert.sh: Loading root cert module to Alice's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #190: Loading root cert module to Alice's Cert DB - PASSED cert.sh: Import Root CA for Alice -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -i ../CA/TestCA.ca.cert cert.sh: #191: Import Root CA for Alice - PASSED cert.sh: Import DSA Root CA for Alice -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -i ../CA/TestCA-dsa.ca.cert cert.sh: #192: Import DSA Root CA for Alice - PASSED cert.sh: Import EC Root CA for Alice -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -i ../CA/TestCA-ec.ca.cert cert.sh: #193: Import EC Root CA for Alice - PASSED cert.sh: Generate Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #194: Generate Cert Request for Alice - PASSED cert.sh: Sign Alice's Request -------------------------- certutil -C -c TestCA -m 30 -v 60 -d ../CA -i req -o Alice.cert -f ../tests.pw cert.sh: #195: Sign Alice's Request - PASSED cert.sh: Import Alice's Cert -------------------------- certutil -A -n Alice -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #196: Import Alice's Cert - PASSED cert.sh SUCCESS: Alice's Cert Created cert.sh: Generate DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #197: Generate DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 30 -v 60 -d ../CA -i req -o Alice-dsa.cert -f ../tests.pw cert.sh: #198: Sign Alice's DSA Request - PASSED cert.sh: Import Alice's DSA Cert -------------------------- certutil -A -n Alice-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #199: Import Alice's DSA Cert - PASSED cert.sh SUCCESS: Alice's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #200: Generate mixed DSA Cert Request for Alice - PASSED cert.sh: Sign Alice's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20030 -v 60 -d ../CA -i req -o Alice-dsamixed.cert -f ../tests.pw cert.sh: #201: Sign Alice's DSA Request with RSA - PASSED cert.sh: Import Alice's mixed DSA Cert -------------------------- certutil -A -n Alice-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #202: Import Alice's mixed DSA Cert - PASSED cert.sh SUCCESS: Alice's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #203: Generate EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request -------------------------- certutil -C -c TestCA-ec -m 30 -v 60 -d ../CA -i req -o Alice-ec.cert -f ../tests.pw cert.sh: #204: Sign Alice's EC Request - PASSED cert.sh: Import Alice's EC Cert -------------------------- certutil -A -n Alice-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #205: Import Alice's EC Cert - PASSED cert.sh SUCCESS: Alice's EC Cert Created cert.sh: Generate mixed EC Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #206: Generate mixed EC Cert Request for Alice - PASSED cert.sh: Sign Alice's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10030 -v 60 -d ../CA -i req -o Alice-ecmixed.cert -f ../tests.pw cert.sh: #207: Sign Alice's EC Request with RSA - PASSED cert.sh: Import Alice's mixed EC Cert -------------------------- certutil -A -n Alice-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #208: Import Alice's mixed EC Cert - PASSED cert.sh SUCCESS: Alice's mixed EC Cert Created Importing RSA-PSS server certificate Import Alice's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Alice -------------------------- certutil -s "CN=Alice, E=Alice-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #209: Generate RSA-PSS Cert Request for Alice - PASSED cert.sh: Sign Alice's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30030 -v 60 -d ../CA -i req -o Alice-rsa-pss.cert -f ../tests.pw cert.sh: #210: Sign Alice's RSA-PSS Request - PASSED cert.sh: Import Alice's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Alice-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/alicedir -f ../tests.pw -i Alice-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #211: Import Alice's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Alice's RSA-PSS Cert Created cert.sh: Initializing Bob's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw cert.sh: #212: Initializing Bob's Cert DB - PASSED cert.sh: Loading root cert module to Bob's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #213: Loading root cert module to Bob's Cert DB - PASSED cert.sh: Import Root CA for Bob -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -i ../CA/TestCA.ca.cert cert.sh: #214: Import Root CA for Bob - PASSED cert.sh: Import DSA Root CA for Bob -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -i ../CA/TestCA-dsa.ca.cert cert.sh: #215: Import DSA Root CA for Bob - PASSED cert.sh: Import EC Root CA for Bob -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -i ../CA/TestCA-ec.ca.cert cert.sh: #216: Import EC Root CA for Bob - PASSED cert.sh: Generate Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #217: Generate Cert Request for Bob - PASSED cert.sh: Sign Bob's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o Bob.cert -f ../tests.pw cert.sh: #218: Sign Bob's Request - PASSED cert.sh: Import Bob's Cert -------------------------- certutil -A -n Bob -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #219: Import Bob's Cert - PASSED cert.sh SUCCESS: Bob's Cert Created cert.sh: Generate DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #220: Generate DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o Bob-dsa.cert -f ../tests.pw cert.sh: #221: Sign Bob's DSA Request - PASSED cert.sh: Import Bob's DSA Cert -------------------------- certutil -A -n Bob-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #222: Import Bob's DSA Cert - PASSED cert.sh SUCCESS: Bob's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #223: Generate mixed DSA Cert Request for Bob - PASSED cert.sh: Sign Bob's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o Bob-dsamixed.cert -f ../tests.pw cert.sh: #224: Sign Bob's DSA Request with RSA - PASSED cert.sh: Import Bob's mixed DSA Cert -------------------------- certutil -A -n Bob-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #225: Import Bob's mixed DSA Cert - PASSED cert.sh SUCCESS: Bob's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #226: Generate EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o Bob-ec.cert -f ../tests.pw cert.sh: #227: Sign Bob's EC Request - PASSED cert.sh: Import Bob's EC Cert -------------------------- certutil -A -n Bob-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #228: Import Bob's EC Cert - PASSED cert.sh SUCCESS: Bob's EC Cert Created cert.sh: Generate mixed EC Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #229: Generate mixed EC Cert Request for Bob - PASSED cert.sh: Sign Bob's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o Bob-ecmixed.cert -f ../tests.pw cert.sh: #230: Sign Bob's EC Request with RSA - PASSED cert.sh: Import Bob's mixed EC Cert -------------------------- certutil -A -n Bob-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #231: Import Bob's mixed EC Cert - PASSED cert.sh SUCCESS: Bob's mixed EC Cert Created Importing RSA-PSS server certificate Import Bob's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Bob -------------------------- certutil -s "CN=Bob, E=Bob-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #232: Generate RSA-PSS Cert Request for Bob - PASSED cert.sh: Sign Bob's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o Bob-rsa-pss.cert -f ../tests.pw cert.sh: #233: Sign Bob's RSA-PSS Request - PASSED cert.sh: Import Bob's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Bob-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/bobdir -f ../tests.pw -i Bob-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #234: Import Bob's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Bob's RSA-PSS Cert Created cert.sh: Creating Dave's Certificate ------------------------- cert.sh: Initializing Dave's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw cert.sh: #235: Initializing Dave's Cert DB - PASSED cert.sh: Loading root cert module to Dave's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #236: Loading root cert module to Dave's Cert DB - PASSED cert.sh: Import Root CA for Dave -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -i ../CA/TestCA.ca.cert cert.sh: #237: Import Root CA for Dave - PASSED cert.sh: Import DSA Root CA for Dave -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -i ../CA/TestCA-dsa.ca.cert cert.sh: #238: Import DSA Root CA for Dave - PASSED cert.sh: Import EC Root CA for Dave -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -i ../CA/TestCA-ec.ca.cert cert.sh: #239: Import EC Root CA for Dave - PASSED cert.sh: Generate Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #240: Generate Cert Request for Dave - PASSED cert.sh: Sign Dave's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o Dave.cert -f ../tests.pw cert.sh: #241: Sign Dave's Request - PASSED cert.sh: Import Dave's Cert -------------------------- certutil -A -n Dave -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #242: Import Dave's Cert - PASSED cert.sh SUCCESS: Dave's Cert Created cert.sh: Generate DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #243: Generate DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o Dave-dsa.cert -f ../tests.pw cert.sh: #244: Sign Dave's DSA Request - PASSED cert.sh: Import Dave's DSA Cert -------------------------- certutil -A -n Dave-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #245: Import Dave's DSA Cert - PASSED cert.sh SUCCESS: Dave's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #246: Generate mixed DSA Cert Request for Dave - PASSED cert.sh: Sign Dave's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o Dave-dsamixed.cert -f ../tests.pw cert.sh: #247: Sign Dave's DSA Request with RSA - PASSED cert.sh: Import Dave's mixed DSA Cert -------------------------- certutil -A -n Dave-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #248: Import Dave's mixed DSA Cert - PASSED cert.sh SUCCESS: Dave's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #249: Generate EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o Dave-ec.cert -f ../tests.pw cert.sh: #250: Sign Dave's EC Request - PASSED cert.sh: Import Dave's EC Cert -------------------------- certutil -A -n Dave-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #251: Import Dave's EC Cert - PASSED cert.sh SUCCESS: Dave's EC Cert Created cert.sh: Generate mixed EC Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #252: Generate mixed EC Cert Request for Dave - PASSED cert.sh: Sign Dave's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o Dave-ecmixed.cert -f ../tests.pw cert.sh: #253: Sign Dave's EC Request with RSA - PASSED cert.sh: Import Dave's mixed EC Cert -------------------------- certutil -A -n Dave-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #254: Import Dave's mixed EC Cert - PASSED cert.sh SUCCESS: Dave's mixed EC Cert Created Importing RSA-PSS server certificate Import Dave's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Dave -------------------------- certutil -s "CN=Dave, E=Dave-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #255: Generate RSA-PSS Cert Request for Dave - PASSED cert.sh: Sign Dave's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o Dave-rsa-pss.cert -f ../tests.pw cert.sh: #256: Sign Dave's RSA-PSS Request - PASSED cert.sh: Import Dave's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Dave-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dave -f ../tests.pw -i Dave-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #257: Import Dave's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Dave's RSA-PSS Cert Created cert.sh: Creating multiEmail's Certificate -------------------- cert.sh: Initializing Eve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw cert.sh: #258: Initializing Eve's Cert DB - PASSED cert.sh: Loading root cert module to Eve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #259: Loading root cert module to Eve's Cert DB - PASSED cert.sh: Import Root CA for Eve -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -i ../CA/TestCA.ca.cert cert.sh: #260: Import Root CA for Eve - PASSED cert.sh: Import DSA Root CA for Eve -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -i ../CA/TestCA-dsa.ca.cert cert.sh: #261: Import DSA Root CA for Eve - PASSED cert.sh: Import EC Root CA for Eve -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -i ../CA/TestCA-ec.ca.cert cert.sh: #262: Import EC Root CA for Eve - PASSED cert.sh: Generate Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #263: Generate Cert Request for Eve - PASSED cert.sh: Sign Eve's Request -------------------------- certutil -C -c TestCA -m 60 -v 60 -d ../CA -i req -o Eve.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #264: Sign Eve's Request - PASSED cert.sh: Import Eve's Cert -------------------------- certutil -A -n Eve -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #265: Import Eve's Cert - PASSED cert.sh SUCCESS: Eve's Cert Created cert.sh: Generate DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #266: Generate DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 60 -v 60 -d ../CA -i req -o Eve-dsa.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #267: Sign Eve's DSA Request - PASSED cert.sh: Import Eve's DSA Cert -------------------------- certutil -A -n Eve-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #268: Import Eve's DSA Cert - PASSED cert.sh SUCCESS: Eve's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #269: Generate mixed DSA Cert Request for Eve - PASSED cert.sh: Sign Eve's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20060 -v 60 -d ../CA -i req -o Eve-dsamixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #270: Sign Eve's DSA Request with RSA - PASSED cert.sh: Import Eve's mixed DSA Cert -------------------------- certutil -A -n Eve-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #271: Import Eve's mixed DSA Cert - PASSED cert.sh SUCCESS: Eve's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #272: Generate EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request -------------------------- certutil -C -c TestCA-ec -m 60 -v 60 -d ../CA -i req -o Eve-ec.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #273: Sign Eve's EC Request - PASSED cert.sh: Import Eve's EC Cert -------------------------- certutil -A -n Eve-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #274: Import Eve's EC Cert - PASSED cert.sh SUCCESS: Eve's EC Cert Created cert.sh: Generate mixed EC Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #275: Generate mixed EC Cert Request for Eve - PASSED cert.sh: Sign Eve's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10060 -v 60 -d ../CA -i req -o Eve-ecmixed.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #276: Sign Eve's EC Request with RSA - PASSED cert.sh: Import Eve's mixed EC Cert -------------------------- certutil -A -n Eve-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #277: Import Eve's mixed EC Cert - PASSED cert.sh SUCCESS: Eve's mixed EC Cert Created Importing RSA-PSS server certificate Import Eve's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Eve -------------------------- certutil -s "CN=Eve, E=Eve-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #278: Generate RSA-PSS Cert Request for Eve - PASSED cert.sh: Sign Eve's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30060 -v 60 -d ../CA -i req -o Eve-rsa-pss.cert -f ../tests.pw -7 eve@example.net,eve@example.org,beve@example.com cert.sh: #279: Sign Eve's RSA-PSS Request - PASSED cert.sh: Import Eve's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Eve-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eve -f ../tests.pw -i Eve-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #280: Import Eve's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Eve's RSA-PSS Cert Created cert.sh: Importing Certificates ============================== cert.sh: Import Bob's cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob.cert cert.sh: #281: Import Bob's cert into Alice's db - PASSED cert.sh: Import Dave's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #282: Import Dave's cert into Alice's DB - PASSED cert.sh: Import Dave's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave.cert cert.sh: #283: Import Dave's cert into Bob's DB - PASSED cert.sh: Import Eve's cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #284: Import Eve's cert into Alice's DB - PASSED cert.sh: Import Eve's cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../eve/Eve.cert cert.sh: #285: Import Eve's cert into Bob's DB - PASSED cert.sh: Importing EC Certificates ============================== cert.sh: Import Bob's EC cert into Alice's db -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../bobdir/Bob-ec.cert cert.sh: #286: Import Bob's EC cert into Alice's db - PASSED cert.sh: Import Dave's EC cert into Alice's DB -------------------------- certutil -E -t ,, -d ../alicedir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #287: Import Dave's EC cert into Alice's DB - PASSED cert.sh: Import Dave's EC cert into Bob's DB -------------------------- certutil -E -t ,, -d ../bobdir -f ../tests.pw -i ../dave/Dave-ec.cert cert.sh: #288: Import Dave's EC cert into Bob's DB - PASSED cert.sh SUCCESS: SMIME passed cert.sh: Creating FIPS 140 DSA Certificates ============== cert.sh: Initializing FIPS PUB 140 Test Certificate's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/fips -f ../tests.fipspw cert.sh: #289: Initializing FIPS PUB 140 Test Certificate's Cert DB - PASSED cert.sh: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/fips WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #290: Loading root cert module to FIPS PUB 140 Test Certificate's Cert DB (ext.) - PASSED cert.sh: Enable FIPS mode on database ----------------------- modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/fips -fips true WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: FIPS mode enabled. cert.sh: #291: Enable FIPS mode on database for FIPS PUB 140 Test Certificate - PASSED cert.sh: Setting invalid database password in FIPS mode -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/fips -f ../tests.fipspw -@ ../tests.fipsbadpw Failed to change password. certutil: Could not set password for the slot: SEC_ERROR_INVALID_PASSWORD: Password entered is invalid. Please pick a different one. cert.sh: #292: Setting invalid database password in FIPS mode - PASSED cert.sh: Attempt to generate a key with exponent of 3 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 3 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #293: Attempt to generate a key with exponent of 3 (too small) - PASSED cert.sh: Attempt to generate a key with exponent of 17 (too small) -------------------------- certutil -G -k rsa -g 2048 -y 17 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/fips -z ../tests_noise -f ../tests.fipspw Generating key. This may take a few moments... certutil: unable to generate key(s) : SEC_ERROR_INVALID_ARGS: security library: invalid arguments. cert.sh: #294: Attempt to generate a key with exponent of 17 (too small) - PASSED cert.sh: Generate Certificate for FIPS PUB 140 Test Certificate -------------------------- certutil -s "CN=FIPS PUB 140 Test Certificate, E=fips@example.com, O=BOGUS NSS, OU=FIPS PUB 140, L=Mountain View, ST=California, C=US" -S -n FIPS_PUB_140_Test_Certificate -x -t Cu,Cu,Cu -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/fips -f ../tests.fipspw -k dsa -v 600 -m 500 -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #295: Generate Certificate for FIPS PUB 140 Test Certificate - PASSED cert.sh SUCCESS: FIPS passed cert.sh: Creating Server CA Issued Certificate for EC Curves Test Certificates ------------------------------------ cert.sh: Initializing EC Curve's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw cert.sh: #296: Initializing EC Curve's Cert DB - PASSED cert.sh: Loading root cert module to EC Curve's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eccurves WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #297: Loading root cert module to EC Curve's Cert DB - PASSED cert.sh: Import EC Root CA for EC Curves Test Certificates -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eccurves -i ../CA/TestCA-ec.ca.cert cert.sh: #298: Import EC Root CA for EC Curves Test Certificates - PASSED cert.sh: Generate EC Cert Request for Curve-nistp256 -------------------------- certutil -s "CN=Curve-nistp256, E=Curve-nistp256-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp256 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #299: Generate EC Cert Request for Curve-nistp256 - PASSED cert.sh: Sign Curve-nistp256's EC Request -------------------------- certutil -C -c TestCA-ec -m 2001 -v 60 -d ../CA -i req -o Curve-nistp256-ec.cert -f ../tests.pw cert.sh: #300: Sign Curve-nistp256's EC Request - PASSED cert.sh: Import Curve-nistp256's EC Cert -------------------------- certutil -A -n Curve-nistp256-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -i Curve-nistp256-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #301: Import Curve-nistp256's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp384 -------------------------- certutil -s "CN=Curve-nistp384, E=Curve-nistp384-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp384 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #302: Generate EC Cert Request for Curve-nistp384 - PASSED cert.sh: Sign Curve-nistp384's EC Request -------------------------- certutil -C -c TestCA-ec -m 2002 -v 60 -d ../CA -i req -o Curve-nistp384-ec.cert -f ../tests.pw cert.sh: #303: Sign Curve-nistp384's EC Request - PASSED cert.sh: Import Curve-nistp384's EC Cert -------------------------- certutil -A -n Curve-nistp384-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -i Curve-nistp384-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #304: Import Curve-nistp384's EC Cert - PASSED cert.sh: Generate EC Cert Request for Curve-nistp521 -------------------------- certutil -s "CN=Curve-nistp521, E=Curve-nistp521-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q nistp521 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #305: Generate EC Cert Request for Curve-nistp521 - PASSED cert.sh: Sign Curve-nistp521's EC Request -------------------------- certutil -C -c TestCA-ec -m 2003 -v 60 -d ../CA -i req -o Curve-nistp521-ec.cert -f ../tests.pw cert.sh: #306: Sign Curve-nistp521's EC Request - PASSED cert.sh: Import Curve-nistp521's EC Cert -------------------------- certutil -A -n Curve-nistp521-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/eccurves -f ../tests.pw -i Curve-nistp521-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #307: Import Curve-nistp521's EC Cert - PASSED cert.sh: Initializing TestExt's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw cert.sh: #308: Initializing TestExt's Cert DB - PASSED cert.sh: Loading root cert module to TestExt's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #309: Loading root cert module to TestExt's Cert DB - PASSED cert.sh: Import Root CA for TestExt -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -i ../CA/TestCA.ca.cert cert.sh: #310: Import Root CA for TestExt - PASSED cert.sh: Import DSA Root CA for TestExt -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -i ../CA/TestCA-dsa.ca.cert cert.sh: #311: Import DSA Root CA for TestExt - PASSED cert.sh: Import EC Root CA for TestExt -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -i ../CA/TestCA-ec.ca.cert cert.sh: #312: Import EC Root CA for TestExt - PASSED cert.sh: Generate Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #313: Generate Cert Request for TestExt - PASSED cert.sh: Sign TestExt's Request -------------------------- certutil -C -c TestCA -m 90 -v 60 -d ../CA -i req -o TestExt.cert -f ../tests.pw cert.sh: #314: Sign TestExt's Request - PASSED cert.sh: Import TestExt's Cert -------------------------- certutil -A -n TestExt -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #315: Import TestExt's Cert - PASSED cert.sh SUCCESS: TestExt's Cert Created cert.sh: Generate DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #316: Generate DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 90 -v 60 -d ../CA -i req -o TestExt-dsa.cert -f ../tests.pw cert.sh: #317: Sign TestExt's DSA Request - PASSED cert.sh: Import TestExt's DSA Cert -------------------------- certutil -A -n TestExt-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #318: Import TestExt's DSA Cert - PASSED cert.sh SUCCESS: TestExt's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #319: Generate mixed DSA Cert Request for TestExt - PASSED cert.sh: Sign TestExt's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20090 -v 60 -d ../CA -i req -o TestExt-dsamixed.cert -f ../tests.pw cert.sh: #320: Sign TestExt's DSA Request with RSA - PASSED cert.sh: Import TestExt's mixed DSA Cert -------------------------- certutil -A -n TestExt-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #321: Import TestExt's mixed DSA Cert - PASSED cert.sh SUCCESS: TestExt's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #322: Generate EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request -------------------------- certutil -C -c TestCA-ec -m 90 -v 60 -d ../CA -i req -o TestExt-ec.cert -f ../tests.pw cert.sh: #323: Sign TestExt's EC Request - PASSED cert.sh: Import TestExt's EC Cert -------------------------- certutil -A -n TestExt-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #324: Import TestExt's EC Cert - PASSED cert.sh SUCCESS: TestExt's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #325: Generate mixed EC Cert Request for TestExt - PASSED cert.sh: Sign TestExt's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10090 -v 60 -d ../CA -i req -o TestExt-ecmixed.cert -f ../tests.pw cert.sh: #326: Sign TestExt's EC Request with RSA - PASSED cert.sh: Import TestExt's mixed EC Cert -------------------------- certutil -A -n TestExt-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #327: Import TestExt's mixed EC Cert - PASSED cert.sh SUCCESS: TestExt's mixed EC Cert Created Importing RSA-PSS server certificate Import TestExt's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestExt -------------------------- certutil -s "CN=TestExt, E=TestExt-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #328: Generate RSA-PSS Cert Request for TestExt - PASSED cert.sh: Sign TestExt's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30090 -v 60 -d ../CA -i req -o TestExt-rsa-pss.cert -f ../tests.pw cert.sh: #329: Sign TestExt's RSA-PSS Request - PASSED cert.sh: Import TestExt's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestExt-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -i TestExt-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #330: Import TestExt's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestExt's RSA-PSS Cert Created certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt1 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt1, E=TestExt1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt1 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:16:33 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 17:08:53 2023 Not After : Thu Jan 18 17:08:53 2024 Subject: "CN=TestExt1,E=TestExt1@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: ce:7e:a0:0d:cf:ca:ac:68:43:83:0b:4f:97:c7:03:04: d7:76:18:a3:79:9c:43:31:bd:90:dc:8c:56:dc:4c:6f: fe:bc:ea:01:e5:46:69:74:2d:5a:65:7f:7b:c2:5f:7b: 21:7d:99:3b:e2:92:32:02:08:c6:00:fe:c2:65:31:5e: 5b:10:cd:ff:da:01:c3:c6:3e:c5:bc:b9:4d:39:54:ee: 30:f8:5c:06:6f:01:89:3b:ba:11:fb:45:c2:b0:86:72: 40:39:37:67:af:eb:91:59:05:5f:d1:ba:a0:3b:76:a4: b5:3a:03:49:f9:6a:d2:e9:d4:ab:f2:81:f8:2c:3b:37: e9:31:7d:2f:6b:0e:31:f5:35:5c:b4:2a:a9:63:89:63: f3:ec:7d:a3:bb:67:95:a7:87:a1:fe:12:f5:ce:43:6b: 54:70:13:c6:f4:8e:15:37:e7:f9:8e:2b:aa:93:ed:ad: 6b:63:d6:05:b9:40:87:69:8a:66:c7:54:a6:52:d6:e5: b6:80:69:c1:71:af:14:a4:5c:90:86:fd:bd:f5:da:05: f5:85:57:95:11:85:6b:17:77:45:52:f3:0a:a8:b4:d8: 6e:cd:ae:71:1e:8d:de:8a:34:19:9b:ae:d1:6f:86:56: b1:66:41:2d:29:25:78:bd:2c:6d:c5:35:09:0f:6c:b7 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 3f:1c:a4:2f:d2:ab:b7:e9:85:6b:ec:8a:c2:b3:c8:9c: 0b:ac:14:08:08:d0:14:d6:e4:28:86:ce:fc:f0:38:74: 2b:3e:b7:29:b1:3e:f3:5a:9f:c2:60:1e:5a:ef:32:8c: a9:2b:16:18:b8:11:d4:4e:80:37:ca:43:dc:50:7e:ba: 73:e0:2e:c6:dc:0c:33:2c:37:81:0b:b2:68:66:22:3e: 94:bb:c0:a9:61:6d:e1:3e:d1:e2:6d:18:a3:a1:37:65: 90:0b:85:63:7a:7e:41:3e:e5:ec:eb:3f:88:a6:52:be: 95:27:87:8f:89:75:69:74:08:3d:11:6c:7a:62:ae:11: dd:84:26:19:4d:fc:aa:d6:2a:96:96:12:8a:bf:03:a4: ce:20:cc:a5:61:d0:d6:41:0a:5d:47:6a:c4:51:60:db: 42:29:c0:8f:f0:1e:5e:18:3c:2d:28:ee:8c:2e:db:4b: 36:03:aa:1e:bb:63:dc:58:9f:b5:64:3b:f8:57:3d:54: f2:6c:0c:b3:a3:ff:91:09:0a:6e:b2:34:36:54:f4:91: de:b7:2f:ce:95:de:d0:11:d5:a2:fb:7b:8d:1b:38:2e: 3c:8e:aa:fd:78:43:79:0e:34:4a:7b:bb:35:80:8f:9d: d5:a5:9b:62:c6:0a:db:63:df:ef:a0:7e:55:c3:89:e5 Fingerprint (SHA-256): 1D:71:61:57:58:3E:08:91:62:4A:4C:AF:13:0B:CE:6C:7F:50:DF:AF:BF:F1:9E:77:59:57:AF:42:AA:72:EF:DD Fingerprint (SHA1): 88:D2:96:1B:F9:1B:B1:D1:2D:B8:E7:77:E4:1C:12:C8:D0:BD:33:82 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #331: Certificate Key Usage Extension (1) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt2 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt2, E=TestExt2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt2 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:16:34 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 17:08:53 2023 Not After : Thu Jan 18 17:08:53 2024 Subject: "CN=TestExt2,E=TestExt2@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a9:4a:cf:19:a1:13:2a:ac:c5:c8:30:3b:94:a0:9d:94: 52:04:e9:80:43:bc:b1:94:03:8b:a4:1f:ee:0e:a6:2e: 8e:d6:8b:81:67:90:8b:27:8b:0b:6d:02:a7:55:64:40: dc:6b:8c:ea:46:3a:9c:f8:27:23:b5:04:43:54:24:d8: cb:d1:8a:8c:02:82:e6:6d:2d:23:71:33:49:e2:8d:35: a6:b5:60:60:64:2d:4a:50:77:eb:49:53:23:92:35:8c: 69:8b:55:04:8a:d0:42:8c:3a:26:51:b9:1f:cc:aa:26: 19:98:a9:81:08:55:16:6b:f6:9f:39:f9:8b:9c:a2:73: fa:c8:ff:92:58:52:33:65:8e:4e:50:63:63:f4:d4:98: f2:b1:75:1e:76:c6:fc:ad:58:34:5b:82:e8:bd:8a:b6: 1f:e9:78:a8:79:98:dc:3f:6a:42:04:7d:d1:24:29:3e: f5:30:43:10:13:1a:cb:5a:58:14:7b:ff:3a:ca:f4:06: df:ea:83:ca:47:4d:58:db:9d:cf:5b:65:2c:7a:82:bf: e7:90:e7:62:a2:aa:d8:30:9d:90:ac:bf:3f:47:11:fe: 46:b8:2f:2d:92:b4:cb:f9:ef:87:3c:9b:49:da:66:f5: f7:e8:13:91:01:d1:2d:df:8d:a1:52:dd:fb:a1:6c:8b Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Critical: True Usages: Digital Signature Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 51:a2:e4:95:d6:70:7a:e2:b8:37:50:f0:60:64:5f:d9: c4:3e:88:45:04:d5:01:f6:ff:ca:09:11:f6:24:90:ff: 66:96:46:60:42:db:bd:96:c3:1e:87:85:32:40:28:1a: 3e:88:6c:5a:d0:27:02:1f:95:36:35:ee:c4:39:e8:1a: d2:31:0a:13:d7:51:92:60:34:b1:9e:27:e9:10:ca:8f: 2d:c2:17:e5:93:59:3a:57:c9:44:4e:e4:92:4a:fd:56: e6:a2:d5:bf:1c:6a:ee:b4:87:41:d9:75:f5:dd:1c:4f: 6e:32:9f:66:4e:be:6d:e0:49:74:7c:e5:e7:10:e2:a9: 7c:06:0a:43:1e:b4:96:c6:7d:f9:2f:67:b2:95:0d:ae: 6b:34:52:6d:64:8f:27:cd:59:fc:9f:11:ff:6b:f4:d6: 64:5d:ac:3e:c5:ee:b6:ba:36:c0:a1:f5:fd:dd:3d:2f: 34:5d:10:de:31:87:bb:63:53:89:10:85:16:47:9c:67: 25:4b:88:12:88:b3:66:84:45:43:d8:c5:48:da:25:2c: 9a:5f:71:12:20:66:a0:03:c1:32:25:32:c1:58:87:b2: 1b:2c:bf:c5:4f:59:bb:fc:47:03:7d:3a:a7:51:ec:dc: 6b:1d:13:ee:4d:72:b2:fa:8c:e4:ad:d8:e4:12:10:f2 Fingerprint (SHA-256): F5:87:06:4F:BD:CF:65:54:BF:CE:57:7F:08:BD:7F:3C:0A:0B:EF:7A:45:86:ED:3E:EC:98:4A:A9:E5:27:CF:58 Fingerprint (SHA1): 35:79:57:99:E9:C7:B2:28:EF:C8:76:A3:32:58:2F:E1:04:AD:35:61 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #332: Certificate Key Usage Extension (2) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt3 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt3, E=TestExt3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: y -1 n Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt3 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:16:34 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 17:08:54 2023 Not After : Thu Jan 18 17:08:54 2024 Subject: "CN=TestExt3,E=TestExt3@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: 9d:97:5b:8e:6a:ec:8d:64:ae:fc:38:ba:70:d9:fe:1f: 2d:57:6d:bf:8b:97:7f:9c:ee:d8:13:d2:53:68:5e:a1: f3:6d:58:c9:26:9b:73:2d:b5:48:1a:d6:ae:c3:3c:69: ec:e4:2b:e0:48:20:86:c3:bf:e7:1f:98:01:fb:6e:bf: 78:a6:67:2b:e3:7b:d2:76:55:5f:1e:fc:d8:db:e5:cd: cb:46:d8:04:a3:90:69:d3:7b:b3:22:7c:95:74:fa:3c: 0a:44:fb:44:64:73:d2:f4:76:c0:23:ff:2a:1d:67:d4: 75:d0:be:ee:ed:6f:74:7b:8e:ab:0a:a5:da:d1:67:0e: 4f:60:71:0e:e3:c8:60:c7:8e:62:ab:d2:d7:60:b5:ac: ce:87:dc:9f:79:29:38:56:f7:1a:19:ae:9e:b0:29:e9: ed:fc:e3:10:8b:79:99:48:52:b8:17:02:ac:3a:92:42: 0c:8a:7c:99:64:4e:91:21:39:fc:30:47:69:e4:b8:9f: 48:d6:0b:29:a0:0c:6b:44:a2:56:5b:3d:76:97:ef:40: 29:c3:54:dd:53:bf:3c:79:30:76:ca:d0:c1:1b:b9:63: 5e:98:5c:13:13:d4:73:79:73:76:49:e7:96:c7:aa:ff: f8:6a:1e:72:5f:59:5c:32:70:ed:73:53:f8:63:da:63 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Data: Is a CA with no maximum path length. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 18:a1:58:9a:00:55:72:a0:fa:30:da:e9:ca:70:9b:69: 17:e4:bf:f6:8f:cf:1d:80:6c:24:c3:91:52:98:67:25: 61:12:27:95:96:2c:68:67:fa:f2:4d:06:cf:da:d6:ef: 57:34:f8:7d:07:18:ec:ae:0f:2e:49:78:fd:ad:81:df: 49:0d:fc:af:ca:02:af:ff:7e:ba:40:4f:d7:65:5d:9d: 38:9a:11:3b:85:b6:7d:92:ad:2b:bc:7a:02:90:10:cf: b4:5e:bf:fc:fc:e8:f0:dc:27:a0:48:d5:a6:2c:73:81: ea:10:d4:00:b6:e4:20:07:d7:36:f0:97:35:f6:6b:2b: 41:36:19:ff:66:56:06:5a:6e:04:50:98:75:45:67:ee: ad:64:38:9a:2a:94:ff:c7:70:95:f7:9f:33:26:65:09: b0:73:3c:b7:65:27:ff:b3:f6:e1:bd:7a:62:bf:4b:89: b8:ac:f7:07:52:1e:63:31:dc:6d:5d:1e:7c:6e:e6:89: b6:69:f3:ea:27:3d:05:79:4e:02:89:db:c6:52:65:94: f5:a5:36:a7:8d:62:f4:de:92:e3:b9:5d:e9:f5:24:55: cf:45:b2:a7:11:f0:dc:77:02:65:19:e9:4b:21:f3:6d: d8:d0:b3:9d:69:b5:50:25:9a:4d:e5:c0:4a:e0:e5:0a Fingerprint (SHA-256): B1:E6:ED:B1:C9:DB:EF:B9:28:1E:A4:14:FD:B1:9E:00:5C:FF:5F:00:65:7C:DC:45:76:98:AB:41:43:E0:6C:CC Fingerprint (SHA1): 4A:3A:83:BC:06:A9:AC:70:B3:5D:1A:FE:2C:AE:12:36:BC:53:82:4A Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #333: Certificate Basic Constraints Extension (3) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt4 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt4, E=TestExt4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -2 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: n -1 y Generating key. This may take a few moments... Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt4 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:16:35 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 17:08:54 2023 Not After : Thu Jan 18 17:08:54 2024 Subject: "CN=TestExt4,E=TestExt4@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c9:59:96:07:b5:da:0f:6d:10:d1:8b:3d:8f:8c:63:b9: 43:3f:03:77:d7:c7:a0:2a:66:df:a9:62:ea:5c:be:24: 7f:09:d3:41:b1:82:9b:d8:d0:27:b0:df:74:4e:70:01: 87:14:35:3c:30:39:cc:23:bf:c1:a1:00:ff:81:97:16: d0:cd:d2:a3:29:4d:9a:6f:9a:b6:c3:ab:6c:11:7a:ca: fd:4a:46:3e:05:4c:9a:95:d4:08:a8:a5:0d:14:f7:05: f5:85:9b:bf:94:49:47:e9:f2:a8:d0:b1:d5:f9:54:0e: 58:62:e6:bb:f2:2e:ed:c8:05:5d:d3:88:83:41:51:d1: da:8c:39:77:3b:0c:9b:2e:ba:07:6f:b3:0a:36:21:e3: d7:b2:cb:f8:d4:1c:54:b5:ec:39:2e:58:d0:48:42:f1: 32:d7:8e:d8:d7:36:9f:10:c6:06:84:93:93:d5:03:c2: 7c:a8:3e:6f:e5:d3:99:c0:b0:89:59:b4:5d:27:6b:4b: 3f:23:51:d6:77:f9:39:e8:4e:ff:b0:88:16:13:25:35: cd:58:56:58:91:52:1f:02:a1:d5:a0:5f:b3:10:03:ab: d9:71:d9:ba:e0:2b:b0:db:4e:a8:f0:5e:dc:08:a3:1b: 12:15:26:a9:f0:5e:e9:c4:e2:7c:49:60:be:5c:60:c1 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Basic Constraints Critical: True Data: Is not a CA. Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 07:77:15:d9:23:6f:36:dd:03:f8:e3:e7:ce:84:4f:f6: 82:8f:1e:2e:46:84:81:9e:fa:cb:64:c9:eb:ff:bd:69: b9:c2:42:c5:aa:e3:72:03:26:4a:04:7e:b6:f4:1b:7c: ff:18:1a:05:b8:5d:5a:3a:38:ee:e6:1a:51:36:8d:a0: 1d:42:1b:07:e3:15:08:20:e1:3e:14:09:44:3f:bb:6c: 11:24:58:96:17:4a:a2:f3:0c:fe:8a:d7:5e:58:2f:28: 56:58:83:62:be:0e:38:29:ef:66:b7:a7:55:e6:17:ec: b3:91:54:11:be:07:6a:af:86:39:a4:7d:1a:71:29:01: 23:4b:c3:bf:08:20:38:f7:b3:b5:41:c9:0a:15:df:b7: 8e:23:84:77:4c:80:ed:ff:68:de:af:c0:3e:8b:c3:75: 2e:bf:8e:37:ec:7b:b1:94:0d:2e:86:8e:7e:4b:f9:22: f1:0d:49:6e:3d:ce:90:3c:64:7f:74:9c:e3:84:52:47: 7f:ee:93:5c:db:ca:3b:a2:a3:f1:ee:03:0e:00:2d:40: d8:ad:56:9f:79:f9:a8:f5:87:be:d4:52:9c:2c:9b:f7: c6:66:fc:a0:a4:00:75:63:ef:f9:ed:e2:ad:da:94:8c: e2:b0:c9:95:7d:95:14:75:6c:d6:af:36:fd:c1:35:b0 Fingerprint (SHA-256): 45:C7:FE:46:A9:03:DD:7B:4B:CA:CE:B2:3E:89:02:7E:96:8C:7E:CA:22:4A:FA:59:AC:B8:83:F5:11:56:F9:AA Fingerprint (SHA1): 39:9F:3A:11:6A:5D:BC:11:99:03:2B:57:50:CF:18:D3:31:95:3F:6D Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #334: Certificate Basic Constraints Extension (4) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt5 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt5, E=TestExt5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: y 12341235123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt5 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:16:36 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 17:08:55 2023 Not After : Thu Jan 18 17:08:55 2024 Subject: "CN=TestExt5,E=TestExt5@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d8:bc:45:85:59:52:24:4c:86:14:44:ab:96:eb:33:ca: cb:5d:ee:8c:6e:9c:90:9a:65:89:c8:5c:94:a7:7f:dc: 90:2d:12:70:92:15:70:03:9e:cb:aa:41:64:aa:cd:5b: 4e:38:fd:a4:4f:27:01:84:2c:7d:e0:25:2a:4f:cd:1c: 51:b1:ab:0a:f5:93:c5:1c:62:8e:0c:51:dc:24:97:b3: 51:c6:09:c9:70:87:0c:7d:50:eb:a5:94:37:33:49:56: 2c:cb:c6:0f:c8:2d:28:9d:8c:cd:9d:f1:0c:0f:75:34: 74:71:37:0e:6b:01:e2:53:8e:7b:ee:72:ca:a0:fb:36: 88:a0:f7:32:cb:13:34:63:f4:a9:c7:cd:ea:d8:5c:50: ba:9f:67:bd:ce:24:c7:a3:51:34:16:78:fd:4b:d5:57: dd:eb:fc:59:29:97:d1:ef:ff:e9:fe:cc:a1:f1:e7:d3: d1:67:9c:b9:f9:d8:17:40:42:ec:b0:b3:75:05:ff:79: 81:e2:c7:39:1a:f0:00:22:a0:12:c7:c4:04:9d:3b:c8: 70:c9:f5:ae:0b:85:a6:e0:fc:06:7b:c4:f5:c3:58:73: a7:32:b3:b6:9d:f0:8d:fa:b0:df:cd:91:c8:a8:cb:9b: 38:b6:d9:72:b4:72:63:1a:c8:3a:d8:9a:40:ce:a1:27 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Key ID: 12341235123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: d2:69:cd:8b:9c:39:dd:4b:6b:35:ce:14:98:90:54:ae: ba:b3:3c:fc:ea:3b:0c:b2:c9:86:30:de:88:f4:42:10: 94:75:23:2f:bb:f3:13:d2:ff:4f:a2:7f:73:cc:71:5a: c9:fa:b7:71:b0:47:e5:ec:78:1f:0b:16:af:1d:22:56: 86:f7:d2:6a:bc:a6:d5:f1:49:c8:c5:9b:3c:d2:bd:e6: 2f:8e:3e:bf:f0:38:6e:af:02:29:fb:20:68:5b:e8:61: 4d:77:7a:39:41:78:ad:61:b0:02:63:03:4f:8b:99:01: 95:e8:25:0d:e4:5f:50:20:3a:48:ce:64:f6:62:36:c1: c7:43:36:35:3f:18:69:b9:1b:f3:9a:87:db:73:72:53: bb:a8:5e:5a:16:84:bc:18:c6:3f:81:bd:90:cc:73:3c: 49:28:d0:d9:15:bf:e1:9d:00:57:35:1f:94:a1:d5:2a: f4:4e:9f:7d:22:56:f8:23:87:65:a3:d4:28:e2:60:f0: c0:0f:38:12:a8:92:25:36:49:69:c6:b7:fd:c2:6f:3e: 51:66:c4:07:c4:a7:d1:73:d6:9c:06:eb:88:8e:c3:3e: c3:2c:b8:78:a6:1d:88:29:81:5c:94:57:0b:fb:fa:46: 59:95:6c:f7:25:c5:7e:1e:c7:ae:68:19:53:9a:b3:c2 Fingerprint (SHA-256): DD:99:D5:EB:B8:9A:72:30:84:B5:9B:FB:82:5D:18:13:05:51:97:6E:B4:40:67:6D:50:CB:59:D0:4A:D1:DB:3F Fingerprint (SHA1): BD:E9:C0:BF:A0:D7:CF:EC:6C:E7:8C:FD:58:61:BC:64:A6:12:6A:78 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #335: Certificate Authority Key Identifier Extension (5) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt6 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt6, E=TestExt6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -3 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: y 3 test.com 214123 y Generating key. This may take a few moments... Enter value for the authKeyID extension [y/N]? Enter value for the key identifier fields,enter to omit: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter value for the authCertSerial field, enter to omit: Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt6 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:16:37 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 17:08:55 2023 Not After : Thu Jan 18 17:08:55 2024 Subject: "CN=TestExt6,E=TestExt6@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bd:97:0d:7e:13:55:3f:e1:f7:2b:92:dc:98:0d:1f:dd: 89:78:99:51:e3:9b:4c:66:40:ec:81:8f:42:ce:ad:dd: dd:e2:e6:18:6f:2d:c0:66:90:d8:22:2a:5b:f4:1c:8c: 32:8d:96:a2:9f:a4:ce:5c:80:73:5e:9c:43:57:39:a4: de:05:9f:97:03:6d:3e:17:b0:0b:17:2b:57:a0:68:a4: d0:a6:e0:7e:27:b5:15:35:9d:d3:f6:f6:d0:7e:a0:c3: f5:c6:63:1b:22:f9:81:80:d3:25:39:cb:13:38:5a:c2: 36:08:9a:c5:08:18:6f:10:40:18:40:d4:65:91:6a:24: 10:74:bb:84:bd:09:b9:02:48:61:d2:2f:f0:7e:f6:5d: 3c:61:bc:78:ba:92:1c:47:0c:11:4c:c4:e3:ff:81:bb: 6b:86:33:d1:33:e9:c5:38:be:6a:71:d8:dd:a9:72:db: 2f:dc:22:bf:bf:d7:4d:81:6b:f1:8a:8e:5e:4b:e7:c7: 3f:e3:46:e8:6d:85:67:f6:03:ad:a6:25:c0:2f:42:5c: c4:5a:95:85:ea:8e:85:cd:8f:95:7b:5f:c5:78:bf:d5: a8:b9:6a:34:4b:13:d3:58:16:ea:9a:65:73:b3:79:82: 0d:01:ac:ad:38:d9:e8:b1:ae:c9:e1:2f:62:8a:5f:ad Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Authority Key Identifier Critical: True Issuer: DNS name: "test.com" Serial Number: 214123 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 2f:db:3e:20:ce:81:f2:a0:50:ab:3f:67:21:9b:7c:94: f2:b5:f1:14:df:ac:7f:1a:6f:78:c7:ef:6a:56:c3:d6: c3:15:40:72:4d:d4:e7:c8:fd:f9:5e:9d:60:74:ca:2e: 50:a1:e2:6a:db:b5:88:21:a8:47:4a:dc:13:d2:2e:bb: f8:88:49:b6:7b:67:be:aa:21:c9:dc:01:65:41:37:ce: 5c:02:77:e1:46:4d:68:2a:f6:b6:f3:b1:a8:ae:0f:0d: d2:b9:1b:2a:31:49:54:d2:a8:5a:ee:ce:02:05:15:51: 46:b1:a9:89:fc:11:cc:0e:09:c9:71:0a:38:75:f2:b3: a5:07:1b:fc:af:06:f7:40:57:f5:7a:a5:41:e8:7b:7d: 87:aa:e6:f0:aa:46:95:0a:be:20:71:8e:85:14:61:3a: 7a:d7:c7:34:d9:a5:1e:06:a0:af:0f:84:0a:29:20:c4: d8:e8:7b:13:7b:a4:29:84:c8:bb:c6:6d:ee:bb:c0:0c: 69:02:58:ba:4c:dc:10:41:29:c8:87:fd:d4:c5:3b:05: f0:78:86:30:16:f0:0e:2d:55:be:bf:75:59:60:27:b8: 5c:84:0c:3b:39:ad:d9:3a:06:db:02:be:65:4d:54:12: 7e:1d:d5:90:85:43:7f:4b:d8:f2:1d:8d:19:30:90:f2 Fingerprint (SHA-256): 99:E1:80:14:AE:E9:77:A0:37:38:C8:B7:4D:3C:4B:F8:9E:E5:77:00:73:8A:C7:EA:C7:A8:15:0D:EC:97:6E:48 Fingerprint (SHA1): 74:68:86:DD:EC:C7:12:5E:9C:6A:C9:4D:E9:82:0C:7F:E1:4B:0E:4E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #336: Certificate Authority Key Identifier Extension (6) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt7 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt7, E=TestExt7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 1 2 rfc822@name.tld 3 test.com 8 1.2.3.4 9 OID.0.2.213 10 0 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt7 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:16:38 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 17:08:55 2023 Not After : Thu Jan 18 17:08:55 2024 Subject: "CN=TestExt7,E=TestExt7@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:2a:f4:7b:ba:70:9d:8e:52:ec:23:4a:96:75:0d:8b: bc:e0:4a:38:db:a9:3f:05:63:a8:38:02:bd:7a:9a:4a: 93:b2:01:bb:21:31:a8:bc:3e:76:33:58:41:be:da:64: b7:06:04:eb:bc:35:95:db:8f:4b:98:d0:c0:58:d5:51: f3:72:a7:d7:3a:7f:1e:ea:10:57:ee:8f:7e:88:47:c0: 5a:b2:77:44:e2:2f:71:58:13:19:4d:79:4a:7e:e7:15: 39:e5:6e:7f:f4:4e:29:c3:a4:32:81:0f:ec:0c:4c:41: 4a:0a:40:3c:80:26:a8:2b:4f:c3:44:e5:cf:86:b1:c1: f0:09:64:66:fe:cf:5a:13:4e:34:e8:48:3c:d7:90:15: 24:d9:47:cb:fc:33:78:ab:2e:f9:98:6b:a9:a7:d7:dd: b4:81:7b:a2:18:a9:9c:54:2e:d0:9c:2f:4f:42:f3:8a: 3f:2b:65:d9:f9:70:5d:c7:f9:26:7b:7f:f3:7c:c5:43: 34:2c:85:21:4d:13:81:80:60:78:cb:36:39:e0:34:fc: 0a:83:3b:1d:1a:ab:41:22:e1:f6:18:eb:fd:d1:6b:d4: aa:f6:79:35:17:34:93:14:17:7e:22:a8:a0:6d:bf:bb: 81:eb:ba:6e:fb:d9:72:0b:2f:a2:0c:3b:42:3d:26:07 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RFC822 Name: "rfc822@name.tld" DNS name: "test.com" IP Address: 87:07:31:2e:32:2e:33:2e:34 Registered ID: OID.2.955.79.73.68.46.48.46.50.46.50.49.51 Reasons: 80 (7 least significant bits unused) Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 35:72:64:20:bd:6d:9b:86:83:50:52:5a:1d:23:87:9e: ef:cf:e8:f7:4d:52:dc:0f:a4:cb:f0:b2:69:7a:9d:be: 9c:f1:90:9e:c3:99:c4:04:5d:cf:99:6f:10:53:36:50: cd:22:09:00:bc:63:5d:b3:96:9d:c0:66:8a:30:93:2a: 1c:70:1f:fd:53:51:34:a6:e4:97:a4:4f:17:da:b9:6d: 85:11:48:b9:8b:6e:38:58:c2:0a:29:70:f7:33:ab:3b: 26:f6:a0:4f:17:23:fc:c0:6f:34:95:09:18:67:5b:b6: f9:fb:c6:5e:dc:c5:fb:1b:cd:f1:e9:19:7b:de:5c:a0: 40:7e:d8:9a:ad:03:4b:be:36:ca:09:ed:cf:0b:4a:92: 93:6f:84:dd:fb:7d:76:aa:78:3e:57:ea:ac:82:28:59: 19:54:42:d8:d1:f8:85:a5:10:34:7b:67:e5:e8:f3:6a: c9:e1:43:95:bc:1d:85:16:f3:d3:6e:68:19:d8:d1:00: 08:2c:7e:29:da:bf:54:90:78:ee:ea:43:11:34:f2:c4: db:79:6c:28:a5:52:86:f6:ad:61:bc:b1:da:07:69:2e: f4:ce:c6:c5:60:e6:27:58:37:28:06:d4:45:18:cd:ea: 40:99:6e:2a:0a:79:8b:7a:5e:cf:66:cd:2e:a3:d3:9c Fingerprint (SHA-256): E6:42:67:B7:43:2E:11:15:0F:80:BD:F5:AC:88:AA:48:8A:B2:83:C1:9C:B4:02:99:49:C2:F3:D0:90:CC:C6:68 Fingerprint (SHA1): F8:3A:4A:6F:4A:5C:C6:58:E6:8D:98:44:33:22:90:15:91:AB:B3:14 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #337: CRL Distribution Points Extension (7) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt8 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt8, E=TestExt8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -4 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 2 SN=asdfsdf 4 3 test.com 10 n n Generating key. This may take a few moments... Enter the type of the distribution point name: 1 - Full Name 2 - Relative Name Any other number to finish Choice: > Enter the relative name: Select one of the following for the reason flags 0 - unused 1 - keyCompromise 2 - caCompromise 3 - affiliationChanged 4 - superseded 5 - cessationOfOperation 6 - certificateHold Any other number to finish Choice: > Enter value for the CRL Issuer name: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Enter data: Select one of the following general name type: 2 - rfc822Name 3 - dnsName 5 - directoryName 7 - uniformResourceidentifier 8 - ipAddress 9 - registerID Any other number to finish Choice: > Notice: Trust flag u is set automatically if the private key is present. Enter another value for the CRLDistributionPoint extension [y/N]? Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt8 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:16:39 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 17:08:56 2023 Not After : Thu Jan 18 17:08:56 2024 Subject: "CN=TestExt8,E=TestExt8@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: b0:44:36:1b:36:38:b7:99:4f:99:7b:36:64:14:d0:35: 94:bb:de:a6:23:9c:cd:d6:69:bd:2d:a1:b5:83:fa:47: ed:fc:d9:9b:31:79:a5:cc:14:16:07:01:6f:db:58:a8: 85:93:96:60:d2:56:a2:ae:0e:47:e0:64:f6:23:11:a8: 26:59:9a:54:9b:47:ac:d5:7f:3c:f7:49:c9:dd:a7:2c: 50:c4:78:2c:2e:c5:8e:e8:78:bf:58:09:c4:84:3f:72: 8f:74:3b:44:d5:b3:33:62:57:ed:b1:3e:65:57:dd:f5: f6:93:ec:d4:70:15:6a:6b:b6:95:dd:bd:15:89:69:64: 88:aa:30:fd:7d:27:8a:ac:ce:10:d3:b9:c5:b6:cb:9b: 1d:ad:e0:5b:c7:89:42:0a:78:af:b5:96:43:0c:4e:a3: a1:15:f1:0c:bb:11:fa:29:41:1f:07:14:da:e3:42:ec: 14:ea:1a:90:56:d0:46:b7:e0:a5:7e:98:15:de:f1:7b: 43:12:73:0a:f9:10:5a:c5:9c:b9:c5:46:f9:8f:1d:1f: 06:b9:4e:ea:cc:87:60:ce:17:98:88:19:1f:79:8b:e2: 41:8c:be:7d:3b:5b:98:a3:1f:81:8d:1a:0e:b3:0e:c2: e9:78:7a:78:fe:e5:ab:a8:6c:60:74:8a:7e:37:de:45 Exponent: 65537 (0x10001) Signed Extensions: Name: CRL Distribution Points Distribution point: RDN: "SN=asdfsdf" Reasons: 08 (7 least significant bits unused) CRL issuer: DNS name: "test.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 4c:c7:63:70:e0:13:2e:62:0e:21:f7:92:d1:ee:d8:23: db:d1:73:a3:68:7a:aa:e3:f0:77:fe:76:27:f9:d7:1c: 93:3a:51:32:37:80:f6:88:36:41:e0:db:ea:9f:14:42: d8:01:f5:5b:cf:e1:b1:00:e4:28:ce:1f:d1:24:1e:d9: f8:88:a4:7a:73:39:49:2b:d5:0f:50:12:0f:fd:a6:09: e4:ff:73:52:34:80:9a:31:2f:af:e6:66:41:38:58:e0: f1:2b:bb:a2:f8:b0:92:8e:83:c6:fb:53:69:37:25:32: ba:b6:48:db:fa:4f:39:a1:45:52:f6:d1:14:6a:ba:97: 20:16:10:5a:7d:1f:ce:df:aa:6f:29:44:ac:e8:2c:57: 48:1e:dc:b9:ff:d1:60:da:1e:ac:03:e9:ca:d8:b8:1e: 2e:23:24:37:87:3e:b4:d5:35:15:10:9f:da:01:b2:8b: 1d:df:95:80:b9:9a:40:0c:71:77:ef:b3:7b:3a:59:cf: 6f:99:36:1c:42:f6:b6:05:80:1c:0a:9f:31:fb:a1:1d: 0a:db:2d:00:9e:80:b0:44:84:ca:6f:e8:0f:1f:f8:e6: 84:6c:17:f3:d0:e3:46:db:f3:fe:e1:fa:2b:28:28:c1: 32:71:b5:db:e0:44:04:c1:37:7e:da:e6:04:52:68:73 Fingerprint (SHA-256): B6:6F:A0:3B:4E:DC:BB:A8:DA:BB:70:A0:B2:90:3F:A6:E8:32:B7:AA:A2:ED:B2:40:73:76:1C:F8:68:B5:E6:07 Fingerprint (SHA1): 89:FB:9F:51:47:F0:B2:F5:64:29:17:BF:8C:07:D4:A5:2A:D7:6B:9E Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #338: CRL Distribution Points Extension (8) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt9 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt9, E=TestExt9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -5 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 10 n Generating key. This may take a few moments... 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt9 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:16:3a Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain Vi ew,ST=California,C=US" Validity: Not Before: Wed Oct 18 17:08:57 2023 Not After : Thu Jan 18 17:08:57 2024 Subject: "CN=TestExt9,E=TestExt9@example.com,O=BOGUS NSS,L=Mountain V iew,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: a1:8e:7d:b4:10:38:fd:0c:ea:b0:3a:69:91:6e:7f:80: c9:85:34:2d:57:11:e7:97:65:54:80:b3:7b:cf:6f:29: 2d:dd:ee:09:d5:08:01:58:be:3a:5c:fd:fa:78:40:2c: 80:fa:f7:af:89:a0:29:6d:0d:9e:70:04:30:32:1c:64: 9e:da:5d:0e:e9:a7:95:af:f6:6d:87:16:64:c4:6e:b2: 86:19:0a:db:cf:09:d1:d3:71:92:6e:2e:c4:da:ab:e7: 81:5c:53:04:d6:40:ce:86:dc:34:f2:38:0c:00:45:ee: a2:b6:f0:52:6e:f0:28:4f:6d:24:06:44:36:02:f1:68: cf:2f:d7:fc:ba:8d:c6:4b:f8:c0:49:c3:0c:e8:05:43: 47:2a:66:44:ee:fb:12:c4:66:2a:92:9b:4e:c8:c6:e0: 71:4e:e3:05:a1:66:1d:06:01:ea:d6:cd:8a:6a:4f:08: 7e:db:ef:81:b9:6e:08:94:93:85:ee:3e:55:2b:5c:87: 5f:2d:5d:f2:cd:a1:9e:0c:a6:31:e5:7f:db:b8:e5:3a: 10:bc:20:8c:dd:dd:f8:a2:37:28:60:50:f9:55:ae:0b: 1b:16:6b:5f:36:81:5a:58:dc:97:04:0d:22:38:63:f7: 32:1b:d2:67:2b:e8:5a:16:33:5f:49:17:af:ab:0d:c5 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Type Data: Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 8d:cc:58:f9:47:c7:2d:f9:10:9e:dd:97:1f:7c:2a:c5: 4f:03:88:aa:06:b4:a1:dd:ac:09:f1:97:1b:3e:35:19: 6f:35:41:9f:9e:01:57:a8:af:1f:66:9f:87:b9:0d:25: af:57:fd:1a:3a:72:42:df:85:f7:69:c2:6c:d4:fd:b9: 5e:be:19:c4:92:0a:f6:64:0b:a2:18:31:9a:71:0e:ec: 37:ba:4e:d1:1b:8c:f3:98:db:4f:6c:6b:6a:59:c5:59: bb:a3:a2:ed:8e:43:6f:96:c1:2a:0b:d4:b4:98:12:ea: 6d:0a:e7:3d:32:e6:07:79:1c:7c:26:ca:56:0a:f4:eb: 04:0f:c8:e2:da:8a:8f:2b:8a:08:a9:f8:b4:b0:19:95: 6d:0f:c4:70:5e:ed:8d:1d:06:86:72:ad:51:17:74:70: 6c:c4:e5:9c:1e:42:18:6c:66:b5:67:65:a8:2e:d3:ec: b2:46:97:d4:6a:f4:41:8f:d0:1f:c2:3e:ec:fb:6e:13: 29:98:9b:c8:62:b6:16:cc:76:1d:15:8a:dc:5b:77:3f: 0e:bb:88:0f:0f:5c:21:7f:8d:e3:9d:49:90:5d:42:65: 9c:85:2c:bc:40:fa:67:59:74:46:2b:17:ae:8d:76:29: 43:8d:df:3c:52:74:cd:0a:62:25:1e:d5:e9:ff:71:d1 Fingerprint (SHA-256): 9E:F5:98:DB:15:F0:56:29:D2:58:4E:89:4B:AD:CA:29:CB:5E:E1:3F:6B:1B:BE:B7:1B:6A:21:41:A2:6B:00:72 Fingerprint (SHA1): 5D:A2:40:41:F7:76:E8:3C:12:03:70:74:FE:5B:E2:07:FC:4C:C8:D0 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #339: Certificate Type Extension (9) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt10 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt10, E=TestExt10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -6 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 0 1 2 3 4 5 6 10 y Generating key. This may take a few moments... 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > 0 - Server Auth 1 - Client Auth 2 - Code Signing 3 - Email Protection 4 - Timestamp 5 - OCSP Responder 6 - Step-up 7 - Microsoft Trust List Signing Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt10 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:16:3b Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Wed Oct 18 17:08:57 2023 Not After : Thu Jan 18 17:08:57 2024 Subject: "CN=TestExt10,E=TestExt10@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:5f:9e:ef:56:02:2b:81:0d:a6:1d:a1:06:0c:75:26: ef:2a:2f:f1:fe:43:7d:2c:87:a2:79:32:2b:6f:ab:f9: 63:4b:8c:42:d1:a1:b2:20:74:d8:9d:07:1f:ef:a1:2a: e9:c3:d8:9a:d8:7a:54:09:ab:fd:1e:c5:70:14:07:d4: 9d:dc:30:08:78:eb:c4:70:e5:36:bd:7c:27:7b:3a:59: a4:15:ce:30:85:e9:f7:e7:65:fd:0f:a4:25:26:19:41: 24:3b:cc:60:94:65:e3:ab:45:e7:33:8d:ce:45:f6:45: 27:8e:9e:24:41:e8:13:90:39:d8:09:20:c7:5e:4d:9a: 73:9d:04:ee:10:2a:3f:1f:e2:77:fd:3a:5a:d1:00:27: 4a:a3:63:6c:48:97:f0:cc:09:d9:cb:e3:57:fb:cd:59: 69:a0:12:1d:41:41:21:90:4e:28:20:ac:eb:a5:bc:02: ed:40:d1:9c:01:36:bf:04:3a:c1:28:fc:27:83:c3:6f: 4f:4a:24:fd:3d:44:83:59:f5:0c:2d:64:eb:c8:8c:aa: 11:b3:80:b1:7a:81:ae:36:41:8f:11:6c:ea:07:b3:3a: df:07:cf:d3:dc:43:bc:a6:4b:12:af:b9:36:75:0e:2d: ac:ce:45:c1:92:6f:f0:12:b0:de:71:a1:23:f0:c7:43 Exponent: 65537 (0x10001) Signed Extensions: Name: Extended Key Usage Critical: True TLS Web Server Authentication Certificate TLS Web Client Authentication Certificate Code Signing Certificate E-Mail Protection Certificate Time Stamping Certifcate OCSP Responder Certificate Strong Crypto Export Approved Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 68:36:21:d3:2d:b6:e7:e6:4e:c7:b0:b1:8b:ae:8e:39: a7:00:9b:3b:eb:99:44:53:2d:8f:92:a6:d1:2f:56:32: a8:8c:94:5b:5b:ef:08:f7:b9:44:3b:0c:b8:22:34:5b: ee:10:e3:6a:1a:e3:73:2e:56:fe:0b:fe:bf:31:d2:b5: 86:da:73:ed:be:8c:3d:b5:4d:a0:94:f9:31:72:54:97: b3:93:41:ce:4d:52:e5:c1:94:f0:4d:47:71:0a:24:c7: b3:70:c1:e9:1c:b6:1f:a6:1c:9d:72:ab:b2:20:ee:eb: e8:71:33:05:22:59:1b:47:2e:20:d0:b7:43:55:c8:82: f4:87:06:0b:fb:e4:16:fd:ba:77:14:e3:6f:7f:20:e2: a9:56:3d:d1:ec:78:6c:23:f4:10:a9:ef:6d:3d:ac:60: 64:58:8f:e7:57:8e:5c:74:5f:01:bf:d0:38:7b:de:f6: c9:15:72:64:2b:d2:b2:a6:78:44:e2:b0:e4:a5:cf:05: 27:36:f5:2a:e1:3c:a1:c7:5a:24:f2:77:45:8c:d3:47: 5d:e8:a0:e9:79:45:98:98:57:b0:27:bf:0c:4d:e6:4c: 73:6b:64:d8:80:e4:31:01:e2:c2:5e:8c:b9:e6:4b:42: ed:a4:77:61:3c:20:b9:8c:5a:fa:a2:ef:ee:93:3d:83 Fingerprint (SHA-256): 55:6C:A3:C6:73:5A:82:A8:A3:EC:5A:46:5A:44:2F:F0:6C:29:37:53:4E:A9:91:E7:19:F7:0F:33:50:97:F2:AE Fingerprint (SHA1): 26:CC:78:D5:94:6D:A3:1D:EE:8E:12:D2:53:B1:BF:33:38:D0:70:E5 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #340: Extended Key Usage Extension (10) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -S -n TestExt11 -t u,u,u -o /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/tempcert -s CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US -x -f ../tests.pw -z ../tests_noise -1 < /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/test.args certutil options: 1 2 3 4 5 6 10 n Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -L -n TestExt11 Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:16:3c Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Validity: Not Before: Wed Oct 18 17:08:58 2023 Not After : Thu Jan 18 17:08:58 2024 Subject: "CN=TestExt11,E=TestExt11@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: bb:90:e6:15:51:4d:a5:ac:24:98:48:2f:17:32:b8:29: 10:20:ee:9d:60:65:f3:96:d4:f3:00:27:a7:3d:e7:13: 93:c9:ef:03:85:73:27:c8:e7:6e:eb:1d:14:b7:32:2b: 0f:cf:6f:c3:35:36:58:54:64:4b:b5:f7:d5:95:2e:c2: 5a:5e:98:21:50:e5:6d:ee:92:0d:b3:58:7c:23:ae:96: d0:86:7a:76:c3:29:1a:2a:45:99:90:2b:d5:d8:2e:f5: 94:81:22:f4:5d:31:16:5c:ea:f2:db:9e:8c:7d:c5:0a: 69:52:6c:93:20:9c:14:2c:51:1f:02:ca:8e:85:99:f8: db:86:43:2d:a5:8f:0d:eb:7f:ba:b2:ba:5b:c2:f2:1d: 3a:64:2e:e3:77:28:cc:2f:2f:86:08:2e:ef:42:14:54: 7d:b0:28:6d:6d:d7:61:6c:f2:f9:30:f8:26:c5:83:28: d2:c3:24:f2:51:b9:73:21:fc:d7:b8:eb:bb:a3:b8:1a: 92:c1:8a:76:42:43:d1:1b:b4:08:12:2e:16:bc:ef:85: 4b:6a:5b:e4:68:c7:84:db:e7:cf:60:0a:f0:60:b2:88: c5:a9:3d:7d:68:41:5f:17:f3:cd:86:d7:f9:c6:69:a4: a7:03:66:18:3e:0d:be:a9:52:10:d2:04:06:51:b5:71 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Key Usage Usages: Non-Repudiation Key Encipherment Data Encipherment Key Agreement Certificate Signing CRL Signing Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 08:05:45:2e:ed:b7:14:df:6e:37:f8:f1:63:8d:c6:89: 97:23:e8:6f:e7:20:18:2a:d9:ce:40:ad:0c:5e:b3:70: 01:1a:b2:6a:83:8e:24:ef:2c:5a:e3:88:6d:c3:06:42: 5d:e9:62:4b:3f:82:19:0f:f4:d5:33:4f:68:18:d7:88: 37:c5:db:29:d2:e8:16:71:f4:f3:36:00:f0:21:77:55: 47:64:55:05:8f:c6:76:93:00:5b:0d:99:21:99:22:ce: b4:81:97:10:bf:7d:e9:cd:7c:d6:b3:bc:d1:1e:f0:0b: 02:4e:49:90:8b:69:f1:5b:de:e8:e7:ed:56:43:f4:e8: 74:4e:4a:32:9d:c0:43:3e:28:0e:72:14:3c:52:da:11: b4:be:30:fd:8c:73:98:3b:00:1d:0f:c1:74:84:79:2f: 3f:5f:93:e4:b9:1e:91:fd:c3:59:6e:c8:67:d7:d4:ab: 86:7e:52:2d:dc:03:0c:5b:d0:ed:72:b5:4b:e7:47:56: c1:0d:66:a6:5e:5e:0c:1c:02:81:7a:8c:d1:ee:17:ac: 62:52:51:ee:39:57:75:86:d0:cb:79:7b:3a:7d:15:41: 4b:d7:f8:4b:5c:4d:d0:2e:bf:23:3e:2a:7c:ed:40:ef: 50:6d:83:37:db:24:2a:19:42:e8:83:e7:11:d7:87:64 Fingerprint (SHA-256): 73:74:68:BB:8E:FE:80:4B:11:43:6F:B3:43:86:D2:20:D2:BF:C7:89:F6:C2:E4:49:BC:B5:3C:92:BB:68:B9:6C Fingerprint (SHA1): 4B:E6:DD:52:75:C1:7E:05:2A:EB:37:28:42:0E:92:5F:A2:36:70:45 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #341: Certificate Key Usage Extension (11) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #342: create cert with invalid SAN parameter (12) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN example.com,dns:www.example.com Generating key. This may take a few moments... certutil: Problem creating SubjectAltName extension: error 0: Success certutil: unable to create cert (Success) cert.sh: #343: create cert with invalid SAN parameter (13) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extSAN dns:example.com,dns:www.example.com Generating key. This may take a few moments... cert.sh: #344: create cert with valid SAN parameter (14) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:16:3f Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed Oct 18 17:08:59 2023 Not After : Thu Jan 18 17:08:59 2024 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: c3:04:a4:01:49:6d:dc:aa:5e:19:64:ca:a0:95:5d:c8: e3:ef:59:25:bd:95:fe:30:4c:fc:c1:d0:00:ea:a7:4b: 17:75:29:09:b5:62:59:f8:f4:da:88:ae:46:95:0d:31: 20:11:b4:a0:42:8e:48:b5:48:4d:d0:85:97:13:9d:de: 3c:c6:57:58:ab:26:8e:9b:3d:6d:f2:96:cf:51:06:fd: c0:cd:c9:79:d3:b6:ea:b3:55:aa:49:ad:16:79:65:d7: ac:76:37:65:ed:04:f0:ea:aa:93:5f:75:2b:14:e8:5c: 50:96:15:ba:09:9b:0c:1d:20:6a:79:05:84:73:4a:88: 2e:d3:00:5d:c3:60:ed:6f:d1:3d:3e:45:c2:5b:7e:83: fe:db:5f:e2:5a:21:23:76:85:22:56:1f:ed:fe:78:d8: 8e:2a:57:e1:92:95:8a:7e:1b:1d:bf:63:b6:c3:0b:7f: 61:85:79:2a:64:88:09:5c:41:d1:b2:ea:73:30:87:b2: 01:72:b9:8d:e4:7c:99:a4:32:90:79:d9:09:0c:92:ad: 01:36:77:db:e6:6f:7b:fa:6c:1f:c4:40:ff:09:cc:6b: bd:c1:b9:37:66:90:87:ff:e3:90:c5:17:bf:b3:95:8e: 05:e9:6c:b1:ab:b9:0f:f2:24:7d:0a:6e:15:1b:fe:03 Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: b6:1a:13:75:c5:cb:a0:9b:b7:c7:24:22:88:a5:68:95: 20:c5:99:78:47:3a:8d:2a:be:bf:0b:33:04:67:6b:24: 76:53:b6:62:a5:d7:51:ec:d9:54:ae:2e:6e:2c:1e:7c: 04:9c:4a:e1:90:76:bb:7d:75:92:5f:64:bd:29:55:70: 2b:13:fd:dc:bf:cd:00:8a:c4:19:83:3e:ea:8d:14:a2: b0:79:89:97:d8:3b:0c:bb:59:12:40:94:6c:5e:ac:9d: 4c:46:5b:3b:8b:86:0d:67:e3:ec:a9:be:d9:0f:d0:d4: 20:d2:67:26:8e:89:f1:00:a8:7b:10:a7:4b:e9:0d:49: be:57:b5:22:46:3e:34:b3:64:37:f0:04:e9:a6:8b:07: 49:91:06:54:df:60:b2:4f:ed:f6:7b:ac:0f:9c:6e:d8: d5:2b:33:64:f7:0f:ff:e8:31:96:53:72:15:0b:64:47: 25:9e:05:d7:08:f3:66:69:da:21:c5:8c:d6:26:3a:7d: 44:03:46:15:57:d8:8f:48:e5:9c:16:fb:0e:c2:fb:77: 24:0e:4e:96:96:7f:58:fb:b4:03:d8:67:6e:06:4c:72: f4:52:f8:1b:5a:89:26:00:64:38:6c:e5:71:17:49:fc: fc:8a:82:bd:ff:41:0a:11:ce:17:aa:91:cf:4d:24:29 Fingerprint (SHA-256): 06:1D:3D:29:88:91:95:85:AD:60:17:B2:6D:22:DA:9D:68:C4:7D:48:EF:4B:14:FB:8B:55:F4:14:FE:4F:F0:33 Fingerprint (SHA1): B6:64:4B:B3:DB:F8:64:FA:A2:58:1F:84:0B:29:4F:7E:7D:FA:5E:70 Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #345: create cert with valid SAN parameter (15) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN --dump-ext-val 2.5.29.17 writing output to /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der cert.sh: #346: dump extension 2.5.29.17 to file /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der (16) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #347: create cert with valid SAN parameter (17) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #348: expect failure to list cert, because we deleted it (18) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der: error 0: Success cert.sh: #349: create cert with invalid generic ext parameter (19) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der: error 0: Success cert.sh: #350: create cert with invalid generic ext parameter (20) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der Generating key. This may take a few moments... certutil: error parsing generic extension parameter not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der,2.5.29.17:critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der: error 0: Success cert.sh: #351: create cert with invalid generic ext parameter (21) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -s CN=example.com -S -t ,, -x -z ../tests_noise -n WithSAN --extGeneric 2.5.29.17:not-critical:/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions/sanext.der Generating key. This may take a few moments... cert.sh: #352: create cert with valid generic ext parameter (22) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN Certificate: Data: Version: 3 (0x2) Serial Number: 00:c1:00:16:43 Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Issuer: "CN=example.com" Validity: Not Before: Wed Oct 18 17:09:01 2023 Not After : Thu Jan 18 17:09:01 2024 Subject: "CN=example.com" Subject Public Key Info: Public Key Algorithm: PKCS #1 RSA Encryption RSA Public Key: Modulus: d3:8e:70:aa:da:b6:8a:06:30:a3:7f:be:08:9a:61:4f: 7f:05:9f:8c:3a:ef:95:c5:27:7a:4b:c5:1b:da:e0:38: 83:93:5d:3d:57:19:59:4b:95:fc:2b:24:cf:82:a8:18: 62:44:a4:e5:f6:78:27:10:d7:d6:e4:27:c4:53:38:49: 05:a8:f6:f9:81:d7:22:0f:62:8f:ef:47:30:a5:0e:ef: 39:b5:a5:b2:fa:52:d0:6b:9a:f1:a9:94:56:c1:b5:ff: 44:78:d7:c1:aa:3a:94:a8:8e:e5:d3:52:30:08:3b:34: ad:9d:c4:22:52:6c:35:da:ab:ca:5d:77:5a:ab:27:54: f9:fc:f9:c2:f3:83:74:3f:9d:7b:0e:93:78:66:be:c6: c6:38:af:81:9d:37:c6:dd:63:0e:3d:aa:83:b5:27:b5: a7:85:bc:9b:ea:57:e2:84:ad:80:81:47:96:b6:9e:e9: e5:46:78:68:20:5b:23:68:48:3a:83:64:55:b7:d2:7f: 2c:c8:bd:24:d3:3c:69:db:93:ad:9c:94:7c:a2:75:c1: b2:49:72:cf:5a:20:21:f2:29:79:59:73:fa:00:db:08: 03:a3:69:d1:96:cd:86:7e:22:28:69:ce:b3:2a:a2:a6: 2f:70:e0:af:93:71:f1:7b:ec:1a:7e:2b:10:d2:59:5d Exponent: 65537 (0x10001) Signed Extensions: Name: Certificate Subject Alt Name DNS name: "example.com" DNS name: "www.example.com" Signature Algorithm: PKCS #1 SHA-256 With RSA Encryption Signature: 6b:e8:4a:72:56:6e:27:1e:42:63:d7:65:52:9c:96:6b: c3:5d:a8:08:fb:17:70:41:6e:59:cf:7a:7e:e4:bd:ff: 74:7a:e9:a6:18:19:c4:07:8c:5a:53:a3:bb:53:76:e4: 68:13:f5:85:48:f5:a9:90:6b:46:62:a4:86:69:18:af: 29:d0:d1:19:1b:f8:46:56:2d:4f:35:78:f9:96:a6:ac: 6e:5e:c2:06:56:e0:fe:aa:46:9b:00:1f:3b:13:32:7a: 44:08:d8:71:ab:26:98:24:6d:15:f0:9d:3a:b5:7b:f8: 94:ba:8b:23:9a:f4:64:e9:ff:29:01:15:82:53:2d:ea: 6e:2e:ab:ed:51:ea:f7:3f:fb:94:76:b0:4b:8f:e6:77: 26:d4:f3:96:aa:cf:e2:8b:51:47:15:32:b1:58:e6:29: 64:ce:7e:e6:72:22:a3:a0:41:b4:a7:37:a9:31:6a:d5: 91:10:4f:88:f5:04:fb:47:4c:14:8e:fb:3a:b9:65:82: 4b:6b:5d:4c:1d:ee:42:5c:35:bb:5c:ec:19:f4:f7:4f: f2:f2:70:1a:0b:df:14:11:91:03:68:d9:f0:b1:6e:9a: 33:8c:21:04:d8:bc:bc:eb:a3:d2:90:2e:93:74:da:25: b5:ca:c3:90:fb:f4:6b:a9:5d:14:9d:76:bd:dd:2a:28 Fingerprint (SHA-256): EA:02:E0:6D:CC:18:57:CF:2C:CD:53:72:06:40:67:56:00:88:F6:21:E3:95:BC:BE:06:E8:93:33:E3:7E:9A:75 Fingerprint (SHA1): 62:31:05:97:EC:E1:05:B3:6A:8C:D1:6A:97:C4:A4:78:BF:F7:41:6B Mozilla-CA-Policy: false (attribute missing) Certificate Trust Flags: SSL Flags: User Email Flags: User Object Signing Flags: User cert.sh: #353: create cert with valid generic ext parameter (23) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -D -n WithSAN cert.sh: #354: create cert with valid generic ext parameter (24) - PASSED certutil -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/cert_extensions -f ../tests.pw -L -n WithSAN certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found certutil: Could not find cert: WithSAN : PR_FILE_NOT_FOUND_ERROR: File not found cert.sh: #355: expect failure to list cert, because we deleted it (25) - PASSED cert.sh: Create A Password Test Cert ============== cert.sh: Create A Password Test Ca -------- cert.sh: Creating a CA Certificate PasswordCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dbpass cert.sh: Creating CA Cert DB -------------------------- certutil -s "CN=TestExt11, E=TestExt11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.pw cert.sh: #356: Creating CA Cert DB - PASSED cert.sh: Loading root cert module to CA Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dbpass WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #357: Loading root cert module to CA Cert DB - PASSED cert.sh: Certificate initialized ---------- cert.sh: Creating CA Cert PasswordCA -------------------------- certutil -s "CN=NSS Password Test CA, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCA -t CTu,CTu,CTu -v 600 -x -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dbpass -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 1 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Notice: Trust flag u is set automatically if the private key is present. Is this a critical extension [y/N]? cert.sh: #358: Creating CA Cert PasswordCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n PasswordCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dbpass -o root.cert cert.sh: #359: Exporting Root Cert - PASSED cert.sh: Changing password on Password Test Cert's Cert DB -------------------------- certutil -W -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.pw -@ ../tests.fipspw Password changed successfully. cert.sh: #360: Changing password on Password Test Cert's Cert DB - PASSED cert.sh: Generate Certificate for Password Test Cert with new password -------------------------- certutil -s "CN=Password Test Cert, E=password@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n PasswordCert -c PasswordCA -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.fipspw -z ../tests_noise Generating key. This may take a few moments... Notice: Trust flag u is set automatically if the private key is present. cert.sh: #361: Generate Certificate for Password Test Cert with new password - PASSED cert.sh SUCCESS: PASSWORD passed cert.sh: Verify Certificate for Password Test Cert with new password -------------------------- certutil -V -n PasswordCert -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/dbpass -f ../tests.fipspw certutil: certificate is valid cert.sh: #362: Verify Certificate for Password Test Cert with new password - PASSED cert.sh: Creating Distrusted Certificate cert.sh: Initializing Distrusted's Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw cert.sh: #363: Initializing Distrusted's Cert DB - PASSED cert.sh: Loading root cert module to Distrusted's Cert DB -------------------------- modutil -add RootCerts -libfile /builddir/build/BUILD/nss-3.90/dist/Linux3.10_ppc_cc_glibc_PTH_64_OPT.OBJ/lib/libnssckbi.so -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust WARNING: Performing this operation while the browser is running could cause corruption of your security databases. If the browser is currently running, you should exit browser before continuing this operation. Type 'q ' to abort, or to continue: Module "RootCerts" added to database. cert.sh: #364: Loading root cert module to Distrusted's Cert DB - PASSED cert.sh: Import Root CA for Distrusted -------------------------- certutil -A -n TestCA -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/TestCA.ca.cert cert.sh: #365: Import Root CA for Distrusted - PASSED cert.sh: Import DSA Root CA for Distrusted -------------------------- certutil -A -n TestCA-dsa -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/TestCA-dsa.ca.cert cert.sh: #366: Import DSA Root CA for Distrusted - PASSED cert.sh: Import EC Root CA for Distrusted -------------------------- certutil -A -n TestCA-ec -t TC,TC,TC -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/TestCA-ec.ca.cert cert.sh: #367: Import EC Root CA for Distrusted - PASSED cert.sh: Generate Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #368: Generate Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's Request -------------------------- certutil -C -c TestCA -m 2000 -v 60 -d ../CA -i req -o Distrusted.cert -f ../tests.pw cert.sh: #369: Sign Distrusted's Request - PASSED cert.sh: Import Distrusted's Cert -------------------------- certutil -A -n Distrusted -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #370: Import Distrusted's Cert - PASSED cert.sh SUCCESS: Distrusted's Cert Created cert.sh: Generate DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #371: Generate DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 2000 -v 60 -d ../CA -i req -o Distrusted-dsa.cert -f ../tests.pw cert.sh: #372: Sign Distrusted's DSA Request - PASSED cert.sh: Import Distrusted's DSA Cert -------------------------- certutil -A -n Distrusted-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #373: Import Distrusted's DSA Cert - PASSED cert.sh SUCCESS: Distrusted's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #374: Generate mixed DSA Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 22000 -v 60 -d ../CA -i req -o Distrusted-dsamixed.cert -f ../tests.pw cert.sh: #375: Sign Distrusted's DSA Request with RSA - PASSED cert.sh: Import Distrusted's mixed DSA Cert -------------------------- certutil -A -n Distrusted-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #376: Import Distrusted's mixed DSA Cert - PASSED cert.sh SUCCESS: Distrusted's mixed DSA Cert Created cert.sh: Generate EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #377: Generate EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request -------------------------- certutil -C -c TestCA-ec -m 2000 -v 60 -d ../CA -i req -o Distrusted-ec.cert -f ../tests.pw cert.sh: #378: Sign Distrusted's EC Request - PASSED cert.sh: Import Distrusted's EC Cert -------------------------- certutil -A -n Distrusted-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #379: Import Distrusted's EC Cert - PASSED cert.sh SUCCESS: Distrusted's EC Cert Created cert.sh: Generate mixed EC Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #380: Generate mixed EC Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's EC Request with RSA -------------------------- certutil -C -c TestCA -m 12000 -v 60 -d ../CA -i req -o Distrusted-ecmixed.cert -f ../tests.pw cert.sh: #381: Sign Distrusted's EC Request with RSA - PASSED cert.sh: Import Distrusted's mixed EC Cert -------------------------- certutil -A -n Distrusted-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #382: Import Distrusted's mixed EC Cert - PASSED cert.sh SUCCESS: Distrusted's mixed EC Cert Created Importing RSA-PSS server certificate Import Distrusted's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for Distrusted -------------------------- certutil -s "CN=Distrusted, E=Distrusted-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #383: Generate RSA-PSS Cert Request for Distrusted - PASSED cert.sh: Sign Distrusted's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 32000 -v 60 -d ../CA -i req -o Distrusted-rsa-pss.cert -f ../tests.pw cert.sh: #384: Sign Distrusted's RSA-PSS Request - PASSED cert.sh: Import Distrusted's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n Distrusted-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i Distrusted-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #385: Import Distrusted's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: Distrusted's RSA-PSS Cert Created cert.sh: Mark CERT as unstrusted -------------------------- certutil -M -n Distrusted -t p,p,p -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw cert.sh: #386: Mark CERT as unstrusted - PASSED cert.sh: Creating Distrusted Intermediate cert.sh: Creating a CA Certificate DistrustedCA ========================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA cert.sh: Creating CA Cert DistrustedCA -------------------------- certutil -s "CN=DistrustedCA, E=DistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -S -n DistrustedCA -t ,, -v 600 -c TestCA -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -1 -2 -5 -f ../tests.pw -z ../tests_noise -m 2010 Generating key. This may take a few moments... 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > 0 - Digital Signature 1 - Non-repudiation 2 - Key encipherment 3 - Data encipherment 4 - Key agreement 5 - Cert signing key 6 - CRL signing key Other to finish > Is this a critical extension [y/N]? Is this a CA certificate [y/N]? Enter the path length constraint, enter to skip [<0 for unlimited path]: > Is this a critical extension [y/N]? 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > 0 - SSL Client 1 - SSL Server 2 - S/MIME 3 - Object Signing 4 - Reserved for future use 5 - SSL CA 6 - S/MIME CA 7 - Object Signing CA Other to finish > Is this a critical extension [y/N]? cert.sh: #387: Creating CA Cert DistrustedCA - PASSED cert.sh: Exporting Root Cert -------------------------- certutil -L -n DistrustedCA -r -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -o root.cert cert.sh: #388: Exporting Root Cert - PASSED cert.sh: Import Distrusted Intermediate -------------------------- certutil -A -n DistrustedCA -t p,p,p -f ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -i ../CA/DistrustedCA.ca.cert cert.sh: #389: Import Distrusted Intermediate - PASSED cert.sh: Generate Cert Request for Leaf Chained to Distrusted CA -------------------------- certutil -s "CN=LeafChainedToDistrustedCA, E=LeafChainedToDistrustedCA@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #390: Generate Cert Request for Leaf Chained to Distrusted CA - PASSED cp: './req' and '/builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA/req' are the same file cert.sh: Sign LeafChainedToDistrustedCA's Request -------------------------- certutil -C -c DistrustedCA -m 100 -v 60 -d ../CA -i req -o LeafChainedToDistrustedCA.cert -f ../tests.pw cert.sh: #391: Sign LeafChainedToDistrustedCA's Request - PASSED cert.sh: Import LeafChainedToDistrustedCA's Cert -t u,u,u -------------------------- certutil -A -n LeafChainedToDistrustedCA -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw -i LeafChainedToDistrustedCA.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #392: Import LeafChainedToDistrustedCA's Cert -t u,u,u - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Server -------------------------- certutil -V -n LeafChainedToDistrustedCA -u V -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #393: Verify LeafChainedToDistrustedCA Cert for SSL Server - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for SSL Client -------------------------- certutil -V -n LeafChainedToDistrustedCA -u C -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #394: Verify LeafChainedToDistrustedCA Cert for SSL Client - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #395: Verify LeafChainedToDistrustedCA Cert for Email signer - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Email recipient -------------------------- certutil -V -n LeafChainedToDistrustedCA -u R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate issuer has been marked as not trusted by the user. cert.sh: #396: Verify LeafChainedToDistrustedCA Cert for Email recipient - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for OCSP responder -------------------------- certutil -V -n LeafChainedToDistrustedCA -u O -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #397: Verify LeafChainedToDistrustedCA Cert for OCSP responder - PASSED cert.sh: Verify LeafChainedToDistrustedCA Cert for Object Signer -------------------------- certutil -V -n LeafChainedToDistrustedCA -u J -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #398: Verify LeafChainedToDistrustedCA Cert for Object Signer - PASSED cert.sh: Verify Distrusted Cert for SSL Server -------------------------- certutil -V -n Distrusted -u V -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #399: Verify Distrusted Cert for SSL Server - PASSED cert.sh: Verify Distrusted Cert for SSL Client -------------------------- certutil -V -n Distrusted -u C -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #400: Verify Distrusted Cert for SSL Client - PASSED cert.sh: Verify Distrusted Cert for Email signer -------------------------- certutil -V -n Distrusted -u S -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #401: Verify Distrusted Cert for Email signer - PASSED cert.sh: Verify Distrusted Cert for Email recipient -------------------------- certutil -V -n Distrusted -u R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #402: Verify Distrusted Cert for Email recipient - PASSED cert.sh: Verify Distrusted Cert for OCSP responder -------------------------- certutil -V -n Distrusted -u O -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Certificate type not approved for application. cert.sh: #403: Verify Distrusted Cert for OCSP responder - PASSED cert.sh: Verify Distrusted Cert for Object Signer -------------------------- certutil -V -n Distrusted -u J -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/distrust -f ../tests.pw certutil: certificate is invalid: Peer's certificate has been marked as not trusted by the user. cert.sh: #404: Verify Distrusted Cert for Object Signer - PASSED cert.sh: OCSP response creation selftest cert.sh: perform selftest -------------------------- ocspresp /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/serverCA serverCA chain-1-serverCA -f ../tests.pw cert.sh: #405: perform selftest - PASSED cert.sh: Initialize Cert DB -------------------------- certutil -N -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw cert.sh: #406: Initialize Cert DB - PASSED cert.sh: Import RSA CA Cert -------------------------- certutil -A -n TestCA -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i ../CA/TestCA.ca.cert cert.sh: #407: Import RSA CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert -------------------------- certutil -A -n TestCA-rsa-pss -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss.ca.cert cert.sh: #408: Import RSA-PSS CA Cert - PASSED cert.sh: Verify RSA-PSS CA Cert -------------------------- certutil -V -u L -e -n TestCA-rsa-pss -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #409: Verify RSA-PSS CA Cert - PASSED cert.sh: Import RSA-PSS CA Cert (SHA1) -------------------------- certutil -A -n TestCA-rsa-pss-sha1 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i ../CA/TestCA-rsa-pss-sha1.ca.cert cert.sh: #410: Import RSA-PSS CA Cert (SHA1) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -A -n TestCA-bogus-rsa-pss1 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestCA-bogus-rsa-pss1.crt cert.sh: #411: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid trailerField) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss1 -u L -e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is invalid: Peer's certificate has an invalid signature. cert.sh: #412: Import Bogus RSA-PSS CA Cert (invalid trailerField) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -A -n TestCA-bogus-rsa-pss2 -t C,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestCA-bogus-rsa-pss2.crt cert.sh: #413: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Import Bogus RSA-PSS CA Cert (invalid hashAlg) -------------------------- certutil -V -b 1712101010Z -n TestCA-bogus-rsa-pss2 -u L -e -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is invalid: The certificate was signed using a signature algorithm that is disabled because it is not secure. cert.sh: #414: Import Bogus RSA-PSS CA Cert (invalid hashAlg) - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss1 -------------------------- certutil -s "CN=TestUser-rsa-pss1, E=TestUser-rsa-pss1@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #415: Generate Cert Request for TestUser-rsa-pss1 - PASSED cert.sh: Sign TestUser-rsa-pss1's Request -------------------------- certutil -C -c TestCA --pss-sign -m 200 -v 60 -d ../CA -i req -o TestUser-rsa-pss1.cert -f ../tests.pw cert.sh: #416: Sign TestUser-rsa-pss1's Request - PASSED cert.sh: Import TestUser-rsa-pss1's Cert -------------------------- certutil -A -n TestUser-rsa-pss1 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss1.cert cert.sh: #417: Import TestUser-rsa-pss1's Cert - PASSED cert.sh: Verify TestUser-rsa-pss1's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #418: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: #419: Verify TestUser-rsa-pss1's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss2 -------------------------- certutil -s "CN=TestUser-rsa-pss2, E=TestUser-rsa-pss2@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #420: Generate Cert Request for TestUser-rsa-pss2 - PASSED cert.sh: Sign TestUser-rsa-pss2's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA512 -m 201 -v 60 -d ../CA -i req -o TestUser-rsa-pss2.cert -f ../tests.pw cert.sh: #421: Sign TestUser-rsa-pss2's Request - PASSED cert.sh: Import TestUser-rsa-pss2's Cert -------------------------- certutil -A -n TestUser-rsa-pss2 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss2.cert cert.sh: #422: Import TestUser-rsa-pss2's Cert - PASSED cert.sh: Verify TestUser-rsa-pss2's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss2 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #423: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: #424: Verify TestUser-rsa-pss2's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss3 -------------------------- certutil -s "CN=TestUser-rsa-pss3, E=TestUser-rsa-pss3@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #425: Generate Cert Request for TestUser-rsa-pss3 - PASSED cert.sh: Sign TestUser-rsa-pss3's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 202 -v 60 -d ../CA -i req -o TestUser-rsa-pss3.cert -f ../tests.pw cert.sh: #426: Sign TestUser-rsa-pss3's Request - PASSED cert.sh: Import TestUser-rsa-pss3's Cert -------------------------- certutil -A -n TestUser-rsa-pss3 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss3.cert cert.sh: #427: Import TestUser-rsa-pss3's Cert - PASSED cert.sh: Verify TestUser-rsa-pss3's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss3 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #428: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: #429: Verify TestUser-rsa-pss3's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss4 -------------------------- certutil -s "CN=TestUser-rsa-pss4, E=TestUser-rsa-pss4@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #430: Generate Cert Request for TestUser-rsa-pss4 - PASSED cert.sh: Sign TestUser-rsa-pss4's Request -------------------------- certutil -C -c TestCA --pss-sign -m 203 -v 60 -d ../CA -i req -o TestUser-rsa-pss4.cert -f ../tests.pw cert.sh: #431: Sign TestUser-rsa-pss4's Request - PASSED cert.sh: Import TestUser-rsa-pss4's Cert -------------------------- certutil -A -n TestUser-rsa-pss4 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss4.cert cert.sh: #432: Import TestUser-rsa-pss4's Cert - PASSED cert.sh: Verify TestUser-rsa-pss4's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss4 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #433: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: #434: Verify TestUser-rsa-pss4's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss5 -------------------------- certutil -s "CN=TestUser-rsa-pss5, E=TestUser-rsa-pss5@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #435: Generate Cert Request for TestUser-rsa-pss5 - PASSED cert.sh: Sign TestUser-rsa-pss5's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -m 204 -v 60 -d ../CA -i req -o TestUser-rsa-pss5.cert -f ../tests.pw cert.sh: #436: Sign TestUser-rsa-pss5's Request - PASSED cert.sh: Import TestUser-rsa-pss5's Cert -------------------------- certutil -A -n TestUser-rsa-pss5 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss5.cert cert.sh: #437: Import TestUser-rsa-pss5's Cert - PASSED cert.sh: Verify TestUser-rsa-pss5's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss5 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #438: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: #439: Verify TestUser-rsa-pss5's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss6 -------------------------- certutil -s "CN=TestUser-rsa-pss6, E=TestUser-rsa-pss6@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #440: Generate Cert Request for TestUser-rsa-pss6 - PASSED cert.sh: Sign TestUser-rsa-pss6's Request -------------------------- certutil -C -c TestCA-rsa-pss -m 205 -v 60 -d ../CA -i req -o TestUser-rsa-pss6.cert -f ../tests.pw cert.sh: #441: Sign TestUser-rsa-pss6's Request - PASSED cert.sh: Import TestUser-rsa-pss6's Cert -------------------------- certutil -A -n TestUser-rsa-pss6 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss6.cert cert.sh: #442: Import TestUser-rsa-pss6's Cert - PASSED cert.sh: Verify TestUser-rsa-pss6's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss6 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #443: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: #444: Verify TestUser-rsa-pss6's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss7 -------------------------- certutil -s "CN=TestUser-rsa-pss7, E=TestUser-rsa-pss7@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #445: Generate Cert Request for TestUser-rsa-pss7 - PASSED cert.sh: Sign TestUser-rsa-pss7's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA512 -m 206 -v 60 -d ../CA -i req -o TestUser-rsa-pss7.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #446: Sign TestUser-rsa-pss7's Request - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss8 -------------------------- certutil -s "CN=TestUser-rsa-pss8, E=TestUser-rsa-pss8@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #447: Generate Cert Request for TestUser-rsa-pss8 - PASSED cert.sh: Sign TestUser-rsa-pss8's Request -------------------------- certutil -C -c TestCA-rsa-pss --pss-sign -Z SHA256 -m 207 -v 60 -d ../CA -i req -o TestUser-rsa-pss8.cert -f ../tests.pw cert.sh: #448: Sign TestUser-rsa-pss8's Request - PASSED cert.sh: Import TestUser-rsa-pss8's Cert -------------------------- certutil -A -n TestUser-rsa-pss8 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss8.cert cert.sh: #449: Import TestUser-rsa-pss8's Cert - PASSED cert.sh: Verify TestUser-rsa-pss8's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss8 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #450: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: #451: Verify TestUser-rsa-pss8's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss9 -------------------------- certutil -s "CN=TestUser-rsa-pss9, E=TestUser-rsa-pss9@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #452: Generate Cert Request for TestUser-rsa-pss9 - PASSED cert.sh: Sign TestUser-rsa-pss9's Request -------------------------- certutil -C -c TestCA --pss-sign -Z SHA1 -m 208 -v 60 -d ../CA -i req -o TestUser-rsa-pss9.cert -f ../tests.pw cert.sh: #453: Sign TestUser-rsa-pss9's Request - PASSED cert.sh: Import TestUser-rsa-pss9's Cert -------------------------- certutil -A -n TestUser-rsa-pss9 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss9.cert cert.sh: #454: Import TestUser-rsa-pss9's Cert - PASSED cert.sh: Verify TestUser-rsa-pss9's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss9 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #455: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: #456: Verify TestUser-rsa-pss9's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss10 -------------------------- certutil -s "CN=TestUser-rsa-pss10, E=TestUser-rsa-pss10@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #457: Generate Cert Request for TestUser-rsa-pss10 - PASSED cert.sh: Sign TestUser-rsa-pss10's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 -m 209 -v 60 -d ../CA -i req -o TestUser-rsa-pss10.cert -f ../tests.pw cert.sh: #458: Sign TestUser-rsa-pss10's Request - PASSED cert.sh: Import TestUser-rsa-pss10's Cert -------------------------- certutil -A -n TestUser-rsa-pss10 -t ,, -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -i TestUser-rsa-pss10.cert cert.sh: #459: Import TestUser-rsa-pss10's Cert - PASSED cert.sh: Verify TestUser-rsa-pss10's Cert -------------------------- certutil -V -u V -e -n TestUser-rsa-pss10 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw certutil: certificate is valid cert.sh: #460: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: #461: Verify TestUser-rsa-pss10's Cert - PASSED cert.sh: Generate Cert Request for TestUser-rsa-pss11 -------------------------- certutil -s "CN=TestUser-rsa-pss11, E=TestUser-rsa-pss11@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/rsapss -f ../tests.pw -z ../tests_noise --pss -o req Generating key. This may take a few moments... cert.sh: #462: Generate Cert Request for TestUser-rsa-pss11 - PASSED cert.sh: Sign TestUser-rsa-pss11's Request -------------------------- certutil -C -c TestCA-rsa-pss-sha1 --pss-sign -Z SHA256 -m 210 -v 60 -d ../CA -i req -o TestUser-rsa-pss11.cert -f ../tests.pw certutil: Could not create RSA-PSS parameters: SEC_ERROR_INVALID_ARGS: security library: invalid arguments. certutil: unable to create cert (security library: invalid arguments.) cert.sh: #463: Sign TestUser-rsa-pss11's Request - PASSED cert.sh: specify token with PKCS#11 URI cert.sh: List keys in NSS Certificate DB -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=NSS%20Certificate%20DB;manufacturer=Mozilla%20Foundation;serial=0000000000000000;model=NSS%203 certutil: Checking token "NSS Certificate DB" in slot "NSS User Private Key and Certificate Services" < 0> dsa 9d7f77539eb478d20165f4f02aafad2e420cc32c NSS Certificate DB:localhost.localdomain-dsa < 1> ec 3777888d5244681d6b21e9adf6436c3c3f3c0fdf NSS Certificate DB:localhost-sni.localdomain-ecmixed < 2> rsa 6d90f0b7140a73b9907ece4ab1c233a14307704d (orphan) < 3> ec 6481f05fdc06b95423ece0448f939d948a746d00 NSS Certificate DB:localhost.localdomain-ec < 4> dsa cc2b0e3fc913faf9e4c131b39baf64c07b1a1471 NSS Certificate DB:localhost-sni.localdomain-dsamixed < 5> ec f7536884dac65c34ed04c4b087d20fec717d650f NSS Certificate DB:localhost-sni.localdomain-ec < 6> rsa ca75df9632637f07486b5f1b31e55d03e1d449cf TestUser-rsa-pss-interop < 7> rsa c1d8c317769b83b906a482f312f563e974d1f226 NSS Certificate DB:localhost.localdomain < 8> rsa 12a5f1a00081f4b22cae2f9b6f78a4f0434520fc NSS Certificate DB:localhost-sni.localdomain < 9> dsa b7281ff9a2524453db1d8d89edd4e38d9d4ec452 NSS Certificate DB:localhost-sni.localdomain-dsa <10> dsa e9a388d3da96fe903aa644cbe87f537f7d081161 NSS Certificate DB:localhost.localdomain-dsamixed <11> ec 108b3a82456a4d1503b66beb9eba725b4db0ed14 NSS Certificate DB:localhost.localdomain-ecmixed cert.sh: #464: List keys in NSS Certificate DB - PASSED cert.sh: List keys in NSS Builtin Objects -------------------------- certutil -K -f ../tests.pw -d ../server -h pkcs11:token=Builtin%20Object%20Token;manufacturer=Mozilla%20Foundation;serial=1;model=1 certutil: Checking token "Builtin Object Token" in slot "NSS Builtin Objects" certutil: no keys found cert.sh: #465: List keys in NSS Builtin Objects - PASSED cert.sh: Creating Client CA Issued Certificates Range 40 - 52 === cert.sh: Generate Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #466: Generate Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's Request -------------------------- certutil -C -c TestCA -m 40 -v 60 -d ../CA -i req -o TestUser40.cert -f ../tests.pw cert.sh: #467: Sign TestUser40's Request - PASSED cert.sh: Import TestUser40's Cert -------------------------- certutil -A -n TestUser40 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #468: Import TestUser40's Cert - PASSED cert.sh SUCCESS: TestUser40's Cert Created cert.sh: Generate DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #469: Generate DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 40 -v 60 -d ../CA -i req -o TestUser40-dsa.cert -f ../tests.pw cert.sh: #470: Sign TestUser40's DSA Request - PASSED cert.sh: Import TestUser40's DSA Cert -------------------------- certutil -A -n TestUser40-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #471: Import TestUser40's DSA Cert - PASSED cert.sh SUCCESS: TestUser40's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #472: Generate mixed DSA Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20040 -v 60 -d ../CA -i req -o TestUser40-dsamixed.cert -f ../tests.pw cert.sh: #473: Sign TestUser40's DSA Request with RSA - PASSED cert.sh: Import TestUser40's mixed DSA Cert -------------------------- certutil -A -n TestUser40-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #474: Import TestUser40's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser40's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #475: Generate EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request -------------------------- certutil -C -c TestCA-ec -m 40 -v 60 -d ../CA -i req -o TestUser40-ec.cert -f ../tests.pw cert.sh: #476: Sign TestUser40's EC Request - PASSED cert.sh: Import TestUser40's EC Cert -------------------------- certutil -A -n TestUser40-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #477: Import TestUser40's EC Cert - PASSED cert.sh SUCCESS: TestUser40's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #478: Generate mixed EC Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10040 -v 60 -d ../CA -i req -o TestUser40-ecmixed.cert -f ../tests.pw cert.sh: #479: Sign TestUser40's EC Request with RSA - PASSED cert.sh: Import TestUser40's mixed EC Cert -------------------------- certutil -A -n TestUser40-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #480: Import TestUser40's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser40's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser40's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser40 -------------------------- certutil -s "CN=TestUser40, E=TestUser40-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #481: Generate RSA-PSS Cert Request for TestUser40 - PASSED cert.sh: Sign TestUser40's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30040 -v 60 -d ../CA -i req -o TestUser40-rsa-pss.cert -f ../tests.pw cert.sh: #482: Sign TestUser40's RSA-PSS Request - PASSED cert.sh: Import TestUser40's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser40-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser40-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #483: Import TestUser40's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser40's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #484: Generate Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's Request -------------------------- certutil -C -c TestCA -m 41 -v 60 -d ../CA -i req -o TestUser41.cert -f ../tests.pw cert.sh: #485: Sign TestUser41's Request - PASSED cert.sh: Import TestUser41's Cert -------------------------- certutil -A -n TestUser41 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #486: Import TestUser41's Cert - PASSED cert.sh SUCCESS: TestUser41's Cert Created cert.sh: Generate DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #487: Generate DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 41 -v 60 -d ../CA -i req -o TestUser41-dsa.cert -f ../tests.pw cert.sh: #488: Sign TestUser41's DSA Request - PASSED cert.sh: Import TestUser41's DSA Cert -------------------------- certutil -A -n TestUser41-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #489: Import TestUser41's DSA Cert - PASSED cert.sh SUCCESS: TestUser41's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #490: Generate mixed DSA Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20041 -v 60 -d ../CA -i req -o TestUser41-dsamixed.cert -f ../tests.pw cert.sh: #491: Sign TestUser41's DSA Request with RSA - PASSED cert.sh: Import TestUser41's mixed DSA Cert -------------------------- certutil -A -n TestUser41-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #492: Import TestUser41's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser41's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #493: Generate EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request -------------------------- certutil -C -c TestCA-ec -m 41 -v 60 -d ../CA -i req -o TestUser41-ec.cert -f ../tests.pw cert.sh: #494: Sign TestUser41's EC Request - PASSED cert.sh: Import TestUser41's EC Cert -------------------------- certutil -A -n TestUser41-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #495: Import TestUser41's EC Cert - PASSED cert.sh SUCCESS: TestUser41's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #496: Generate mixed EC Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10041 -v 60 -d ../CA -i req -o TestUser41-ecmixed.cert -f ../tests.pw cert.sh: #497: Sign TestUser41's EC Request with RSA - PASSED cert.sh: Import TestUser41's mixed EC Cert -------------------------- certutil -A -n TestUser41-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #498: Import TestUser41's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser41's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser41's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser41 -------------------------- certutil -s "CN=TestUser41, E=TestUser41-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #499: Generate RSA-PSS Cert Request for TestUser41 - PASSED cert.sh: Sign TestUser41's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30041 -v 60 -d ../CA -i req -o TestUser41-rsa-pss.cert -f ../tests.pw cert.sh: #500: Sign TestUser41's RSA-PSS Request - PASSED cert.sh: Import TestUser41's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser41-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser41-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #501: Import TestUser41's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser41's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #502: Generate Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's Request -------------------------- certutil -C -c TestCA -m 42 -v 60 -d ../CA -i req -o TestUser42.cert -f ../tests.pw cert.sh: #503: Sign TestUser42's Request - PASSED cert.sh: Import TestUser42's Cert -------------------------- certutil -A -n TestUser42 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #504: Import TestUser42's Cert - PASSED cert.sh SUCCESS: TestUser42's Cert Created cert.sh: Generate DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #505: Generate DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 42 -v 60 -d ../CA -i req -o TestUser42-dsa.cert -f ../tests.pw cert.sh: #506: Sign TestUser42's DSA Request - PASSED cert.sh: Import TestUser42's DSA Cert -------------------------- certutil -A -n TestUser42-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #507: Import TestUser42's DSA Cert - PASSED cert.sh SUCCESS: TestUser42's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #508: Generate mixed DSA Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20042 -v 60 -d ../CA -i req -o TestUser42-dsamixed.cert -f ../tests.pw cert.sh: #509: Sign TestUser42's DSA Request with RSA - PASSED cert.sh: Import TestUser42's mixed DSA Cert -------------------------- certutil -A -n TestUser42-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #510: Import TestUser42's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser42's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #511: Generate EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request -------------------------- certutil -C -c TestCA-ec -m 42 -v 60 -d ../CA -i req -o TestUser42-ec.cert -f ../tests.pw cert.sh: #512: Sign TestUser42's EC Request - PASSED cert.sh: Import TestUser42's EC Cert -------------------------- certutil -A -n TestUser42-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #513: Import TestUser42's EC Cert - PASSED cert.sh SUCCESS: TestUser42's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #514: Generate mixed EC Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10042 -v 60 -d ../CA -i req -o TestUser42-ecmixed.cert -f ../tests.pw cert.sh: #515: Sign TestUser42's EC Request with RSA - PASSED cert.sh: Import TestUser42's mixed EC Cert -------------------------- certutil -A -n TestUser42-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #516: Import TestUser42's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser42's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser42's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser42 -------------------------- certutil -s "CN=TestUser42, E=TestUser42-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #517: Generate RSA-PSS Cert Request for TestUser42 - PASSED cert.sh: Sign TestUser42's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30042 -v 60 -d ../CA -i req -o TestUser42-rsa-pss.cert -f ../tests.pw cert.sh: #518: Sign TestUser42's RSA-PSS Request - PASSED cert.sh: Import TestUser42's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser42-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser42-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #519: Import TestUser42's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser42's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #520: Generate Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's Request -------------------------- certutil -C -c TestCA -m 43 -v 60 -d ../CA -i req -o TestUser43.cert -f ../tests.pw cert.sh: #521: Sign TestUser43's Request - PASSED cert.sh: Import TestUser43's Cert -------------------------- certutil -A -n TestUser43 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #522: Import TestUser43's Cert - PASSED cert.sh SUCCESS: TestUser43's Cert Created cert.sh: Generate DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #523: Generate DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 43 -v 60 -d ../CA -i req -o TestUser43-dsa.cert -f ../tests.pw cert.sh: #524: Sign TestUser43's DSA Request - PASSED cert.sh: Import TestUser43's DSA Cert -------------------------- certutil -A -n TestUser43-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #525: Import TestUser43's DSA Cert - PASSED cert.sh SUCCESS: TestUser43's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #526: Generate mixed DSA Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20043 -v 60 -d ../CA -i req -o TestUser43-dsamixed.cert -f ../tests.pw cert.sh: #527: Sign TestUser43's DSA Request with RSA - PASSED cert.sh: Import TestUser43's mixed DSA Cert -------------------------- certutil -A -n TestUser43-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #528: Import TestUser43's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser43's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #529: Generate EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request -------------------------- certutil -C -c TestCA-ec -m 43 -v 60 -d ../CA -i req -o TestUser43-ec.cert -f ../tests.pw cert.sh: #530: Sign TestUser43's EC Request - PASSED cert.sh: Import TestUser43's EC Cert -------------------------- certutil -A -n TestUser43-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #531: Import TestUser43's EC Cert - PASSED cert.sh SUCCESS: TestUser43's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #532: Generate mixed EC Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10043 -v 60 -d ../CA -i req -o TestUser43-ecmixed.cert -f ../tests.pw cert.sh: #533: Sign TestUser43's EC Request with RSA - PASSED cert.sh: Import TestUser43's mixed EC Cert -------------------------- certutil -A -n TestUser43-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #534: Import TestUser43's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser43's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser43's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser43 -------------------------- certutil -s "CN=TestUser43, E=TestUser43-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #535: Generate RSA-PSS Cert Request for TestUser43 - PASSED cert.sh: Sign TestUser43's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30043 -v 60 -d ../CA -i req -o TestUser43-rsa-pss.cert -f ../tests.pw cert.sh: #536: Sign TestUser43's RSA-PSS Request - PASSED cert.sh: Import TestUser43's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser43-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser43-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #537: Import TestUser43's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser43's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #538: Generate Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's Request -------------------------- certutil -C -c TestCA -m 44 -v 60 -d ../CA -i req -o TestUser44.cert -f ../tests.pw cert.sh: #539: Sign TestUser44's Request - PASSED cert.sh: Import TestUser44's Cert -------------------------- certutil -A -n TestUser44 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #540: Import TestUser44's Cert - PASSED cert.sh SUCCESS: TestUser44's Cert Created cert.sh: Generate DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #541: Generate DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 44 -v 60 -d ../CA -i req -o TestUser44-dsa.cert -f ../tests.pw cert.sh: #542: Sign TestUser44's DSA Request - PASSED cert.sh: Import TestUser44's DSA Cert -------------------------- certutil -A -n TestUser44-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #543: Import TestUser44's DSA Cert - PASSED cert.sh SUCCESS: TestUser44's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #544: Generate mixed DSA Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20044 -v 60 -d ../CA -i req -o TestUser44-dsamixed.cert -f ../tests.pw cert.sh: #545: Sign TestUser44's DSA Request with RSA - PASSED cert.sh: Import TestUser44's mixed DSA Cert -------------------------- certutil -A -n TestUser44-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #546: Import TestUser44's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser44's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #547: Generate EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request -------------------------- certutil -C -c TestCA-ec -m 44 -v 60 -d ../CA -i req -o TestUser44-ec.cert -f ../tests.pw cert.sh: #548: Sign TestUser44's EC Request - PASSED cert.sh: Import TestUser44's EC Cert -------------------------- certutil -A -n TestUser44-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #549: Import TestUser44's EC Cert - PASSED cert.sh SUCCESS: TestUser44's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #550: Generate mixed EC Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10044 -v 60 -d ../CA -i req -o TestUser44-ecmixed.cert -f ../tests.pw cert.sh: #551: Sign TestUser44's EC Request with RSA - PASSED cert.sh: Import TestUser44's mixed EC Cert -------------------------- certutil -A -n TestUser44-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #552: Import TestUser44's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser44's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser44's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser44 -------------------------- certutil -s "CN=TestUser44, E=TestUser44-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #553: Generate RSA-PSS Cert Request for TestUser44 - PASSED cert.sh: Sign TestUser44's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30044 -v 60 -d ../CA -i req -o TestUser44-rsa-pss.cert -f ../tests.pw cert.sh: #554: Sign TestUser44's RSA-PSS Request - PASSED cert.sh: Import TestUser44's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser44-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser44-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #555: Import TestUser44's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser44's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #556: Generate Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's Request -------------------------- certutil -C -c TestCA -m 45 -v 60 -d ../CA -i req -o TestUser45.cert -f ../tests.pw cert.sh: #557: Sign TestUser45's Request - PASSED cert.sh: Import TestUser45's Cert -------------------------- certutil -A -n TestUser45 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #558: Import TestUser45's Cert - PASSED cert.sh SUCCESS: TestUser45's Cert Created cert.sh: Generate DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #559: Generate DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 45 -v 60 -d ../CA -i req -o TestUser45-dsa.cert -f ../tests.pw cert.sh: #560: Sign TestUser45's DSA Request - PASSED cert.sh: Import TestUser45's DSA Cert -------------------------- certutil -A -n TestUser45-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #561: Import TestUser45's DSA Cert - PASSED cert.sh SUCCESS: TestUser45's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #562: Generate mixed DSA Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20045 -v 60 -d ../CA -i req -o TestUser45-dsamixed.cert -f ../tests.pw cert.sh: #563: Sign TestUser45's DSA Request with RSA - PASSED cert.sh: Import TestUser45's mixed DSA Cert -------------------------- certutil -A -n TestUser45-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #564: Import TestUser45's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser45's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #565: Generate EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request -------------------------- certutil -C -c TestCA-ec -m 45 -v 60 -d ../CA -i req -o TestUser45-ec.cert -f ../tests.pw cert.sh: #566: Sign TestUser45's EC Request - PASSED cert.sh: Import TestUser45's EC Cert -------------------------- certutil -A -n TestUser45-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #567: Import TestUser45's EC Cert - PASSED cert.sh SUCCESS: TestUser45's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #568: Generate mixed EC Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10045 -v 60 -d ../CA -i req -o TestUser45-ecmixed.cert -f ../tests.pw cert.sh: #569: Sign TestUser45's EC Request with RSA - PASSED cert.sh: Import TestUser45's mixed EC Cert -------------------------- certutil -A -n TestUser45-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #570: Import TestUser45's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser45's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser45's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser45 -------------------------- certutil -s "CN=TestUser45, E=TestUser45-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #571: Generate RSA-PSS Cert Request for TestUser45 - PASSED cert.sh: Sign TestUser45's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30045 -v 60 -d ../CA -i req -o TestUser45-rsa-pss.cert -f ../tests.pw cert.sh: #572: Sign TestUser45's RSA-PSS Request - PASSED cert.sh: Import TestUser45's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser45-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser45-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #573: Import TestUser45's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser45's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #574: Generate Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's Request -------------------------- certutil -C -c TestCA -m 46 -v 60 -d ../CA -i req -o TestUser46.cert -f ../tests.pw cert.sh: #575: Sign TestUser46's Request - PASSED cert.sh: Import TestUser46's Cert -------------------------- certutil -A -n TestUser46 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #576: Import TestUser46's Cert - PASSED cert.sh SUCCESS: TestUser46's Cert Created cert.sh: Generate DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #577: Generate DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 46 -v 60 -d ../CA -i req -o TestUser46-dsa.cert -f ../tests.pw cert.sh: #578: Sign TestUser46's DSA Request - PASSED cert.sh: Import TestUser46's DSA Cert -------------------------- certutil -A -n TestUser46-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #579: Import TestUser46's DSA Cert - PASSED cert.sh SUCCESS: TestUser46's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #580: Generate mixed DSA Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20046 -v 60 -d ../CA -i req -o TestUser46-dsamixed.cert -f ../tests.pw cert.sh: #581: Sign TestUser46's DSA Request with RSA - PASSED cert.sh: Import TestUser46's mixed DSA Cert -------------------------- certutil -A -n TestUser46-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #582: Import TestUser46's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser46's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #583: Generate EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request -------------------------- certutil -C -c TestCA-ec -m 46 -v 60 -d ../CA -i req -o TestUser46-ec.cert -f ../tests.pw cert.sh: #584: Sign TestUser46's EC Request - PASSED cert.sh: Import TestUser46's EC Cert -------------------------- certutil -A -n TestUser46-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #585: Import TestUser46's EC Cert - PASSED cert.sh SUCCESS: TestUser46's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #586: Generate mixed EC Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10046 -v 60 -d ../CA -i req -o TestUser46-ecmixed.cert -f ../tests.pw cert.sh: #587: Sign TestUser46's EC Request with RSA - PASSED cert.sh: Import TestUser46's mixed EC Cert -------------------------- certutil -A -n TestUser46-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #588: Import TestUser46's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser46's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser46's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser46 -------------------------- certutil -s "CN=TestUser46, E=TestUser46-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #589: Generate RSA-PSS Cert Request for TestUser46 - PASSED cert.sh: Sign TestUser46's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30046 -v 60 -d ../CA -i req -o TestUser46-rsa-pss.cert -f ../tests.pw cert.sh: #590: Sign TestUser46's RSA-PSS Request - PASSED cert.sh: Import TestUser46's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser46-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser46-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #591: Import TestUser46's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser46's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #592: Generate Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's Request -------------------------- certutil -C -c TestCA -m 47 -v 60 -d ../CA -i req -o TestUser47.cert -f ../tests.pw cert.sh: #593: Sign TestUser47's Request - PASSED cert.sh: Import TestUser47's Cert -------------------------- certutil -A -n TestUser47 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #594: Import TestUser47's Cert - PASSED cert.sh SUCCESS: TestUser47's Cert Created cert.sh: Generate DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #595: Generate DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 47 -v 60 -d ../CA -i req -o TestUser47-dsa.cert -f ../tests.pw cert.sh: #596: Sign TestUser47's DSA Request - PASSED cert.sh: Import TestUser47's DSA Cert -------------------------- certutil -A -n TestUser47-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #597: Import TestUser47's DSA Cert - PASSED cert.sh SUCCESS: TestUser47's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #598: Generate mixed DSA Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20047 -v 60 -d ../CA -i req -o TestUser47-dsamixed.cert -f ../tests.pw cert.sh: #599: Sign TestUser47's DSA Request with RSA - PASSED cert.sh: Import TestUser47's mixed DSA Cert -------------------------- certutil -A -n TestUser47-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #600: Import TestUser47's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser47's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #601: Generate EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request -------------------------- certutil -C -c TestCA-ec -m 47 -v 60 -d ../CA -i req -o TestUser47-ec.cert -f ../tests.pw cert.sh: #602: Sign TestUser47's EC Request - PASSED cert.sh: Import TestUser47's EC Cert -------------------------- certutil -A -n TestUser47-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #603: Import TestUser47's EC Cert - PASSED cert.sh SUCCESS: TestUser47's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #604: Generate mixed EC Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10047 -v 60 -d ../CA -i req -o TestUser47-ecmixed.cert -f ../tests.pw cert.sh: #605: Sign TestUser47's EC Request with RSA - PASSED cert.sh: Import TestUser47's mixed EC Cert -------------------------- certutil -A -n TestUser47-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #606: Import TestUser47's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser47's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser47's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser47 -------------------------- certutil -s "CN=TestUser47, E=TestUser47-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #607: Generate RSA-PSS Cert Request for TestUser47 - PASSED cert.sh: Sign TestUser47's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30047 -v 60 -d ../CA -i req -o TestUser47-rsa-pss.cert -f ../tests.pw cert.sh: #608: Sign TestUser47's RSA-PSS Request - PASSED cert.sh: Import TestUser47's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser47-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser47-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #609: Import TestUser47's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser47's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #610: Generate Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's Request -------------------------- certutil -C -c TestCA -m 48 -v 60 -d ../CA -i req -o TestUser48.cert -f ../tests.pw cert.sh: #611: Sign TestUser48's Request - PASSED cert.sh: Import TestUser48's Cert -------------------------- certutil -A -n TestUser48 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #612: Import TestUser48's Cert - PASSED cert.sh SUCCESS: TestUser48's Cert Created cert.sh: Generate DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #613: Generate DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 48 -v 60 -d ../CA -i req -o TestUser48-dsa.cert -f ../tests.pw cert.sh: #614: Sign TestUser48's DSA Request - PASSED cert.sh: Import TestUser48's DSA Cert -------------------------- certutil -A -n TestUser48-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #615: Import TestUser48's DSA Cert - PASSED cert.sh SUCCESS: TestUser48's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #616: Generate mixed DSA Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20048 -v 60 -d ../CA -i req -o TestUser48-dsamixed.cert -f ../tests.pw cert.sh: #617: Sign TestUser48's DSA Request with RSA - PASSED cert.sh: Import TestUser48's mixed DSA Cert -------------------------- certutil -A -n TestUser48-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #618: Import TestUser48's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser48's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #619: Generate EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request -------------------------- certutil -C -c TestCA-ec -m 48 -v 60 -d ../CA -i req -o TestUser48-ec.cert -f ../tests.pw cert.sh: #620: Sign TestUser48's EC Request - PASSED cert.sh: Import TestUser48's EC Cert -------------------------- certutil -A -n TestUser48-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #621: Import TestUser48's EC Cert - PASSED cert.sh SUCCESS: TestUser48's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #622: Generate mixed EC Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10048 -v 60 -d ../CA -i req -o TestUser48-ecmixed.cert -f ../tests.pw cert.sh: #623: Sign TestUser48's EC Request with RSA - PASSED cert.sh: Import TestUser48's mixed EC Cert -------------------------- certutil -A -n TestUser48-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #624: Import TestUser48's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser48's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser48's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser48 -------------------------- certutil -s "CN=TestUser48, E=TestUser48-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #625: Generate RSA-PSS Cert Request for TestUser48 - PASSED cert.sh: Sign TestUser48's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30048 -v 60 -d ../CA -i req -o TestUser48-rsa-pss.cert -f ../tests.pw cert.sh: #626: Sign TestUser48's RSA-PSS Request - PASSED cert.sh: Import TestUser48's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser48-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser48-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #627: Import TestUser48's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser48's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #628: Generate Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's Request -------------------------- certutil -C -c TestCA -m 49 -v 60 -d ../CA -i req -o TestUser49.cert -f ../tests.pw cert.sh: #629: Sign TestUser49's Request - PASSED cert.sh: Import TestUser49's Cert -------------------------- certutil -A -n TestUser49 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #630: Import TestUser49's Cert - PASSED cert.sh SUCCESS: TestUser49's Cert Created cert.sh: Generate DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #631: Generate DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 49 -v 60 -d ../CA -i req -o TestUser49-dsa.cert -f ../tests.pw cert.sh: #632: Sign TestUser49's DSA Request - PASSED cert.sh: Import TestUser49's DSA Cert -------------------------- certutil -A -n TestUser49-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #633: Import TestUser49's DSA Cert - PASSED cert.sh SUCCESS: TestUser49's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #634: Generate mixed DSA Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20049 -v 60 -d ../CA -i req -o TestUser49-dsamixed.cert -f ../tests.pw cert.sh: #635: Sign TestUser49's DSA Request with RSA - PASSED cert.sh: Import TestUser49's mixed DSA Cert -------------------------- certutil -A -n TestUser49-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #636: Import TestUser49's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser49's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #637: Generate EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request -------------------------- certutil -C -c TestCA-ec -m 49 -v 60 -d ../CA -i req -o TestUser49-ec.cert -f ../tests.pw cert.sh: #638: Sign TestUser49's EC Request - PASSED cert.sh: Import TestUser49's EC Cert -------------------------- certutil -A -n TestUser49-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #639: Import TestUser49's EC Cert - PASSED cert.sh SUCCESS: TestUser49's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #640: Generate mixed EC Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10049 -v 60 -d ../CA -i req -o TestUser49-ecmixed.cert -f ../tests.pw cert.sh: #641: Sign TestUser49's EC Request with RSA - PASSED cert.sh: Import TestUser49's mixed EC Cert -------------------------- certutil -A -n TestUser49-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #642: Import TestUser49's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser49's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser49's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser49 -------------------------- certutil -s "CN=TestUser49, E=TestUser49-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #643: Generate RSA-PSS Cert Request for TestUser49 - PASSED cert.sh: Sign TestUser49's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30049 -v 60 -d ../CA -i req -o TestUser49-rsa-pss.cert -f ../tests.pw cert.sh: #644: Sign TestUser49's RSA-PSS Request - PASSED cert.sh: Import TestUser49's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser49-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser49-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #645: Import TestUser49's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser49's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #646: Generate Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's Request -------------------------- certutil -C -c TestCA -m 50 -v 60 -d ../CA -i req -o TestUser50.cert -f ../tests.pw cert.sh: #647: Sign TestUser50's Request - PASSED cert.sh: Import TestUser50's Cert -------------------------- certutil -A -n TestUser50 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #648: Import TestUser50's Cert - PASSED cert.sh SUCCESS: TestUser50's Cert Created cert.sh: Generate DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #649: Generate DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 50 -v 60 -d ../CA -i req -o TestUser50-dsa.cert -f ../tests.pw cert.sh: #650: Sign TestUser50's DSA Request - PASSED cert.sh: Import TestUser50's DSA Cert -------------------------- certutil -A -n TestUser50-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #651: Import TestUser50's DSA Cert - PASSED cert.sh SUCCESS: TestUser50's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #652: Generate mixed DSA Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20050 -v 60 -d ../CA -i req -o TestUser50-dsamixed.cert -f ../tests.pw cert.sh: #653: Sign TestUser50's DSA Request with RSA - PASSED cert.sh: Import TestUser50's mixed DSA Cert -------------------------- certutil -A -n TestUser50-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #654: Import TestUser50's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser50's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #655: Generate EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request -------------------------- certutil -C -c TestCA-ec -m 50 -v 60 -d ../CA -i req -o TestUser50-ec.cert -f ../tests.pw cert.sh: #656: Sign TestUser50's EC Request - PASSED cert.sh: Import TestUser50's EC Cert -------------------------- certutil -A -n TestUser50-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #657: Import TestUser50's EC Cert - PASSED cert.sh SUCCESS: TestUser50's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #658: Generate mixed EC Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10050 -v 60 -d ../CA -i req -o TestUser50-ecmixed.cert -f ../tests.pw cert.sh: #659: Sign TestUser50's EC Request with RSA - PASSED cert.sh: Import TestUser50's mixed EC Cert -------------------------- certutil -A -n TestUser50-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #660: Import TestUser50's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser50's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser50's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser50 -------------------------- certutil -s "CN=TestUser50, E=TestUser50-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #661: Generate RSA-PSS Cert Request for TestUser50 - PASSED cert.sh: Sign TestUser50's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30050 -v 60 -d ../CA -i req -o TestUser50-rsa-pss.cert -f ../tests.pw cert.sh: #662: Sign TestUser50's RSA-PSS Request - PASSED cert.sh: Import TestUser50's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser50-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser50-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #663: Import TestUser50's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser50's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #664: Generate Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's Request -------------------------- certutil -C -c TestCA -m 51 -v 60 -d ../CA -i req -o TestUser51.cert -f ../tests.pw cert.sh: #665: Sign TestUser51's Request - PASSED cert.sh: Import TestUser51's Cert -------------------------- certutil -A -n TestUser51 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #666: Import TestUser51's Cert - PASSED cert.sh SUCCESS: TestUser51's Cert Created cert.sh: Generate DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #667: Generate DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 51 -v 60 -d ../CA -i req -o TestUser51-dsa.cert -f ../tests.pw cert.sh: #668: Sign TestUser51's DSA Request - PASSED cert.sh: Import TestUser51's DSA Cert -------------------------- certutil -A -n TestUser51-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #669: Import TestUser51's DSA Cert - PASSED cert.sh SUCCESS: TestUser51's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #670: Generate mixed DSA Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20051 -v 60 -d ../CA -i req -o TestUser51-dsamixed.cert -f ../tests.pw cert.sh: #671: Sign TestUser51's DSA Request with RSA - PASSED cert.sh: Import TestUser51's mixed DSA Cert -------------------------- certutil -A -n TestUser51-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #672: Import TestUser51's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser51's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #673: Generate EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request -------------------------- certutil -C -c TestCA-ec -m 51 -v 60 -d ../CA -i req -o TestUser51-ec.cert -f ../tests.pw cert.sh: #674: Sign TestUser51's EC Request - PASSED cert.sh: Import TestUser51's EC Cert -------------------------- certutil -A -n TestUser51-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #675: Import TestUser51's EC Cert - PASSED cert.sh SUCCESS: TestUser51's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #676: Generate mixed EC Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10051 -v 60 -d ../CA -i req -o TestUser51-ecmixed.cert -f ../tests.pw cert.sh: #677: Sign TestUser51's EC Request with RSA - PASSED cert.sh: Import TestUser51's mixed EC Cert -------------------------- certutil -A -n TestUser51-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #678: Import TestUser51's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser51's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser51's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser51 -------------------------- certutil -s "CN=TestUser51, E=TestUser51-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #679: Generate RSA-PSS Cert Request for TestUser51 - PASSED cert.sh: Sign TestUser51's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30051 -v 60 -d ../CA -i req -o TestUser51-rsa-pss.cert -f ../tests.pw cert.sh: #680: Sign TestUser51's RSA-PSS Request - PASSED cert.sh: Import TestUser51's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser51-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser51-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #681: Import TestUser51's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser51's RSA-PSS Cert Created cert.sh: Generate Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #682: Generate Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's Request -------------------------- certutil -C -c TestCA -m 52 -v 60 -d ../CA -i req -o TestUser52.cert -f ../tests.pw cert.sh: #683: Sign TestUser52's Request - PASSED cert.sh: Import TestUser52's Cert -------------------------- certutil -A -n TestUser52 -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #684: Import TestUser52's Cert - PASSED cert.sh SUCCESS: TestUser52's Cert Created cert.sh: Generate DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsa@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #685: Generate DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request -------------------------- certutil -C -c TestCA-dsa -m 52 -v 60 -d ../CA -i req -o TestUser52-dsa.cert -f ../tests.pw cert.sh: #686: Sign TestUser52's DSA Request - PASSED cert.sh: Import TestUser52's DSA Cert -------------------------- certutil -A -n TestUser52-dsa -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-dsa.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #687: Import TestUser52's DSA Cert - PASSED cert.sh SUCCESS: TestUser52's DSA Cert Created cert.sh: Generate mixed DSA Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-dsamixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k dsa -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #688: Generate mixed DSA Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's DSA Request with RSA -------------------------- certutil -C -c TestCA -m 20052 -v 60 -d ../CA -i req -o TestUser52-dsamixed.cert -f ../tests.pw cert.sh: #689: Sign TestUser52's DSA Request with RSA - PASSED cert.sh: Import TestUser52's mixed DSA Cert -------------------------- certutil -A -n TestUser52-dsamixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-dsamixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #690: Import TestUser52's mixed DSA Cert - PASSED cert.sh SUCCESS: TestUser52's mixed DSA Cert Created cert.sh: Generate EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ec@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #691: Generate EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request -------------------------- certutil -C -c TestCA-ec -m 52 -v 60 -d ../CA -i req -o TestUser52-ec.cert -f ../tests.pw cert.sh: #692: Sign TestUser52's EC Request - PASSED cert.sh: Import TestUser52's EC Cert -------------------------- certutil -A -n TestUser52-ec -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-ec.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #693: Import TestUser52's EC Cert - PASSED cert.sh SUCCESS: TestUser52's EC Cert Created cert.sh: Generate mixed EC Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-ecmixed@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -k ec -q secp384r1 -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -z ../tests_noise -o req Generating key. This may take a few moments... cert.sh: #694: Generate mixed EC Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's EC Request with RSA -------------------------- certutil -C -c TestCA -m 10052 -v 60 -d ../CA -i req -o TestUser52-ecmixed.cert -f ../tests.pw cert.sh: #695: Sign TestUser52's EC Request with RSA - PASSED cert.sh: Import TestUser52's mixed EC Cert -------------------------- certutil -A -n TestUser52-ecmixed -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-ecmixed.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #696: Import TestUser52's mixed EC Cert - PASSED cert.sh SUCCESS: TestUser52's mixed EC Cert Created Importing RSA-PSS server certificate Import TestUser52's mixed EC Cert -------------------------- pk12util -i /builddir/build/BUILD/nss-3.90/nss/tests/cert/TestUser-rsa-pss-interop.p12 -k ../tests.pw -w ../tests.pw -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client pk12util: PKCS12 IMPORT SUCCESSFUL cert.sh: Generate RSA-PSS Cert Request for TestUser52 -------------------------- certutil -s "CN=TestUser52, E=TestUser52-rsa-pss@example.com, O=BOGUS NSS, L=Mountain View, ST=California, C=US" -R -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -k ca75df9632637f07486b5f1b31e55d03e1d449cf -f ../tests.pw -z ../tests_noise -o req cert.sh: #697: Generate RSA-PSS Cert Request for TestUser52 - PASSED cert.sh: Sign TestUser52's RSA-PSS Request -------------------------- certutil -C -c TestCA -m 30052 -v 60 -d ../CA -i req -o TestUser52-rsa-pss.cert -f ../tests.pw cert.sh: #698: Sign TestUser52's RSA-PSS Request - PASSED cert.sh: Import TestUser52's RSA-PSS Cert -t u,u,u -------------------------- certutil -A -n TestUser52-rsa-pss -t u,u,u -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -f ../tests.pw -i TestUser52-rsa-pss.cert Notice: Trust flag u is set automatically if the private key is present. cert.sh: #699: Import TestUser52's RSA-PSS Cert -t u,u,u - PASSED cert.sh SUCCESS: TestUser52's RSA-PSS Cert Created cert.sh: Creating CA CRL ===================================== cert.sh: Generating CRL for range 40-42 TestCA authority -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -G -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or cert.sh: #700: Generating CRL for range 40-42 TestCA authority - PASSED cert.sh: Generating CRL (DSA) for range 40-42 TestCA-dsa authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -G -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or-dsa cert.sh: #701: Generating CRL (DSA) for range 40-42 TestCA-dsa authority - PASSED cert.sh: Generating CRL (ECC) for range 40-42 TestCA-ec authority -------------------------- crlutil -q -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -G -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or-ec cert.sh: #702: Generating CRL (ECC) for range 40-42 TestCA-ec authority - PASSED cert.sh: Modifying CA CRL by adding one more cert ============ cert.sh: Modify CRL by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42_or1 -i ../server/root.crl_40-42_or cert.sh: #703: Modify CRL by adding one more cert - PASSED cert.sh: Modify CRL (DSA) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42_or1-dsa -i ../server/root.crl_40-42_or-dsa cert.sh: #704: Modify CRL (DSA) by adding one more cert - PASSED cert.sh: Modify CRL (ECC) by adding one more cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42_or1-ec -i ../server/root.crl_40-42_or-ec cert.sh: #705: Modify CRL (ECC) by adding one more cert - PASSED cert.sh: Modifying CA CRL by removing one cert =============== cert.sh: Modify CRL by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #706: Modify CRL by removing one cert - PASSED cert.sh: Modify CRL (DSA) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-dsa -f ../tests.pw -o ../server/root.crl_40-42 -i ../server/root.crl_40-42_or1 cert.sh: #707: Modify CRL (DSA) by removing one cert - PASSED cert.sh: Modify CRL (ECC) by removing one cert -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_40-42-ec -i ../server/root.crl_40-42_or1-ec cert.sh: #708: Modify CRL (ECC) by removing one cert - PASSED cert.sh: Creating CA CRL for groups 1 and 2 =============== cert.sh: Creating CRL for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_43-48 -i ../server/root.crl_40-42 cert.sh: #709: Creating CRL for groups 1 and 2 - PASSED cert.sh: Creating CRL (ECC) for groups 1 and 2 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_43-48-ec -i ../server/root.crl_40-42-ec cert.sh: #710: Creating CRL (ECC) for groups 1 and 2 - PASSED cert.sh: Creating CA CRL for groups 1, 2 and 3 =============== cert.sh: Creating CRL for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA -f ../tests.pw -o ../server/root.crl_49-52 -i ../server/root.crl_43-48 cert.sh: #711: Creating CRL for groups 1, 2 and 3 - PASSED cert.sh: Creating CRL (ECC) for groups 1, 2 and 3 -------------------------- crlutil -q -d /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/CA -M -n TestCA-ec -f ../tests.pw -o ../server/root.crl_49-52-ec -i ../server/root.crl_43-48-ec cert.sh: #712: Creating CRL (ECC) for groups 1, 2 and 3 - PASSED cert.sh: Importing Server CA Issued CRL for certs trough 52 cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -D -n TestCA -f ../tests.pw -d ../server crlutil: could not find TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #713: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42 -n TestCA -f ../tests.pw -d ../server cert.sh: #714: Importing CRL for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -D -n TestCA-ec -f ../tests.pw -d ../server crlutil: could not find TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. crlutil: could not find the issuer TestCA-ec's CRL: SEC_ERROR_CRL_NOT_FOUND: No matching CRL was found. cert.sh: #715: Importing CRL (ECC) for groups 1 - PASSED cert.sh: Importing CRL (ECC) for groups 1 -------------------------- crlutil -q -I -i ../server/root.crl_40-42-ec -n TestCA-ec -f ../tests.pw -d ../server cert.sh: #716: Importing CRL (ECC) for groups 1 - PASSED cert.sh SUCCESS: SSL CRL prep passed cert.sh: Verify large rsa pss signature -------------- vfychain -a Leaf-bogus-dsa.crt Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. CN=decodeECorDSASignature-testCase/taviso : ERROR -8010: The signature algorithm in the signature field of the certificate does not match the algorithm in its signatureAlgorithm field. cert.sh: #717: Verify large dsa signature - PASSED cert.sh: Verify large rsa pss signature -------------- vfychain -a Leaf-bogus-rsa-pss.crt Chain is bad! PROBLEM WITH THE CERT CHAIN: CERT 0. taviso@google.com : ERROR -8010: The signature algorithm in the signature field of the certificate does not match the algorithm in its signatureAlgorithm field. cert.sh: #718: Verify large rsa pss signature - PASSED cert.sh cert.sh: finished cert.sh ssl.sh: SSL tests =============================== ssl.sh: CRL SSL Client Tests =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:32 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9259 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9259 found at Wed Oct 18 17:09:32 UTC 2023 selfserv_9997 with PID 9259 started at Wed Oct 18 17:09:32 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #719: TLS Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9259 at Wed Oct 18 17:09:33 UTC 2023 kill -USR1 9259 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9259 killed at Wed Oct 18 17:09:33 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9311 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9311 found at Wed Oct 18 17:09:33 UTC 2023 selfserv_9997 with PID 9311 started at Wed Oct 18 17:09:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #720: TLS Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9311 at Wed Oct 18 17:09:33 UTC 2023 kill -USR1 9311 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9311 killed at Wed Oct 18 17:09:33 UTC 2023 ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9363 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9363 found at Wed Oct 18 17:09:33 UTC 2023 selfserv_9997 with PID 9363 started at Wed Oct 18 17:09:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #721: TLS Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9363 at Wed Oct 18 17:09:33 UTC 2023 kill -USR1 9363 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9363 killed at Wed Oct 18 17:09:33 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9430 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9430 found at Wed Oct 18 17:09:33 UTC 2023 selfserv_9997 with PID 9430 started at Wed Oct 18 17:09:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #722: TLS Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9430 at Wed Oct 18 17:09:33 UTC 2023 kill -USR1 9430 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9430 killed at Wed Oct 18 17:09:33 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9482 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9482 found at Wed Oct 18 17:09:33 UTC 2023 selfserv_9997 with PID 9482 started at Wed Oct 18 17:09:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #723: TLS Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9482 at Wed Oct 18 17:09:33 UTC 2023 kill -USR1 9482 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9482 killed at Wed Oct 18 17:09:33 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:33 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9534 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9534 found at Wed Oct 18 17:09:33 UTC 2023 selfserv_9997 with PID 9534 started at Wed Oct 18 17:09:33 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #724: TLS Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9534 at Wed Oct 18 17:09:34 UTC 2023 kill -USR1 9534 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9534 killed at Wed Oct 18 17:09:34 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9600 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9600 found at Wed Oct 18 17:09:34 UTC 2023 selfserv_9997 with PID 9600 started at Wed Oct 18 17:09:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #725: TLS Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 9600 at Wed Oct 18 17:09:34 UTC 2023 kill -USR1 9600 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9600 killed at Wed Oct 18 17:09:34 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9653 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9653 found at Wed Oct 18 17:09:34 UTC 2023 selfserv_9997 with PID 9653 started at Wed Oct 18 17:09:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #726: TLS Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9653 at Wed Oct 18 17:09:34 UTC 2023 kill -USR1 9653 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9653 killed at Wed Oct 18 17:09:34 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9705 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9705 found at Wed Oct 18 17:09:34 UTC 2023 selfserv_9997 with PID 9705 started at Wed Oct 18 17:09:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #727: TLS Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 9705 at Wed Oct 18 17:09:34 UTC 2023 kill -USR1 9705 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9705 killed at Wed Oct 18 17:09:34 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9771 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9771 found at Wed Oct 18 17:09:34 UTC 2023 selfserv_9997 with PID 9771 started at Wed Oct 18 17:09:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #728: TLS Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 9771 at Wed Oct 18 17:09:34 UTC 2023 kill -USR1 9771 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9771 killed at Wed Oct 18 17:09:34 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9823 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9823 found at Wed Oct 18 17:09:34 UTC 2023 selfserv_9997 with PID 9823 started at Wed Oct 18 17:09:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #729: TLS Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 9823 at Wed Oct 18 17:09:34 UTC 2023 kill -USR1 9823 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9823 killed at Wed Oct 18 17:09:35 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9875 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9875 found at Wed Oct 18 17:09:35 UTC 2023 selfserv_9997 with PID 9875 started at Wed Oct 18 17:09:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #730: TLS Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 9875 at Wed Oct 18 17:09:35 UTC 2023 kill -USR1 9875 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9875 killed at Wed Oct 18 17:09:35 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9941 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9941 found at Wed Oct 18 17:09:35 UTC 2023 selfserv_9997 with PID 9941 started at Wed Oct 18 17:09:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #731: TLS Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 9941 at Wed Oct 18 17:09:35 UTC 2023 kill -USR1 9941 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9941 killed at Wed Oct 18 17:09:35 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9993 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9993 found at Wed Oct 18 17:09:35 UTC 2023 selfserv_9997 with PID 9993 started at Wed Oct 18 17:09:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #732: TLS Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 9993 at Wed Oct 18 17:09:35 UTC 2023 kill -USR1 9993 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9993 killed at Wed Oct 18 17:09:35 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10045 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10045 found at Wed Oct 18 17:09:35 UTC 2023 selfserv_9997 with PID 10045 started at Wed Oct 18 17:09:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #733: TLS Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 10045 at Wed Oct 18 17:09:35 UTC 2023 kill -USR1 10045 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10045 killed at Wed Oct 18 17:09:35 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10111 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10111 found at Wed Oct 18 17:09:35 UTC 2023 selfserv_9997 with PID 10111 started at Wed Oct 18 17:09:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #734: TLS Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 10111 at Wed Oct 18 17:09:35 UTC 2023 kill -USR1 10111 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10111 killed at Wed Oct 18 17:09:35 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10165 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10165 found at Wed Oct 18 17:09:35 UTC 2023 selfserv_9997 with PID 10165 started at Wed Oct 18 17:09:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #735: TLS Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10165 at Wed Oct 18 17:09:35 UTC 2023 kill -USR1 10165 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10165 killed at Wed Oct 18 17:09:35 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10217 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10217 found at Wed Oct 18 17:09:35 UTC 2023 selfserv_9997 with PID 10217 started at Wed Oct 18 17:09:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #736: TLS Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 10217 at Wed Oct 18 17:09:36 UTC 2023 kill -USR1 10217 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10217 killed at Wed Oct 18 17:09:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10283 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10283 found at Wed Oct 18 17:09:36 UTC 2023 selfserv_9997 with PID 10283 started at Wed Oct 18 17:09:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #737: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10283 at Wed Oct 18 17:09:36 UTC 2023 kill -USR1 10283 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10283 killed at Wed Oct 18 17:09:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10335 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10335 found at Wed Oct 18 17:09:36 UTC 2023 selfserv_9997 with PID 10335 started at Wed Oct 18 17:09:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #738: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10335 at Wed Oct 18 17:09:36 UTC 2023 kill -USR1 10335 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10335 killed at Wed Oct 18 17:09:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10387 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10387 found at Wed Oct 18 17:09:36 UTC 2023 selfserv_9997 with PID 10387 started at Wed Oct 18 17:09:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #739: SSL3 Request don't require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10387 at Wed Oct 18 17:09:36 UTC 2023 kill -USR1 10387 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10387 killed at Wed Oct 18 17:09:36 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10453 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10453 found at Wed Oct 18 17:09:36 UTC 2023 selfserv_9997 with PID 10453 started at Wed Oct 18 17:09:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #740: SSL3 Request don't require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10453 at Wed Oct 18 17:09:37 UTC 2023 kill -USR1 10453 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10453 killed at Wed Oct 18 17:09:37 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10505 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10505 found at Wed Oct 18 17:09:37 UTC 2023 selfserv_9997 with PID 10505 started at Wed Oct 18 17:09:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #741: SSL3 Request don't require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10505 at Wed Oct 18 17:09:37 UTC 2023 kill -USR1 10505 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10505 killed at Wed Oct 18 17:09:37 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10557 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10557 found at Wed Oct 18 17:09:37 UTC 2023 selfserv_9997 with PID 10557 started at Wed Oct 18 17:09:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #742: SSL3 Request don't require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10557 at Wed Oct 18 17:09:37 UTC 2023 kill -USR1 10557 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10557 killed at Wed Oct 18 17:09:37 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10623 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10623 found at Wed Oct 18 17:09:37 UTC 2023 selfserv_9997 with PID 10623 started at Wed Oct 18 17:09:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #743: SSL3 Request don't require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 10623 at Wed Oct 18 17:09:37 UTC 2023 kill -USR1 10623 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10623 killed at Wed Oct 18 17:09:37 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10675 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10675 found at Wed Oct 18 17:09:37 UTC 2023 selfserv_9997 with PID 10675 started at Wed Oct 18 17:09:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #744: SSL3 Request don't require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10675 at Wed Oct 18 17:09:37 UTC 2023 kill -USR1 10675 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10675 killed at Wed Oct 18 17:09:37 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10727 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10727 found at Wed Oct 18 17:09:37 UTC 2023 selfserv_9997 with PID 10727 started at Wed Oct 18 17:09:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #745: SSL3 Request don't require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 10727 at Wed Oct 18 17:09:37 UTC 2023 kill -USR1 10727 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10727 killed at Wed Oct 18 17:09:37 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10793 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10793 found at Wed Oct 18 17:09:37 UTC 2023 selfserv_9997 with PID 10793 started at Wed Oct 18 17:09:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #746: SSL3 Require client auth (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 10793 at Wed Oct 18 17:09:38 UTC 2023 kill -USR1 10793 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10793 killed at Wed Oct 18 17:09:38 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10845 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10845 found at Wed Oct 18 17:09:38 UTC 2023 selfserv_9997 with PID 10845 started at Wed Oct 18 17:09:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #747: SSL3 Require client auth (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 10845 at Wed Oct 18 17:09:38 UTC 2023 kill -USR1 10845 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10845 killed at Wed Oct 18 17:09:38 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10897 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10897 found at Wed Oct 18 17:09:38 UTC 2023 selfserv_9997 with PID 10897 started at Wed Oct 18 17:09:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #748: SSL3 Require client auth (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 10897 at Wed Oct 18 17:09:38 UTC 2023 kill -USR1 10897 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10897 killed at Wed Oct 18 17:09:38 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10963 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10963 found at Wed Oct 18 17:09:38 UTC 2023 selfserv_9997 with PID 10963 started at Wed Oct 18 17:09:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #749: SSL3 Require client auth (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 10963 at Wed Oct 18 17:09:38 UTC 2023 kill -USR1 10963 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10963 killed at Wed Oct 18 17:09:38 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11015 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11015 found at Wed Oct 18 17:09:38 UTC 2023 selfserv_9997 with PID 11015 started at Wed Oct 18 17:09:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #750: SSL3 Require client auth (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 11015 at Wed Oct 18 17:09:38 UTC 2023 kill -USR1 11015 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11015 killed at Wed Oct 18 17:09:38 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11068 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11068 found at Wed Oct 18 17:09:38 UTC 2023 selfserv_9997 with PID 11068 started at Wed Oct 18 17:09:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #751: SSL3 Require client auth (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 11068 at Wed Oct 18 17:09:38 UTC 2023 kill -USR1 11068 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11068 killed at Wed Oct 18 17:09:38 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11134 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11134 found at Wed Oct 18 17:09:38 UTC 2023 selfserv_9997 with PID 11134 started at Wed Oct 18 17:09:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #752: SSL3 Require client auth (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 11134 at Wed Oct 18 17:09:39 UTC 2023 kill -USR1 11134 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11134 killed at Wed Oct 18 17:09:39 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11186 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11186 found at Wed Oct 18 17:09:39 UTC 2023 selfserv_9997 with PID 11186 started at Wed Oct 18 17:09:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #753: SSL3 Require client auth (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11186 at Wed Oct 18 17:09:39 UTC 2023 kill -USR1 11186 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11186 killed at Wed Oct 18 17:09:39 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11239 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11239 found at Wed Oct 18 17:09:39 UTC 2023 selfserv_9997 with PID 11239 started at Wed Oct 18 17:09:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #754: SSL3 Require client auth (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 11239 at Wed Oct 18 17:09:39 UTC 2023 kill -USR1 11239 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11239 killed at Wed Oct 18 17:09:39 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11305 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11305 found at Wed Oct 18 17:09:39 UTC 2023 selfserv_9997 with PID 11305 started at Wed Oct 18 17:09:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #755: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11305 at Wed Oct 18 17:09:39 UTC 2023 kill -USR1 11305 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11305 killed at Wed Oct 18 17:09:39 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11357 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11357 found at Wed Oct 18 17:09:39 UTC 2023 selfserv_9997 with PID 11357 started at Wed Oct 18 17:09:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #756: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11357 at Wed Oct 18 17:09:40 UTC 2023 kill -USR1 11357 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11357 killed at Wed Oct 18 17:09:40 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11409 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11409 found at Wed Oct 18 17:09:40 UTC 2023 selfserv_9997 with PID 11409 started at Wed Oct 18 17:09:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #757: TLS Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11409 at Wed Oct 18 17:09:40 UTC 2023 kill -USR1 11409 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11409 killed at Wed Oct 18 17:09:40 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11476 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11476 found at Wed Oct 18 17:09:40 UTC 2023 selfserv_9997 with PID 11476 started at Wed Oct 18 17:09:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #758: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11476 at Wed Oct 18 17:09:40 UTC 2023 kill -USR1 11476 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11476 killed at Wed Oct 18 17:09:40 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11528 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11528 found at Wed Oct 18 17:09:40 UTC 2023 selfserv_9997 with PID 11528 started at Wed Oct 18 17:09:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #759: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11528 at Wed Oct 18 17:09:40 UTC 2023 kill -USR1 11528 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11528 killed at Wed Oct 18 17:09:40 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11580 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11580 found at Wed Oct 18 17:09:40 UTC 2023 selfserv_9997 with PID 11580 started at Wed Oct 18 17:09:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #760: TLS Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11580 at Wed Oct 18 17:09:40 UTC 2023 kill -USR1 11580 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11580 killed at Wed Oct 18 17:09:40 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11646 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11646 found at Wed Oct 18 17:09:41 UTC 2023 selfserv_9997 with PID 11646 started at Wed Oct 18 17:09:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #761: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11646 at Wed Oct 18 17:09:41 UTC 2023 kill -USR1 11646 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11646 killed at Wed Oct 18 17:09:41 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11698 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11698 found at Wed Oct 18 17:09:41 UTC 2023 selfserv_9997 with PID 11698 started at Wed Oct 18 17:09:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #762: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11698 at Wed Oct 18 17:09:41 UTC 2023 kill -USR1 11698 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11698 killed at Wed Oct 18 17:09:41 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11750 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11750 found at Wed Oct 18 17:09:41 UTC 2023 selfserv_9997 with PID 11750 started at Wed Oct 18 17:09:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #763: TLS Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11750 at Wed Oct 18 17:09:41 UTC 2023 kill -USR1 11750 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11750 killed at Wed Oct 18 17:09:41 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11816 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11816 found at Wed Oct 18 17:09:41 UTC 2023 selfserv_9997 with PID 11816 started at Wed Oct 18 17:09:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #764: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11816 at Wed Oct 18 17:09:41 UTC 2023 kill -USR1 11816 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11816 killed at Wed Oct 18 17:09:41 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11868 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11868 found at Wed Oct 18 17:09:41 UTC 2023 selfserv_9997 with PID 11868 started at Wed Oct 18 17:09:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #765: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11868 at Wed Oct 18 17:09:42 UTC 2023 kill -USR1 11868 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11868 killed at Wed Oct 18 17:09:42 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11920 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11920 found at Wed Oct 18 17:09:42 UTC 2023 selfserv_9997 with PID 11920 started at Wed Oct 18 17:09:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #766: TLS Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11920 at Wed Oct 18 17:09:42 UTC 2023 kill -USR1 11920 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11920 killed at Wed Oct 18 17:09:42 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11997 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11997 found at Wed Oct 18 17:09:42 UTC 2023 selfserv_9997 with PID 11997 started at Wed Oct 18 17:09:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #767: TLS Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11997 at Wed Oct 18 17:09:42 UTC 2023 kill -USR1 11997 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11997 killed at Wed Oct 18 17:09:42 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12049 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12049 found at Wed Oct 18 17:09:42 UTC 2023 selfserv_9997 with PID 12049 started at Wed Oct 18 17:09:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #768: TLS Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12049 at Wed Oct 18 17:09:42 UTC 2023 kill -USR1 12049 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12049 killed at Wed Oct 18 17:09:42 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12101 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12101 found at Wed Oct 18 17:09:42 UTC 2023 selfserv_9997 with PID 12101 started at Wed Oct 18 17:09:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #769: TLS Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12101 at Wed Oct 18 17:09:43 UTC 2023 kill -USR1 12101 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12101 killed at Wed Oct 18 17:09:43 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12167 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12167 found at Wed Oct 18 17:09:43 UTC 2023 selfserv_9997 with PID 12167 started at Wed Oct 18 17:09:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #770: TLS Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12167 at Wed Oct 18 17:09:43 UTC 2023 kill -USR1 12167 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12167 killed at Wed Oct 18 17:09:43 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12223 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12223 found at Wed Oct 18 17:09:43 UTC 2023 selfserv_9997 with PID 12223 started at Wed Oct 18 17:09:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #771: TLS Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12223 at Wed Oct 18 17:09:43 UTC 2023 kill -USR1 12223 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12223 killed at Wed Oct 18 17:09:43 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12275 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12275 found at Wed Oct 18 17:09:43 UTC 2023 selfserv_9997 with PID 12275 started at Wed Oct 18 17:09:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #772: TLS Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12275 at Wed Oct 18 17:09:43 UTC 2023 kill -USR1 12275 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12275 killed at Wed Oct 18 17:09:43 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12341 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12341 found at Wed Oct 18 17:09:43 UTC 2023 selfserv_9997 with PID 12341 started at Wed Oct 18 17:09:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #773: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12341 at Wed Oct 18 17:09:44 UTC 2023 kill -USR1 12341 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12341 killed at Wed Oct 18 17:09:44 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12393 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12393 found at Wed Oct 18 17:09:44 UTC 2023 selfserv_9997 with PID 12393 started at Wed Oct 18 17:09:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #774: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12393 at Wed Oct 18 17:09:44 UTC 2023 kill -USR1 12393 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12393 killed at Wed Oct 18 17:09:44 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12445 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12445 found at Wed Oct 18 17:09:44 UTC 2023 selfserv_9997 with PID 12445 started at Wed Oct 18 17:09:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #775: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12445 at Wed Oct 18 17:09:44 UTC 2023 kill -USR1 12445 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12445 killed at Wed Oct 18 17:09:44 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12511 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12511 found at Wed Oct 18 17:09:44 UTC 2023 selfserv_9997 with PID 12511 started at Wed Oct 18 17:09:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #776: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12511 at Wed Oct 18 17:09:45 UTC 2023 kill -USR1 12511 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12511 killed at Wed Oct 18 17:09:45 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12563 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12563 found at Wed Oct 18 17:09:45 UTC 2023 selfserv_9997 with PID 12563 started at Wed Oct 18 17:09:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #777: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12563 at Wed Oct 18 17:09:45 UTC 2023 kill -USR1 12563 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12563 killed at Wed Oct 18 17:09:45 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12615 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12615 found at Wed Oct 18 17:09:45 UTC 2023 selfserv_9997 with PID 12615 started at Wed Oct 18 17:09:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #778: TLS 1.0 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12615 at Wed Oct 18 17:09:45 UTC 2023 kill -USR1 12615 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12615 killed at Wed Oct 18 17:09:45 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12681 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12681 found at Wed Oct 18 17:09:45 UTC 2023 selfserv_9997 with PID 12681 started at Wed Oct 18 17:09:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #779: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12681 at Wed Oct 18 17:09:45 UTC 2023 kill -USR1 12681 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12681 killed at Wed Oct 18 17:09:45 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12733 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12733 found at Wed Oct 18 17:09:45 UTC 2023 selfserv_9997 with PID 12733 started at Wed Oct 18 17:09:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #780: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12733 at Wed Oct 18 17:09:46 UTC 2023 kill -USR1 12733 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12733 killed at Wed Oct 18 17:09:46 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12785 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12785 found at Wed Oct 18 17:09:46 UTC 2023 selfserv_9997 with PID 12785 started at Wed Oct 18 17:09:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #781: TLS 1.0 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12785 at Wed Oct 18 17:09:46 UTC 2023 kill -USR1 12785 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12785 killed at Wed Oct 18 17:09:46 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12851 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12851 found at Wed Oct 18 17:09:46 UTC 2023 selfserv_9997 with PID 12851 started at Wed Oct 18 17:09:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #782: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12851 at Wed Oct 18 17:09:46 UTC 2023 kill -USR1 12851 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12851 killed at Wed Oct 18 17:09:46 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12903 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12903 found at Wed Oct 18 17:09:46 UTC 2023 selfserv_9997 with PID 12903 started at Wed Oct 18 17:09:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #783: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12903 at Wed Oct 18 17:09:46 UTC 2023 kill -USR1 12903 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12903 killed at Wed Oct 18 17:09:46 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12955 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12955 found at Wed Oct 18 17:09:46 UTC 2023 selfserv_9997 with PID 12955 started at Wed Oct 18 17:09:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #784: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12955 at Wed Oct 18 17:09:47 UTC 2023 kill -USR1 12955 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12955 killed at Wed Oct 18 17:09:47 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13021 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13021 found at Wed Oct 18 17:09:47 UTC 2023 selfserv_9997 with PID 13021 started at Wed Oct 18 17:09:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #785: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13021 at Wed Oct 18 17:09:47 UTC 2023 kill -USR1 13021 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13021 killed at Wed Oct 18 17:09:47 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13073 found at Wed Oct 18 17:09:47 UTC 2023 selfserv_9997 with PID 13073 started at Wed Oct 18 17:09:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #786: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13073 at Wed Oct 18 17:09:47 UTC 2023 kill -USR1 13073 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13073 killed at Wed Oct 18 17:09:47 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13125 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13125 found at Wed Oct 18 17:09:47 UTC 2023 selfserv_9997 with PID 13125 started at Wed Oct 18 17:09:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #787: TLS 1.0 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13125 at Wed Oct 18 17:09:47 UTC 2023 kill -USR1 13125 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13125 killed at Wed Oct 18 17:09:47 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13191 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13191 found at Wed Oct 18 17:09:47 UTC 2023 selfserv_9997 with PID 13191 started at Wed Oct 18 17:09:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #788: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13191 at Wed Oct 18 17:09:48 UTC 2023 kill -USR1 13191 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13191 killed at Wed Oct 18 17:09:48 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13243 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13243 found at Wed Oct 18 17:09:48 UTC 2023 selfserv_9997 with PID 13243 started at Wed Oct 18 17:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #789: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13243 at Wed Oct 18 17:09:48 UTC 2023 kill -USR1 13243 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13243 killed at Wed Oct 18 17:09:48 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13295 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13295 found at Wed Oct 18 17:09:48 UTC 2023 selfserv_9997 with PID 13295 started at Wed Oct 18 17:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #790: TLS 1.0 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13295 at Wed Oct 18 17:09:48 UTC 2023 kill -USR1 13295 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13295 killed at Wed Oct 18 17:09:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13361 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13361 found at Wed Oct 18 17:09:48 UTC 2023 selfserv_9997 with PID 13361 started at Wed Oct 18 17:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #791: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13361 at Wed Oct 18 17:09:48 UTC 2023 kill -USR1 13361 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13361 killed at Wed Oct 18 17:09:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13413 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13413 found at Wed Oct 18 17:09:48 UTC 2023 selfserv_9997 with PID 13413 started at Wed Oct 18 17:09:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #792: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13413 at Wed Oct 18 17:09:49 UTC 2023 kill -USR1 13413 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13413 killed at Wed Oct 18 17:09:49 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13465 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13465 found at Wed Oct 18 17:09:49 UTC 2023 selfserv_9997 with PID 13465 started at Wed Oct 18 17:09:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #793: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13465 at Wed Oct 18 17:09:49 UTC 2023 kill -USR1 13465 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13465 killed at Wed Oct 18 17:09:49 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13531 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13531 found at Wed Oct 18 17:09:49 UTC 2023 selfserv_9997 with PID 13531 started at Wed Oct 18 17:09:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #794: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13531 at Wed Oct 18 17:09:49 UTC 2023 kill -USR1 13531 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13531 killed at Wed Oct 18 17:09:49 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13583 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13583 found at Wed Oct 18 17:09:49 UTC 2023 selfserv_9997 with PID 13583 started at Wed Oct 18 17:09:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #795: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13583 at Wed Oct 18 17:09:49 UTC 2023 kill -USR1 13583 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13583 killed at Wed Oct 18 17:09:49 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13635 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13635 found at Wed Oct 18 17:09:49 UTC 2023 selfserv_9997 with PID 13635 started at Wed Oct 18 17:09:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #796: SSL3 Request don't require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13635 at Wed Oct 18 17:09:50 UTC 2023 kill -USR1 13635 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13635 killed at Wed Oct 18 17:09:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13701 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13701 found at Wed Oct 18 17:09:50 UTC 2023 selfserv_9997 with PID 13701 started at Wed Oct 18 17:09:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #797: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13701 at Wed Oct 18 17:09:50 UTC 2023 kill -USR1 13701 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13701 killed at Wed Oct 18 17:09:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13753 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13753 found at Wed Oct 18 17:09:50 UTC 2023 selfserv_9997 with PID 13753 started at Wed Oct 18 17:09:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #798: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13753 at Wed Oct 18 17:09:50 UTC 2023 kill -USR1 13753 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13753 killed at Wed Oct 18 17:09:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13805 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13805 found at Wed Oct 18 17:09:50 UTC 2023 selfserv_9997 with PID 13805 started at Wed Oct 18 17:09:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #799: SSL3 Request don't require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13805 at Wed Oct 18 17:09:50 UTC 2023 kill -USR1 13805 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13805 killed at Wed Oct 18 17:09:50 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13871 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13871 found at Wed Oct 18 17:09:50 UTC 2023 selfserv_9997 with PID 13871 started at Wed Oct 18 17:09:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #800: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13871 at Wed Oct 18 17:09:51 UTC 2023 kill -USR1 13871 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13871 killed at Wed Oct 18 17:09:51 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13923 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13923 found at Wed Oct 18 17:09:51 UTC 2023 selfserv_9997 with PID 13923 started at Wed Oct 18 17:09:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #801: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13923 at Wed Oct 18 17:09:51 UTC 2023 kill -USR1 13923 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13923 killed at Wed Oct 18 17:09:51 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13975 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13975 found at Wed Oct 18 17:09:51 UTC 2023 selfserv_9997 with PID 13975 started at Wed Oct 18 17:09:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #802: SSL3 Require client auth on 2nd hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13975 at Wed Oct 18 17:09:51 UTC 2023 kill -USR1 13975 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13975 killed at Wed Oct 18 17:09:51 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14041 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14041 found at Wed Oct 18 17:09:51 UTC 2023 selfserv_9997 with PID 14041 started at Wed Oct 18 17:09:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #803: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14041 at Wed Oct 18 17:09:51 UTC 2023 kill -USR1 14041 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14041 killed at Wed Oct 18 17:09:51 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14094 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14094 found at Wed Oct 18 17:09:51 UTC 2023 selfserv_9997 with PID 14094 started at Wed Oct 18 17:09:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #804: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14094 at Wed Oct 18 17:09:52 UTC 2023 kill -USR1 14094 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14094 killed at Wed Oct 18 17:09:52 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14146 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14146 found at Wed Oct 18 17:09:52 UTC 2023 selfserv_9997 with PID 14146 started at Wed Oct 18 17:09:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #805: SSL3 Require client auth on 2nd hs (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14146 at Wed Oct 18 17:09:52 UTC 2023 kill -USR1 14146 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14146 killed at Wed Oct 18 17:09:52 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14212 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14212 found at Wed Oct 18 17:09:52 UTC 2023 selfserv_9997 with PID 14212 started at Wed Oct 18 17:09:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #806: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14212 at Wed Oct 18 17:09:52 UTC 2023 kill -USR1 14212 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14212 killed at Wed Oct 18 17:09:52 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14264 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14264 found at Wed Oct 18 17:09:52 UTC 2023 selfserv_9997 with PID 14264 started at Wed Oct 18 17:09:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #807: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14264 at Wed Oct 18 17:09:52 UTC 2023 kill -USR1 14264 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14264 killed at Wed Oct 18 17:09:52 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14317 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14317 found at Wed Oct 18 17:09:52 UTC 2023 selfserv_9997 with PID 14317 started at Wed Oct 18 17:09:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #808: SSL3 Require client auth on 2nd hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14317 at Wed Oct 18 17:09:52 UTC 2023 kill -USR1 14317 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14317 killed at Wed Oct 18 17:09:52 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14383 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14383 found at Wed Oct 18 17:09:52 UTC 2023 selfserv_9997 with PID 14383 started at Wed Oct 18 17:09:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #809: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14383 at Wed Oct 18 17:09:52 UTC 2023 kill -USR1 14383 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14383 killed at Wed Oct 18 17:09:52 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14435 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14435 found at Wed Oct 18 17:09:53 UTC 2023 selfserv_9997 with PID 14435 started at Wed Oct 18 17:09:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #810: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14435 at Wed Oct 18 17:09:53 UTC 2023 kill -USR1 14435 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14435 killed at Wed Oct 18 17:09:53 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14487 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14487 found at Wed Oct 18 17:09:53 UTC 2023 selfserv_9997 with PID 14487 started at Wed Oct 18 17:09:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #811: TLS 1.3 Request don't require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14487 at Wed Oct 18 17:09:53 UTC 2023 kill -USR1 14487 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14487 killed at Wed Oct 18 17:09:53 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14553 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14553 found at Wed Oct 18 17:09:53 UTC 2023 selfserv_9997 with PID 14553 started at Wed Oct 18 17:09:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #812: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14553 at Wed Oct 18 17:09:53 UTC 2023 kill -USR1 14553 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14553 killed at Wed Oct 18 17:09:53 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14605 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14605 found at Wed Oct 18 17:09:53 UTC 2023 selfserv_9997 with PID 14605 started at Wed Oct 18 17:09:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #813: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14605 at Wed Oct 18 17:09:53 UTC 2023 kill -USR1 14605 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14605 killed at Wed Oct 18 17:09:53 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14657 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14657 found at Wed Oct 18 17:09:53 UTC 2023 selfserv_9997 with PID 14657 started at Wed Oct 18 17:09:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #814: TLS 1.3 Require client auth on post hs (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14657 at Wed Oct 18 17:09:53 UTC 2023 kill -USR1 14657 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14657 killed at Wed Oct 18 17:09:53 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14724 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14724 found at Wed Oct 18 17:09:53 UTC 2023 selfserv_9997 with PID 14724 started at Wed Oct 18 17:09:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #815: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14724 at Wed Oct 18 17:09:54 UTC 2023 kill -USR1 14724 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14724 killed at Wed Oct 18 17:09:54 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14776 found at Wed Oct 18 17:09:54 UTC 2023 selfserv_9997 with PID 14776 started at Wed Oct 18 17:09:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #816: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14776 at Wed Oct 18 17:09:54 UTC 2023 kill -USR1 14776 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14776 killed at Wed Oct 18 17:09:54 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14828 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14828 found at Wed Oct 18 17:09:54 UTC 2023 selfserv_9997 with PID 14828 started at Wed Oct 18 17:09:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #817: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14828 at Wed Oct 18 17:09:54 UTC 2023 kill -USR1 14828 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14828 killed at Wed Oct 18 17:09:54 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14894 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14894 found at Wed Oct 18 17:09:54 UTC 2023 selfserv_9997 with PID 14894 started at Wed Oct 18 17:09:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #818: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14894 at Wed Oct 18 17:09:54 UTC 2023 kill -USR1 14894 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14894 killed at Wed Oct 18 17:09:54 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14946 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14946 found at Wed Oct 18 17:09:54 UTC 2023 selfserv_9997 with PID 14946 started at Wed Oct 18 17:09:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #819: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14946 at Wed Oct 18 17:09:55 UTC 2023 kill -USR1 14946 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14946 killed at Wed Oct 18 17:09:55 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14999 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14999 found at Wed Oct 18 17:09:55 UTC 2023 selfserv_9997 with PID 14999 started at Wed Oct 18 17:09:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #820: TLS 1.3 Require client auth on post hs (client does not provide auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14999 at Wed Oct 18 17:09:55 UTC 2023 kill -USR1 14999 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14999 killed at Wed Oct 18 17:09:55 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15065 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15065 found at Wed Oct 18 17:09:55 UTC 2023 selfserv_9997 with PID 15065 started at Wed Oct 18 17:09:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #821: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15065 at Wed Oct 18 17:09:55 UTC 2023 kill -USR1 15065 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15065 killed at Wed Oct 18 17:09:55 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15118 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15118 found at Wed Oct 18 17:09:55 UTC 2023 selfserv_9997 with PID 15118 started at Wed Oct 18 17:09:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #822: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15118 at Wed Oct 18 17:09:55 UTC 2023 kill -USR1 15118 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15118 killed at Wed Oct 18 17:09:55 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15170 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15170 found at Wed Oct 18 17:09:55 UTC 2023 selfserv_9997 with PID 15170 started at Wed Oct 18 17:09:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #823: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15170 at Wed Oct 18 17:09:55 UTC 2023 kill -USR1 15170 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15170 killed at Wed Oct 18 17:09:55 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15237 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15237 found at Wed Oct 18 17:09:55 UTC 2023 selfserv_9997 with PID 15237 started at Wed Oct 18 17:09:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #824: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15237 at Wed Oct 18 17:09:56 UTC 2023 kill -USR1 15237 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15237 killed at Wed Oct 18 17:09:56 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15289 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15289 found at Wed Oct 18 17:09:56 UTC 2023 selfserv_9997 with PID 15289 started at Wed Oct 18 17:09:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #825: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15289 at Wed Oct 18 17:09:56 UTC 2023 kill -USR1 15289 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15289 killed at Wed Oct 18 17:09:56 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15341 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15341 found at Wed Oct 18 17:09:56 UTC 2023 selfserv_9997 with PID 15341 started at Wed Oct 18 17:09:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #826: TLS 1.2 Require client auth auto select(RSA) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15341 at Wed Oct 18 17:09:56 UTC 2023 kill -USR1 15341 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15341 killed at Wed Oct 18 17:09:56 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15407 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15407 found at Wed Oct 18 17:09:56 UTC 2023 selfserv_9997 with PID 15407 started at Wed Oct 18 17:09:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #827: TLS Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15407 at Wed Oct 18 17:09:56 UTC 2023 kill -USR1 15407 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15407 killed at Wed Oct 18 17:09:56 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15459 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15459 found at Wed Oct 18 17:09:56 UTC 2023 selfserv_9997 with PID 15459 started at Wed Oct 18 17:09:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #828: TLS Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15459 at Wed Oct 18 17:09:56 UTC 2023 kill -USR1 15459 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15459 killed at Wed Oct 18 17:09:56 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15511 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15511 found at Wed Oct 18 17:09:56 UTC 2023 selfserv_9997 with PID 15511 started at Wed Oct 18 17:09:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #829: TLS Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15511 at Wed Oct 18 17:09:56 UTC 2023 kill -USR1 15511 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15511 killed at Wed Oct 18 17:09:56 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15577 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15577 found at Wed Oct 18 17:09:57 UTC 2023 selfserv_9997 with PID 15577 started at Wed Oct 18 17:09:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #830: TLS Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 15577 at Wed Oct 18 17:09:57 UTC 2023 kill -USR1 15577 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15577 killed at Wed Oct 18 17:09:57 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15629 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15629 found at Wed Oct 18 17:09:57 UTC 2023 selfserv_9997 with PID 15629 started at Wed Oct 18 17:09:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #831: TLS Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15629 at Wed Oct 18 17:09:57 UTC 2023 kill -USR1 15629 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15629 killed at Wed Oct 18 17:09:57 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15681 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15681 found at Wed Oct 18 17:09:57 UTC 2023 selfserv_9997 with PID 15681 started at Wed Oct 18 17:09:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #832: TLS Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 15681 at Wed Oct 18 17:09:57 UTC 2023 kill -USR1 15681 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15681 killed at Wed Oct 18 17:09:57 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15747 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15747 found at Wed Oct 18 17:09:57 UTC 2023 selfserv_9997 with PID 15747 started at Wed Oct 18 17:09:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #833: TLS Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 15747 at Wed Oct 18 17:09:57 UTC 2023 kill -USR1 15747 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15747 killed at Wed Oct 18 17:09:57 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15799 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15799 found at Wed Oct 18 17:09:57 UTC 2023 selfserv_9997 with PID 15799 started at Wed Oct 18 17:09:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #834: TLS Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 15799 at Wed Oct 18 17:09:57 UTC 2023 kill -USR1 15799 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15799 killed at Wed Oct 18 17:09:57 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15851 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15851 found at Wed Oct 18 17:09:57 UTC 2023 selfserv_9997 with PID 15851 started at Wed Oct 18 17:09:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #835: TLS Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 15851 at Wed Oct 18 17:09:57 UTC 2023 kill -USR1 15851 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15851 killed at Wed Oct 18 17:09:57 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15917 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15917 found at Wed Oct 18 17:09:57 UTC 2023 selfserv_9997 with PID 15917 started at Wed Oct 18 17:09:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #836: TLS Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 15917 at Wed Oct 18 17:09:57 UTC 2023 kill -USR1 15917 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15917 killed at Wed Oct 18 17:09:57 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15969 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15969 found at Wed Oct 18 17:09:58 UTC 2023 selfserv_9997 with PID 15969 started at Wed Oct 18 17:09:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #837: TLS Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15969 at Wed Oct 18 17:09:58 UTC 2023 kill -USR1 15969 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15969 killed at Wed Oct 18 17:09:58 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16021 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16021 found at Wed Oct 18 17:09:58 UTC 2023 selfserv_9997 with PID 16021 started at Wed Oct 18 17:09:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #838: TLS Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 16021 at Wed Oct 18 17:09:58 UTC 2023 kill -USR1 16021 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16021 killed at Wed Oct 18 17:09:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16087 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16087 found at Wed Oct 18 17:09:58 UTC 2023 selfserv_9997 with PID 16087 started at Wed Oct 18 17:09:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #839: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16087 at Wed Oct 18 17:09:58 UTC 2023 kill -USR1 16087 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16087 killed at Wed Oct 18 17:09:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16139 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16139 found at Wed Oct 18 17:09:58 UTC 2023 selfserv_9997 with PID 16139 started at Wed Oct 18 17:09:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #840: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16139 at Wed Oct 18 17:09:58 UTC 2023 kill -USR1 16139 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16139 killed at Wed Oct 18 17:09:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16192 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16192 found at Wed Oct 18 17:09:58 UTC 2023 selfserv_9997 with PID 16192 started at Wed Oct 18 17:09:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #841: SSL3 Request don't require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16192 at Wed Oct 18 17:09:58 UTC 2023 kill -USR1 16192 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16192 killed at Wed Oct 18 17:09:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16258 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16258 found at Wed Oct 18 17:09:58 UTC 2023 selfserv_9997 with PID 16258 started at Wed Oct 18 17:09:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #842: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 16258 at Wed Oct 18 17:09:58 UTC 2023 kill -USR1 16258 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16258 killed at Wed Oct 18 17:09:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16310 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16310 found at Wed Oct 18 17:09:58 UTC 2023 selfserv_9997 with PID 16310 started at Wed Oct 18 17:09:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #843: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16310 at Wed Oct 18 17:09:59 UTC 2023 kill -USR1 16310 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16310 killed at Wed Oct 18 17:09:59 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16362 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16362 found at Wed Oct 18 17:09:59 UTC 2023 selfserv_9997 with PID 16362 started at Wed Oct 18 17:09:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #844: SSL3 Request don't require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 16362 at Wed Oct 18 17:09:59 UTC 2023 kill -USR1 16362 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16362 killed at Wed Oct 18 17:09:59 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16429 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16429 found at Wed Oct 18 17:09:59 UTC 2023 selfserv_9997 with PID 16429 started at Wed Oct 18 17:09:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #845: SSL3 Require client auth (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 16429 at Wed Oct 18 17:09:59 UTC 2023 kill -USR1 16429 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16429 killed at Wed Oct 18 17:09:59 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16481 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16481 found at Wed Oct 18 17:09:59 UTC 2023 selfserv_9997 with PID 16481 started at Wed Oct 18 17:09:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #846: SSL3 Require client auth (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 16481 at Wed Oct 18 17:09:59 UTC 2023 kill -USR1 16481 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16481 killed at Wed Oct 18 17:09:59 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:09:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16533 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16533 found at Wed Oct 18 17:09:59 UTC 2023 selfserv_9997 with PID 16533 started at Wed Oct 18 17:09:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #847: SSL3 Require client auth (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 16533 at Wed Oct 18 17:09:59 UTC 2023 kill -USR1 16533 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16533 killed at Wed Oct 18 17:09:59 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16599 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16599 found at Wed Oct 18 17:09:59 UTC 2023 selfserv_9997 with PID 16599 started at Wed Oct 18 17:09:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #848: SSL3 Require client auth (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 16599 at Wed Oct 18 17:09:59 UTC 2023 kill -USR1 16599 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16599 killed at Wed Oct 18 17:09:59 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16651 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16651 found at Wed Oct 18 17:09:59 UTC 2023 selfserv_9997 with PID 16651 started at Wed Oct 18 17:09:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #849: SSL3 Require client auth (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16651 at Wed Oct 18 17:09:59 UTC 2023 kill -USR1 16651 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16651 killed at Wed Oct 18 17:09:59 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:09:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:09:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16703 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16703 found at Wed Oct 18 17:09:59 UTC 2023 selfserv_9997 with PID 16703 started at Wed Oct 18 17:09:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #850: SSL3 Require client auth (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 16703 at Wed Oct 18 17:09:59 UTC 2023 kill -USR1 16703 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16703 killed at Wed Oct 18 17:09:59 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:10:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16769 found at Wed Oct 18 17:10:00 UTC 2023 selfserv_9997 with PID 16769 started at Wed Oct 18 17:10:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #851: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16769 at Wed Oct 18 17:10:00 UTC 2023 kill -USR1 16769 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16769 killed at Wed Oct 18 17:10:00 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:10:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16821 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16821 found at Wed Oct 18 17:10:00 UTC 2023 selfserv_9997 with PID 16821 started at Wed Oct 18 17:10:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #852: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16821 at Wed Oct 18 17:10:00 UTC 2023 kill -USR1 16821 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16821 killed at Wed Oct 18 17:10:00 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:10:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16873 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16873 found at Wed Oct 18 17:10:00 UTC 2023 selfserv_9997 with PID 16873 started at Wed Oct 18 17:10:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #853: TLS Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16873 at Wed Oct 18 17:10:00 UTC 2023 kill -USR1 16873 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16873 killed at Wed Oct 18 17:10:00 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16939 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16939 found at Wed Oct 18 17:10:00 UTC 2023 selfserv_9997 with PID 16939 started at Wed Oct 18 17:10:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #854: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16939 at Wed Oct 18 17:10:00 UTC 2023 kill -USR1 16939 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16939 killed at Wed Oct 18 17:10:00 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16991 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16991 found at Wed Oct 18 17:10:00 UTC 2023 selfserv_9997 with PID 16991 started at Wed Oct 18 17:10:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #855: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16991 at Wed Oct 18 17:10:01 UTC 2023 kill -USR1 16991 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16991 killed at Wed Oct 18 17:10:01 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17043 found at Wed Oct 18 17:10:01 UTC 2023 selfserv_9997 with PID 17043 started at Wed Oct 18 17:10:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #856: TLS Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17043 at Wed Oct 18 17:10:01 UTC 2023 kill -USR1 17043 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17043 killed at Wed Oct 18 17:10:01 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:10:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17109 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17109 found at Wed Oct 18 17:10:01 UTC 2023 selfserv_9997 with PID 17109 started at Wed Oct 18 17:10:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #857: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17109 at Wed Oct 18 17:10:01 UTC 2023 kill -USR1 17109 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17109 killed at Wed Oct 18 17:10:01 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:10:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17161 found at Wed Oct 18 17:10:01 UTC 2023 selfserv_9997 with PID 17161 started at Wed Oct 18 17:10:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #858: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17161 at Wed Oct 18 17:10:01 UTC 2023 kill -USR1 17161 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17161 killed at Wed Oct 18 17:10:01 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:10:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17213 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17213 found at Wed Oct 18 17:10:01 UTC 2023 selfserv_9997 with PID 17213 started at Wed Oct 18 17:10:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #859: TLS Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17213 at Wed Oct 18 17:10:01 UTC 2023 kill -USR1 17213 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17213 killed at Wed Oct 18 17:10:01 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17279 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17279 found at Wed Oct 18 17:10:01 UTC 2023 selfserv_9997 with PID 17279 started at Wed Oct 18 17:10:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #860: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17279 at Wed Oct 18 17:10:02 UTC 2023 kill -USR1 17279 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17279 killed at Wed Oct 18 17:10:02 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17331 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17331 found at Wed Oct 18 17:10:02 UTC 2023 selfserv_9997 with PID 17331 started at Wed Oct 18 17:10:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #861: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17331 at Wed Oct 18 17:10:02 UTC 2023 kill -USR1 17331 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17331 killed at Wed Oct 18 17:10:02 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17383 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17383 found at Wed Oct 18 17:10:02 UTC 2023 selfserv_9997 with PID 17383 started at Wed Oct 18 17:10:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #862: TLS Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17383 at Wed Oct 18 17:10:02 UTC 2023 kill -USR1 17383 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17383 killed at Wed Oct 18 17:10:02 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:10:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17449 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17449 found at Wed Oct 18 17:10:02 UTC 2023 selfserv_9997 with PID 17449 started at Wed Oct 18 17:10:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #863: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17449 at Wed Oct 18 17:10:02 UTC 2023 kill -USR1 17449 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17449 killed at Wed Oct 18 17:10:02 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:10:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17501 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17501 found at Wed Oct 18 17:10:02 UTC 2023 selfserv_9997 with PID 17501 started at Wed Oct 18 17:10:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #864: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17501 at Wed Oct 18 17:10:02 UTC 2023 kill -USR1 17501 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17501 killed at Wed Oct 18 17:10:02 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:10:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17553 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17553 found at Wed Oct 18 17:10:02 UTC 2023 selfserv_9997 with PID 17553 started at Wed Oct 18 17:10:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #865: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17553 at Wed Oct 18 17:10:03 UTC 2023 kill -USR1 17553 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17553 killed at Wed Oct 18 17:10:03 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17619 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17619 found at Wed Oct 18 17:10:03 UTC 2023 selfserv_9997 with PID 17619 started at Wed Oct 18 17:10:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #866: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17619 at Wed Oct 18 17:10:03 UTC 2023 kill -USR1 17619 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17619 killed at Wed Oct 18 17:10:03 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17672 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17672 found at Wed Oct 18 17:10:03 UTC 2023 selfserv_9997 with PID 17672 started at Wed Oct 18 17:10:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #867: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17672 at Wed Oct 18 17:10:03 UTC 2023 kill -USR1 17672 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17672 killed at Wed Oct 18 17:10:03 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17726 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17726 found at Wed Oct 18 17:10:03 UTC 2023 selfserv_9997 with PID 17726 started at Wed Oct 18 17:10:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #868: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17726 at Wed Oct 18 17:10:03 UTC 2023 kill -USR1 17726 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17726 killed at Wed Oct 18 17:10:03 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:10:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17792 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17792 found at Wed Oct 18 17:10:03 UTC 2023 selfserv_9997 with PID 17792 started at Wed Oct 18 17:10:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #869: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17792 at Wed Oct 18 17:10:04 UTC 2023 kill -USR1 17792 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17792 killed at Wed Oct 18 17:10:04 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:10:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17846 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17846 found at Wed Oct 18 17:10:04 UTC 2023 selfserv_9997 with PID 17846 started at Wed Oct 18 17:10:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #870: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17846 at Wed Oct 18 17:10:04 UTC 2023 kill -USR1 17846 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17846 killed at Wed Oct 18 17:10:04 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:10:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17898 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17898 found at Wed Oct 18 17:10:04 UTC 2023 selfserv_9997 with PID 17898 started at Wed Oct 18 17:10:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #871: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17898 at Wed Oct 18 17:10:04 UTC 2023 kill -USR1 17898 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17898 killed at Wed Oct 18 17:10:04 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17964 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17964 found at Wed Oct 18 17:10:04 UTC 2023 selfserv_9997 with PID 17964 started at Wed Oct 18 17:10:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #872: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17964 at Wed Oct 18 17:10:04 UTC 2023 kill -USR1 17964 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17964 killed at Wed Oct 18 17:10:04 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18016 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18016 found at Wed Oct 18 17:10:04 UTC 2023 selfserv_9997 with PID 18016 started at Wed Oct 18 17:10:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #873: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18016 at Wed Oct 18 17:10:04 UTC 2023 kill -USR1 18016 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18016 killed at Wed Oct 18 17:10:04 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18068 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18068 found at Wed Oct 18 17:10:05 UTC 2023 selfserv_9997 with PID 18068 started at Wed Oct 18 17:10:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #874: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18068 at Wed Oct 18 17:10:05 UTC 2023 kill -USR1 18068 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18068 killed at Wed Oct 18 17:10:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:10:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18134 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18134 found at Wed Oct 18 17:10:05 UTC 2023 selfserv_9997 with PID 18134 started at Wed Oct 18 17:10:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #875: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18134 at Wed Oct 18 17:10:05 UTC 2023 kill -USR1 18134 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18134 killed at Wed Oct 18 17:10:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:10:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18186 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18186 found at Wed Oct 18 17:10:05 UTC 2023 selfserv_9997 with PID 18186 started at Wed Oct 18 17:10:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #876: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18186 at Wed Oct 18 17:10:05 UTC 2023 kill -USR1 18186 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18186 killed at Wed Oct 18 17:10:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:10:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18238 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18238 found at Wed Oct 18 17:10:05 UTC 2023 selfserv_9997 with PID 18238 started at Wed Oct 18 17:10:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #877: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18238 at Wed Oct 18 17:10:05 UTC 2023 kill -USR1 18238 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18238 killed at Wed Oct 18 17:10:05 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18304 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18304 found at Wed Oct 18 17:10:05 UTC 2023 selfserv_9997 with PID 18304 started at Wed Oct 18 17:10:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #878: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18304 at Wed Oct 18 17:10:05 UTC 2023 kill -USR1 18304 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18304 killed at Wed Oct 18 17:10:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18356 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18356 found at Wed Oct 18 17:10:06 UTC 2023 selfserv_9997 with PID 18356 started at Wed Oct 18 17:10:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #879: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18356 at Wed Oct 18 17:10:06 UTC 2023 kill -USR1 18356 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18356 killed at Wed Oct 18 17:10:06 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18408 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18408 found at Wed Oct 18 17:10:06 UTC 2023 selfserv_9997 with PID 18408 started at Wed Oct 18 17:10:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #880: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18408 at Wed Oct 18 17:10:06 UTC 2023 kill -USR1 18408 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18408 killed at Wed Oct 18 17:10:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:10:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18474 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18474 found at Wed Oct 18 17:10:06 UTC 2023 selfserv_9997 with PID 18474 started at Wed Oct 18 17:10:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #881: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18474 at Wed Oct 18 17:10:06 UTC 2023 kill -USR1 18474 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18474 killed at Wed Oct 18 17:10:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:10:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18526 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18526 found at Wed Oct 18 17:10:06 UTC 2023 selfserv_9997 with PID 18526 started at Wed Oct 18 17:10:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #882: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser41 - not revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18526 at Wed Oct 18 17:10:06 UTC 2023 kill -USR1 18526 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18526 killed at Wed Oct 18 17:10:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:10:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18578 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18578 found at Wed Oct 18 17:10:06 UTC 2023 selfserv_9997 with PID 18578 started at Wed Oct 18 17:10:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #883: SSL3 Require client auth on 2nd hs (EC) (bad password) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18578 at Wed Oct 18 17:10:06 UTC 2023 kill -USR1 18578 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18578 killed at Wed Oct 18 17:10:06 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18645 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18645 found at Wed Oct 18 17:10:07 UTC 2023 selfserv_9997 with PID 18645 started at Wed Oct 18 17:10:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #884: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18645 at Wed Oct 18 17:10:07 UTC 2023 kill -USR1 18645 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18645 killed at Wed Oct 18 17:10:07 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18697 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18697 found at Wed Oct 18 17:10:07 UTC 2023 selfserv_9997 with PID 18697 started at Wed Oct 18 17:10:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #885: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18697 at Wed Oct 18 17:10:07 UTC 2023 kill -USR1 18697 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18697 killed at Wed Oct 18 17:10:07 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18749 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18749 found at Wed Oct 18 17:10:07 UTC 2023 selfserv_9997 with PID 18749 started at Wed Oct 18 17:10:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. ssl.sh: #886: SSL3 Require client auth on 2nd hs (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18749 at Wed Oct 18 17:10:07 UTC 2023 kill -USR1 18749 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18749 killed at Wed Oct 18 17:10:07 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18816 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18816 found at Wed Oct 18 17:10:07 UTC 2023 selfserv_9997 with PID 18816 started at Wed Oct 18 17:10:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #887: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18816 at Wed Oct 18 17:10:07 UTC 2023 kill -USR1 18816 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18816 killed at Wed Oct 18 17:10:07 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18868 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18868 found at Wed Oct 18 17:10:07 UTC 2023 selfserv_9997 with PID 18868 started at Wed Oct 18 17:10:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #888: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18868 at Wed Oct 18 17:10:08 UTC 2023 kill -USR1 18868 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18868 killed at Wed Oct 18 17:10:08 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18920 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18920 found at Wed Oct 18 17:10:08 UTC 2023 selfserv_9997 with PID 18920 started at Wed Oct 18 17:10:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #889: TLS 1.2 Require client auth auto select(EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18920 at Wed Oct 18 17:10:08 UTC 2023 kill -USR1 18920 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18920 killed at Wed Oct 18 17:10:08 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18986 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18986 found at Wed Oct 18 17:10:08 UTC 2023 selfserv_9997 with PID 18986 started at Wed Oct 18 17:10:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #890: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser40 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18986 at Wed Oct 18 17:10:08 UTC 2023 kill -USR1 18986 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18986 killed at Wed Oct 18 17:10:08 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19038 found at Wed Oct 18 17:10:08 UTC 2023 selfserv_9997 with PID 19038 started at Wed Oct 18 17:10:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #891: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19038 at Wed Oct 18 17:10:08 UTC 2023 kill -USR1 19038 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19038 killed at Wed Oct 18 17:10:08 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19090 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19090 found at Wed Oct 18 17:10:09 UTC 2023 selfserv_9997 with PID 19090 started at Wed Oct 18 17:10:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #892: TLS 1.3 Require client auth auto select (EC) (client auth) (cert TestUser42 - revoked) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19090 at Wed Oct 18 17:10:09 UTC 2023 kill -USR1 19090 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19090 killed at Wed Oct 18 17:10:09 UTC 2023 ssl.sh: Cache CRL SSL Client Tests =============================== /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/authin.tl.tmp 0 selfserv_9997 starting at Wed Oct 18 17:10:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:09 UTC 2023 selfserv_9997 with PID 19161 started at Wed Oct 18 17:10:09 UTC 2023 Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:09 UTC 2023 ssl.sh: #719: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:09 UTC 2023 ssl.sh: #720: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:09 UTC 2023 ssl.sh: #721: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:09 UTC 2023 ssl.sh: #722: TLS Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:09 UTC 2023 ssl.sh: #723: TLS Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:09 UTC 2023 ssl.sh: #724: TLS Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:10 UTC 2023 ssl.sh: #725: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:10 UTC 2023 ssl.sh: #726: TLS Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:10 UTC 2023 ssl.sh: #727: TLS Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:10 UTC 2023 ssl.sh: #728: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:10 UTC 2023 ssl.sh: #729: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:10 UTC 2023 ssl.sh: #730: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:10 UTC 2023 ssl.sh: #731: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:10 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #732: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:10 UTC 2023 ssl.sh: #733: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:11 UTC 2023 ssl.sh: #734: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:11 UTC 2023 ssl.sh: #735: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:11 UTC 2023 ssl.sh: #736: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:11 UTC 2023 ssl.sh: #737: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:11 UTC 2023 ssl.sh: #738: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:11 UTC 2023 ssl.sh: #739: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:11 UTC 2023 ssl.sh: #740: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:11 UTC 2023 ssl.sh: #741: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:11 UTC 2023 ssl.sh: #742: TLS Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:11 UTC 2023 ssl.sh: #743: TLS Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:12 UTC 2023 ssl.sh: #744: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:12 UTC 2023 ssl.sh: #745: TLS Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:12 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #746: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:12 UTC 2023 ssl.sh: #747: TLS Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:12 UTC 2023 ssl.sh: #748: TLS Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:12 UTC 2023 ssl.sh: #749: TLS Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:12 UTC 2023 ssl.sh: #750: TLS Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:12 UTC 2023 ssl.sh: #751: TLS Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:12 UTC 2023 ssl.sh: #752: TLS Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:12 UTC 2023 ssl.sh: #753: TLS Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:12 UTC 2023 ssl.sh: #754: TLS Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:13 UTC 2023 ssl.sh: #755: TLS Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:13 UTC 2023 ssl.sh: #756: TLS Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:13 UTC 2023 ssl.sh: #757: TLS Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:13 UTC 2023 ssl.sh: #758: TLS Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 19161 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19161 found at Wed Oct 18 17:10:13 UTC 2023 ssl.sh: #759: TLS Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 19161 at Wed Oct 18 17:10:13 UTC 2023 kill -USR1 19161 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19161 killed at Wed Oct 18 17:10:13 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:13 UTC 2023 selfserv_9997 with PID 20423 started at Wed Oct 18 17:10:13 UTC 2023 Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:13 UTC 2023 ssl.sh: #760: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:13 UTC 2023 ssl.sh: #761: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:13 UTC 2023 ssl.sh: #762: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:13 UTC 2023 ssl.sh: #763: SSL3 Require client auth (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:14 UTC 2023 ssl.sh: #764: SSL3 Require client auth (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:14 UTC 2023 ssl.sh: #765: SSL3 Require client auth (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:14 UTC 2023 ssl.sh: #766: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:14 UTC 2023 ssl.sh: #767: SSL3 Require client auth (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:14 UTC 2023 ssl.sh: #768: SSL3 Require client auth (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:14 UTC 2023 ssl.sh: #769: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:14 UTC 2023 ssl.sh: #770: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:14 UTC 2023 ssl.sh: #771: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:15 UTC 2023 ssl.sh: #772: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:15 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #773: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:15 UTC 2023 ssl.sh: #774: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:15 UTC 2023 ssl.sh: #775: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:15 UTC 2023 ssl.sh: #776: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:15 UTC 2023 ssl.sh: #777: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:15 UTC 2023 ssl.sh: #778: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:15 UTC 2023 ssl.sh: #779: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:15 UTC 2023 ssl.sh: #780: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:15 UTC 2023 ssl.sh: #781: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:15 UTC 2023 ssl.sh: #782: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:16 UTC 2023 ssl.sh: #783: SSL3 Require client auth (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:16 UTC 2023 ssl.sh: #784: SSL3 Require client auth (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:16 UTC 2023 ssl.sh: #785: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:16 UTC 2023 ssl.sh: #786: SSL3 Require client auth (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:16 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #787: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:16 UTC 2023 ssl.sh: #788: SSL3 Require client auth (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:16 UTC 2023 ssl.sh: #789: SSL3 Require client auth (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:16 UTC 2023 ssl.sh: #790: SSL3 Require client auth (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:16 UTC 2023 ssl.sh: #791: SSL3 Require client auth (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:16 UTC 2023 ssl.sh: #792: SSL3 Require client auth (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:16 UTC 2023 ssl.sh: #793: SSL3 Require client auth (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:17 UTC 2023 ssl.sh: #794: SSL3 Require client auth (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:17 UTC 2023 ssl.sh: #795: SSL3 Require client auth (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:17 UTC 2023 ssl.sh: #796: SSL3 Require client auth (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:17 UTC 2023 ssl.sh: #797: SSL3 Require client auth (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:17 UTC 2023 ssl.sh: #798: SSL3 Require client auth (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:17 UTC 2023 ssl.sh: #799: SSL3 Require client auth (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 20423 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20423 found at Wed Oct 18 17:10:17 UTC 2023 ssl.sh: #800: SSL3 Require client auth (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 20423 at Wed Oct 18 17:10:17 UTC 2023 kill -USR1 20423 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20423 killed at Wed Oct 18 17:10:17 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:17 UTC 2023 selfserv_9997 with PID 21683 started at Wed Oct 18 17:10:17 UTC 2023 Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:17 UTC 2023 ssl.sh: #801: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:17 UTC 2023 ssl.sh: #802: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:17 UTC 2023 ssl.sh: #803: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:18 UTC 2023 ssl.sh: #804: TLS Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:18 UTC 2023 ssl.sh: #805: TLS Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:18 UTC 2023 ssl.sh: #806: TLS Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:18 UTC 2023 ssl.sh: #807: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:18 UTC 2023 ssl.sh: #808: TLS Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:18 UTC 2023 ssl.sh: #809: TLS Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:18 UTC 2023 ssl.sh: #810: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:18 UTC 2023 ssl.sh: #811: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:18 UTC 2023 ssl.sh: #812: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:19 UTC 2023 ssl.sh: #813: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:19 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #814: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:19 UTC 2023 ssl.sh: #815: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:19 UTC 2023 ssl.sh: #816: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:19 UTC 2023 ssl.sh: #817: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:19 UTC 2023 ssl.sh: #818: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:19 UTC 2023 ssl.sh: #819: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:19 UTC 2023 ssl.sh: #820: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:19 UTC 2023 ssl.sh: #821: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:19 UTC 2023 ssl.sh: #822: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:19 UTC 2023 ssl.sh: #823: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:20 UTC 2023 ssl.sh: #824: TLS Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:20 UTC 2023 ssl.sh: #825: TLS Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:20 UTC 2023 ssl.sh: #826: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:20 UTC 2023 ssl.sh: #827: TLS Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:20 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #828: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:20 UTC 2023 ssl.sh: #829: TLS Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:20 UTC 2023 ssl.sh: #830: TLS Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:20 UTC 2023 ssl.sh: #831: TLS Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:20 UTC 2023 ssl.sh: #832: TLS Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:20 UTC 2023 ssl.sh: #833: TLS Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:20 UTC 2023 ssl.sh: #834: TLS Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:21 UTC 2023 ssl.sh: #835: TLS Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:21 UTC 2023 ssl.sh: #836: TLS Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:21 UTC 2023 ssl.sh: #837: TLS Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:21 UTC 2023 ssl.sh: #838: TLS Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:21 UTC 2023 ssl.sh: #839: TLS Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:21 UTC 2023 ssl.sh: #840: TLS Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 21683 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21683 found at Wed Oct 18 17:10:21 UTC 2023 ssl.sh: #841: TLS Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 21683 at Wed Oct 18 17:10:21 UTC 2023 kill -USR1 21683 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21683 killed at Wed Oct 18 17:10:21 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:21 UTC 2023 selfserv_9997 with PID 22949 started at Wed Oct 18 17:10:21 UTC 2023 Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:21 UTC 2023 ssl.sh: #842: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:21 UTC 2023 ssl.sh: #843: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:21 UTC 2023 ssl.sh: #844: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:22 UTC 2023 ssl.sh: #845: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:22 UTC 2023 ssl.sh: #846: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:22 UTC 2023 ssl.sh: #847: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:22 UTC 2023 ssl.sh: #848: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:22 UTC 2023 ssl.sh: #849: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:22 UTC 2023 ssl.sh: #850: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:22 UTC 2023 ssl.sh: #851: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:22 UTC 2023 ssl.sh: #852: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:22 UTC 2023 ssl.sh: #853: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:23 UTC 2023 ssl.sh: #854: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:23 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #855: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:23 UTC 2023 ssl.sh: #856: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:23 UTC 2023 ssl.sh: #857: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:23 UTC 2023 ssl.sh: #858: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:23 UTC 2023 ssl.sh: #859: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:23 UTC 2023 ssl.sh: #860: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:23 UTC 2023 ssl.sh: #861: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:23 UTC 2023 ssl.sh: #862: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:23 UTC 2023 ssl.sh: #863: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:23 UTC 2023 ssl.sh: #864: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:24 UTC 2023 ssl.sh: #865: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:24 UTC 2023 ssl.sh: #866: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:24 UTC 2023 ssl.sh: #867: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:24 UTC 2023 ssl.sh: #868: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:24 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #869: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:24 UTC 2023 ssl.sh: #870: SSL3 Require client auth (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:24 UTC 2023 ssl.sh: #871: SSL3 Require client auth (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:24 UTC 2023 ssl.sh: #872: SSL3 Require client auth (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:24 UTC 2023 ssl.sh: #873: SSL3 Require client auth (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:24 UTC 2023 ssl.sh: #874: SSL3 Require client auth (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:25 UTC 2023 ssl.sh: #875: SSL3 Require client auth (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:25 UTC 2023 ssl.sh: #876: SSL3 Require client auth (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:25 UTC 2023 ssl.sh: #877: SSL3 Require client auth (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:25 UTC 2023 ssl.sh: #878: SSL3 Require client auth (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:25 UTC 2023 ssl.sh: #879: SSL3 Require client auth (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:25 UTC 2023 ssl.sh: #880: SSL3 Require client auth (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 254, expected is 254 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:25 UTC 2023 ssl.sh: #881: SSL3 Require client auth (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -8180: Peer's Certificate has been revoked. tstclnt: write to SSL socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 22949 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22949 found at Wed Oct 18 17:10:25 UTC 2023 ssl.sh: #882: SSL3 Require client auth (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 22949 at Wed Oct 18 17:10:25 UTC 2023 kill -USR1 22949 selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22949 killed at Wed Oct 18 17:10:25 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24210 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24210 found at Wed Oct 18 17:10:25 UTC 2023 selfserv_9997 with PID 24210 started at Wed Oct 18 17:10:25 UTC 2023 trying to kill selfserv_9997 with PID 24210 at Wed Oct 18 17:10:25 UTC 2023 kill -USR1 24210 ./ssl.sh: line 228: 24210 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9997 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24210 killed at Wed Oct 18 17:10:25 UTC 2023 selfserv_9997 starting at Wed Oct 18 17:10:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:25 UTC 2023 selfserv_9997 with PID 24252 started at Wed Oct 18 17:10:25 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:25 UTC 2023 ssl.sh: #883: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:26 UTC 2023 ssl.sh: #884: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:26 UTC 2023 ssl.sh: #885: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:26 UTC 2023 ssl.sh: #886: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:26 UTC 2023 ssl.sh: #887: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:26 UTC 2023 ssl.sh: #888: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:26 UTC 2023 ssl.sh: #889: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:26 UTC 2023 ssl.sh: #890: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:27 UTC 2023 ssl.sh: #891: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:27 UTC 2023 ssl.sh: #892: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:27 UTC 2023 ssl.sh: #893: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:27 UTC 2023 ssl.sh: #894: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:27 UTC 2023 ssl.sh: #895: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:27 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #896: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:27 UTC 2023 ssl.sh: #897: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:28 UTC 2023 ssl.sh: #898: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:28 UTC 2023 ssl.sh: #899: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:28 UTC 2023 ssl.sh: #900: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:28 UTC 2023 ssl.sh: #901: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:28 UTC 2023 ssl.sh: #902: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:28 UTC 2023 ssl.sh: #903: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:28 UTC 2023 ssl.sh: #904: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:29 UTC 2023 ssl.sh: #905: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:29 UTC 2023 ssl.sh: #906: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:29 UTC 2023 ssl.sh: #907: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:29 UTC 2023 ssl.sh: #908: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:29 UTC 2023 ssl.sh: #909: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:29 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #910: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:29 UTC 2023 ssl.sh: #911: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:30 UTC 2023 ssl.sh: #912: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:30 UTC 2023 ssl.sh: #913: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:30 UTC 2023 ssl.sh: #914: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:30 UTC 2023 ssl.sh: #915: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:30 UTC 2023 ssl.sh: #916: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:30 UTC 2023 ssl.sh: #917: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:30 UTC 2023 ssl.sh: #918: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:31 UTC 2023 ssl.sh: #919: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:31 UTC 2023 ssl.sh: #920: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:31 UTC 2023 ssl.sh: #921: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:31 UTC 2023 ssl.sh: #922: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 24252 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24252 found at Wed Oct 18 17:10:31 UTC 2023 ssl.sh: #923: TLS Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24252 at Wed Oct 18 17:10:31 UTC 2023 kill -USR1 24252 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24252 killed at Wed Oct 18 17:10:31 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:31 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:31 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:31 UTC 2023 selfserv_9997 with PID 25517 started at Wed Oct 18 17:10:31 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:31 UTC 2023 ssl.sh: #924: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:32 UTC 2023 ssl.sh: #925: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:32 UTC 2023 ssl.sh: #926: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:32 UTC 2023 ssl.sh: #927: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:32 UTC 2023 ssl.sh: #928: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:32 UTC 2023 ssl.sh: #929: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:32 UTC 2023 ssl.sh: #930: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:33 UTC 2023 ssl.sh: #931: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:33 UTC 2023 ssl.sh: #932: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:33 UTC 2023 ssl.sh: #933: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:33 UTC 2023 ssl.sh: #934: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:33 UTC 2023 ssl.sh: #935: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:34 UTC 2023 ssl.sh: #936: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:34 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #937: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:34 UTC 2023 ssl.sh: #938: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:34 UTC 2023 ssl.sh: #939: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:34 UTC 2023 ssl.sh: #940: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:34 UTC 2023 ssl.sh: #941: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:35 UTC 2023 ssl.sh: #942: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:35 UTC 2023 ssl.sh: #943: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:35 UTC 2023 ssl.sh: #944: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:35 UTC 2023 ssl.sh: #945: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:35 UTC 2023 ssl.sh: #946: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:36 UTC 2023 ssl.sh: #947: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:36 UTC 2023 ssl.sh: #948: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:36 UTC 2023 ssl.sh: #949: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:36 UTC 2023 ssl.sh: #950: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:36 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #951: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:36 UTC 2023 ssl.sh: #952: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:37 UTC 2023 ssl.sh: #953: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:37 UTC 2023 ssl.sh: #954: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:37 UTC 2023 ssl.sh: #955: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:37 UTC 2023 ssl.sh: #956: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:37 UTC 2023 ssl.sh: #957: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:37 UTC 2023 ssl.sh: #958: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:38 UTC 2023 ssl.sh: #959: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:38 UTC 2023 ssl.sh: #960: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:38 UTC 2023 ssl.sh: #961: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:38 UTC 2023 ssl.sh: #962: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:38 UTC 2023 ssl.sh: #963: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 25517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25517 found at Wed Oct 18 17:10:39 UTC 2023 ssl.sh: #964: TLS 1.0 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 25517 at Wed Oct 18 17:10:39 UTC 2023 kill -USR1 25517 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25517 killed at Wed Oct 18 17:10:39 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:39 UTC 2023 selfserv_9997 with PID 26776 started at Wed Oct 18 17:10:39 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:39 UTC 2023 ssl.sh: #965: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:39 UTC 2023 ssl.sh: #966: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:39 UTC 2023 ssl.sh: #967: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:39 UTC 2023 ssl.sh: #968: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:39 UTC 2023 ssl.sh: #969: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:39 UTC 2023 ssl.sh: #970: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:40 UTC 2023 ssl.sh: #971: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:40 UTC 2023 ssl.sh: #972: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:40 UTC 2023 ssl.sh: #973: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:40 UTC 2023 ssl.sh: #974: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:40 UTC 2023 ssl.sh: #975: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:40 UTC 2023 ssl.sh: #976: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:40 UTC 2023 ssl.sh: #977: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:41 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #978: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:41 UTC 2023 ssl.sh: #979: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:41 UTC 2023 ssl.sh: #980: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:41 UTC 2023 ssl.sh: #981: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:41 UTC 2023 ssl.sh: #982: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:41 UTC 2023 ssl.sh: #983: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:41 UTC 2023 ssl.sh: #984: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:42 UTC 2023 ssl.sh: #985: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:42 UTC 2023 ssl.sh: #986: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:42 UTC 2023 ssl.sh: #987: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:42 UTC 2023 ssl.sh: #988: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:42 UTC 2023 ssl.sh: #989: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:42 UTC 2023 ssl.sh: #990: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:42 UTC 2023 ssl.sh: #991: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:43 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #992: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:43 UTC 2023 ssl.sh: #993: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:43 UTC 2023 ssl.sh: #994: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:43 UTC 2023 ssl.sh: #995: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:43 UTC 2023 ssl.sh: #996: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:43 UTC 2023 ssl.sh: #997: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:43 UTC 2023 ssl.sh: #998: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:44 UTC 2023 ssl.sh: #999: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:44 UTC 2023 ssl.sh: #1000: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:44 UTC 2023 ssl.sh: #1001: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:44 UTC 2023 ssl.sh: #1002: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:44 UTC 2023 ssl.sh: #1003: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:44 UTC 2023 ssl.sh: #1004: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 26776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26776 found at Wed Oct 18 17:10:44 UTC 2023 ssl.sh: #1005: SSL3 Request don't require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 26776 at Wed Oct 18 17:10:44 UTC 2023 kill -USR1 26776 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26776 killed at Wed Oct 18 17:10:45 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:45 UTC 2023 selfserv_9997 with PID 28053 started at Wed Oct 18 17:10:45 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:45 UTC 2023 ssl.sh: #1006: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:45 UTC 2023 ssl.sh: #1007: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:45 UTC 2023 ssl.sh: #1008: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:45 UTC 2023 ssl.sh: #1009: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:45 UTC 2023 ssl.sh: #1010: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:45 UTC 2023 ssl.sh: #1011: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:46 UTC 2023 ssl.sh: #1012: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:46 UTC 2023 ssl.sh: #1013: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:46 UTC 2023 ssl.sh: #1014: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:46 UTC 2023 ssl.sh: #1015: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:46 UTC 2023 ssl.sh: #1016: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:46 UTC 2023 ssl.sh: #1017: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:47 UTC 2023 ssl.sh: #1018: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:47 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1019: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:47 UTC 2023 ssl.sh: #1020: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:47 UTC 2023 ssl.sh: #1021: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:47 UTC 2023 ssl.sh: #1022: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:47 UTC 2023 ssl.sh: #1023: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:47 UTC 2023 ssl.sh: #1024: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:47 UTC 2023 ssl.sh: #1025: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:48 UTC 2023 ssl.sh: #1026: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:48 UTC 2023 ssl.sh: #1027: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:48 UTC 2023 ssl.sh: #1028: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:48 UTC 2023 ssl.sh: #1029: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:48 UTC 2023 ssl.sh: #1030: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:48 UTC 2023 ssl.sh: #1031: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:49 UTC 2023 ssl.sh: #1032: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:49 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1033: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:49 UTC 2023 ssl.sh: #1034: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:49 UTC 2023 ssl.sh: #1035: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:49 UTC 2023 ssl.sh: #1036: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:49 UTC 2023 ssl.sh: #1037: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:49 UTC 2023 ssl.sh: #1038: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:49 UTC 2023 ssl.sh: #1039: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:50 UTC 2023 ssl.sh: #1040: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:50 UTC 2023 ssl.sh: #1041: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:50 UTC 2023 ssl.sh: #1042: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:50 UTC 2023 ssl.sh: #1043: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:50 UTC 2023 ssl.sh: #1044: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:50 UTC 2023 ssl.sh: #1045: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 28053 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28053 found at Wed Oct 18 17:10:51 UTC 2023 ssl.sh: #1046: TLS Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28053 at Wed Oct 18 17:10:51 UTC 2023 kill -USR1 28053 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28053 killed at Wed Oct 18 17:10:51 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:51 UTC 2023 selfserv_9997 with PID 29315 started at Wed Oct 18 17:10:51 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:51 UTC 2023 ssl.sh: #1047: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:51 UTC 2023 ssl.sh: #1048: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:51 UTC 2023 ssl.sh: #1049: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:51 UTC 2023 ssl.sh: #1050: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:51 UTC 2023 ssl.sh: #1051: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:52 UTC 2023 ssl.sh: #1052: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:52 UTC 2023 ssl.sh: #1053: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:52 UTC 2023 ssl.sh: #1054: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:52 UTC 2023 ssl.sh: #1055: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:52 UTC 2023 ssl.sh: #1056: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:53 UTC 2023 ssl.sh: #1057: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:53 UTC 2023 ssl.sh: #1058: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:53 UTC 2023 ssl.sh: #1059: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:53 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1060: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:53 UTC 2023 ssl.sh: #1061: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:54 UTC 2023 ssl.sh: #1062: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:54 UTC 2023 ssl.sh: #1063: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:54 UTC 2023 ssl.sh: #1064: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:54 UTC 2023 ssl.sh: #1065: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:54 UTC 2023 ssl.sh: #1066: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:54 UTC 2023 ssl.sh: #1067: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:55 UTC 2023 ssl.sh: #1068: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:55 UTC 2023 ssl.sh: #1069: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:55 UTC 2023 ssl.sh: #1070: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:55 UTC 2023 ssl.sh: #1071: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:55 UTC 2023 ssl.sh: #1072: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:56 UTC 2023 ssl.sh: #1073: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:56 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1074: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:56 UTC 2023 ssl.sh: #1075: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:56 UTC 2023 ssl.sh: #1076: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:56 UTC 2023 ssl.sh: #1077: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:56 UTC 2023 ssl.sh: #1078: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:57 UTC 2023 ssl.sh: #1079: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:57 UTC 2023 ssl.sh: #1080: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:57 UTC 2023 ssl.sh: #1081: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:57 UTC 2023 ssl.sh: #1082: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:57 UTC 2023 ssl.sh: #1083: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:57 UTC 2023 ssl.sh: #1084: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:58 UTC 2023 ssl.sh: #1085: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:58 UTC 2023 ssl.sh: #1086: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 29315 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29315 found at Wed Oct 18 17:10:58 UTC 2023 ssl.sh: #1087: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 29315 at Wed Oct 18 17:10:58 UTC 2023 kill -USR1 29315 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29315 killed at Wed Oct 18 17:10:58 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:10:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:10:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:10:58 UTC 2023 selfserv_9997 with PID 30579 started at Wed Oct 18 17:10:58 UTC 2023 Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:10:58 UTC 2023 ssl.sh: #1088: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:10:58 UTC 2023 ssl.sh: #1089: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:10:58 UTC 2023 ssl.sh: #1090: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:10:59 UTC 2023 ssl.sh: #1091: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:10:59 UTC 2023 ssl.sh: #1092: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:10:59 UTC 2023 ssl.sh: #1093: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:10:59 UTC 2023 ssl.sh: #1094: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:10:59 UTC 2023 ssl.sh: #1095: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:10:59 UTC 2023 ssl.sh: #1096: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:10:59 UTC 2023 ssl.sh: #1097: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:00 UTC 2023 ssl.sh: #1098: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:00 UTC 2023 ssl.sh: #1099: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:00 UTC 2023 ssl.sh: #1100: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:00 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1101: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:00 UTC 2023 ssl.sh: #1102: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:00 UTC 2023 ssl.sh: #1103: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:01 UTC 2023 ssl.sh: #1104: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:01 UTC 2023 ssl.sh: #1105: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:01 UTC 2023 ssl.sh: #1106: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:01 UTC 2023 ssl.sh: #1107: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:01 UTC 2023 ssl.sh: #1108: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:01 UTC 2023 ssl.sh: #1109: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:01 UTC 2023 ssl.sh: #1110: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:02 UTC 2023 ssl.sh: #1111: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:02 UTC 2023 ssl.sh: #1112: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:02 UTC 2023 ssl.sh: #1113: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:02 UTC 2023 ssl.sh: #1114: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:02 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1115: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:02 UTC 2023 ssl.sh: #1116: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:02 UTC 2023 ssl.sh: #1117: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:03 UTC 2023 ssl.sh: #1118: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:03 UTC 2023 ssl.sh: #1119: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:03 UTC 2023 ssl.sh: #1120: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:03 UTC 2023 ssl.sh: #1121: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:03 UTC 2023 ssl.sh: #1122: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:03 UTC 2023 ssl.sh: #1123: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:03 UTC 2023 ssl.sh: #1124: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:04 UTC 2023 ssl.sh: #1125: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:04 UTC 2023 ssl.sh: #1126: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:04 UTC 2023 ssl.sh: #1127: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 30579 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30579 found at Wed Oct 18 17:11:04 UTC 2023 ssl.sh: #1128: SSL3 Request don't require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 30579 at Wed Oct 18 17:11:04 UTC 2023 kill -USR1 30579 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30579 killed at Wed Oct 18 17:11:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31839 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31839 found at Wed Oct 18 17:11:04 UTC 2023 selfserv_9997 with PID 31839 started at Wed Oct 18 17:11:04 UTC 2023 trying to kill selfserv_9997 with PID 31839 at Wed Oct 18 17:11:04 UTC 2023 kill -USR1 31839 ./ssl.sh: line 228: 31839 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9997 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31839 killed at Wed Oct 18 17:11:04 UTC 2023 selfserv_9997 starting at Wed Oct 18 17:11:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:04 UTC 2023 selfserv_9997 with PID 31882 started at Wed Oct 18 17:11:04 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:04 UTC 2023 ssl.sh: #1129: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:04 UTC 2023 ssl.sh: #1130: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:05 UTC 2023 ssl.sh: #1131: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:05 UTC 2023 ssl.sh: #1132: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:05 UTC 2023 ssl.sh: #1133: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:05 UTC 2023 ssl.sh: #1134: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:05 UTC 2023 ssl.sh: #1135: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:05 UTC 2023 ssl.sh: #1136: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:05 UTC 2023 ssl.sh: #1137: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:06 UTC 2023 ssl.sh: #1138: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:06 UTC 2023 ssl.sh: #1139: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:06 UTC 2023 ssl.sh: #1140: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:06 UTC 2023 ssl.sh: #1141: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:06 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1142: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:06 UTC 2023 ssl.sh: #1143: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:06 UTC 2023 ssl.sh: #1144: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:07 UTC 2023 ssl.sh: #1145: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:07 UTC 2023 ssl.sh: #1146: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:07 UTC 2023 ssl.sh: #1147: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:07 UTC 2023 ssl.sh: #1148: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:07 UTC 2023 ssl.sh: #1149: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:07 UTC 2023 ssl.sh: #1150: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:07 UTC 2023 ssl.sh: #1151: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:08 UTC 2023 ssl.sh: #1152: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:08 UTC 2023 ssl.sh: #1153: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:08 UTC 2023 ssl.sh: #1154: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:08 UTC 2023 ssl.sh: #1155: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:08 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1156: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:08 UTC 2023 ssl.sh: #1157: TLS Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:09 UTC 2023 ssl.sh: #1158: TLS Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:09 UTC 2023 ssl.sh: #1159: TLS Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:09 UTC 2023 ssl.sh: #1160: TLS Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:09 UTC 2023 ssl.sh: #1161: TLS Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:09 UTC 2023 ssl.sh: #1162: TLS Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:09 UTC 2023 ssl.sh: #1163: TLS Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:09 UTC 2023 ssl.sh: #1164: TLS Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:10 UTC 2023 ssl.sh: #1165: TLS Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:10 UTC 2023 ssl.sh: #1166: TLS Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:10 UTC 2023 ssl.sh: #1167: TLS Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:10 UTC 2023 ssl.sh: #1168: TLS Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 31882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31882 found at Wed Oct 18 17:11:10 UTC 2023 ssl.sh: #1169: TLS Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 31882 at Wed Oct 18 17:11:10 UTC 2023 kill -USR1 31882 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31882 killed at Wed Oct 18 17:11:10 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:10 UTC 2023 selfserv_9997 with PID 694 started at Wed Oct 18 17:11:10 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:10 UTC 2023 ssl.sh: #1170: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:11 UTC 2023 ssl.sh: #1171: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:11 UTC 2023 ssl.sh: #1172: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:11 UTC 2023 ssl.sh: #1173: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:11 UTC 2023 ssl.sh: #1174: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:11 UTC 2023 ssl.sh: #1175: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:11 UTC 2023 ssl.sh: #1176: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:12 UTC 2023 ssl.sh: #1177: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:12 UTC 2023 ssl.sh: #1178: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:12 UTC 2023 ssl.sh: #1179: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:12 UTC 2023 ssl.sh: #1180: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:12 UTC 2023 ssl.sh: #1181: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:13 UTC 2023 ssl.sh: #1182: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:13 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1183: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:13 UTC 2023 ssl.sh: #1184: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:13 UTC 2023 ssl.sh: #1185: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:13 UTC 2023 ssl.sh: #1186: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:13 UTC 2023 ssl.sh: #1187: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:14 UTC 2023 ssl.sh: #1188: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:14 UTC 2023 ssl.sh: #1189: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:14 UTC 2023 ssl.sh: #1190: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:14 UTC 2023 ssl.sh: #1191: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:14 UTC 2023 ssl.sh: #1192: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:15 UTC 2023 ssl.sh: #1193: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:15 UTC 2023 ssl.sh: #1194: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:15 UTC 2023 ssl.sh: #1195: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:15 UTC 2023 ssl.sh: #1196: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:15 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1197: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:15 UTC 2023 ssl.sh: #1198: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:16 UTC 2023 ssl.sh: #1199: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:16 UTC 2023 ssl.sh: #1200: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:16 UTC 2023 ssl.sh: #1201: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:16 UTC 2023 ssl.sh: #1202: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:16 UTC 2023 ssl.sh: #1203: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:17 UTC 2023 ssl.sh: #1204: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:17 UTC 2023 ssl.sh: #1205: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:17 UTC 2023 ssl.sh: #1206: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:17 UTC 2023 ssl.sh: #1207: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:17 UTC 2023 ssl.sh: #1208: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:17 UTC 2023 ssl.sh: #1209: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:11:18 UTC 2023 ssl.sh: #1210: TLS 1.0 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 694 at Wed Oct 18 17:11:18 UTC 2023 kill -USR1 694 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 694 killed at Wed Oct 18 17:11:18 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:18 UTC 2023 selfserv_9997 with PID 2038 started at Wed Oct 18 17:11:18 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:18 UTC 2023 ssl.sh: #1211: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:18 UTC 2023 ssl.sh: #1212: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:18 UTC 2023 ssl.sh: #1213: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:18 UTC 2023 ssl.sh: #1214: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:18 UTC 2023 ssl.sh: #1215: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:19 UTC 2023 ssl.sh: #1216: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:19 UTC 2023 ssl.sh: #1217: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:19 UTC 2023 ssl.sh: #1218: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:19 UTC 2023 ssl.sh: #1219: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:19 UTC 2023 ssl.sh: #1220: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:19 UTC 2023 ssl.sh: #1221: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:19 UTC 2023 ssl.sh: #1222: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:20 UTC 2023 ssl.sh: #1223: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:20 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1224: Load group 2 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:20 UTC 2023 ssl.sh: #1225: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:20 UTC 2023 ssl.sh: #1226: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:20 UTC 2023 ssl.sh: #1227: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:20 UTC 2023 ssl.sh: #1228: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:20 UTC 2023 ssl.sh: #1229: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:21 UTC 2023 ssl.sh: #1230: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:21 UTC 2023 ssl.sh: #1231: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:21 UTC 2023 ssl.sh: #1232: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:21 UTC 2023 ssl.sh: #1233: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:21 UTC 2023 ssl.sh: #1234: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:21 UTC 2023 ssl.sh: #1235: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:21 UTC 2023 ssl.sh: #1236: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:22 UTC 2023 ssl.sh: #1237: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41 Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52 RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:22 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1238: Load group 3 crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:22 UTC 2023 ssl.sh: #1239: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:22 UTC 2023 ssl.sh: #1240: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:22 UTC 2023 ssl.sh: #1241: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:22 UTC 2023 ssl.sh: #1242: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:23 UTC 2023 ssl.sh: #1243: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:23 UTC 2023 ssl.sh: #1244: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:23 UTC 2023 ssl.sh: #1245: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:23 UTC 2023 ssl.sh: #1246: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:23 UTC 2023 ssl.sh: #1247: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:23 UTC 2023 ssl.sh: #1248: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:23 UTC 2023 ssl.sh: #1249: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:24 UTC 2023 ssl.sh: #1250: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 2038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2038 found at Wed Oct 18 17:11:24 UTC 2023 ssl.sh: #1251: SSL3 Require client auth on 2nd hs (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2038 at Wed Oct 18 17:11:24 UTC 2023 kill -USR1 2038 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2038 killed at Wed Oct 18 17:11:24 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:24 UTC 2023 selfserv_9997 with PID 3314 started at Wed Oct 18 17:11:24 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:24 UTC 2023 ssl.sh: #1252: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:24 UTC 2023 ssl.sh: #1253: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:24 UTC 2023 ssl.sh: #1254: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:24 UTC 2023 ssl.sh: #1255: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:24 UTC 2023 ssl.sh: #1256: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:25 UTC 2023 ssl.sh: #1257: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:25 UTC 2023 ssl.sh: #1258: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:25 UTC 2023 ssl.sh: #1259: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:25 UTC 2023 ssl.sh: #1260: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:25 UTC 2023 ssl.sh: #1261: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:25 UTC 2023 ssl.sh: #1262: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:26 UTC 2023 ssl.sh: #1263: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:26 UTC 2023 ssl.sh: #1264: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:26 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1265: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:26 UTC 2023 ssl.sh: #1266: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:26 UTC 2023 ssl.sh: #1267: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:26 UTC 2023 ssl.sh: #1268: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:26 UTC 2023 ssl.sh: #1269: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:27 UTC 2023 ssl.sh: #1270: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:27 UTC 2023 ssl.sh: #1271: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:27 UTC 2023 ssl.sh: #1272: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:27 UTC 2023 ssl.sh: #1273: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:27 UTC 2023 ssl.sh: #1274: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:27 UTC 2023 ssl.sh: #1275: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:27 UTC 2023 ssl.sh: #1276: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:28 UTC 2023 ssl.sh: #1277: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:28 UTC 2023 ssl.sh: #1278: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:28 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1279: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:28 UTC 2023 ssl.sh: #1280: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:28 UTC 2023 ssl.sh: #1281: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:28 UTC 2023 ssl.sh: #1282: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:28 UTC 2023 ssl.sh: #1283: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:29 UTC 2023 ssl.sh: #1284: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:29 UTC 2023 ssl.sh: #1285: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:29 UTC 2023 ssl.sh: #1286: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:29 UTC 2023 ssl.sh: #1287: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:29 UTC 2023 ssl.sh: #1288: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:29 UTC 2023 ssl.sh: #1289: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:29 UTC 2023 ssl.sh: #1290: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:30 UTC 2023 ssl.sh: #1291: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 3314 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3314 found at Wed Oct 18 17:11:30 UTC 2023 ssl.sh: #1292: TLS Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3314 at Wed Oct 18 17:11:30 UTC 2023 kill -USR1 3314 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3314 killed at Wed Oct 18 17:11:30 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:30 UTC 2023 selfserv_9997 with PID 4575 started at Wed Oct 18 17:11:30 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:30 UTC 2023 ssl.sh: #1293: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:30 UTC 2023 ssl.sh: #1294: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:30 UTC 2023 ssl.sh: #1295: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:31 UTC 2023 ssl.sh: #1296: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:31 UTC 2023 ssl.sh: #1297: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:31 UTC 2023 ssl.sh: #1298: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:31 UTC 2023 ssl.sh: #1299: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:31 UTC 2023 ssl.sh: #1300: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:31 UTC 2023 ssl.sh: #1301: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:32 UTC 2023 ssl.sh: #1302: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:32 UTC 2023 ssl.sh: #1303: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:32 UTC 2023 ssl.sh: #1304: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:32 UTC 2023 ssl.sh: #1305: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:32 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1306: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:33 UTC 2023 ssl.sh: #1307: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:33 UTC 2023 ssl.sh: #1308: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:33 UTC 2023 ssl.sh: #1309: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:33 UTC 2023 ssl.sh: #1310: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:33 UTC 2023 ssl.sh: #1311: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:33 UTC 2023 ssl.sh: #1312: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:34 UTC 2023 ssl.sh: #1313: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:34 UTC 2023 ssl.sh: #1314: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:34 UTC 2023 ssl.sh: #1315: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:34 UTC 2023 ssl.sh: #1316: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:34 UTC 2023 ssl.sh: #1317: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:35 UTC 2023 ssl.sh: #1318: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:35 UTC 2023 ssl.sh: #1319: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:35 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1320: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser40-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:35 UTC 2023 ssl.sh: #1321: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser41-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:35 UTC 2023 ssl.sh: #1322: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser42-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:35 UTC 2023 ssl.sh: #1323: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser43-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:36 UTC 2023 ssl.sh: #1324: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser44-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:36 UTC 2023 ssl.sh: #1325: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser45-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:36 UTC 2023 ssl.sh: #1326: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser46-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:36 UTC 2023 ssl.sh: #1327: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser47-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:36 UTC 2023 ssl.sh: #1328: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser48-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:36 UTC 2023 ssl.sh: #1329: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser49-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:37 UTC 2023 ssl.sh: #1330: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser50-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:37 UTC 2023 ssl.sh: #1331: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser51-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:37 UTC 2023 ssl.sh: #1332: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n TestUser52-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 4575 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4575 found at Wed Oct 18 17:11:37 UTC 2023 ssl.sh: #1333: TLS 1.0 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4575 at Wed Oct 18 17:11:37 UTC 2023 kill -USR1 4575 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4575 killed at Wed Oct 18 17:11:37 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:37 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:37 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:37 UTC 2023 selfserv_9997 with PID 5835 started at Wed Oct 18 17:11:37 UTC 2023 Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:37 UTC 2023 ssl.sh: #1334: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:38 UTC 2023 ssl.sh: #1335: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:38 UTC 2023 ssl.sh: #1336: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:38 UTC 2023 ssl.sh: #1337: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:38 UTC 2023 ssl.sh: #1338: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:38 UTC 2023 ssl.sh: #1339: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:38 UTC 2023 ssl.sh: #1340: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:38 UTC 2023 ssl.sh: #1341: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:39 UTC 2023 ssl.sh: #1342: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:39 UTC 2023 ssl.sh: #1343: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:39 UTC 2023 ssl.sh: #1344: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:39 UTC 2023 ssl.sh: #1345: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:39 UTC 2023 ssl.sh: #1346: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 43 - 48 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_43-48-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:39 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1347: Load group 2 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:39 UTC 2023 ssl.sh: #1348: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:40 UTC 2023 ssl.sh: #1349: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:40 UTC 2023 ssl.sh: #1350: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:40 UTC 2023 ssl.sh: #1351: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:40 UTC 2023 ssl.sh: #1352: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:40 UTC 2023 ssl.sh: #1353: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:40 UTC 2023 ssl.sh: #1354: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:40 UTC 2023 ssl.sh: #1355: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:41 UTC 2023 ssl.sh: #1356: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:41 UTC 2023 ssl.sh: #1357: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:41 UTC 2023 ssl.sh: #1358: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:41 UTC 2023 ssl.sh: #1359: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:41 UTC 2023 ssl.sh: #1360: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - not revoked) produced a returncode of 0, expected is 0 - PASSED ================= Reloading ECC CRL for group 49 - 52 ============= tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n TestUser41-ec Request: GET crl:///builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server/root.crl_49-52-ec RELOAD time tests.* subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:41 UTC 2023 ================= CRL Reloaded ============= ssl.sh: #1361: Load group 3 ECC crl produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser40-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:41 UTC 2023 ssl.sh: #1362: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser40 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser41-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:42 UTC 2023 ssl.sh: #1363: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser41 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser42-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:42 UTC 2023 ssl.sh: #1364: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser42 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser43-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:42 UTC 2023 ssl.sh: #1365: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser43 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser44-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:42 UTC 2023 ssl.sh: #1366: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser44 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser45-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:42 UTC 2023 ssl.sh: #1367: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser45 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser46-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:42 UTC 2023 ssl.sh: #1368: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser46 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser47-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:42 UTC 2023 ssl.sh: #1369: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser47 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser48-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:43 UTC 2023 ssl.sh: #1370: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser48 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser49-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:43 UTC 2023 ssl.sh: #1371: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser49 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser50-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:43 UTC 2023 ssl.sh: #1372: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser50 - revoked) produced a returncode of 1, expected is 1 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser51-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:43 UTC 2023 ssl.sh: #1373: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser51 - not revoked) produced a returncode of 0, expected is 0 - PASSED Server Args: -r_-r_-r_-r tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n TestUser52-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -8180: Peer's Certificate has been revoked. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_REVOKED_CERT_ALERT: SSL peer rejected your certificate as revoked. kill -0 5835 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5835 found at Wed Oct 18 17:11:43 UTC 2023 ssl.sh: #1374: SSL3 Require client auth on 2nd hs (EC) (client auth)(cert TestUser52 - revoked) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5835 at Wed Oct 18 17:11:43 UTC 2023 kill -USR1 5835 selfserv: 0 cache hits; 82 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5835 killed at Wed Oct 18 17:11:43 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 7108 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7108 found at Wed Oct 18 17:11:43 UTC 2023 selfserv_9997 with PID 7108 started at Wed Oct 18 17:11:43 UTC 2023 trying to kill selfserv_9997 with PID 7108 at Wed Oct 18 17:11:43 UTC 2023 kill -USR1 7108 ./ssl.sh: line 228: 7108 User defined signal 1 ${PROFTOOL} ${BINDIR}/selfserv_9997 -D -p ${PORT} -d ${P_R_SERVERDIR} ${RSA_OPTIONS} ${SERVER_OPTIONS} ${ECC_OPTIONS} -S ${HOSTADDR}-dsa -w nss "$@" -i ${R_SERVERPID} -V ${SERVER_VMIN}:${SERVER_VMAX} $verbose -H 1 selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7108 killed at Wed Oct 18 17:11:43 UTC 2023 ssl.sh: SSL Cipher Coverage - server normal/client normal =============================== selfserv_9997 starting at Wed Oct 18 17:11:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 7153 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7153 found at Wed Oct 18 17:11:43 UTC 2023 selfserv_9997 with PID 7153 started at Wed Oct 18 17:11:43 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1375: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1376: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1377: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1378: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1379: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1380: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1381: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1382: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1383: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1384: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1385: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1386: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1387: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1388: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1389: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1390: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1391: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1392: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1393: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1394: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1395: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1396: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1397: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1398: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1399: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1400: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1401: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1402: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1403: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1404: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1405: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1406: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1407: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1408: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1409: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1410: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1411: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1412: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1413: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1414: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1415: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1416: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1417: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1418: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1419: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1420: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1421: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1422: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1423: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1424: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1425: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 7153 at Wed Oct 18 17:11:45 UTC 2023 kill -USR1 7153 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7153 killed at Wed Oct 18 17:11:45 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 17:11:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 7702 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 7702 found at Wed Oct 18 17:11:45 UTC 2023 selfserv_9997 with PID 7702 started at Wed Oct 18 17:11:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1426: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1427: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1428: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1429: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1430: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1431: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1432: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1433: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1434: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1435: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1436: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1437: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1438: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1439: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1440: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1441: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1442: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1443: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1444: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1445: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1446: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1447: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1448: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1449: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1450: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1451: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1452: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1453: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1454: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1455: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1456: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1457: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1458: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1459: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1460: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1461: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1462: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1463: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1464: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1465: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1466: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1467: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1468: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1469: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1470: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1471: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1472: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1473: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1474: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1475: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1476: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1477: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1478: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1479: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1480: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1481: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1482: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1483: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1484: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1485: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1486: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1487: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1488: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1489: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1490: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1491: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1492: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1493: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1494: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1495: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1496: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1497: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1498: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1499: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1500: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1501: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 7702 at Wed Oct 18 17:11:49 UTC 2023 kill -USR1 7702 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 7702 killed at Wed Oct 18 17:11:49 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client normal =============================== selfserv_9997 starting at Wed Oct 18 17:11:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8501 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8501 found at Wed Oct 18 17:11:49 UTC 2023 selfserv_9997 with PID 8501 started at Wed Oct 18 17:11:49 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1502: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1503: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8501 at Wed Oct 18 17:11:49 UTC 2023 kill -USR1 8501 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8501 killed at Wed Oct 18 17:11:49 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8567 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8567 found at Wed Oct 18 17:11:49 UTC 2023 selfserv_9997 with PID 8567 started at Wed Oct 18 17:11:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1502: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8567 at Wed Oct 18 17:11:50 UTC 2023 kill -USR1 8567 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8567 killed at Wed Oct 18 17:11:50 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:11:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8619 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8619 found at Wed Oct 18 17:11:50 UTC 2023 selfserv_9997 with PID 8619 started at Wed Oct 18 17:11:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1503: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8619 at Wed Oct 18 17:11:50 UTC 2023 kill -USR1 8619 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8619 killed at Wed Oct 18 17:11:50 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8671 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8671 found at Wed Oct 18 17:11:50 UTC 2023 selfserv_9997 with PID 8671 started at Wed Oct 18 17:11:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1504: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8671 at Wed Oct 18 17:11:50 UTC 2023 kill -USR1 8671 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8671 killed at Wed Oct 18 17:11:50 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8723 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8723 found at Wed Oct 18 17:11:50 UTC 2023 selfserv_9997 with PID 8723 started at Wed Oct 18 17:11:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1505: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8723 at Wed Oct 18 17:11:50 UTC 2023 kill -USR1 8723 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8723 killed at Wed Oct 18 17:11:50 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:11:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8776 found at Wed Oct 18 17:11:50 UTC 2023 selfserv_9997 with PID 8776 started at Wed Oct 18 17:11:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1506: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 8776 at Wed Oct 18 17:11:50 UTC 2023 kill -USR1 8776 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8776 killed at Wed Oct 18 17:11:50 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8829 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8829 found at Wed Oct 18 17:11:50 UTC 2023 selfserv_9997 with PID 8829 started at Wed Oct 18 17:11:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1507: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8829 at Wed Oct 18 17:11:50 UTC 2023 kill -USR1 8829 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8829 killed at Wed Oct 18 17:11:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8882 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8882 found at Wed Oct 18 17:11:50 UTC 2023 selfserv_9997 with PID 8882 started at Wed Oct 18 17:11:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1508: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8882 at Wed Oct 18 17:11:51 UTC 2023 kill -USR1 8882 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8882 killed at Wed Oct 18 17:11:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:11:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8934 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8934 found at Wed Oct 18 17:11:51 UTC 2023 selfserv_9997 with PID 8934 started at Wed Oct 18 17:11:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1509: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8934 at Wed Oct 18 17:11:51 UTC 2023 kill -USR1 8934 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8934 killed at Wed Oct 18 17:11:51 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 8986 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 8986 found at Wed Oct 18 17:11:51 UTC 2023 selfserv_9997 with PID 8986 started at Wed Oct 18 17:11:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1510: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 8986 at Wed Oct 18 17:11:51 UTC 2023 kill -USR1 8986 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 8986 killed at Wed Oct 18 17:11:51 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9038 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9038 found at Wed Oct 18 17:11:51 UTC 2023 selfserv_9997 with PID 9038 started at Wed Oct 18 17:11:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1511: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9038 at Wed Oct 18 17:11:51 UTC 2023 kill -USR1 9038 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9038 killed at Wed Oct 18 17:11:51 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:11:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9090 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9090 found at Wed Oct 18 17:11:51 UTC 2023 selfserv_9997 with PID 9090 started at Wed Oct 18 17:11:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1512: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9090 at Wed Oct 18 17:11:51 UTC 2023 kill -USR1 9090 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9090 killed at Wed Oct 18 17:11:51 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9142 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9142 found at Wed Oct 18 17:11:51 UTC 2023 selfserv_9997 with PID 9142 started at Wed Oct 18 17:11:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1513: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9142 at Wed Oct 18 17:11:52 UTC 2023 kill -USR1 9142 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9142 killed at Wed Oct 18 17:11:52 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9194 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9194 found at Wed Oct 18 17:11:52 UTC 2023 selfserv_9997 with PID 9194 started at Wed Oct 18 17:11:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1514: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9194 at Wed Oct 18 17:11:52 UTC 2023 kill -USR1 9194 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9194 killed at Wed Oct 18 17:11:52 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:11:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9247 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9247 found at Wed Oct 18 17:11:52 UTC 2023 selfserv_9997 with PID 9247 started at Wed Oct 18 17:11:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1515: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9247 at Wed Oct 18 17:11:52 UTC 2023 kill -USR1 9247 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9247 killed at Wed Oct 18 17:11:52 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9299 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9299 found at Wed Oct 18 17:11:52 UTC 2023 selfserv_9997 with PID 9299 started at Wed Oct 18 17:11:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1516: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9299 at Wed Oct 18 17:11:52 UTC 2023 kill -USR1 9299 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9299 killed at Wed Oct 18 17:11:52 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9351 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9351 found at Wed Oct 18 17:11:52 UTC 2023 selfserv_9997 with PID 9351 started at Wed Oct 18 17:11:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1517: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9351 at Wed Oct 18 17:11:53 UTC 2023 kill -USR1 9351 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9351 killed at Wed Oct 18 17:11:53 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:11:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9403 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9403 found at Wed Oct 18 17:11:53 UTC 2023 selfserv_9997 with PID 9403 started at Wed Oct 18 17:11:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1518: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9403 at Wed Oct 18 17:11:53 UTC 2023 kill -USR1 9403 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9403 killed at Wed Oct 18 17:11:53 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9456 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9456 found at Wed Oct 18 17:11:53 UTC 2023 selfserv_9997 with PID 9456 started at Wed Oct 18 17:11:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1519: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9456 at Wed Oct 18 17:11:53 UTC 2023 kill -USR1 9456 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9456 killed at Wed Oct 18 17:11:53 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9508 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9508 found at Wed Oct 18 17:11:53 UTC 2023 selfserv_9997 with PID 9508 started at Wed Oct 18 17:11:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1520: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9508 at Wed Oct 18 17:11:53 UTC 2023 kill -USR1 9508 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9508 killed at Wed Oct 18 17:11:53 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:11:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9560 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9560 found at Wed Oct 18 17:11:53 UTC 2023 selfserv_9997 with PID 9560 started at Wed Oct 18 17:11:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1521: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9560 at Wed Oct 18 17:11:54 UTC 2023 kill -USR1 9560 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9560 killed at Wed Oct 18 17:11:54 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9612 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9612 found at Wed Oct 18 17:11:54 UTC 2023 selfserv_9997 with PID 9612 started at Wed Oct 18 17:11:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1522: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9612 at Wed Oct 18 17:11:54 UTC 2023 kill -USR1 9612 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9612 killed at Wed Oct 18 17:11:54 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9665 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9665 found at Wed Oct 18 17:11:54 UTC 2023 selfserv_9997 with PID 9665 started at Wed Oct 18 17:11:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1523: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9665 at Wed Oct 18 17:11:54 UTC 2023 kill -USR1 9665 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9665 killed at Wed Oct 18 17:11:54 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:11:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9717 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9717 found at Wed Oct 18 17:11:54 UTC 2023 selfserv_9997 with PID 9717 started at Wed Oct 18 17:11:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1524: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9717 at Wed Oct 18 17:11:54 UTC 2023 kill -USR1 9717 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9717 killed at Wed Oct 18 17:11:54 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9769 found at Wed Oct 18 17:11:54 UTC 2023 selfserv_9997 with PID 9769 started at Wed Oct 18 17:11:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1525: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9769 at Wed Oct 18 17:11:55 UTC 2023 kill -USR1 9769 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9769 killed at Wed Oct 18 17:11:55 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9821 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9821 found at Wed Oct 18 17:11:55 UTC 2023 selfserv_9997 with PID 9821 started at Wed Oct 18 17:11:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1526: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9821 at Wed Oct 18 17:11:55 UTC 2023 kill -USR1 9821 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9821 killed at Wed Oct 18 17:11:55 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:11:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9873 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9873 found at Wed Oct 18 17:11:55 UTC 2023 selfserv_9997 with PID 9873 started at Wed Oct 18 17:11:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1527: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9873 at Wed Oct 18 17:11:55 UTC 2023 kill -USR1 9873 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9873 killed at Wed Oct 18 17:11:55 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9925 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9925 found at Wed Oct 18 17:11:55 UTC 2023 selfserv_9997 with PID 9925 started at Wed Oct 18 17:11:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1528: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 9925 at Wed Oct 18 17:11:55 UTC 2023 kill -USR1 9925 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9925 killed at Wed Oct 18 17:11:55 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 9977 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 9977 found at Wed Oct 18 17:11:55 UTC 2023 selfserv_9997 with PID 9977 started at Wed Oct 18 17:11:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1529: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 9977 at Wed Oct 18 17:11:56 UTC 2023 kill -USR1 9977 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 9977 killed at Wed Oct 18 17:11:56 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:11:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10029 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10029 found at Wed Oct 18 17:11:56 UTC 2023 selfserv_9997 with PID 10029 started at Wed Oct 18 17:11:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1530: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10029 at Wed Oct 18 17:11:56 UTC 2023 kill -USR1 10029 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10029 killed at Wed Oct 18 17:11:56 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10081 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10081 found at Wed Oct 18 17:11:56 UTC 2023 selfserv_9997 with PID 10081 started at Wed Oct 18 17:11:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1531: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10081 at Wed Oct 18 17:11:56 UTC 2023 kill -USR1 10081 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10081 killed at Wed Oct 18 17:11:56 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10133 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10133 found at Wed Oct 18 17:11:56 UTC 2023 selfserv_9997 with PID 10133 started at Wed Oct 18 17:11:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1532: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10133 at Wed Oct 18 17:11:56 UTC 2023 kill -USR1 10133 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10133 killed at Wed Oct 18 17:11:56 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10187 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10187 found at Wed Oct 18 17:11:56 UTC 2023 selfserv_9997 with PID 10187 started at Wed Oct 18 17:11:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1533: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10187 at Wed Oct 18 17:11:56 UTC 2023 kill -USR1 10187 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10187 killed at Wed Oct 18 17:11:56 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10239 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10239 found at Wed Oct 18 17:11:56 UTC 2023 selfserv_9997 with PID 10239 started at Wed Oct 18 17:11:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1534: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10239 at Wed Oct 18 17:11:57 UTC 2023 kill -USR1 10239 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10239 killed at Wed Oct 18 17:11:57 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10291 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10291 found at Wed Oct 18 17:11:57 UTC 2023 selfserv_9997 with PID 10291 started at Wed Oct 18 17:11:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1535: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10291 at Wed Oct 18 17:11:57 UTC 2023 kill -USR1 10291 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10291 killed at Wed Oct 18 17:11:57 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10343 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10343 found at Wed Oct 18 17:11:57 UTC 2023 selfserv_9997 with PID 10343 started at Wed Oct 18 17:11:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1536: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10343 at Wed Oct 18 17:11:57 UTC 2023 kill -USR1 10343 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10343 killed at Wed Oct 18 17:11:57 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10395 found at Wed Oct 18 17:11:57 UTC 2023 selfserv_9997 with PID 10395 started at Wed Oct 18 17:11:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1537: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10395 at Wed Oct 18 17:11:57 UTC 2023 kill -USR1 10395 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10395 killed at Wed Oct 18 17:11:57 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:11:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10447 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10447 found at Wed Oct 18 17:11:57 UTC 2023 selfserv_9997 with PID 10447 started at Wed Oct 18 17:11:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1538: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10447 at Wed Oct 18 17:11:57 UTC 2023 kill -USR1 10447 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10447 killed at Wed Oct 18 17:11:57 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:57 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10499 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10499 found at Wed Oct 18 17:11:57 UTC 2023 selfserv_9997 with PID 10499 started at Wed Oct 18 17:11:57 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1539: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10499 at Wed Oct 18 17:11:58 UTC 2023 kill -USR1 10499 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10499 killed at Wed Oct 18 17:11:58 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:11:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10551 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10551 found at Wed Oct 18 17:11:58 UTC 2023 selfserv_9997 with PID 10551 started at Wed Oct 18 17:11:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1540: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10551 at Wed Oct 18 17:11:58 UTC 2023 kill -USR1 10551 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10551 killed at Wed Oct 18 17:11:58 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10603 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10603 found at Wed Oct 18 17:11:58 UTC 2023 selfserv_9997 with PID 10603 started at Wed Oct 18 17:11:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1541: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10603 at Wed Oct 18 17:11:58 UTC 2023 kill -USR1 10603 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10603 killed at Wed Oct 18 17:11:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:11:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10655 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10655 found at Wed Oct 18 17:11:58 UTC 2023 selfserv_9997 with PID 10655 started at Wed Oct 18 17:11:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1542: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10655 at Wed Oct 18 17:11:58 UTC 2023 kill -USR1 10655 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10655 killed at Wed Oct 18 17:11:58 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10707 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10707 found at Wed Oct 18 17:11:58 UTC 2023 selfserv_9997 with PID 10707 started at Wed Oct 18 17:11:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1543: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10707 at Wed Oct 18 17:11:58 UTC 2023 kill -USR1 10707 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10707 killed at Wed Oct 18 17:11:58 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:11:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10759 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10759 found at Wed Oct 18 17:11:58 UTC 2023 selfserv_9997 with PID 10759 started at Wed Oct 18 17:11:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1544: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10759 at Wed Oct 18 17:11:58 UTC 2023 kill -USR1 10759 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10759 killed at Wed Oct 18 17:11:58 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10811 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10811 found at Wed Oct 18 17:11:58 UTC 2023 selfserv_9997 with PID 10811 started at Wed Oct 18 17:11:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1545: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10811 at Wed Oct 18 17:11:58 UTC 2023 kill -USR1 10811 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10811 killed at Wed Oct 18 17:11:58 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:11:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10863 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10863 found at Wed Oct 18 17:11:58 UTC 2023 selfserv_9997 with PID 10863 started at Wed Oct 18 17:11:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1546: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10863 at Wed Oct 18 17:11:59 UTC 2023 kill -USR1 10863 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10863 killed at Wed Oct 18 17:11:59 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10915 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10915 found at Wed Oct 18 17:11:59 UTC 2023 selfserv_9997 with PID 10915 started at Wed Oct 18 17:11:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1547: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 10915 at Wed Oct 18 17:11:59 UTC 2023 kill -USR1 10915 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10915 killed at Wed Oct 18 17:11:59 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:11:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 10967 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 10967 found at Wed Oct 18 17:11:59 UTC 2023 selfserv_9997 with PID 10967 started at Wed Oct 18 17:11:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1548: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 10967 at Wed Oct 18 17:11:59 UTC 2023 kill -USR1 10967 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 10967 killed at Wed Oct 18 17:11:59 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:11:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11019 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11019 found at Wed Oct 18 17:11:59 UTC 2023 selfserv_9997 with PID 11019 started at Wed Oct 18 17:11:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1549: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11019 at Wed Oct 18 17:11:59 UTC 2023 kill -USR1 11019 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11019 killed at Wed Oct 18 17:11:59 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:11:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:11:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11072 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11072 found at Wed Oct 18 17:11:59 UTC 2023 selfserv_9997 with PID 11072 started at Wed Oct 18 17:11:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1550: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11072 at Wed Oct 18 17:12:00 UTC 2023 kill -USR1 11072 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11072 killed at Wed Oct 18 17:12:00 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11124 found at Wed Oct 18 17:12:00 UTC 2023 selfserv_9997 with PID 11124 started at Wed Oct 18 17:12:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1551: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11124 at Wed Oct 18 17:12:00 UTC 2023 kill -USR1 11124 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11124 killed at Wed Oct 18 17:12:00 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11176 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11176 found at Wed Oct 18 17:12:00 UTC 2023 selfserv_9997 with PID 11176 started at Wed Oct 18 17:12:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1552: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11176 at Wed Oct 18 17:12:00 UTC 2023 kill -USR1 11176 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11176 killed at Wed Oct 18 17:12:00 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11228 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11228 found at Wed Oct 18 17:12:00 UTC 2023 selfserv_9997 with PID 11228 started at Wed Oct 18 17:12:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1553: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11228 at Wed Oct 18 17:12:00 UTC 2023 kill -USR1 11228 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11228 killed at Wed Oct 18 17:12:00 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11281 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11281 found at Wed Oct 18 17:12:00 UTC 2023 selfserv_9997 with PID 11281 started at Wed Oct 18 17:12:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1554: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11281 at Wed Oct 18 17:12:00 UTC 2023 kill -USR1 11281 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11281 killed at Wed Oct 18 17:12:00 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11333 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11333 found at Wed Oct 18 17:12:00 UTC 2023 selfserv_9997 with PID 11333 started at Wed Oct 18 17:12:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1555: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11333 at Wed Oct 18 17:12:01 UTC 2023 kill -USR1 11333 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11333 killed at Wed Oct 18 17:12:01 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11385 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11385 found at Wed Oct 18 17:12:01 UTC 2023 selfserv_9997 with PID 11385 started at Wed Oct 18 17:12:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1556: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11385 at Wed Oct 18 17:12:01 UTC 2023 kill -USR1 11385 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11385 killed at Wed Oct 18 17:12:01 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11438 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11438 found at Wed Oct 18 17:12:01 UTC 2023 selfserv_9997 with PID 11438 started at Wed Oct 18 17:12:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1557: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11438 at Wed Oct 18 17:12:01 UTC 2023 kill -USR1 11438 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11438 killed at Wed Oct 18 17:12:01 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11490 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11490 found at Wed Oct 18 17:12:01 UTC 2023 selfserv_9997 with PID 11490 started at Wed Oct 18 17:12:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1558: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11490 at Wed Oct 18 17:12:01 UTC 2023 kill -USR1 11490 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11490 killed at Wed Oct 18 17:12:01 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11542 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11542 found at Wed Oct 18 17:12:01 UTC 2023 selfserv_9997 with PID 11542 started at Wed Oct 18 17:12:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1559: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11542 at Wed Oct 18 17:12:02 UTC 2023 kill -USR1 11542 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11542 killed at Wed Oct 18 17:12:02 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 17:12:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11600 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11600 found at Wed Oct 18 17:12:02 UTC 2023 selfserv_9997 with PID 11600 started at Wed Oct 18 17:12:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1560: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11600 at Wed Oct 18 17:12:02 UTC 2023 kill -USR1 11600 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11600 killed at Wed Oct 18 17:12:02 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 17:12:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11658 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11658 found at Wed Oct 18 17:12:02 UTC 2023 selfserv_9997 with PID 11658 started at Wed Oct 18 17:12:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1561: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11658 at Wed Oct 18 17:12:02 UTC 2023 kill -USR1 11658 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11658 killed at Wed Oct 18 17:12:02 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 17:12:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11716 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11716 found at Wed Oct 18 17:12:02 UTC 2023 selfserv_9997 with PID 11716 started at Wed Oct 18 17:12:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1562: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11716 at Wed Oct 18 17:12:02 UTC 2023 kill -USR1 11716 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11716 killed at Wed Oct 18 17:12:02 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 17:12:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11774 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11774 found at Wed Oct 18 17:12:02 UTC 2023 selfserv_9997 with PID 11774 started at Wed Oct 18 17:12:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1563: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11774 at Wed Oct 18 17:12:02 UTC 2023 kill -USR1 11774 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11774 killed at Wed Oct 18 17:12:02 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9997 starting at Wed Oct 18 17:12:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11832 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11832 found at Wed Oct 18 17:12:02 UTC 2023 selfserv_9997 with PID 11832 started at Wed Oct 18 17:12:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1564: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 11832 at Wed Oct 18 17:12:02 UTC 2023 kill -USR1 11832 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11832 killed at Wed Oct 18 17:12:02 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 17:12:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11890 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11890 found at Wed Oct 18 17:12:02 UTC 2023 selfserv_9997 with PID 11890 started at Wed Oct 18 17:12:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1565: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11890 at Wed Oct 18 17:12:02 UTC 2023 kill -USR1 11890 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11890 killed at Wed Oct 18 17:12:02 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 17:12:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 11948 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 11948 found at Wed Oct 18 17:12:02 UTC 2023 selfserv_9997 with PID 11948 started at Wed Oct 18 17:12:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1566: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 11948 at Wed Oct 18 17:12:03 UTC 2023 kill -USR1 11948 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 11948 killed at Wed Oct 18 17:12:03 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9997 starting at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12006 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12006 found at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 with PID 12006 started at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1567: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12006 at Wed Oct 18 17:12:03 UTC 2023 kill -USR1 12006 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12006 killed at Wed Oct 18 17:12:03 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9997 starting at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12064 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12064 found at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 with PID 12064 started at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1568: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12064 at Wed Oct 18 17:12:03 UTC 2023 kill -USR1 12064 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12064 killed at Wed Oct 18 17:12:03 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12122 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12122 found at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 with PID 12122 started at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1569: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12122 at Wed Oct 18 17:12:03 UTC 2023 kill -USR1 12122 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12122 killed at Wed Oct 18 17:12:03 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9997 starting at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12164 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12164 found at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 with PID 12164 started at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1502: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12164 at Wed Oct 18 17:12:03 UTC 2023 kill -USR1 12164 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12164 killed at Wed Oct 18 17:12:03 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9997 starting at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12206 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12206 found at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 with PID 12206 started at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1503: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9997 with PID 12206 at Wed Oct 18 17:12:03 UTC 2023 kill -USR1 12206 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12206 killed at Wed Oct 18 17:12:03 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9997 starting at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12248 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12248 found at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 with PID 12248 started at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1504: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 12248 at Wed Oct 18 17:12:03 UTC 2023 kill -USR1 12248 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12248 killed at Wed Oct 18 17:12:03 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9997 starting at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12290 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12290 found at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 with PID 12290 started at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1505: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 12290 at Wed Oct 18 17:12:03 UTC 2023 kill -USR1 12290 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12290 killed at Wed Oct 18 17:12:03 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9997 starting at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12332 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12332 found at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 with PID 12332 started at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1506: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 12332 at Wed Oct 18 17:12:03 UTC 2023 kill -USR1 12332 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12332 killed at Wed Oct 18 17:12:03 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9997 starting at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12374 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12374 found at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 with PID 12374 started at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1507: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 12374 at Wed Oct 18 17:12:03 UTC 2023 kill -USR1 12374 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12374 killed at Wed Oct 18 17:12:03 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9997 starting at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12416 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12416 found at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 with PID 12416 started at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1508: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 12416 at Wed Oct 18 17:12:03 UTC 2023 kill -USR1 12416 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12416 killed at Wed Oct 18 17:12:03 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9997 starting at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12458 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12458 found at Wed Oct 18 17:12:03 UTC 2023 selfserv_9997 with PID 12458 started at Wed Oct 18 17:12:03 UTC 2023 strsclnt -q -p 9997 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 17:12:03 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 17:12:35 UTC 2023 ssl.sh: #1509: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9997 with PID 12458 at Wed Oct 18 17:12:35 UTC 2023 kill -USR1 12458 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12458 killed at Wed Oct 18 17:12:35 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12509 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12509 found at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 with PID 12509 started at Wed Oct 18 17:12:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1510: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12509 at Wed Oct 18 17:12:35 UTC 2023 kill -USR1 12509 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12509 killed at Wed Oct 18 17:12:35 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12551 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12551 found at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 with PID 12551 started at Wed Oct 18 17:12:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1511: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12551 at Wed Oct 18 17:12:35 UTC 2023 kill -USR1 12551 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12551 killed at Wed Oct 18 17:12:35 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12590 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12590 found at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 with PID 12590 started at Wed Oct 18 17:12:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1512: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 12590 at Wed Oct 18 17:12:35 UTC 2023 kill -USR1 12590 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12590 killed at Wed Oct 18 17:12:35 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12629 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12629 found at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 with PID 12629 started at Wed Oct 18 17:12:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1513: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12629 at Wed Oct 18 17:12:35 UTC 2023 kill -USR1 12629 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12629 killed at Wed Oct 18 17:12:35 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12668 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12668 found at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 with PID 12668 started at Wed Oct 18 17:12:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1514: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 12668 at Wed Oct 18 17:12:35 UTC 2023 kill -USR1 12668 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12668 killed at Wed Oct 18 17:12:35 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12707 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12707 found at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 with PID 12707 started at Wed Oct 18 17:12:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1515: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12707 at Wed Oct 18 17:12:35 UTC 2023 kill -USR1 12707 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12707 killed at Wed Oct 18 17:12:35 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12746 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12746 found at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 with PID 12746 started at Wed Oct 18 17:12:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1516: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12746 at Wed Oct 18 17:12:35 UTC 2023 kill -USR1 12746 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12746 killed at Wed Oct 18 17:12:35 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12785 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12785 found at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 with PID 12785 started at Wed Oct 18 17:12:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1517: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12785 at Wed Oct 18 17:12:35 UTC 2023 kill -USR1 12785 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12785 killed at Wed Oct 18 17:12:35 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12824 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12824 found at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 with PID 12824 started at Wed Oct 18 17:12:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1518: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12824 at Wed Oct 18 17:12:35 UTC 2023 kill -USR1 12824 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12824 killed at Wed Oct 18 17:12:35 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12863 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12863 found at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 with PID 12863 started at Wed Oct 18 17:12:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1519: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12863 at Wed Oct 18 17:12:35 UTC 2023 kill -USR1 12863 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12863 killed at Wed Oct 18 17:12:35 UTC 2023 ssl.sh: SSL SCHEME - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12902 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12902 found at Wed Oct 18 17:12:36 UTC 2023 selfserv_9997 with PID 12902 started at Wed Oct 18 17:12:36 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1520: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12902 at Wed Oct 18 17:12:36 UTC 2023 kill -USR1 12902 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12902 killed at Wed Oct 18 17:12:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12942 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12942 found at Wed Oct 18 17:12:36 UTC 2023 selfserv_9997 with PID 12942 started at Wed Oct 18 17:12:36 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1521: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 12942 at Wed Oct 18 17:12:36 UTC 2023 kill -USR1 12942 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12942 killed at Wed Oct 18 17:12:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 12982 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 12982 found at Wed Oct 18 17:12:36 UTC 2023 selfserv_9997 with PID 12982 started at Wed Oct 18 17:12:36 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1522: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 12982 at Wed Oct 18 17:12:36 UTC 2023 kill -USR1 12982 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 12982 killed at Wed Oct 18 17:12:36 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13022 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13022 found at Wed Oct 18 17:12:36 UTC 2023 selfserv_9997 with PID 13022 started at Wed Oct 18 17:12:36 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1523: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 13022 at Wed Oct 18 17:12:36 UTC 2023 kill -USR1 13022 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13022 killed at Wed Oct 18 17:12:36 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13062 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13062 found at Wed Oct 18 17:12:36 UTC 2023 selfserv_9997 with PID 13062 started at Wed Oct 18 17:12:36 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1524: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13062 at Wed Oct 18 17:12:36 UTC 2023 kill -USR1 13062 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13062 killed at Wed Oct 18 17:12:36 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13102 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13102 found at Wed Oct 18 17:12:36 UTC 2023 selfserv_9997 with PID 13102 started at Wed Oct 18 17:12:36 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1525: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13102 at Wed Oct 18 17:12:36 UTC 2023 kill -USR1 13102 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13102 killed at Wed Oct 18 17:12:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13142 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13142 found at Wed Oct 18 17:12:36 UTC 2023 selfserv_9997 with PID 13142 started at Wed Oct 18 17:12:36 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1526: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13142 at Wed Oct 18 17:12:36 UTC 2023 kill -USR1 13142 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13142 killed at Wed Oct 18 17:12:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13182 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13182 found at Wed Oct 18 17:12:36 UTC 2023 selfserv_9997 with PID 13182 started at Wed Oct 18 17:12:36 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1527: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13182 at Wed Oct 18 17:12:36 UTC 2023 kill -USR1 13182 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13182 killed at Wed Oct 18 17:12:36 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 13222 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13222 found at Wed Oct 18 17:12:36 UTC 2023 selfserv_9997 with PID 13222 started at Wed Oct 18 17:12:36 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1528: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13222 at Wed Oct 18 17:12:36 UTC 2023 kill -USR1 13222 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13222 killed at Wed Oct 18 17:12:36 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client normal =============================== selfserv_9997 starting at Wed Oct 18 17:12:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 13262 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13262 found at Wed Oct 18 17:12:36 UTC 2023 selfserv_9997 with PID 13262 started at Wed Oct 18 17:12:36 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1529: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1530: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1531: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1532: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1533: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1534: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1535: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1536: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1537: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1538: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1539: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1540: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1541: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1542: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1543: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1544: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1545: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1546: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1547: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1548: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1549: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1550: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1551: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1552: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1553: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1554: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1555: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1556: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1557: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1558: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1559: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1560: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1561: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1562: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1563: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1564: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1565: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1566: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1567: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1568: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1569: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1570: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1571: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1572: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1573: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1574: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1575: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1576: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1577: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1578: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1579: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 13262 at Wed Oct 18 17:12:38 UTC 2023 kill -USR1 13262 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13262 killed at Wed Oct 18 17:12:38 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 17:12:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 13811 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 13811 found at Wed Oct 18 17:12:38 UTC 2023 selfserv_9997 with PID 13811 started at Wed Oct 18 17:12:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1580: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1581: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1582: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1583: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1584: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1585: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1586: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1587: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1588: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1589: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1590: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1591: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1592: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1593: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1594: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1595: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1596: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1597: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1598: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1599: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1600: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1601: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1602: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1603: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1604: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1605: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1606: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1607: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1608: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1609: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1610: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1611: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1612: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1613: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1614: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1615: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1616: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1617: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1618: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1619: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1620: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1621: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1622: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1623: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1624: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1625: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1626: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1627: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1628: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1629: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1630: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1631: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1632: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1633: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1634: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1635: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1636: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1637: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1638: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1639: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1640: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1641: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1642: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1643: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1644: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1645: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1646: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1647: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1648: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1649: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1650: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1651: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 255-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1652: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1653: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1654: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 255-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1655: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 13811 at Wed Oct 18 17:12:42 UTC 2023 kill -USR1 13811 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 13811 killed at Wed Oct 18 17:12:42 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14623 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14623 found at Wed Oct 18 17:12:42 UTC 2023 selfserv_9997 with PID 14623 started at Wed Oct 18 17:12:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1656: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14623 at Wed Oct 18 17:12:42 UTC 2023 kill -USR1 14623 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14623 killed at Wed Oct 18 17:12:42 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14675 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14675 found at Wed Oct 18 17:12:42 UTC 2023 selfserv_9997 with PID 14675 started at Wed Oct 18 17:12:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1657: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14675 at Wed Oct 18 17:12:42 UTC 2023 kill -USR1 14675 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14675 killed at Wed Oct 18 17:12:42 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14728 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14728 found at Wed Oct 18 17:12:42 UTC 2023 selfserv_9997 with PID 14728 started at Wed Oct 18 17:12:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1658: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14728 at Wed Oct 18 17:12:42 UTC 2023 kill -USR1 14728 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14728 killed at Wed Oct 18 17:12:42 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14780 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14780 found at Wed Oct 18 17:12:42 UTC 2023 selfserv_9997 with PID 14780 started at Wed Oct 18 17:12:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1659: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14780 at Wed Oct 18 17:12:42 UTC 2023 kill -USR1 14780 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14780 killed at Wed Oct 18 17:12:42 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14836 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14836 found at Wed Oct 18 17:12:42 UTC 2023 selfserv_9997 with PID 14836 started at Wed Oct 18 17:12:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1660: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 14836 at Wed Oct 18 17:12:42 UTC 2023 kill -USR1 14836 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14836 killed at Wed Oct 18 17:12:42 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14895 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14895 found at Wed Oct 18 17:12:42 UTC 2023 selfserv_9997 with PID 14895 started at Wed Oct 18 17:12:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1661: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14895 at Wed Oct 18 17:12:42 UTC 2023 kill -USR1 14895 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14895 killed at Wed Oct 18 17:12:42 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 14947 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 14947 found at Wed Oct 18 17:12:42 UTC 2023 selfserv_9997 with PID 14947 started at Wed Oct 18 17:12:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1662: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 14947 at Wed Oct 18 17:12:43 UTC 2023 kill -USR1 14947 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 14947 killed at Wed Oct 18 17:12:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15000 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15000 found at Wed Oct 18 17:12:43 UTC 2023 selfserv_9997 with PID 15000 started at Wed Oct 18 17:12:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1663: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15000 at Wed Oct 18 17:12:43 UTC 2023 kill -USR1 15000 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15000 killed at Wed Oct 18 17:12:43 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15052 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15052 found at Wed Oct 18 17:12:43 UTC 2023 selfserv_9997 with PID 15052 started at Wed Oct 18 17:12:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1664: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15052 at Wed Oct 18 17:12:43 UTC 2023 kill -USR1 15052 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15052 killed at Wed Oct 18 17:12:43 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15104 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15104 found at Wed Oct 18 17:12:43 UTC 2023 selfserv_9997 with PID 15104 started at Wed Oct 18 17:12:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1665: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15104 at Wed Oct 18 17:12:43 UTC 2023 kill -USR1 15104 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15104 killed at Wed Oct 18 17:12:43 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15157 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15157 found at Wed Oct 18 17:12:43 UTC 2023 selfserv_9997 with PID 15157 started at Wed Oct 18 17:12:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1666: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15157 at Wed Oct 18 17:12:43 UTC 2023 kill -USR1 15157 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15157 killed at Wed Oct 18 17:12:43 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15214 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15214 found at Wed Oct 18 17:12:43 UTC 2023 selfserv_9997 with PID 15214 started at Wed Oct 18 17:12:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1667: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15214 at Wed Oct 18 17:12:43 UTC 2023 kill -USR1 15214 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15214 killed at Wed Oct 18 17:12:43 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:43 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15266 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15266 found at Wed Oct 18 17:12:43 UTC 2023 selfserv_9997 with PID 15266 started at Wed Oct 18 17:12:43 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1668: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15266 at Wed Oct 18 17:12:43 UTC 2023 kill -USR1 15266 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15266 killed at Wed Oct 18 17:12:43 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15318 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15318 found at Wed Oct 18 17:12:44 UTC 2023 selfserv_9997 with PID 15318 started at Wed Oct 18 17:12:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1669: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15318 at Wed Oct 18 17:12:44 UTC 2023 kill -USR1 15318 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15318 killed at Wed Oct 18 17:12:44 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15370 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15370 found at Wed Oct 18 17:12:44 UTC 2023 selfserv_9997 with PID 15370 started at Wed Oct 18 17:12:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1670: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15370 at Wed Oct 18 17:12:44 UTC 2023 kill -USR1 15370 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15370 killed at Wed Oct 18 17:12:44 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15422 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15422 found at Wed Oct 18 17:12:44 UTC 2023 selfserv_9997 with PID 15422 started at Wed Oct 18 17:12:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1671: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15422 at Wed Oct 18 17:12:44 UTC 2023 kill -USR1 15422 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15422 killed at Wed Oct 18 17:12:44 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15474 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15474 found at Wed Oct 18 17:12:44 UTC 2023 selfserv_9997 with PID 15474 started at Wed Oct 18 17:12:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1672: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15474 at Wed Oct 18 17:12:44 UTC 2023 kill -USR1 15474 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15474 killed at Wed Oct 18 17:12:44 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15526 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15526 found at Wed Oct 18 17:12:44 UTC 2023 selfserv_9997 with PID 15526 started at Wed Oct 18 17:12:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1673: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15526 at Wed Oct 18 17:12:44 UTC 2023 kill -USR1 15526 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15526 killed at Wed Oct 18 17:12:44 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15578 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15578 found at Wed Oct 18 17:12:44 UTC 2023 selfserv_9997 with PID 15578 started at Wed Oct 18 17:12:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1674: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15578 at Wed Oct 18 17:12:44 UTC 2023 kill -USR1 15578 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15578 killed at Wed Oct 18 17:12:44 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:44 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15630 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15630 found at Wed Oct 18 17:12:44 UTC 2023 selfserv_9997 with PID 15630 started at Wed Oct 18 17:12:44 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1675: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15630 at Wed Oct 18 17:12:45 UTC 2023 kill -USR1 15630 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15630 killed at Wed Oct 18 17:12:45 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15682 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15682 found at Wed Oct 18 17:12:45 UTC 2023 selfserv_9997 with PID 15682 started at Wed Oct 18 17:12:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1676: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15682 at Wed Oct 18 17:12:45 UTC 2023 kill -USR1 15682 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15682 killed at Wed Oct 18 17:12:45 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15734 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15734 found at Wed Oct 18 17:12:45 UTC 2023 selfserv_9997 with PID 15734 started at Wed Oct 18 17:12:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1677: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15734 at Wed Oct 18 17:12:45 UTC 2023 kill -USR1 15734 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15734 killed at Wed Oct 18 17:12:45 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15786 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15786 found at Wed Oct 18 17:12:45 UTC 2023 selfserv_9997 with PID 15786 started at Wed Oct 18 17:12:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1678: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 15786 at Wed Oct 18 17:12:45 UTC 2023 kill -USR1 15786 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15786 killed at Wed Oct 18 17:12:45 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15838 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15838 found at Wed Oct 18 17:12:45 UTC 2023 selfserv_9997 with PID 15838 started at Wed Oct 18 17:12:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1679: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15838 at Wed Oct 18 17:12:45 UTC 2023 kill -USR1 15838 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15838 killed at Wed Oct 18 17:12:45 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15890 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15890 found at Wed Oct 18 17:12:45 UTC 2023 selfserv_9997 with PID 15890 started at Wed Oct 18 17:12:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1680: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15890 at Wed Oct 18 17:12:46 UTC 2023 kill -USR1 15890 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15890 killed at Wed Oct 18 17:12:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15942 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15942 found at Wed Oct 18 17:12:46 UTC 2023 selfserv_9997 with PID 15942 started at Wed Oct 18 17:12:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1681: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15942 at Wed Oct 18 17:12:46 UTC 2023 kill -USR1 15942 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15942 killed at Wed Oct 18 17:12:46 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 15994 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 15994 found at Wed Oct 18 17:12:46 UTC 2023 selfserv_9997 with PID 15994 started at Wed Oct 18 17:12:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1682: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 15994 at Wed Oct 18 17:12:46 UTC 2023 kill -USR1 15994 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 15994 killed at Wed Oct 18 17:12:46 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16046 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16046 found at Wed Oct 18 17:12:46 UTC 2023 selfserv_9997 with PID 16046 started at Wed Oct 18 17:12:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1683: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16046 at Wed Oct 18 17:12:46 UTC 2023 kill -USR1 16046 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16046 killed at Wed Oct 18 17:12:46 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16098 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16098 found at Wed Oct 18 17:12:46 UTC 2023 selfserv_9997 with PID 16098 started at Wed Oct 18 17:12:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1684: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16098 at Wed Oct 18 17:12:46 UTC 2023 kill -USR1 16098 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16098 killed at Wed Oct 18 17:12:46 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:46 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16150 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16150 found at Wed Oct 18 17:12:46 UTC 2023 selfserv_9997 with PID 16150 started at Wed Oct 18 17:12:46 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1685: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16150 at Wed Oct 18 17:12:47 UTC 2023 kill -USR1 16150 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16150 killed at Wed Oct 18 17:12:47 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16203 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16203 found at Wed Oct 18 17:12:47 UTC 2023 selfserv_9997 with PID 16203 started at Wed Oct 18 17:12:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1686: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16203 at Wed Oct 18 17:12:47 UTC 2023 kill -USR1 16203 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16203 killed at Wed Oct 18 17:12:47 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16255 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16255 found at Wed Oct 18 17:12:47 UTC 2023 selfserv_9997 with PID 16255 started at Wed Oct 18 17:12:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1687: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16255 at Wed Oct 18 17:12:47 UTC 2023 kill -USR1 16255 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16255 killed at Wed Oct 18 17:12:47 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16307 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16307 found at Wed Oct 18 17:12:47 UTC 2023 selfserv_9997 with PID 16307 started at Wed Oct 18 17:12:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1688: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16307 at Wed Oct 18 17:12:47 UTC 2023 kill -USR1 16307 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16307 killed at Wed Oct 18 17:12:47 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16359 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16359 found at Wed Oct 18 17:12:47 UTC 2023 selfserv_9997 with PID 16359 started at Wed Oct 18 17:12:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1689: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16359 at Wed Oct 18 17:12:47 UTC 2023 kill -USR1 16359 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16359 killed at Wed Oct 18 17:12:47 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16412 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16412 found at Wed Oct 18 17:12:47 UTC 2023 selfserv_9997 with PID 16412 started at Wed Oct 18 17:12:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1690: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16412 at Wed Oct 18 17:12:47 UTC 2023 kill -USR1 16412 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16412 killed at Wed Oct 18 17:12:47 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:47 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16464 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16464 found at Wed Oct 18 17:12:47 UTC 2023 selfserv_9997 with PID 16464 started at Wed Oct 18 17:12:47 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1691: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16464 at Wed Oct 18 17:12:48 UTC 2023 kill -USR1 16464 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16464 killed at Wed Oct 18 17:12:48 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16516 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16516 found at Wed Oct 18 17:12:48 UTC 2023 selfserv_9997 with PID 16516 started at Wed Oct 18 17:12:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1692: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16516 at Wed Oct 18 17:12:48 UTC 2023 kill -USR1 16516 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16516 killed at Wed Oct 18 17:12:48 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16568 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16568 found at Wed Oct 18 17:12:48 UTC 2023 selfserv_9997 with PID 16568 started at Wed Oct 18 17:12:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1693: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16568 at Wed Oct 18 17:12:48 UTC 2023 kill -USR1 16568 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16568 killed at Wed Oct 18 17:12:48 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16620 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16620 found at Wed Oct 18 17:12:48 UTC 2023 selfserv_9997 with PID 16620 started at Wed Oct 18 17:12:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1694: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16620 at Wed Oct 18 17:12:48 UTC 2023 kill -USR1 16620 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16620 killed at Wed Oct 18 17:12:48 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16672 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16672 found at Wed Oct 18 17:12:48 UTC 2023 selfserv_9997 with PID 16672 started at Wed Oct 18 17:12:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1695: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16672 at Wed Oct 18 17:12:48 UTC 2023 kill -USR1 16672 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16672 killed at Wed Oct 18 17:12:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16724 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16724 found at Wed Oct 18 17:12:48 UTC 2023 selfserv_9997 with PID 16724 started at Wed Oct 18 17:12:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1696: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16724 at Wed Oct 18 17:12:48 UTC 2023 kill -USR1 16724 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16724 killed at Wed Oct 18 17:12:48 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16776 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16776 found at Wed Oct 18 17:12:48 UTC 2023 selfserv_9997 with PID 16776 started at Wed Oct 18 17:12:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1697: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16776 at Wed Oct 18 17:12:48 UTC 2023 kill -USR1 16776 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16776 killed at Wed Oct 18 17:12:48 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:48 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16828 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16828 found at Wed Oct 18 17:12:48 UTC 2023 selfserv_9997 with PID 16828 started at Wed Oct 18 17:12:48 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1698: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 16828 at Wed Oct 18 17:12:48 UTC 2023 kill -USR1 16828 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16828 killed at Wed Oct 18 17:12:48 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16880 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16880 found at Wed Oct 18 17:12:49 UTC 2023 selfserv_9997 with PID 16880 started at Wed Oct 18 17:12:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1699: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16880 at Wed Oct 18 17:12:49 UTC 2023 kill -USR1 16880 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16880 killed at Wed Oct 18 17:12:49 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16932 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16932 found at Wed Oct 18 17:12:49 UTC 2023 selfserv_9997 with PID 16932 started at Wed Oct 18 17:12:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1700: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16932 at Wed Oct 18 17:12:49 UTC 2023 kill -USR1 16932 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16932 killed at Wed Oct 18 17:12:49 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 16984 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 16984 found at Wed Oct 18 17:12:49 UTC 2023 selfserv_9997 with PID 16984 started at Wed Oct 18 17:12:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1701: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 16984 at Wed Oct 18 17:12:49 UTC 2023 kill -USR1 16984 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 16984 killed at Wed Oct 18 17:12:49 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17036 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17036 found at Wed Oct 18 17:12:49 UTC 2023 selfserv_9997 with PID 17036 started at Wed Oct 18 17:12:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1702: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17036 at Wed Oct 18 17:12:49 UTC 2023 kill -USR1 17036 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17036 killed at Wed Oct 18 17:12:49 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17088 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17088 found at Wed Oct 18 17:12:49 UTC 2023 selfserv_9997 with PID 17088 started at Wed Oct 18 17:12:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1703: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17088 at Wed Oct 18 17:12:49 UTC 2023 kill -USR1 17088 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17088 killed at Wed Oct 18 17:12:49 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17140 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17140 found at Wed Oct 18 17:12:49 UTC 2023 selfserv_9997 with PID 17140 started at Wed Oct 18 17:12:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1704: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17140 at Wed Oct 18 17:12:49 UTC 2023 kill -USR1 17140 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17140 killed at Wed Oct 18 17:12:49 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17192 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17192 found at Wed Oct 18 17:12:49 UTC 2023 selfserv_9997 with PID 17192 started at Wed Oct 18 17:12:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1705: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17192 at Wed Oct 18 17:12:50 UTC 2023 kill -USR1 17192 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17192 killed at Wed Oct 18 17:12:50 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17244 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17244 found at Wed Oct 18 17:12:50 UTC 2023 selfserv_9997 with PID 17244 started at Wed Oct 18 17:12:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1706: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17244 at Wed Oct 18 17:12:50 UTC 2023 kill -USR1 17244 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17244 killed at Wed Oct 18 17:12:50 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17296 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17296 found at Wed Oct 18 17:12:50 UTC 2023 selfserv_9997 with PID 17296 started at Wed Oct 18 17:12:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1707: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17296 at Wed Oct 18 17:12:50 UTC 2023 kill -USR1 17296 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17296 killed at Wed Oct 18 17:12:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17348 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17348 found at Wed Oct 18 17:12:50 UTC 2023 selfserv_9997 with PID 17348 started at Wed Oct 18 17:12:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1708: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17348 at Wed Oct 18 17:12:50 UTC 2023 kill -USR1 17348 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17348 killed at Wed Oct 18 17:12:50 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17400 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17400 found at Wed Oct 18 17:12:50 UTC 2023 selfserv_9997 with PID 17400 started at Wed Oct 18 17:12:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1709: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17400 at Wed Oct 18 17:12:50 UTC 2023 kill -USR1 17400 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17400 killed at Wed Oct 18 17:12:50 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:12:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17452 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17452 found at Wed Oct 18 17:12:50 UTC 2023 selfserv_9997 with PID 17452 started at Wed Oct 18 17:12:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1710: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 17452 at Wed Oct 18 17:12:51 UTC 2023 kill -USR1 17452 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17452 killed at Wed Oct 18 17:12:51 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17504 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17504 found at Wed Oct 18 17:12:51 UTC 2023 selfserv_9997 with PID 17504 started at Wed Oct 18 17:12:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1711: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17504 at Wed Oct 18 17:12:51 UTC 2023 kill -USR1 17504 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17504 killed at Wed Oct 18 17:12:51 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17556 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17556 found at Wed Oct 18 17:12:51 UTC 2023 selfserv_9997 with PID 17556 started at Wed Oct 18 17:12:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1712: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17556 at Wed Oct 18 17:12:51 UTC 2023 kill -USR1 17556 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17556 killed at Wed Oct 18 17:12:51 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:12:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17608 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17608 found at Wed Oct 18 17:12:51 UTC 2023 selfserv_9997 with PID 17608 started at Wed Oct 18 17:12:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1713: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17608 at Wed Oct 18 17:12:51 UTC 2023 kill -USR1 17608 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17608 killed at Wed Oct 18 17:12:51 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 17:12:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17693 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17693 found at Wed Oct 18 17:12:51 UTC 2023 selfserv_9997 with PID 17693 started at Wed Oct 18 17:12:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1656: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17693 at Wed Oct 18 17:12:51 UTC 2023 kill -USR1 17693 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17693 killed at Wed Oct 18 17:12:51 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17735 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17735 found at Wed Oct 18 17:12:51 UTC 2023 selfserv_9997 with PID 17735 started at Wed Oct 18 17:12:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1657: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17735 at Wed Oct 18 17:12:51 UTC 2023 kill -USR1 17735 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17735 killed at Wed Oct 18 17:12:51 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17774 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17774 found at Wed Oct 18 17:12:51 UTC 2023 selfserv_9997 with PID 17774 started at Wed Oct 18 17:12:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1658: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 17774 at Wed Oct 18 17:12:51 UTC 2023 kill -USR1 17774 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17774 killed at Wed Oct 18 17:12:51 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17815 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17815 found at Wed Oct 18 17:12:51 UTC 2023 selfserv_9997 with PID 17815 started at Wed Oct 18 17:12:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1659: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17815 at Wed Oct 18 17:12:51 UTC 2023 kill -USR1 17815 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17815 killed at Wed Oct 18 17:12:51 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17854 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17854 found at Wed Oct 18 17:12:51 UTC 2023 selfserv_9997 with PID 17854 started at Wed Oct 18 17:12:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1660: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 17854 at Wed Oct 18 17:12:51 UTC 2023 kill -USR1 17854 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17854 killed at Wed Oct 18 17:12:51 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17893 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17893 found at Wed Oct 18 17:12:51 UTC 2023 selfserv_9997 with PID 17893 started at Wed Oct 18 17:12:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1661: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17893 at Wed Oct 18 17:12:51 UTC 2023 kill -USR1 17893 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17893 killed at Wed Oct 18 17:12:51 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17932 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17932 found at Wed Oct 18 17:12:51 UTC 2023 selfserv_9997 with PID 17932 started at Wed Oct 18 17:12:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1662: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17932 at Wed Oct 18 17:12:52 UTC 2023 kill -USR1 17932 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17932 killed at Wed Oct 18 17:12:52 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 17971 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 17971 found at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 with PID 17971 started at Wed Oct 18 17:12:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1663: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 17971 at Wed Oct 18 17:12:52 UTC 2023 kill -USR1 17971 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 17971 killed at Wed Oct 18 17:12:52 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18010 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18010 found at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 with PID 18010 started at Wed Oct 18 17:12:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1664: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18010 at Wed Oct 18 17:12:52 UTC 2023 kill -USR1 18010 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18010 killed at Wed Oct 18 17:12:52 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18049 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18049 found at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 with PID 18049 started at Wed Oct 18 17:12:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1665: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18049 at Wed Oct 18 17:12:52 UTC 2023 kill -USR1 18049 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18049 killed at Wed Oct 18 17:12:52 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18088 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18088 found at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 with PID 18088 started at Wed Oct 18 17:12:52 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1666: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18088 at Wed Oct 18 17:12:52 UTC 2023 kill -USR1 18088 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18088 killed at Wed Oct 18 17:12:52 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18128 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18128 found at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 with PID 18128 started at Wed Oct 18 17:12:52 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1667: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18128 at Wed Oct 18 17:12:52 UTC 2023 kill -USR1 18128 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18128 killed at Wed Oct 18 17:12:52 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18168 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18168 found at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 with PID 18168 started at Wed Oct 18 17:12:52 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1668: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18168 at Wed Oct 18 17:12:52 UTC 2023 kill -USR1 18168 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18168 killed at Wed Oct 18 17:12:52 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18208 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18208 found at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 with PID 18208 started at Wed Oct 18 17:12:52 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1669: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 18208 at Wed Oct 18 17:12:52 UTC 2023 kill -USR1 18208 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18208 killed at Wed Oct 18 17:12:52 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18248 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18248 found at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 with PID 18248 started at Wed Oct 18 17:12:52 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1670: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18248 at Wed Oct 18 17:12:52 UTC 2023 kill -USR1 18248 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18248 killed at Wed Oct 18 17:12:52 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18288 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18288 found at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 with PID 18288 started at Wed Oct 18 17:12:52 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1671: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18288 at Wed Oct 18 17:12:52 UTC 2023 kill -USR1 18288 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18288 killed at Wed Oct 18 17:12:52 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18328 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18328 found at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 with PID 18328 started at Wed Oct 18 17:12:52 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1672: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18328 at Wed Oct 18 17:12:52 UTC 2023 kill -USR1 18328 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18328 killed at Wed Oct 18 17:12:52 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18368 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18368 found at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 with PID 18368 started at Wed Oct 18 17:12:52 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1673: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18368 at Wed Oct 18 17:12:52 UTC 2023 kill -USR1 18368 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18368 killed at Wed Oct 18 17:12:52 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:52 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 18408 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18408 found at Wed Oct 18 17:12:52 UTC 2023 selfserv_9997 with PID 18408 started at Wed Oct 18 17:12:52 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1674: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 18408 at Wed Oct 18 17:12:52 UTC 2023 kill -USR1 18408 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18408 killed at Wed Oct 18 17:12:52 UTC 2023 ssl.sh: SSL - FIPS mode on for server =============================== ssl.sh: Turning FIPS on for the server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -fips true -force FIPS mode enabled. ssl.sh: #1675: expect failure to list cert, because we deleted it (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -list ssl.sh: #1676: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1677: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -fips true -force FIPS mode enabled. ssl.sh: #1678: expect failure to list cert, because we deleted it (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -list ssl.sh: #1679: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1680: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server fips/client normal =============================== selfserv_9997 starting at Wed Oct 18 17:12:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 18492 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 18492 found at Wed Oct 18 17:12:53 UTC 2023 selfserv_9997 with PID 18492 started at Wed Oct 18 17:12:53 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1681: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1682: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1683: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1684: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1685: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1686: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1687: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1688: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1689: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1690: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1691: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1692: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1693: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1694: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1695: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1696: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1697: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1698: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1699: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1700: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1701: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1702: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1703: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1704: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1705: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1706: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1707: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1708: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1709: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1710: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1711: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1712: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1713: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1714: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1715: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1716: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1717: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1718: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1719: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1720: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1721: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1722: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1723: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1724: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1725: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1726: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1727: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1728: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1729: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1730: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1731: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 18492 at Wed Oct 18 17:12:55 UTC 2023 kill -USR1 18492 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 18492 killed at Wed Oct 18 17:12:55 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 17:12:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 19043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19043 found at Wed Oct 18 17:12:55 UTC 2023 selfserv_9997 with PID 19043 started at Wed Oct 18 17:12:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1732: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1733: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1734: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1735: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1736: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1737: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1738: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1739: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1740: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1741: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1742: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1743: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1744: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1745: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1746: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1747: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1748: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1749: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1750: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1751: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1752: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1753: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1754: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1755: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1756: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1757: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1758: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1759: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1760: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1761: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1762: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1763: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1764: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1765: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1766: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1767: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1768: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1769: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1770: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1771: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1772: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1773: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1774: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1775: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1776: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1777: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1778: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1779: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1780: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1781: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1782: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1783: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1784: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1785: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1786: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1787: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1788: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1789: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1790: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1791: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1792: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1793: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1794: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1795: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1796: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1797: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1798: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1799: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1800: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1801: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1802: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1803: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1804: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1805: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1806: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1807: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19043 at Wed Oct 18 17:12:59 UTC 2023 kill -USR1 19043 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19043 killed at Wed Oct 18 17:12:59 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server fips/client normal =============================== selfserv_9997 starting at Wed Oct 18 17:12:59 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:12:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19842 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19842 found at Wed Oct 18 17:12:59 UTC 2023 selfserv_9997 with PID 19842 started at Wed Oct 18 17:12:59 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1808: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1809: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19842 at Wed Oct 18 17:12:59 UTC 2023 kill -USR1 19842 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19842 killed at Wed Oct 18 17:12:59 UTC 2023 ssl.sh: SSL Client Authentication - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19908 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19908 found at Wed Oct 18 17:13:00 UTC 2023 selfserv_9997 with PID 19908 started at Wed Oct 18 17:13:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1808: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19908 at Wed Oct 18 17:13:00 UTC 2023 kill -USR1 19908 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19908 killed at Wed Oct 18 17:13:00 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:13:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 19960 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 19960 found at Wed Oct 18 17:13:00 UTC 2023 selfserv_9997 with PID 19960 started at Wed Oct 18 17:13:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1809: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 19960 at Wed Oct 18 17:13:00 UTC 2023 kill -USR1 19960 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 19960 killed at Wed Oct 18 17:13:00 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20013 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20013 found at Wed Oct 18 17:13:00 UTC 2023 selfserv_9997 with PID 20013 started at Wed Oct 18 17:13:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1810: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20013 at Wed Oct 18 17:13:00 UTC 2023 kill -USR1 20013 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20013 killed at Wed Oct 18 17:13:00 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20065 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20065 found at Wed Oct 18 17:13:01 UTC 2023 selfserv_9997 with PID 20065 started at Wed Oct 18 17:13:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1811: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20065 at Wed Oct 18 17:13:01 UTC 2023 kill -USR1 20065 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20065 killed at Wed Oct 18 17:13:01 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:13:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20117 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20117 found at Wed Oct 18 17:13:01 UTC 2023 selfserv_9997 with PID 20117 started at Wed Oct 18 17:13:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1812: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20117 at Wed Oct 18 17:13:01 UTC 2023 kill -USR1 20117 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20117 killed at Wed Oct 18 17:13:01 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20169 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20169 found at Wed Oct 18 17:13:01 UTC 2023 selfserv_9997 with PID 20169 started at Wed Oct 18 17:13:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1813: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20169 at Wed Oct 18 17:13:01 UTC 2023 kill -USR1 20169 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20169 killed at Wed Oct 18 17:13:01 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20222 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20222 found at Wed Oct 18 17:13:01 UTC 2023 selfserv_9997 with PID 20222 started at Wed Oct 18 17:13:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1814: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20222 at Wed Oct 18 17:13:02 UTC 2023 kill -USR1 20222 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20222 killed at Wed Oct 18 17:13:02 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:13:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20274 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20274 found at Wed Oct 18 17:13:02 UTC 2023 selfserv_9997 with PID 20274 started at Wed Oct 18 17:13:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1815: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20274 at Wed Oct 18 17:13:02 UTC 2023 kill -USR1 20274 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20274 killed at Wed Oct 18 17:13:02 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20327 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20327 found at Wed Oct 18 17:13:02 UTC 2023 selfserv_9997 with PID 20327 started at Wed Oct 18 17:13:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1816: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20327 at Wed Oct 18 17:13:02 UTC 2023 kill -USR1 20327 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20327 killed at Wed Oct 18 17:13:02 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20379 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20379 found at Wed Oct 18 17:13:02 UTC 2023 selfserv_9997 with PID 20379 started at Wed Oct 18 17:13:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1817: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20379 at Wed Oct 18 17:13:03 UTC 2023 kill -USR1 20379 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20379 killed at Wed Oct 18 17:13:03 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:13:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20431 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20431 found at Wed Oct 18 17:13:03 UTC 2023 selfserv_9997 with PID 20431 started at Wed Oct 18 17:13:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1818: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20431 at Wed Oct 18 17:13:03 UTC 2023 kill -USR1 20431 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20431 killed at Wed Oct 18 17:13:03 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20483 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20483 found at Wed Oct 18 17:13:03 UTC 2023 selfserv_9997 with PID 20483 started at Wed Oct 18 17:13:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1819: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20483 at Wed Oct 18 17:13:03 UTC 2023 kill -USR1 20483 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20483 killed at Wed Oct 18 17:13:03 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20535 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20535 found at Wed Oct 18 17:13:03 UTC 2023 selfserv_9997 with PID 20535 started at Wed Oct 18 17:13:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1820: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20535 at Wed Oct 18 17:13:04 UTC 2023 kill -USR1 20535 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20535 killed at Wed Oct 18 17:13:04 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:13:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20587 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20587 found at Wed Oct 18 17:13:04 UTC 2023 selfserv_9997 with PID 20587 started at Wed Oct 18 17:13:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1821: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20587 at Wed Oct 18 17:13:04 UTC 2023 kill -USR1 20587 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20587 killed at Wed Oct 18 17:13:04 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20639 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20639 found at Wed Oct 18 17:13:04 UTC 2023 selfserv_9997 with PID 20639 started at Wed Oct 18 17:13:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1822: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20639 at Wed Oct 18 17:13:04 UTC 2023 kill -USR1 20639 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20639 killed at Wed Oct 18 17:13:04 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20691 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20691 found at Wed Oct 18 17:13:04 UTC 2023 selfserv_9997 with PID 20691 started at Wed Oct 18 17:13:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1823: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20691 at Wed Oct 18 17:13:05 UTC 2023 kill -USR1 20691 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20691 killed at Wed Oct 18 17:13:05 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:13:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20743 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20743 found at Wed Oct 18 17:13:05 UTC 2023 selfserv_9997 with PID 20743 started at Wed Oct 18 17:13:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1824: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 20743 at Wed Oct 18 17:13:05 UTC 2023 kill -USR1 20743 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20743 killed at Wed Oct 18 17:13:05 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20795 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20795 found at Wed Oct 18 17:13:05 UTC 2023 selfserv_9997 with PID 20795 started at Wed Oct 18 17:13:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1825: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20795 at Wed Oct 18 17:13:05 UTC 2023 kill -USR1 20795 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20795 killed at Wed Oct 18 17:13:05 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20847 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20847 found at Wed Oct 18 17:13:05 UTC 2023 selfserv_9997 with PID 20847 started at Wed Oct 18 17:13:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1826: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20847 at Wed Oct 18 17:13:06 UTC 2023 kill -USR1 20847 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20847 killed at Wed Oct 18 17:13:06 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:13:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20899 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20899 found at Wed Oct 18 17:13:06 UTC 2023 selfserv_9997 with PID 20899 started at Wed Oct 18 17:13:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1827: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20899 at Wed Oct 18 17:13:06 UTC 2023 kill -USR1 20899 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20899 killed at Wed Oct 18 17:13:06 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 20951 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 20951 found at Wed Oct 18 17:13:06 UTC 2023 selfserv_9997 with PID 20951 started at Wed Oct 18 17:13:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1828: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 20951 at Wed Oct 18 17:13:06 UTC 2023 kill -USR1 20951 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 20951 killed at Wed Oct 18 17:13:06 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21003 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21003 found at Wed Oct 18 17:13:06 UTC 2023 selfserv_9997 with PID 21003 started at Wed Oct 18 17:13:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1829: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 21003 at Wed Oct 18 17:13:07 UTC 2023 kill -USR1 21003 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21003 killed at Wed Oct 18 17:13:07 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:13:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21055 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21055 found at Wed Oct 18 17:13:07 UTC 2023 selfserv_9997 with PID 21055 started at Wed Oct 18 17:13:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1830: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 21055 at Wed Oct 18 17:13:07 UTC 2023 kill -USR1 21055 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21055 killed at Wed Oct 18 17:13:07 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21107 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21107 found at Wed Oct 18 17:13:07 UTC 2023 selfserv_9997 with PID 21107 started at Wed Oct 18 17:13:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1831: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21107 at Wed Oct 18 17:13:07 UTC 2023 kill -USR1 21107 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21107 killed at Wed Oct 18 17:13:07 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21159 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21159 found at Wed Oct 18 17:13:07 UTC 2023 selfserv_9997 with PID 21159 started at Wed Oct 18 17:13:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1832: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21159 at Wed Oct 18 17:13:08 UTC 2023 kill -USR1 21159 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21159 killed at Wed Oct 18 17:13:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:13:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21211 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21211 found at Wed Oct 18 17:13:08 UTC 2023 selfserv_9997 with PID 21211 started at Wed Oct 18 17:13:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1833: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21211 at Wed Oct 18 17:13:08 UTC 2023 kill -USR1 21211 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21211 killed at Wed Oct 18 17:13:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21263 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21263 found at Wed Oct 18 17:13:08 UTC 2023 selfserv_9997 with PID 21263 started at Wed Oct 18 17:13:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1834: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21263 at Wed Oct 18 17:13:08 UTC 2023 kill -USR1 21263 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21263 killed at Wed Oct 18 17:13:09 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21316 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21316 found at Wed Oct 18 17:13:09 UTC 2023 selfserv_9997 with PID 21316 started at Wed Oct 18 17:13:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1835: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 21316 at Wed Oct 18 17:13:09 UTC 2023 kill -USR1 21316 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21316 killed at Wed Oct 18 17:13:09 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:13:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21368 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21368 found at Wed Oct 18 17:13:09 UTC 2023 selfserv_9997 with PID 21368 started at Wed Oct 18 17:13:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1836: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 21368 at Wed Oct 18 17:13:09 UTC 2023 kill -USR1 21368 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21368 killed at Wed Oct 18 17:13:09 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21420 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21420 found at Wed Oct 18 17:13:09 UTC 2023 selfserv_9997 with PID 21420 started at Wed Oct 18 17:13:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1837: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21420 at Wed Oct 18 17:13:10 UTC 2023 kill -USR1 21420 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21420 killed at Wed Oct 18 17:13:10 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21473 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21473 found at Wed Oct 18 17:13:10 UTC 2023 selfserv_9997 with PID 21473 started at Wed Oct 18 17:13:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1838: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21473 at Wed Oct 18 17:13:10 UTC 2023 kill -USR1 21473 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21473 killed at Wed Oct 18 17:13:10 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21525 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21525 found at Wed Oct 18 17:13:10 UTC 2023 selfserv_9997 with PID 21525 started at Wed Oct 18 17:13:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1839: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21525 at Wed Oct 18 17:13:10 UTC 2023 kill -USR1 21525 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21525 killed at Wed Oct 18 17:13:10 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21577 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21577 found at Wed Oct 18 17:13:10 UTC 2023 selfserv_9997 with PID 21577 started at Wed Oct 18 17:13:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1840: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21577 at Wed Oct 18 17:13:10 UTC 2023 kill -USR1 21577 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21577 killed at Wed Oct 18 17:13:11 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21629 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21629 found at Wed Oct 18 17:13:11 UTC 2023 selfserv_9997 with PID 21629 started at Wed Oct 18 17:13:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1841: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 21629 at Wed Oct 18 17:13:11 UTC 2023 kill -USR1 21629 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21629 killed at Wed Oct 18 17:13:11 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21681 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21681 found at Wed Oct 18 17:13:11 UTC 2023 selfserv_9997 with PID 21681 started at Wed Oct 18 17:13:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1842: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21681 at Wed Oct 18 17:13:11 UTC 2023 kill -USR1 21681 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21681 killed at Wed Oct 18 17:13:11 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21733 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21733 found at Wed Oct 18 17:13:11 UTC 2023 selfserv_9997 with PID 21733 started at Wed Oct 18 17:13:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1843: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21733 at Wed Oct 18 17:13:11 UTC 2023 kill -USR1 21733 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21733 killed at Wed Oct 18 17:13:11 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:13:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21785 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21785 found at Wed Oct 18 17:13:12 UTC 2023 selfserv_9997 with PID 21785 started at Wed Oct 18 17:13:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1844: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21785 at Wed Oct 18 17:13:12 UTC 2023 kill -USR1 21785 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21785 killed at Wed Oct 18 17:13:12 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21838 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21838 found at Wed Oct 18 17:13:12 UTC 2023 selfserv_9997 with PID 21838 started at Wed Oct 18 17:13:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1845: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21838 at Wed Oct 18 17:13:12 UTC 2023 kill -USR1 21838 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21838 killed at Wed Oct 18 17:13:12 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:13:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21890 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21890 found at Wed Oct 18 17:13:12 UTC 2023 selfserv_9997 with PID 21890 started at Wed Oct 18 17:13:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1846: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 21890 at Wed Oct 18 17:13:12 UTC 2023 kill -USR1 21890 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21890 killed at Wed Oct 18 17:13:12 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21942 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21942 found at Wed Oct 18 17:13:12 UTC 2023 selfserv_9997 with PID 21942 started at Wed Oct 18 17:13:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1847: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21942 at Wed Oct 18 17:13:12 UTC 2023 kill -USR1 21942 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21942 killed at Wed Oct 18 17:13:12 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:13:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 21994 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 21994 found at Wed Oct 18 17:13:13 UTC 2023 selfserv_9997 with PID 21994 started at Wed Oct 18 17:13:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1848: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 21994 at Wed Oct 18 17:13:13 UTC 2023 kill -USR1 21994 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 21994 killed at Wed Oct 18 17:13:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22046 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22046 found at Wed Oct 18 17:13:13 UTC 2023 selfserv_9997 with PID 22046 started at Wed Oct 18 17:13:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1849: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22046 at Wed Oct 18 17:13:13 UTC 2023 kill -USR1 22046 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22046 killed at Wed Oct 18 17:13:13 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:13:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22100 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22100 found at Wed Oct 18 17:13:13 UTC 2023 selfserv_9997 with PID 22100 started at Wed Oct 18 17:13:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1850: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22100 at Wed Oct 18 17:13:13 UTC 2023 kill -USR1 22100 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22100 killed at Wed Oct 18 17:13:13 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22152 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22152 found at Wed Oct 18 17:13:13 UTC 2023 selfserv_9997 with PID 22152 started at Wed Oct 18 17:13:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1851: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22152 at Wed Oct 18 17:13:14 UTC 2023 kill -USR1 22152 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22152 killed at Wed Oct 18 17:13:14 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:13:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22204 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22204 found at Wed Oct 18 17:13:14 UTC 2023 selfserv_9997 with PID 22204 started at Wed Oct 18 17:13:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1852: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22204 at Wed Oct 18 17:13:14 UTC 2023 kill -USR1 22204 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22204 killed at Wed Oct 18 17:13:14 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22256 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22256 found at Wed Oct 18 17:13:14 UTC 2023 selfserv_9997 with PID 22256 started at Wed Oct 18 17:13:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1853: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22256 at Wed Oct 18 17:13:14 UTC 2023 kill -USR1 22256 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22256 killed at Wed Oct 18 17:13:14 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:13:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22308 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22308 found at Wed Oct 18 17:13:14 UTC 2023 selfserv_9997 with PID 22308 started at Wed Oct 18 17:13:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1854: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22308 at Wed Oct 18 17:13:14 UTC 2023 kill -USR1 22308 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22308 killed at Wed Oct 18 17:13:14 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22360 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22360 found at Wed Oct 18 17:13:15 UTC 2023 selfserv_9997 with PID 22360 started at Wed Oct 18 17:13:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1855: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22360 at Wed Oct 18 17:13:15 UTC 2023 kill -USR1 22360 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22360 killed at Wed Oct 18 17:13:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:13:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22412 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22412 found at Wed Oct 18 17:13:15 UTC 2023 selfserv_9997 with PID 22412 started at Wed Oct 18 17:13:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1856: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22412 at Wed Oct 18 17:13:15 UTC 2023 kill -USR1 22412 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22412 killed at Wed Oct 18 17:13:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22465 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22465 found at Wed Oct 18 17:13:15 UTC 2023 selfserv_9997 with PID 22465 started at Wed Oct 18 17:13:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1857: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22465 at Wed Oct 18 17:13:16 UTC 2023 kill -USR1 22465 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22465 killed at Wed Oct 18 17:13:16 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:13:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22517 found at Wed Oct 18 17:13:16 UTC 2023 selfserv_9997 with PID 22517 started at Wed Oct 18 17:13:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1858: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22517 at Wed Oct 18 17:13:16 UTC 2023 kill -USR1 22517 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22517 killed at Wed Oct 18 17:13:16 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22569 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22569 found at Wed Oct 18 17:13:16 UTC 2023 selfserv_9997 with PID 22569 started at Wed Oct 18 17:13:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1859: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22569 at Wed Oct 18 17:13:16 UTC 2023 kill -USR1 22569 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22569 killed at Wed Oct 18 17:13:16 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:13:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22621 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22621 found at Wed Oct 18 17:13:16 UTC 2023 selfserv_9997 with PID 22621 started at Wed Oct 18 17:13:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1860: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22621 at Wed Oct 18 17:13:17 UTC 2023 kill -USR1 22621 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22621 killed at Wed Oct 18 17:13:17 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22673 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22673 found at Wed Oct 18 17:13:17 UTC 2023 selfserv_9997 with PID 22673 started at Wed Oct 18 17:13:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1861: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22673 at Wed Oct 18 17:13:17 UTC 2023 kill -USR1 22673 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22673 killed at Wed Oct 18 17:13:17 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:13:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22728 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22728 found at Wed Oct 18 17:13:17 UTC 2023 selfserv_9997 with PID 22728 started at Wed Oct 18 17:13:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1862: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 22728 at Wed Oct 18 17:13:17 UTC 2023 kill -USR1 22728 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22728 killed at Wed Oct 18 17:13:17 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22780 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22780 found at Wed Oct 18 17:13:17 UTC 2023 selfserv_9997 with PID 22780 started at Wed Oct 18 17:13:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1863: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22780 at Wed Oct 18 17:13:18 UTC 2023 kill -USR1 22780 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22780 killed at Wed Oct 18 17:13:18 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22833 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22833 found at Wed Oct 18 17:13:18 UTC 2023 selfserv_9997 with PID 22833 started at Wed Oct 18 17:13:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1864: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22833 at Wed Oct 18 17:13:18 UTC 2023 kill -USR1 22833 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22833 killed at Wed Oct 18 17:13:18 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:13:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22885 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22885 found at Wed Oct 18 17:13:18 UTC 2023 selfserv_9997 with PID 22885 started at Wed Oct 18 17:13:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1865: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22885 at Wed Oct 18 17:13:18 UTC 2023 kill -USR1 22885 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22885 killed at Wed Oct 18 17:13:18 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 17:13:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 22943 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 22943 found at Wed Oct 18 17:13:18 UTC 2023 selfserv_9997 with PID 22943 started at Wed Oct 18 17:13:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1866: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 22943 at Wed Oct 18 17:13:19 UTC 2023 kill -USR1 22943 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 22943 killed at Wed Oct 18 17:13:19 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 17:13:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23001 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23001 found at Wed Oct 18 17:13:19 UTC 2023 selfserv_9997 with PID 23001 started at Wed Oct 18 17:13:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1867: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23001 at Wed Oct 18 17:13:19 UTC 2023 kill -USR1 23001 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23001 killed at Wed Oct 18 17:13:19 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 17:13:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23059 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23059 found at Wed Oct 18 17:13:19 UTC 2023 selfserv_9997 with PID 23059 started at Wed Oct 18 17:13:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1868: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23059 at Wed Oct 18 17:13:19 UTC 2023 kill -USR1 23059 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23059 killed at Wed Oct 18 17:13:19 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 17:13:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23117 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23117 found at Wed Oct 18 17:13:19 UTC 2023 selfserv_9997 with PID 23117 started at Wed Oct 18 17:13:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1869: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23117 at Wed Oct 18 17:13:19 UTC 2023 kill -USR1 23117 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23117 killed at Wed Oct 18 17:13:19 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9997 starting at Wed Oct 18 17:13:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23175 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23175 found at Wed Oct 18 17:13:19 UTC 2023 selfserv_9997 with PID 23175 started at Wed Oct 18 17:13:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #1870: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23175 at Wed Oct 18 17:13:19 UTC 2023 kill -USR1 23175 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23175 killed at Wed Oct 18 17:13:19 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 17:13:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23233 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23233 found at Wed Oct 18 17:13:20 UTC 2023 selfserv_9997 with PID 23233 started at Wed Oct 18 17:13:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1871: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23233 at Wed Oct 18 17:13:20 UTC 2023 kill -USR1 23233 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23233 killed at Wed Oct 18 17:13:20 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 17:13:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23291 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23291 found at Wed Oct 18 17:13:20 UTC 2023 selfserv_9997 with PID 23291 started at Wed Oct 18 17:13:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1872: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23291 at Wed Oct 18 17:13:20 UTC 2023 kill -USR1 23291 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23291 killed at Wed Oct 18 17:13:20 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9997 starting at Wed Oct 18 17:13:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23349 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23349 found at Wed Oct 18 17:13:20 UTC 2023 selfserv_9997 with PID 23349 started at Wed Oct 18 17:13:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1873: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23349 at Wed Oct 18 17:13:20 UTC 2023 kill -USR1 23349 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23349 killed at Wed Oct 18 17:13:20 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9997 starting at Wed Oct 18 17:13:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23408 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23408 found at Wed Oct 18 17:13:20 UTC 2023 selfserv_9997 with PID 23408 started at Wed Oct 18 17:13:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1874: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23408 at Wed Oct 18 17:13:20 UTC 2023 kill -USR1 23408 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23408 killed at Wed Oct 18 17:13:20 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 17:13:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23467 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23467 found at Wed Oct 18 17:13:20 UTC 2023 selfserv_9997 with PID 23467 started at Wed Oct 18 17:13:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #1875: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 23467 at Wed Oct 18 17:13:20 UTC 2023 kill -USR1 23467 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23467 killed at Wed Oct 18 17:13:20 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server fips/client normal =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9997 starting at Wed Oct 18 17:13:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23509 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23509 found at Wed Oct 18 17:13:20 UTC 2023 selfserv_9997 with PID 23509 started at Wed Oct 18 17:13:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1808: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23509 at Wed Oct 18 17:13:20 UTC 2023 kill -USR1 23509 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23509 killed at Wed Oct 18 17:13:20 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9997 starting at Wed Oct 18 17:13:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23551 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23551 found at Wed Oct 18 17:13:21 UTC 2023 selfserv_9997 with PID 23551 started at Wed Oct 18 17:13:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1809: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9997 with PID 23551 at Wed Oct 18 17:13:21 UTC 2023 kill -USR1 23551 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23551 killed at Wed Oct 18 17:13:21 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9997 starting at Wed Oct 18 17:13:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23593 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23593 found at Wed Oct 18 17:13:21 UTC 2023 selfserv_9997 with PID 23593 started at Wed Oct 18 17:13:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1810: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 23593 at Wed Oct 18 17:13:21 UTC 2023 kill -USR1 23593 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23593 killed at Wed Oct 18 17:13:21 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9997 starting at Wed Oct 18 17:13:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23635 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23635 found at Wed Oct 18 17:13:21 UTC 2023 selfserv_9997 with PID 23635 started at Wed Oct 18 17:13:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1811: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 23635 at Wed Oct 18 17:13:21 UTC 2023 kill -USR1 23635 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23635 killed at Wed Oct 18 17:13:21 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9997 starting at Wed Oct 18 17:13:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23677 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23677 found at Wed Oct 18 17:13:21 UTC 2023 selfserv_9997 with PID 23677 started at Wed Oct 18 17:13:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1812: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 23677 at Wed Oct 18 17:13:21 UTC 2023 kill -USR1 23677 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23677 killed at Wed Oct 18 17:13:21 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9997 starting at Wed Oct 18 17:13:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23719 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23719 found at Wed Oct 18 17:13:21 UTC 2023 selfserv_9997 with PID 23719 started at Wed Oct 18 17:13:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #1813: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 23719 at Wed Oct 18 17:13:21 UTC 2023 kill -USR1 23719 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23719 killed at Wed Oct 18 17:13:21 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9997 starting at Wed Oct 18 17:13:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23761 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23761 found at Wed Oct 18 17:13:21 UTC 2023 selfserv_9997 with PID 23761 started at Wed Oct 18 17:13:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #1814: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 23761 at Wed Oct 18 17:13:21 UTC 2023 kill -USR1 23761 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23761 killed at Wed Oct 18 17:13:21 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9997 starting at Wed Oct 18 17:13:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23803 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23803 found at Wed Oct 18 17:13:21 UTC 2023 selfserv_9997 with PID 23803 started at Wed Oct 18 17:13:21 UTC 2023 strsclnt -q -p 9997 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 17:13:21 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 17:13:53 UTC 2023 ssl.sh: #1815: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9997 with PID 23803 at Wed Oct 18 17:13:53 UTC 2023 kill -USR1 23803 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23803 killed at Wed Oct 18 17:13:53 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 17:13:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23870 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23870 found at Wed Oct 18 17:13:53 UTC 2023 selfserv_9997 with PID 23870 started at Wed Oct 18 17:13:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1816: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23870 at Wed Oct 18 17:13:53 UTC 2023 kill -USR1 23870 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23870 killed at Wed Oct 18 17:13:53 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:13:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23912 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23912 found at Wed Oct 18 17:13:53 UTC 2023 selfserv_9997 with PID 23912 started at Wed Oct 18 17:13:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1817: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23912 at Wed Oct 18 17:13:53 UTC 2023 kill -USR1 23912 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23912 killed at Wed Oct 18 17:13:53 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:13:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23951 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23951 found at Wed Oct 18 17:13:53 UTC 2023 selfserv_9997 with PID 23951 started at Wed Oct 18 17:13:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1818: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 23951 at Wed Oct 18 17:13:53 UTC 2023 kill -USR1 23951 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23951 killed at Wed Oct 18 17:13:53 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:13:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 23990 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 23990 found at Wed Oct 18 17:13:53 UTC 2023 selfserv_9997 with PID 23990 started at Wed Oct 18 17:13:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1819: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 23990 at Wed Oct 18 17:13:53 UTC 2023 kill -USR1 23990 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 23990 killed at Wed Oct 18 17:13:53 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:13:53 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24029 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24029 found at Wed Oct 18 17:13:53 UTC 2023 selfserv_9997 with PID 24029 started at Wed Oct 18 17:13:53 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1820: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 24029 at Wed Oct 18 17:13:54 UTC 2023 kill -USR1 24029 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24029 killed at Wed Oct 18 17:13:54 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:13:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24068 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24068 found at Wed Oct 18 17:13:54 UTC 2023 selfserv_9997 with PID 24068 started at Wed Oct 18 17:13:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1821: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24068 at Wed Oct 18 17:13:54 UTC 2023 kill -USR1 24068 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24068 killed at Wed Oct 18 17:13:54 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:13:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24107 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24107 found at Wed Oct 18 17:13:54 UTC 2023 selfserv_9997 with PID 24107 started at Wed Oct 18 17:13:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1822: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24107 at Wed Oct 18 17:13:54 UTC 2023 kill -USR1 24107 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24107 killed at Wed Oct 18 17:13:54 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:13:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24146 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24146 found at Wed Oct 18 17:13:54 UTC 2023 selfserv_9997 with PID 24146 started at Wed Oct 18 17:13:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1823: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24146 at Wed Oct 18 17:13:54 UTC 2023 kill -USR1 24146 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24146 killed at Wed Oct 18 17:13:54 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:13:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24185 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24185 found at Wed Oct 18 17:13:54 UTC 2023 selfserv_9997 with PID 24185 started at Wed Oct 18 17:13:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1824: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24185 at Wed Oct 18 17:13:54 UTC 2023 kill -USR1 24185 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24185 killed at Wed Oct 18 17:13:54 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:13:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24224 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24224 found at Wed Oct 18 17:13:54 UTC 2023 selfserv_9997 with PID 24224 started at Wed Oct 18 17:13:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1825: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24224 at Wed Oct 18 17:13:54 UTC 2023 kill -USR1 24224 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24224 killed at Wed Oct 18 17:13:54 UTC 2023 ssl.sh: SSL SCHEME - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:13:54 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:54 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24263 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24263 found at Wed Oct 18 17:13:54 UTC 2023 selfserv_9997 with PID 24263 started at Wed Oct 18 17:13:54 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1826: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24263 at Wed Oct 18 17:13:54 UTC 2023 kill -USR1 24263 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24263 killed at Wed Oct 18 17:13:55 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:13:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24304 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24304 found at Wed Oct 18 17:13:55 UTC 2023 selfserv_9997 with PID 24304 started at Wed Oct 18 17:13:55 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1827: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24304 at Wed Oct 18 17:13:55 UTC 2023 kill -USR1 24304 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24304 killed at Wed Oct 18 17:13:55 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:13:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24344 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24344 found at Wed Oct 18 17:13:55 UTC 2023 selfserv_9997 with PID 24344 started at Wed Oct 18 17:13:55 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1828: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24344 at Wed Oct 18 17:13:55 UTC 2023 kill -USR1 24344 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24344 killed at Wed Oct 18 17:13:55 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:13:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24384 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24384 found at Wed Oct 18 17:13:55 UTC 2023 selfserv_9997 with PID 24384 started at Wed Oct 18 17:13:55 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1829: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 24384 at Wed Oct 18 17:13:55 UTC 2023 kill -USR1 24384 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24384 killed at Wed Oct 18 17:13:55 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:13:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24424 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24424 found at Wed Oct 18 17:13:55 UTC 2023 selfserv_9997 with PID 24424 started at Wed Oct 18 17:13:55 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1830: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24424 at Wed Oct 18 17:13:55 UTC 2023 kill -USR1 24424 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24424 killed at Wed Oct 18 17:13:55 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:13:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24464 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24464 found at Wed Oct 18 17:13:55 UTC 2023 selfserv_9997 with PID 24464 started at Wed Oct 18 17:13:55 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1831: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24464 at Wed Oct 18 17:13:55 UTC 2023 kill -USR1 24464 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24464 killed at Wed Oct 18 17:13:55 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:13:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24504 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24504 found at Wed Oct 18 17:13:55 UTC 2023 selfserv_9997 with PID 24504 started at Wed Oct 18 17:13:55 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1832: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24504 at Wed Oct 18 17:13:55 UTC 2023 kill -USR1 24504 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24504 killed at Wed Oct 18 17:13:55 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:13:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24545 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24545 found at Wed Oct 18 17:13:56 UTC 2023 selfserv_9997 with PID 24545 started at Wed Oct 18 17:13:56 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1833: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24545 at Wed Oct 18 17:13:56 UTC 2023 kill -USR1 24545 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24545 killed at Wed Oct 18 17:13:56 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:13:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 24586 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24586 found at Wed Oct 18 17:13:56 UTC 2023 selfserv_9997 with PID 24586 started at Wed Oct 18 17:13:56 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1834: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 24586 at Wed Oct 18 17:13:56 UTC 2023 kill -USR1 24586 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24586 killed at Wed Oct 18 17:13:56 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server fips/client normal =============================== selfserv_9997 starting at Wed Oct 18 17:13:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 24626 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 24626 found at Wed Oct 18 17:13:56 UTC 2023 selfserv_9997 with PID 24626 started at Wed Oct 18 17:13:56 UTC 2023 ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1835: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1836: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1837: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1838: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1839: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1840: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1841: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1842: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1843: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1844: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1845: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1846: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1847: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1848: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1849: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1850: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1851: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1852: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1853: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1854: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1855: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1856: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1857: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1858: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1859: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1860: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1861: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1862: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1863: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1864: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1865: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1866: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1867: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1868: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1869: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1870: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1871: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1872: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1873: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1874: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1875: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1876: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1877: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1878: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1879: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1880: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1881: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1882: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1883: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1884: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1885: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 24626 at Wed Oct 18 17:13:58 UTC 2023 kill -USR1 24626 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 24626 killed at Wed Oct 18 17:13:58 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 17:13:58 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:13:58 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) selfserv: About to call accept. tstclnt: exiting with return code 0 selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file kill -0 25177 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25177 found at Wed Oct 18 17:13:59 UTC 2023 selfserv_9997 with PID 25177 started at Wed Oct 18 17:13:59 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1886: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1887: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1888: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1889: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1890: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1891: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1892: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1893: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1894: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1895: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1896: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1897: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1898: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1899: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1900: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1901: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1902: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1903: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1904: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1905: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1906: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1907: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1908: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1909: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1910: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1911: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1912: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1913: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1914: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1915: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1916: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1917: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1918: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1919: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1920: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1921: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1922: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1923: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1924: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1925: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1926: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1927: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1928: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1929: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1930: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1931: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1932: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1933: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1934: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1935: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1936: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1937: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1938: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1939: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1940: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1941: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1942: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1943: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1944: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1945: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1946: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1947: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1948: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1949: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1950: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1951: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1952: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1953: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1954: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1955: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1956: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1957: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1958: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1959: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1960: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1961: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25177 at Wed Oct 18 17:14:02 UTC 2023 kill -USR1 25177 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25177 killed at Wed Oct 18 17:14:02 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server fips/client normal =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server fips/client normal =============================== ssl.sh: TLS Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 25989 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 25989 found at Wed Oct 18 17:14:02 UTC 2023 selfserv_9997 with PID 25989 started at Wed Oct 18 17:14:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1962: TLS Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 25989 at Wed Oct 18 17:14:02 UTC 2023 kill -USR1 25989 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 25989 killed at Wed Oct 18 17:14:02 UTC 2023 ssl.sh: TLS Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26041 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26041 found at Wed Oct 18 17:14:02 UTC 2023 selfserv_9997 with PID 26041 started at Wed Oct 18 17:14:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1963: TLS Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26041 at Wed Oct 18 17:14:02 UTC 2023 kill -USR1 26041 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26041 killed at Wed Oct 18 17:14:02 UTC 2023 ssl.sh: TLS Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:02 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:02 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26093 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26093 found at Wed Oct 18 17:14:03 UTC 2023 selfserv_9997 with PID 26093 started at Wed Oct 18 17:14:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1964: TLS Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26093 at Wed Oct 18 17:14:03 UTC 2023 kill -USR1 26093 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26093 killed at Wed Oct 18 17:14:03 UTC 2023 ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26145 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26145 found at Wed Oct 18 17:14:03 UTC 2023 selfserv_9997 with PID 26145 started at Wed Oct 18 17:14:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1965: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 26145 at Wed Oct 18 17:14:03 UTC 2023 kill -USR1 26145 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26145 killed at Wed Oct 18 17:14:03 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26197 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26197 found at Wed Oct 18 17:14:03 UTC 2023 selfserv_9997 with PID 26197 started at Wed Oct 18 17:14:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1966: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 26197 at Wed Oct 18 17:14:03 UTC 2023 kill -USR1 26197 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26197 killed at Wed Oct 18 17:14:03 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26249 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26249 found at Wed Oct 18 17:14:03 UTC 2023 selfserv_9997 with PID 26249 started at Wed Oct 18 17:14:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1967: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26249 at Wed Oct 18 17:14:03 UTC 2023 kill -USR1 26249 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26249 killed at Wed Oct 18 17:14:03 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26301 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26301 found at Wed Oct 18 17:14:03 UTC 2023 selfserv_9997 with PID 26301 started at Wed Oct 18 17:14:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1968: SSL3 Request don't require client auth (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26301 at Wed Oct 18 17:14:04 UTC 2023 kill -USR1 26301 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26301 killed at Wed Oct 18 17:14:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26353 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26353 found at Wed Oct 18 17:14:04 UTC 2023 selfserv_9997 with PID 26353 started at Wed Oct 18 17:14:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1969: SSL3 Request don't require client auth (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26353 at Wed Oct 18 17:14:04 UTC 2023 kill -USR1 26353 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26353 killed at Wed Oct 18 17:14:04 UTC 2023 ssl.sh: SSL3 Request don't require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26405 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26405 found at Wed Oct 18 17:14:04 UTC 2023 selfserv_9997 with PID 26405 started at Wed Oct 18 17:14:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1970: SSL3 Request don't require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26405 at Wed Oct 18 17:14:04 UTC 2023 kill -USR1 26405 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26405 killed at Wed Oct 18 17:14:04 UTC 2023 ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:04 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26457 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26457 found at Wed Oct 18 17:14:04 UTC 2023 selfserv_9997 with PID 26457 started at Wed Oct 18 17:14:04 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1971: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 26457 at Wed Oct 18 17:14:05 UTC 2023 kill -USR1 26457 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26457 killed at Wed Oct 18 17:14:05 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26509 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26509 found at Wed Oct 18 17:14:05 UTC 2023 selfserv_9997 with PID 26509 started at Wed Oct 18 17:14:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1972: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 26509 at Wed Oct 18 17:14:05 UTC 2023 kill -USR1 26509 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26509 killed at Wed Oct 18 17:14:05 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26561 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26561 found at Wed Oct 18 17:14:05 UTC 2023 selfserv_9997 with PID 26561 started at Wed Oct 18 17:14:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1973: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26561 at Wed Oct 18 17:14:05 UTC 2023 kill -USR1 26561 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26561 killed at Wed Oct 18 17:14:05 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26613 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26613 found at Wed Oct 18 17:14:05 UTC 2023 selfserv_9997 with PID 26613 started at Wed Oct 18 17:14:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1974: TLS Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26613 at Wed Oct 18 17:14:05 UTC 2023 kill -USR1 26613 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26613 killed at Wed Oct 18 17:14:05 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:05 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26665 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26665 found at Wed Oct 18 17:14:05 UTC 2023 selfserv_9997 with PID 26665 started at Wed Oct 18 17:14:05 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1975: TLS Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26665 at Wed Oct 18 17:14:06 UTC 2023 kill -USR1 26665 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26665 killed at Wed Oct 18 17:14:06 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26717 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26717 found at Wed Oct 18 17:14:06 UTC 2023 selfserv_9997 with PID 26717 started at Wed Oct 18 17:14:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1976: TLS Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26717 at Wed Oct 18 17:14:06 UTC 2023 kill -USR1 26717 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26717 killed at Wed Oct 18 17:14:06 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26769 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26769 found at Wed Oct 18 17:14:06 UTC 2023 selfserv_9997 with PID 26769 started at Wed Oct 18 17:14:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1977: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 26769 at Wed Oct 18 17:14:06 UTC 2023 kill -USR1 26769 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26769 killed at Wed Oct 18 17:14:06 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26821 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26821 found at Wed Oct 18 17:14:06 UTC 2023 selfserv_9997 with PID 26821 started at Wed Oct 18 17:14:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1978: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 26821 at Wed Oct 18 17:14:06 UTC 2023 kill -USR1 26821 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26821 killed at Wed Oct 18 17:14:06 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:06 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26873 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26873 found at Wed Oct 18 17:14:06 UTC 2023 selfserv_9997 with PID 26873 started at Wed Oct 18 17:14:06 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1979: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26873 at Wed Oct 18 17:14:07 UTC 2023 kill -USR1 26873 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26873 killed at Wed Oct 18 17:14:07 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26925 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26925 found at Wed Oct 18 17:14:07 UTC 2023 selfserv_9997 with PID 26925 started at Wed Oct 18 17:14:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1980: TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26925 at Wed Oct 18 17:14:07 UTC 2023 kill -USR1 26925 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26925 killed at Wed Oct 18 17:14:07 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 26977 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 26977 found at Wed Oct 18 17:14:07 UTC 2023 selfserv_9997 with PID 26977 started at Wed Oct 18 17:14:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1981: TLS 1.0 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 26977 at Wed Oct 18 17:14:07 UTC 2023 kill -USR1 26977 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 26977 killed at Wed Oct 18 17:14:07 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27029 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27029 found at Wed Oct 18 17:14:07 UTC 2023 selfserv_9997 with PID 27029 started at Wed Oct 18 17:14:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1982: TLS 1.0 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27029 at Wed Oct 18 17:14:07 UTC 2023 kill -USR1 27029 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27029 killed at Wed Oct 18 17:14:07 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:07 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:07 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27081 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27081 found at Wed Oct 18 17:14:08 UTC 2023 selfserv_9997 with PID 27081 started at Wed Oct 18 17:14:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1983: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27081 at Wed Oct 18 17:14:08 UTC 2023 kill -USR1 27081 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27081 killed at Wed Oct 18 17:14:08 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27134 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27134 found at Wed Oct 18 17:14:08 UTC 2023 selfserv_9997 with PID 27134 started at Wed Oct 18 17:14:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1984: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27134 at Wed Oct 18 17:14:08 UTC 2023 kill -USR1 27134 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27134 killed at Wed Oct 18 17:14:08 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27186 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27186 found at Wed Oct 18 17:14:08 UTC 2023 selfserv_9997 with PID 27186 started at Wed Oct 18 17:14:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1985: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27186 at Wed Oct 18 17:14:08 UTC 2023 kill -USR1 27186 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27186 killed at Wed Oct 18 17:14:08 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:08 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27238 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27238 found at Wed Oct 18 17:14:08 UTC 2023 selfserv_9997 with PID 27238 started at Wed Oct 18 17:14:08 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1986: SSL3 Request don't require client auth on 2nd hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27238 at Wed Oct 18 17:14:09 UTC 2023 kill -USR1 27238 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27238 killed at Wed Oct 18 17:14:09 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27290 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27290 found at Wed Oct 18 17:14:09 UTC 2023 selfserv_9997 with PID 27290 started at Wed Oct 18 17:14:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1987: SSL3 Request don't require client auth on 2nd hs (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27290 at Wed Oct 18 17:14:09 UTC 2023 kill -USR1 27290 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27290 killed at Wed Oct 18 17:14:09 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27342 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27342 found at Wed Oct 18 17:14:09 UTC 2023 selfserv_9997 with PID 27342 started at Wed Oct 18 17:14:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1988: SSL3 Request don't require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27342 at Wed Oct 18 17:14:09 UTC 2023 kill -USR1 27342 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27342 killed at Wed Oct 18 17:14:09 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:09 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27394 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27394 found at Wed Oct 18 17:14:09 UTC 2023 selfserv_9997 with PID 27394 started at Wed Oct 18 17:14:09 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1989: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27394 at Wed Oct 18 17:14:10 UTC 2023 kill -USR1 27394 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27394 killed at Wed Oct 18 17:14:10 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27446 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27446 found at Wed Oct 18 17:14:10 UTC 2023 selfserv_9997 with PID 27446 started at Wed Oct 18 17:14:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #1990: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27446 at Wed Oct 18 17:14:10 UTC 2023 kill -USR1 27446 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27446 killed at Wed Oct 18 17:14:10 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27498 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27498 found at Wed Oct 18 17:14:10 UTC 2023 selfserv_9997 with PID 27498 started at Wed Oct 18 17:14:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1991: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27498 at Wed Oct 18 17:14:10 UTC 2023 kill -USR1 27498 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27498 killed at Wed Oct 18 17:14:10 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27550 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27550 found at Wed Oct 18 17:14:11 UTC 2023 selfserv_9997 with PID 27550 started at Wed Oct 18 17:14:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1992: TLS 1.3 Request don't require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27550 at Wed Oct 18 17:14:11 UTC 2023 kill -USR1 27550 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27550 killed at Wed Oct 18 17:14:11 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27602 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27602 found at Wed Oct 18 17:14:11 UTC 2023 selfserv_9997 with PID 27602 started at Wed Oct 18 17:14:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1993: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27602 at Wed Oct 18 17:14:11 UTC 2023 kill -USR1 27602 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27602 killed at Wed Oct 18 17:14:11 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27654 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27654 found at Wed Oct 18 17:14:11 UTC 2023 selfserv_9997 with PID 27654 started at Wed Oct 18 17:14:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1994: TLS 1.3 Request don't require client auth on post hs (client does not provide auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27654 at Wed Oct 18 17:14:11 UTC 2023 kill -USR1 27654 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27654 killed at Wed Oct 18 17:14:11 UTC 2023 ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27707 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27707 found at Wed Oct 18 17:14:11 UTC 2023 selfserv_9997 with PID 27707 started at Wed Oct 18 17:14:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #1995: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27707 at Wed Oct 18 17:14:11 UTC 2023 kill -USR1 27707 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27707 killed at Wed Oct 18 17:14:11 UTC 2023 ssl.sh: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -E -u -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27759 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27759 found at Wed Oct 18 17:14:12 UTC 2023 selfserv_9997 with PID 27759 started at Wed Oct 18 17:14:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1996: TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27759 at Wed Oct 18 17:14:12 UTC 2023 kill -USR1 27759 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27759 killed at Wed Oct 18 17:14:12 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27811 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27811 found at Wed Oct 18 17:14:12 UTC 2023 selfserv_9997 with PID 27811 started at Wed Oct 18 17:14:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1997: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27811 at Wed Oct 18 17:14:12 UTC 2023 kill -USR1 27811 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27811 killed at Wed Oct 18 17:14:12 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27863 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27863 found at Wed Oct 18 17:14:12 UTC 2023 selfserv_9997 with PID 27863 started at Wed Oct 18 17:14:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1998: TLS Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27863 at Wed Oct 18 17:14:12 UTC 2023 kill -USR1 27863 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27863 killed at Wed Oct 18 17:14:12 UTC 2023 ssl.sh: TLS Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27917 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27917 found at Wed Oct 18 17:14:12 UTC 2023 selfserv_9997 with PID 27917 started at Wed Oct 18 17:14:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1999: TLS Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 27917 at Wed Oct 18 17:14:12 UTC 2023 kill -USR1 27917 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27917 killed at Wed Oct 18 17:14:12 UTC 2023 ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:12 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:12 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 27969 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 27969 found at Wed Oct 18 17:14:13 UTC 2023 selfserv_9997 with PID 27969 started at Wed Oct 18 17:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2000: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 27969 at Wed Oct 18 17:14:13 UTC 2023 kill -USR1 27969 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 27969 killed at Wed Oct 18 17:14:13 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28021 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28021 found at Wed Oct 18 17:14:13 UTC 2023 selfserv_9997 with PID 28021 started at Wed Oct 18 17:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2001: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28021 at Wed Oct 18 17:14:13 UTC 2023 kill -USR1 28021 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28021 killed at Wed Oct 18 17:14:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28073 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28073 found at Wed Oct 18 17:14:13 UTC 2023 selfserv_9997 with PID 28073 started at Wed Oct 18 17:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2002: SSL3 Request don't require client auth (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28073 at Wed Oct 18 17:14:13 UTC 2023 kill -USR1 28073 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28073 killed at Wed Oct 18 17:14:13 UTC 2023 ssl.sh: SSL3 Request don't require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28125 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28125 found at Wed Oct 18 17:14:13 UTC 2023 selfserv_9997 with PID 28125 started at Wed Oct 18 17:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2003: SSL3 Request don't require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28125 at Wed Oct 18 17:14:13 UTC 2023 kill -USR1 28125 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28125 killed at Wed Oct 18 17:14:13 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:13 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:13 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28177 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28177 found at Wed Oct 18 17:14:14 UTC 2023 selfserv_9997 with PID 28177 started at Wed Oct 18 17:14:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2004: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28177 at Wed Oct 18 17:14:14 UTC 2023 kill -USR1 28177 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28177 killed at Wed Oct 18 17:14:14 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28230 found at Wed Oct 18 17:14:14 UTC 2023 selfserv_9997 with PID 28230 started at Wed Oct 18 17:14:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2005: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28230 at Wed Oct 18 17:14:14 UTC 2023 kill -USR1 28230 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28230 killed at Wed Oct 18 17:14:14 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28283 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28283 found at Wed Oct 18 17:14:14 UTC 2023 selfserv_9997 with PID 28283 started at Wed Oct 18 17:14:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2006: TLS Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28283 at Wed Oct 18 17:14:14 UTC 2023 kill -USR1 28283 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28283 killed at Wed Oct 18 17:14:14 UTC 2023 ssl.sh: TLS Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28335 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28335 found at Wed Oct 18 17:14:14 UTC 2023 selfserv_9997 with PID 28335 started at Wed Oct 18 17:14:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2007: TLS Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28335 at Wed Oct 18 17:14:14 UTC 2023 kill -USR1 28335 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28335 killed at Wed Oct 18 17:14:14 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28387 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28387 found at Wed Oct 18 17:14:15 UTC 2023 selfserv_9997 with PID 28387 started at Wed Oct 18 17:14:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2008: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28387 at Wed Oct 18 17:14:15 UTC 2023 kill -USR1 28387 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28387 killed at Wed Oct 18 17:14:15 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28439 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28439 found at Wed Oct 18 17:14:15 UTC 2023 selfserv_9997 with PID 28439 started at Wed Oct 18 17:14:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2009: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28439 at Wed Oct 18 17:14:15 UTC 2023 kill -USR1 28439 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28439 killed at Wed Oct 18 17:14:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28491 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28491 found at Wed Oct 18 17:14:15 UTC 2023 selfserv_9997 with PID 28491 started at Wed Oct 18 17:14:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2010: TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28491 at Wed Oct 18 17:14:15 UTC 2023 kill -USR1 28491 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28491 killed at Wed Oct 18 17:14:15 UTC 2023 ssl.sh: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28543 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28543 found at Wed Oct 18 17:14:15 UTC 2023 selfserv_9997 with PID 28543 started at Wed Oct 18 17:14:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2011: TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28543 at Wed Oct 18 17:14:15 UTC 2023 kill -USR1 28543 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28543 killed at Wed Oct 18 17:14:15 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28595 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28595 found at Wed Oct 18 17:14:16 UTC 2023 selfserv_9997 with PID 28595 started at Wed Oct 18 17:14:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2012: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28595 at Wed Oct 18 17:14:16 UTC 2023 kill -USR1 28595 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28595 killed at Wed Oct 18 17:14:16 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28647 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28647 found at Wed Oct 18 17:14:16 UTC 2023 selfserv_9997 with PID 28647 started at Wed Oct 18 17:14:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2013: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28647 at Wed Oct 18 17:14:16 UTC 2023 kill -USR1 28647 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28647 killed at Wed Oct 18 17:14:16 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28699 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28699 found at Wed Oct 18 17:14:16 UTC 2023 selfserv_9997 with PID 28699 started at Wed Oct 18 17:14:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2014: SSL3 Request don't require client auth on 2nd hs (EC) (bad password) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28699 at Wed Oct 18 17:14:16 UTC 2023 kill -USR1 28699 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28699 killed at Wed Oct 18 17:14:16 UTC 2023 ssl.sh: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28751 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28751 found at Wed Oct 18 17:14:17 UTC 2023 selfserv_9997 with PID 28751 started at Wed Oct 18 17:14:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2015: SSL3 Request don't require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28751 at Wed Oct 18 17:14:17 UTC 2023 kill -USR1 28751 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28751 killed at Wed Oct 18 17:14:17 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28804 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28804 found at Wed Oct 18 17:14:17 UTC 2023 selfserv_9997 with PID 28804 started at Wed Oct 18 17:14:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Incorrect password/PIN entered. Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2016: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 28804 at Wed Oct 18 17:14:17 UTC 2023 kill -USR1 28804 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28804 killed at Wed Oct 18 17:14:17 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28857 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28857 found at Wed Oct 18 17:14:17 UTC 2023 selfserv_9997 with PID 28857 started at Wed Oct 18 17:14:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2017: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28857 at Wed Oct 18 17:14:17 UTC 2023 kill -USR1 28857 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28857 killed at Wed Oct 18 17:14:17 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:17 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:17 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28909 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28909 found at Wed Oct 18 17:14:18 UTC 2023 selfserv_9997 with PID 28909 started at Wed Oct 18 17:14:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2018: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28909 at Wed Oct 18 17:14:18 UTC 2023 kill -USR1 28909 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28909 killed at Wed Oct 18 17:14:18 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 28961 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 28961 found at Wed Oct 18 17:14:18 UTC 2023 selfserv_9997 with PID 28961 started at Wed Oct 18 17:14:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2019: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 28961 at Wed Oct 18 17:14:18 UTC 2023 kill -USR1 28961 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 28961 killed at Wed Oct 18 17:14:18 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server fips/client normal =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server fips/client normal =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 17:14:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29043 found at Wed Oct 18 17:14:18 UTC 2023 selfserv_9997 with PID 29043 started at Wed Oct 18 17:14:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1962: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29043 at Wed Oct 18 17:14:18 UTC 2023 kill -USR1 29043 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29043 killed at Wed Oct 18 17:14:18 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:14:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29085 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29085 found at Wed Oct 18 17:14:18 UTC 2023 selfserv_9997 with PID 29085 started at Wed Oct 18 17:14:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1963: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29085 at Wed Oct 18 17:14:18 UTC 2023 kill -USR1 29085 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29085 killed at Wed Oct 18 17:14:18 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:14:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29124 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29124 found at Wed Oct 18 17:14:18 UTC 2023 selfserv_9997 with PID 29124 started at Wed Oct 18 17:14:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1964: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 29124 at Wed Oct 18 17:14:18 UTC 2023 kill -USR1 29124 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29124 killed at Wed Oct 18 17:14:18 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:14:18 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:18 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29163 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29163 found at Wed Oct 18 17:14:19 UTC 2023 selfserv_9997 with PID 29163 started at Wed Oct 18 17:14:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1965: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29163 at Wed Oct 18 17:14:19 UTC 2023 kill -USR1 29163 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29163 killed at Wed Oct 18 17:14:19 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:14:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29202 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29202 found at Wed Oct 18 17:14:19 UTC 2023 selfserv_9997 with PID 29202 started at Wed Oct 18 17:14:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #1966: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 29202 at Wed Oct 18 17:14:19 UTC 2023 kill -USR1 29202 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29202 killed at Wed Oct 18 17:14:19 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:14:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29241 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29241 found at Wed Oct 18 17:14:19 UTC 2023 selfserv_9997 with PID 29241 started at Wed Oct 18 17:14:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1967: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29241 at Wed Oct 18 17:14:19 UTC 2023 kill -USR1 29241 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29241 killed at Wed Oct 18 17:14:19 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:14:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29280 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29280 found at Wed Oct 18 17:14:19 UTC 2023 selfserv_9997 with PID 29280 started at Wed Oct 18 17:14:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1968: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29280 at Wed Oct 18 17:14:19 UTC 2023 kill -USR1 29280 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29280 killed at Wed Oct 18 17:14:19 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:14:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29319 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29319 found at Wed Oct 18 17:14:19 UTC 2023 selfserv_9997 with PID 29319 started at Wed Oct 18 17:14:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1969: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29319 at Wed Oct 18 17:14:19 UTC 2023 kill -USR1 29319 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29319 killed at Wed Oct 18 17:14:19 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:14:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29358 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29358 found at Wed Oct 18 17:14:19 UTC 2023 selfserv_9997 with PID 29358 started at Wed Oct 18 17:14:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1970: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29358 at Wed Oct 18 17:14:19 UTC 2023 kill -USR1 29358 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29358 killed at Wed Oct 18 17:14:19 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:14:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29398 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29398 found at Wed Oct 18 17:14:20 UTC 2023 selfserv_9997 with PID 29398 started at Wed Oct 18 17:14:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #1971: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29398 at Wed Oct 18 17:14:20 UTC 2023 kill -USR1 29398 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29398 killed at Wed Oct 18 17:14:20 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server fips/client normal =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:14:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29437 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29437 found at Wed Oct 18 17:14:20 UTC 2023 selfserv_9997 with PID 29437 started at Wed Oct 18 17:14:20 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1972: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29437 at Wed Oct 18 17:14:20 UTC 2023 kill -USR1 29437 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29437 killed at Wed Oct 18 17:14:20 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:14:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29477 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29477 found at Wed Oct 18 17:14:20 UTC 2023 selfserv_9997 with PID 29477 started at Wed Oct 18 17:14:20 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1973: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 29477 at Wed Oct 18 17:14:20 UTC 2023 kill -USR1 29477 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29477 killed at Wed Oct 18 17:14:20 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:14:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29517 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29517 found at Wed Oct 18 17:14:20 UTC 2023 selfserv_9997 with PID 29517 started at Wed Oct 18 17:14:20 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1974: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29517 at Wed Oct 18 17:14:20 UTC 2023 kill -USR1 29517 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29517 killed at Wed Oct 18 17:14:20 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:14:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29557 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29557 found at Wed Oct 18 17:14:20 UTC 2023 selfserv_9997 with PID 29557 started at Wed Oct 18 17:14:20 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1975: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 29557 at Wed Oct 18 17:14:20 UTC 2023 kill -USR1 29557 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29557 killed at Wed Oct 18 17:14:20 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:14:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29597 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29597 found at Wed Oct 18 17:14:20 UTC 2023 selfserv_9997 with PID 29597 started at Wed Oct 18 17:14:20 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1976: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29597 at Wed Oct 18 17:14:20 UTC 2023 kill -USR1 29597 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29597 killed at Wed Oct 18 17:14:20 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:14:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29637 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29637 found at Wed Oct 18 17:14:21 UTC 2023 selfserv_9997 with PID 29637 started at Wed Oct 18 17:14:21 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1977: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29637 at Wed Oct 18 17:14:21 UTC 2023 kill -USR1 29637 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29637 killed at Wed Oct 18 17:14:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:14:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29677 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29677 found at Wed Oct 18 17:14:21 UTC 2023 selfserv_9997 with PID 29677 started at Wed Oct 18 17:14:21 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1978: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29677 at Wed Oct 18 17:14:21 UTC 2023 kill -USR1 29677 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29677 killed at Wed Oct 18 17:14:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:14:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29717 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29717 found at Wed Oct 18 17:14:21 UTC 2023 selfserv_9997 with PID 29717 started at Wed Oct 18 17:14:21 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1979: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29717 at Wed Oct 18 17:14:21 UTC 2023 kill -USR1 29717 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29717 killed at Wed Oct 18 17:14:21 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:14:21 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:21 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 29757 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29757 found at Wed Oct 18 17:14:21 UTC 2023 selfserv_9997 with PID 29757 started at Wed Oct 18 17:14:21 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #1980: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 29757 at Wed Oct 18 17:14:21 UTC 2023 kill -USR1 29757 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29757 killed at Wed Oct 18 17:14:21 UTC 2023 ssl.sh: SSL - FIPS mode off for server =============================== ssl.sh: Turning FIPS off for the server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -fips false -force FIPS mode disabled. ssl.sh: #1981: expect failure to list cert, because we deleted it (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/server -list ssl.sh: #1982: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1983: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended server modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -fips false -force FIPS mode disabled. ssl.sh: #1984: expect failure to list cert, because we deleted it (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_server -list ssl.sh: #1985: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #1986: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: SSL - FIPS mode on for client =============================== ssl.sh: Turning FIPS on for the client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -fips true -force FIPS mode enabled. ssl.sh: #1987: expect failure to list cert, because we deleted it (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -list ssl.sh: #1988: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1989: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: Turning FIPS on for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -fips true -force FIPS mode enabled. ssl.sh: #1990: expect failure to list cert, because we deleted it (modutil -fips true) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -list ssl.sh: #1991: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED 1. NSS Internal FIPS PKCS #11 Module ssl.sh: #1992: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 0, expected is 0 - PASSED ssl.sh: SSL Cipher Coverage - server normal/client fips =============================== selfserv_9997 starting at Wed Oct 18 17:14:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 29879 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 29879 found at Wed Oct 18 17:14:22 UTC 2023 selfserv_9997 with PID 29879 started at Wed Oct 18 17:14:22 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1993: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1994: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1995: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1996: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1997: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1998: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #1999: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2000: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2001: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2002: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2003: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2004: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2005: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2006: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2007: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2008: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2009: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2010: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2011: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2012: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2013: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2014: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2015: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2016: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2017: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2018: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2019: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2020: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2021: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2022: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2023: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2024: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2025: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2026: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2027: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2028: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2029: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2030: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2031: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2032: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2033: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2034: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2035: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2036: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2037: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2038: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2039: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2040: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2041: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (DSA),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2042: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2043: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 29879 at Wed Oct 18 17:14:27 UTC 2023 kill -USR1 29879 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 29879 killed at Wed Oct 18 17:14:27 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 17:14:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 30431 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 30431 found at Wed Oct 18 17:14:27 UTC 2023 selfserv_9997 with PID 30431 started at Wed Oct 18 17:14:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2044: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2045: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2046: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2047: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2048: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2049: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2050: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2051: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2052: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2053: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2054: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2055: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2056: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2057: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2058: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2059: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2060: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2061: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2062: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2063: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2064: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2065: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2066: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2067: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2068: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2069: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2070: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2071: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2072: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2073: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2074: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2075: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2076: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2077: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2078: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2079: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2080: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2081: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2082: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2083: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2084: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2085: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2086: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2087: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2088: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2089: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2090: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2091: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2092: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2093: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2094: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2095: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2096: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2097: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2098: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2099: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2100: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 384-bit RSA, Key Exchange: 384-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2101: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2102: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2103: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2104: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2105: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2106: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2107: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2108: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2109: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2110: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2111: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2112: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2113: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2114: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2115: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 384-bit ECDSA, Key Exchange: 384-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2116: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2117: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2118: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2119: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 30431 at Wed Oct 18 17:14:36 UTC 2023 kill -USR1 30431 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 30431 killed at Wed Oct 18 17:14:36 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) - server normal/client fips =============================== selfserv_9997 starting at Wed Oct 18 17:14:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain-rsa-pss \ -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31230 found at Wed Oct 18 17:14:36 UTC 2023 selfserv_9997 with PID 31230 started at Wed Oct 18 17:14:36 UTC 2023 ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2120: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS (RSA-PSS) ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.2:tls1.2 \ -f -d ../client -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-rsa-pss@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2121: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 - RSA-PSS produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31230 at Wed Oct 18 17:14:36 UTC 2023 kill -USR1 31230 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31230 killed at Wed Oct 18 17:14:36 UTC 2023 ssl.sh: SSL Client Authentication - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:14:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31309 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31309 found at Wed Oct 18 17:14:36 UTC 2023 selfserv_9997 with PID 31309 started at Wed Oct 18 17:14:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2120: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 31309 at Wed Oct 18 17:14:36 UTC 2023 kill -USR1 31309 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31309 killed at Wed Oct 18 17:14:36 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:14:36 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:14:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31361 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31361 found at Wed Oct 18 17:14:36 UTC 2023 selfserv_9997 with PID 31361 started at Wed Oct 18 17:14:36 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2121: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 31361 at Wed Oct 18 17:15:00 UTC 2023 kill -USR1 31361 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31361 killed at Wed Oct 18 17:15:00 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:15:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:15:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31428 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31428 found at Wed Oct 18 17:15:01 UTC 2023 selfserv_9997 with PID 31428 started at Wed Oct 18 17:15:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2122: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31428 at Wed Oct 18 17:15:01 UTC 2023 kill -USR1 31428 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31428 killed at Wed Oct 18 17:15:01 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:15:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:15:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31492 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31492 found at Wed Oct 18 17:15:01 UTC 2023 selfserv_9997 with PID 31492 started at Wed Oct 18 17:15:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2123: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 31492 at Wed Oct 18 17:15:01 UTC 2023 kill -USR1 31492 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31492 killed at Wed Oct 18 17:15:01 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:15:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:15:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31544 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31544 found at Wed Oct 18 17:15:01 UTC 2023 selfserv_9997 with PID 31544 started at Wed Oct 18 17:15:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2124: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 31544 at Wed Oct 18 17:15:24 UTC 2023 kill -USR1 31544 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31544 killed at Wed Oct 18 17:15:24 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:15:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:15:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31690 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31690 found at Wed Oct 18 17:15:24 UTC 2023 selfserv_9997 with PID 31690 started at Wed Oct 18 17:15:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2125: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31690 at Wed Oct 18 17:15:25 UTC 2023 kill -USR1 31690 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31690 killed at Wed Oct 18 17:15:25 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:15:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:15:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31754 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31754 found at Wed Oct 18 17:15:25 UTC 2023 selfserv_9997 with PID 31754 started at Wed Oct 18 17:15:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2126: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 31754 at Wed Oct 18 17:15:25 UTC 2023 kill -USR1 31754 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31754 killed at Wed Oct 18 17:15:25 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:15:25 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:15:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31806 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31806 found at Wed Oct 18 17:15:25 UTC 2023 selfserv_9997 with PID 31806 started at Wed Oct 18 17:15:25 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2127: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 31806 at Wed Oct 18 17:15:49 UTC 2023 kill -USR1 31806 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31806 killed at Wed Oct 18 17:15:49 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:15:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:15:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31874 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31874 found at Wed Oct 18 17:15:49 UTC 2023 selfserv_9997 with PID 31874 started at Wed Oct 18 17:15:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2128: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 31874 at Wed Oct 18 17:15:49 UTC 2023 kill -USR1 31874 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31874 killed at Wed Oct 18 17:15:49 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:15:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:15:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31938 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31938 found at Wed Oct 18 17:15:49 UTC 2023 selfserv_9997 with PID 31938 started at Wed Oct 18 17:15:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2129: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 31938 at Wed Oct 18 17:15:50 UTC 2023 kill -USR1 31938 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31938 killed at Wed Oct 18 17:15:50 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:15:50 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:15:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 31990 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 31990 found at Wed Oct 18 17:15:50 UTC 2023 selfserv_9997 with PID 31990 started at Wed Oct 18 17:15:50 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2130: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 31990 at Wed Oct 18 17:16:14 UTC 2023 kill -USR1 31990 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 31990 killed at Wed Oct 18 17:16:14 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:16:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:16:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32043 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32043 found at Wed Oct 18 17:16:14 UTC 2023 selfserv_9997 with PID 32043 started at Wed Oct 18 17:16:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2131: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32043 at Wed Oct 18 17:16:14 UTC 2023 kill -USR1 32043 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32043 killed at Wed Oct 18 17:16:14 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:16:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:16:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32107 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32107 found at Wed Oct 18 17:16:14 UTC 2023 selfserv_9997 with PID 32107 started at Wed Oct 18 17:16:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2132: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 32107 at Wed Oct 18 17:16:15 UTC 2023 kill -USR1 32107 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32107 killed at Wed Oct 18 17:16:15 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:16:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:16:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32159 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32159 found at Wed Oct 18 17:16:15 UTC 2023 selfserv_9997 with PID 32159 started at Wed Oct 18 17:16:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2133: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 32159 at Wed Oct 18 17:16:38 UTC 2023 kill -USR1 32159 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32159 killed at Wed Oct 18 17:16:38 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:16:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:16:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32213 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32213 found at Wed Oct 18 17:16:38 UTC 2023 selfserv_9997 with PID 32213 started at Wed Oct 18 17:16:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2134: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32213 at Wed Oct 18 17:16:38 UTC 2023 kill -USR1 32213 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32213 killed at Wed Oct 18 17:16:38 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:16:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:16:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32269 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32269 found at Wed Oct 18 17:16:38 UTC 2023 selfserv_9997 with PID 32269 started at Wed Oct 18 17:16:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2135: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32269 at Wed Oct 18 17:16:38 UTC 2023 kill -USR1 32269 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32269 killed at Wed Oct 18 17:16:38 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:16:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:16:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32325 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32325 found at Wed Oct 18 17:16:38 UTC 2023 selfserv_9997 with PID 32325 started at Wed Oct 18 17:16:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #2136: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 32325 at Wed Oct 18 17:16:39 UTC 2023 kill -USR1 32325 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32325 killed at Wed Oct 18 17:16:39 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:16:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:16:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32381 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32381 found at Wed Oct 18 17:16:39 UTC 2023 selfserv_9997 with PID 32381 started at Wed Oct 18 17:16:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2137: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32381 at Wed Oct 18 17:16:39 UTC 2023 kill -USR1 32381 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32381 killed at Wed Oct 18 17:16:39 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:16:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:16:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32441 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32441 found at Wed Oct 18 17:16:39 UTC 2023 selfserv_9997 with PID 32441 started at Wed Oct 18 17:16:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2138: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 32441 at Wed Oct 18 17:17:03 UTC 2023 kill -USR1 32441 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32441 killed at Wed Oct 18 17:17:03 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:17:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:17:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32513 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32513 found at Wed Oct 18 17:17:03 UTC 2023 selfserv_9997 with PID 32513 started at Wed Oct 18 17:17:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2139: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32513 at Wed Oct 18 17:17:03 UTC 2023 kill -USR1 32513 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32513 killed at Wed Oct 18 17:17:03 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:17:03 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:17:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32573 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32573 found at Wed Oct 18 17:17:03 UTC 2023 selfserv_9997 with PID 32573 started at Wed Oct 18 17:17:03 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2140: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 32573 at Wed Oct 18 17:17:27 UTC 2023 kill -USR1 32573 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32573 killed at Wed Oct 18 17:17:27 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:17:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:17:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32625 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32625 found at Wed Oct 18 17:17:27 UTC 2023 selfserv_9997 with PID 32625 started at Wed Oct 18 17:17:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2141: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32625 at Wed Oct 18 17:17:27 UTC 2023 kill -USR1 32625 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32625 killed at Wed Oct 18 17:17:27 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:17:27 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:17:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32685 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32685 found at Wed Oct 18 17:17:27 UTC 2023 selfserv_9997 with PID 32685 started at Wed Oct 18 17:17:27 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2142: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 32685 at Wed Oct 18 17:17:51 UTC 2023 kill -USR1 32685 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32685 killed at Wed Oct 18 17:17:51 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:17:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:17:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 32754 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 32754 found at Wed Oct 18 17:17:51 UTC 2023 selfserv_9997 with PID 32754 started at Wed Oct 18 17:17:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2143: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 32754 at Wed Oct 18 17:17:51 UTC 2023 kill -USR1 32754 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 32754 killed at Wed Oct 18 17:17:51 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:17:51 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:17:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 346 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 346 found at Wed Oct 18 17:17:51 UTC 2023 selfserv_9997 with PID 346 started at Wed Oct 18 17:17:51 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w bogus -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12286: Cannot communicate securely with peer: no common encryption algorithm(s). Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2144: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 346 at Wed Oct 18 17:18:15 UTC 2023 kill -USR1 346 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 346 killed at Wed Oct 18 17:18:15 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:18:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 400 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 400 found at Wed Oct 18 17:18:15 UTC 2023 selfserv_9997 with PID 400 started at Wed Oct 18 17:18:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.0 -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2145: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 400 at Wed Oct 18 17:18:16 UTC 2023 kill -USR1 400 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 400 killed at Wed Oct 18 17:18:16 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:18:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 461 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 461 found at Wed Oct 18 17:18:16 UTC 2023 selfserv_9997 with PID 461 started at Wed Oct 18 17:18:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2146: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 461 at Wed Oct 18 17:18:39 UTC 2023 kill -USR1 461 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 461 killed at Wed Oct 18 17:18:39 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:18:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 515 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 515 found at Wed Oct 18 17:18:39 UTC 2023 selfserv_9997 with PID 515 started at Wed Oct 18 17:18:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2147: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 515 at Wed Oct 18 17:18:39 UTC 2023 kill -USR1 515 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 515 killed at Wed Oct 18 17:18:39 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:18:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 574 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 574 found at Wed Oct 18 17:18:39 UTC 2023 selfserv_9997 with PID 574 started at Wed Oct 18 17:18:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2148: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 574 at Wed Oct 18 17:18:40 UTC 2023 kill -USR1 574 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 574 killed at Wed Oct 18 17:18:40 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:18:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 628 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 628 found at Wed Oct 18 17:18:40 UTC 2023 selfserv_9997 with PID 628 started at Wed Oct 18 17:18:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2149: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 628 at Wed Oct 18 17:18:40 UTC 2023 kill -USR1 628 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 628 killed at Wed Oct 18 17:18:40 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 17:18:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 694 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 694 found at Wed Oct 18 17:18:40 UTC 2023 selfserv_9997 with PID 694 started at Wed Oct 18 17:18:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2150: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 694 at Wed Oct 18 17:18:40 UTC 2023 kill -USR1 694 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 694 killed at Wed Oct 18 17:18:40 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 17:18:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 761 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 761 found at Wed Oct 18 17:18:40 UTC 2023 selfserv_9997 with PID 761 started at Wed Oct 18 17:18:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2151: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 761 at Wed Oct 18 17:18:40 UTC 2023 kill -USR1 761 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 761 killed at Wed Oct 18 17:18:40 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 17:18:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 839 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 839 found at Wed Oct 18 17:18:40 UTC 2023 selfserv_9997 with PID 839 started at Wed Oct 18 17:18:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #2152: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 839 at Wed Oct 18 17:18:40 UTC 2023 kill -USR1 839 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 839 killed at Wed Oct 18 17:18:40 UTC 2023 ssl.sh: SSL3 Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 17:18:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 913 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 913 found at Wed Oct 18 17:18:40 UTC 2023 selfserv_9997 with PID 913 started at Wed Oct 18 17:18:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2153: SSL3 Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 913 at Wed Oct 18 17:18:41 UTC 2023 kill -USR1 913 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 913 killed at Wed Oct 18 17:18:41 UTC 2023 ssl.sh: SSL3 Server hello response with SNI: SSL don't have SH extensions ---- selfserv_9997 starting at Wed Oct 18 17:18:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 974 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 974 found at Wed Oct 18 17:18:41 UTC 2023 selfserv_9997 with PID 974 started at Wed Oct 18 17:18:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:ssl3 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12271: SSL peer cannot verify your certificate. tstclnt: authentication of server cert failed: SSL_ERROR_BAD_CERT_DOMAIN: Unable to communicate securely with peer: requested domain name does not match the server's certificate. ssl.sh: #2154: SSL3 Server hello response with SNI: SSL don't have SH extensions produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 974 at Wed Oct 18 17:18:41 UTC 2023 kill -USR1 974 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 974 killed at Wed Oct 18 17:18:41 UTC 2023 ssl.sh: TLS Server hello response without SNI ---- selfserv_9997 starting at Wed Oct 18 17:18:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1032 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1032 found at Wed Oct 18 17:18:41 UTC 2023 selfserv_9997 with PID 1032 started at Wed Oct 18 17:18:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2155: TLS Server hello response without SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1032 at Wed Oct 18 17:18:41 UTC 2023 kill -USR1 1032 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1032 killed at Wed Oct 18 17:18:41 UTC 2023 ssl.sh: TLS Server hello response with SNI ---- selfserv_9997 starting at Wed Oct 18 17:18:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1092 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1092 found at Wed Oct 18 17:18:41 UTC 2023 selfserv_9997 with PID 1092 started at Wed Oct 18 17:18:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2156: TLS Server hello response with SNI produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1092 at Wed Oct 18 17:18:41 UTC 2023 kill -USR1 1092 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1092 killed at Wed Oct 18 17:18:41 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name on 2d HS ---- selfserv_9997 starting at Wed Oct 18 17:18:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1159 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1159 found at Wed Oct 18 17:18:41 UTC 2023 selfserv_9997 with PID 1159 started at Wed Oct 18 17:18:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2157: TLS Server hello response with SNI: Change name on 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1159 at Wed Oct 18 17:18:41 UTC 2023 kill -USR1 1159 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1159 killed at Wed Oct 18 17:18:41 UTC 2023 ssl.sh: TLS Server hello response with SNI: Change name to invalid 2d HS ---- selfserv_9997 starting at Wed Oct 18 17:18:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1230 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1230 found at Wed Oct 18 17:18:41 UTC 2023 selfserv_9997 with PID 1230 started at Wed Oct 18 17:18:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni.localdomain -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12182: SSL peer has no certificate for the requested DNS name. subject DN: CN=localhost-sni.localdomain,E=localhost-sni.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: read from socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #2158: TLS Server hello response with SNI: Change name to invalid 2d HS produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1230 at Wed Oct 18 17:18:41 UTC 2023 kill -USR1 1230 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1230 killed at Wed Oct 18 17:18:41 UTC 2023 ssl.sh: TLS Server response with alert ---- selfserv_9997 starting at Wed Oct 18 17:18:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -a localhost-sni.localdomain -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1297 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1297 found at Wed Oct 18 17:18:41 UTC 2023 selfserv_9997 with PID 1297 started at Wed Oct 18 17:18:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V ssl3:tls1.2 -c v -w nss -n pkcs11:token=NSS%20FIPS%20140-2%20Certificate%20DB;object=TestUser -a localhost-sni1.localdomain < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12182: SSL peer has no certificate for the requested DNS name. tstclnt: write to SSL socket failed: SSL_ERROR_UNRECOGNIZED_NAME_ALERT: SSL peer has no certificate for the requested DNS name. ssl.sh: #2159: TLS Server response with alert produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 1297 at Wed Oct 18 17:18:42 UTC 2023 kill -USR1 1297 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1297 killed at Wed Oct 18 17:18:42 UTC 2023 ssl.sh: SSL Cert Status (OCSP Stapling) - server normal/client fips =============================== OCSP stapling, signed response, good status ssl.sh: OCSP stapling, signed response, good status ---- selfserv_9997 starting at Wed Oct 18 17:18:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T good \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1341 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1341 found at Wed Oct 18 17:18:42 UTC 2023 selfserv_9997 with PID 1341 started at Wed Oct 18 17:18:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2120: OCSP stapling, signed response, good status produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1341 at Wed Oct 18 17:18:42 UTC 2023 kill -USR1 1341 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1341 killed at Wed Oct 18 17:18:42 UTC 2023 OCSP stapling, signed response, revoked status ssl.sh: OCSP stapling, signed response, revoked status ---- selfserv_9997 starting at Wed Oct 18 17:18:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T revoked \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1395 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1395 found at Wed Oct 18 17:18:42 UTC 2023 selfserv_9997 with PID 1395 started at Wed Oct 18 17:18:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2121: OCSP stapling, signed response, revoked status produced a returncode of 3, expected is 3 - PASSED trying to kill selfserv_9997 with PID 1395 at Wed Oct 18 17:18:42 UTC 2023 kill -USR1 1395 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1395 killed at Wed Oct 18 17:18:42 UTC 2023 OCSP stapling, signed response, unknown status ssl.sh: OCSP stapling, signed response, unknown status ---- selfserv_9997 starting at Wed Oct 18 17:18:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T unknown \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1437 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1437 found at Wed Oct 18 17:18:42 UTC 2023 selfserv_9997 with PID 1437 started at Wed Oct 18 17:18:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2122: OCSP stapling, signed response, unknown status produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 1437 at Wed Oct 18 17:18:42 UTC 2023 kill -USR1 1437 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1437 killed at Wed Oct 18 17:18:42 UTC 2023 OCSP stapling, unsigned failure response ssl.sh: OCSP stapling, unsigned failure response ---- selfserv_9997 starting at Wed Oct 18 17:18:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T failure \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1479 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1479 found at Wed Oct 18 17:18:42 UTC 2023 selfserv_9997 with PID 1479 started at Wed Oct 18 17:18:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2123: OCSP stapling, unsigned failure response produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 1479 at Wed Oct 18 17:18:42 UTC 2023 kill -USR1 1479 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1479 killed at Wed Oct 18 17:18:42 UTC 2023 OCSP stapling, good status, bad signature ssl.sh: OCSP stapling, good status, bad signature ---- selfserv_9997 starting at Wed Oct 18 17:18:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T badsig \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1521 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1521 found at Wed Oct 18 17:18:42 UTC 2023 selfserv_9997 with PID 1521 started at Wed Oct 18 17:18:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2124: OCSP stapling, good status, bad signature produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 1521 at Wed Oct 18 17:18:42 UTC 2023 kill -USR1 1521 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1521 killed at Wed Oct 18 17:18:42 UTC 2023 OCSP stapling, invalid cert status data ssl.sh: OCSP stapling, invalid cert status data ---- selfserv_9997 starting at Wed Oct 18 17:18:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T corrupted \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1563 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1563 found at Wed Oct 18 17:18:42 UTC 2023 selfserv_9997 with PID 1563 started at Wed Oct 18 17:18:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 1 Cert Status items (OCSP stapled data) ssl.sh: #2125: OCSP stapling, invalid cert status data produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 1563 at Wed Oct 18 17:18:42 UTC 2023 kill -USR1 1563 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1563 killed at Wed Oct 18 17:18:42 UTC 2023 Valid cert, Server doesn't staple ssl.sh: Valid cert, Server doesn't staple ---- selfserv_9997 starting at Wed Oct 18 17:18:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1605 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1605 found at Wed Oct 18 17:18:42 UTC 2023 selfserv_9997 with PID 1605 started at Wed Oct 18 17:18:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -c v -T -O -F -M 1 -V ssl3:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) ssl.sh: #2126: Valid cert, Server doesn't staple produced a returncode of 2, expected is 2 - PASSED trying to kill selfserv_9997 with PID 1605 at Wed Oct 18 17:18:42 UTC 2023 kill -USR1 1605 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1605 killed at Wed Oct 18 17:18:42 UTC 2023 Stress OCSP stapling, server uses random status ssl.sh: Stress OCSP stapling, server uses random status ---- selfserv_9997 starting at Wed Oct 18 17:18:42 UTC 2023 selfserv_9997 -D -p 9997 -d ../server/../stapling/ -n localhost.localdomain -A TestCA -T random \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:18:42 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1647 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1647 found at Wed Oct 18 17:18:42 UTC 2023 selfserv_9997 with PID 1647 started at Wed Oct 18 17:18:42 UTC 2023 strsclnt -q -p 9997 -d ../client -w nss \ -c 1000 -V ssl3:tls1.2 -N -T localhost.localdomain strsclnt started at Wed Oct 18 17:18:42 UTC 2023 strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: NoReuse - 1000 server certificates tested. strsclnt completed at Wed Oct 18 17:19:14 UTC 2023 ssl.sh: #2127: Stress OCSP stapling, server uses random status produced a returncode of 0, expected is 0. - PASSED trying to kill selfserv_9997 with PID 1647 at Wed Oct 18 17:19:14 UTC 2023 kill -USR1 1647 selfserv: 0 cache hits; 1000 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1647 killed at Wed Oct 18 17:19:14 UTC 2023 ssl.sh: SSL Signed Certificate Timestamps - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 17:19:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1702 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1702 found at Wed Oct 18 17:19:14 UTC 2023 selfserv_9997 with PID 1702 started at Wed Oct 18 17:19:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA (ECC),O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2128: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1702 at Wed Oct 18 17:19:14 UTC 2023 kill -USR1 1702 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1702 killed at Wed Oct 18 17:19:14 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:19:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1744 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1744 found at Wed Oct 18 17:19:14 UTC 2023 selfserv_9997 with PID 1744 started at Wed Oct 18 17:19:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2129: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1744 at Wed Oct 18 17:19:14 UTC 2023 kill -USR1 1744 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1744 killed at Wed Oct 18 17:19:14 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:19:14 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1783 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1783 found at Wed Oct 18 17:19:14 UTC 2023 selfserv_9997 with PID 1783 started at Wed Oct 18 17:19:14 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2130: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1783 at Wed Oct 18 17:19:15 UTC 2023 kill -USR1 1783 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1783 killed at Wed Oct 18 17:19:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:19:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1822 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1822 found at Wed Oct 18 17:19:15 UTC 2023 selfserv_9997 with PID 1822 started at Wed Oct 18 17:19:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2131: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1822 at Wed Oct 18 17:19:15 UTC 2023 kill -USR1 1822 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1822 killed at Wed Oct 18 17:19:15 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:19:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1862 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1862 found at Wed Oct 18 17:19:15 UTC 2023 selfserv_9997 with PID 1862 started at Wed Oct 18 17:19:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2132: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 1862 at Wed Oct 18 17:19:15 UTC 2023 kill -USR1 1862 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1862 killed at Wed Oct 18 17:19:15 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:19:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1901 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1901 found at Wed Oct 18 17:19:15 UTC 2023 selfserv_9997 with PID 1901 started at Wed Oct 18 17:19:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2133: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1901 at Wed Oct 18 17:19:15 UTC 2023 kill -USR1 1901 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1901 killed at Wed Oct 18 17:19:15 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:19:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1940 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1940 found at Wed Oct 18 17:19:15 UTC 2023 selfserv_9997 with PID 1940 started at Wed Oct 18 17:19:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2134: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1940 at Wed Oct 18 17:19:15 UTC 2023 kill -USR1 1940 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1940 killed at Wed Oct 18 17:19:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:19:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 1979 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 1979 found at Wed Oct 18 17:19:15 UTC 2023 selfserv_9997 with PID 1979 started at Wed Oct 18 17:19:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2135: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 1979 at Wed Oct 18 17:19:15 UTC 2023 kill -USR1 1979 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 1979 killed at Wed Oct 18 17:19:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:19:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2018 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2018 found at Wed Oct 18 17:19:15 UTC 2023 selfserv_9997 with PID 2018 started at Wed Oct 18 17:19:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2136: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2018 at Wed Oct 18 17:19:15 UTC 2023 kill -USR1 2018 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2018 killed at Wed Oct 18 17:19:15 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:19:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2058 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2058 found at Wed Oct 18 17:19:15 UTC 2023 selfserv_9997 with PID 2058 started at Wed Oct 18 17:19:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Test CA,O=BOGUS NSS,L=Mountain View,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2137: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2058 at Wed Oct 18 17:19:15 UTC 2023 kill -USR1 2058 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2058 killed at Wed Oct 18 17:19:15 UTC 2023 ssl.sh: SSL SCHEME - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:19:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2097 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2097 found at Wed Oct 18 17:19:15 UTC 2023 selfserv_9997 with PID 2097 started at Wed Oct 18 17:19:15 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2138: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2097 at Wed Oct 18 17:19:16 UTC 2023 kill -USR1 2097 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2097 killed at Wed Oct 18 17:19:16 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:19:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2138 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2138 found at Wed Oct 18 17:19:16 UTC 2023 selfserv_9997 with PID 2138 started at Wed Oct 18 17:19:16 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2139: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2138 at Wed Oct 18 17:19:16 UTC 2023 kill -USR1 2138 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2138 killed at Wed Oct 18 17:19:16 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:19:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2178 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2178 found at Wed Oct 18 17:19:16 UTC 2023 selfserv_9997 with PID 2178 started at Wed Oct 18 17:19:16 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2140: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2178 at Wed Oct 18 17:19:16 UTC 2023 kill -USR1 2178 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2178 killed at Wed Oct 18 17:19:16 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:19:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2218 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2218 found at Wed Oct 18 17:19:16 UTC 2023 selfserv_9997 with PID 2218 started at Wed Oct 18 17:19:16 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2141: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 2218 at Wed Oct 18 17:19:16 UTC 2023 kill -USR1 2218 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2218 killed at Wed Oct 18 17:19:16 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:19:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2258 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2258 found at Wed Oct 18 17:19:16 UTC 2023 selfserv_9997 with PID 2258 started at Wed Oct 18 17:19:16 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2142: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2258 at Wed Oct 18 17:19:16 UTC 2023 kill -USR1 2258 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2258 killed at Wed Oct 18 17:19:16 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:19:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2298 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2298 found at Wed Oct 18 17:19:16 UTC 2023 selfserv_9997 with PID 2298 started at Wed Oct 18 17:19:16 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2143: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2298 at Wed Oct 18 17:19:16 UTC 2023 kill -USR1 2298 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2298 killed at Wed Oct 18 17:19:16 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:19:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2338 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2338 found at Wed Oct 18 17:19:16 UTC 2023 selfserv_9997 with PID 2338 started at Wed Oct 18 17:19:16 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2144: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2338 at Wed Oct 18 17:19:16 UTC 2023 kill -USR1 2338 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2338 killed at Wed Oct 18 17:19:16 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:19:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2378 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2378 found at Wed Oct 18 17:19:16 UTC 2023 selfserv_9997 with PID 2378 started at Wed Oct 18 17:19:16 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2145: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2378 at Wed Oct 18 17:19:16 UTC 2023 kill -USR1 2378 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2378 killed at Wed Oct 18 17:19:16 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:19:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 2418 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2418 found at Wed Oct 18 17:19:16 UTC 2023 selfserv_9997 with PID 2418 started at Wed Oct 18 17:19:16 UTC 2023 strsclnt -q -p 9997 -d ../client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2146: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 2418 at Wed Oct 18 17:19:16 UTC 2023 kill -USR1 2418 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2418 killed at Wed Oct 18 17:19:16 UTC 2023 ssl.sh: SSL Cipher Coverage Extended Test - server normal/client fips =============================== selfserv_9997 starting at Wed Oct 18 17:19:16 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V ssl3:tls1.2 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:16 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 2468 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 2468 found at Wed Oct 18 17:19:16 UTC 2023 selfserv_9997 with PID 2468 started at Wed Oct 18 17:19:16 UTC 2023 selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file ssl.sh: running SSL3_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2147: SSL3_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2148: SSL3_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2149: SSL3_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2150: SSL3_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2151: SSL3_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2152: SSL3_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2153: SSL3_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running SSL3_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:ssl3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.0 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: No Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2154: SSL3_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009F -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2155: TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A3 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2156: TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2157: TLS_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2158: TLS_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2159: TLS_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2160: TLS_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2161: TLS_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2162: TLS_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2163: TLS_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2164: TLS_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2165: TLS_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2166: TLS11_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2167: TLS11_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2168: TLS11_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2169: TLS11_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2170: TLS11_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2171: TLS11_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2172: TLS11_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2173: TLS11_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c c -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2174: TLS12_RSA_WITH_RC4_128_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c d -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2175: TLS12_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_DES_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c e -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 56-bit DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2176: TLS12_RSA_WITH_DES_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_MD5 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c i -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 128-bit MD5 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2177: TLS12_RSA_WITH_NULL_MD5 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c n -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2178: TLS12_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c v -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2179: TLS12_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c y -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2180: TLS12_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c z -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2181: TLS12_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0016 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2182: TLS12_DHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0032 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2183: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0033 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2184: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0038 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2185: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0039 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2186: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_NULL_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2187: TLS12_RSA_WITH_NULL_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2188: TLS12_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :003D -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2189: TLS12_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0040 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2190: TLS12_DHE_DSS_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :0067 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2191: TLS12_DHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006A -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2192: TLS12_DHE_DSS_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :006B -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 256-bit SHA256 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2193: TLS12_DHE_RSA_WITH_AES_256_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009C -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit RSA Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2194: TLS12_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :009E -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2195: TLS12_DHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :00A2 -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit DSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: dsa_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-dsa@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (DSA),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2196: TLS12_DHE_DSS_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCAA -V ssl3:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 2048-bit DHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2197: TLS12_DHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_128_GCM_SHA256 ---------------------------- trying to kill selfserv_9997 with PID 2468 at Wed Oct 18 17:19:22 UTC 2023 kill -USR1 2468 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 2468 killed at Wed Oct 18 17:19:22 UTC 2023 ssl.sh: TLS13_DHE_WITH_AES_128_GCM_SHA256 ---- selfserv_9997 starting at Wed Oct 18 17:19:22 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -c :1301:1302:1303:C001:C002:C003:C004:C005:C006:C007:C008:C009:C00A:C00B:C00C:C00D:C00E:C00F:C010:C011:C012:C013:C014:C023:C024:C027:C028:C02B:C02C:C02F:C030:CCA8:CCA9:CCAA:0016:0032:0033:0038:0039:003B:003C:003D:0040:0041:0067:006A:006B:0084:009C:009D:009E:009F:00A2:00A3:CCAAcdeinvyz -i ../tests_pid.17687\ -V tls1.0:tls1.3 -v -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 -q \ -d ../ext_client -v < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: exiting with return code 0 kill -0 3026 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3026 found at Wed Oct 18 17:19:22 UTC 2023 selfserv_9997 with PID 3026 started at Wed Oct 18 17:19:22 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: About to call accept. selfserv: HDX PR_Read hit EOF returned error -5938: Encountered end of file selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2198: TLS13_DHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2199: TLS13_DHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 3 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2200: TLS13_DHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 4 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2201: TLS_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 5 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2202: TLS_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 6 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2203: TLS_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 7 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2204: TLS_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 8 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2205: TLS_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 9 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2206: TLS_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 10 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2207: TLS_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 11 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2208: TLS_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 12 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2209: TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 13 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2210: TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 14 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2211: TLS_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 15 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2212: TLS_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 16 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2213: TLS_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 17 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2214: TLS_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 18 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2215: TLS_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 19 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2216: TLS_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 20 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2217: TLS_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 21 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2218: TLS_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 22 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2219: TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.0 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 23 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.1 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 1 bytes H tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 136 bytes TTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2220: TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 24 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2221: TLS11_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 25 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2222: TLS11_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 26 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2223: TLS11_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 27 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2224: TLS11_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 28 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2225: TLS11_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 29 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2226: TLS11_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 30 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2227: TLS11_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 31 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2228: TLS11_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 32 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2229: TLS11_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 33 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_sha1 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2230: TLS11_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 34 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2231: TLS11_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 35 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2232: TLS11_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 36 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2233: TLS11_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 37 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2234: TLS11_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 38 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2235: TLS11_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 39 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2236: TLS11_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 40 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2237: TLS11_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 41 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2238: TLS11_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 42 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2239: TLS11_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.1 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 43 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.2 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: RSA PKCS#1 SHA1+MD5 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2240: TLS11_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C001 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 44 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2241: TLS12_ECDH_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C002 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 45 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2242: TLS12_ECDH_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C003 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 46 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2243: TLS12_ECDH_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C004 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 47 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2244: TLS12_ECDH_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C005 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 48 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2245: TLS12_ECDH_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C006 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 49 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2246: TLS12_ECDHE_ECDSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C007 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 50 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2247: TLS12_ECDHE_ECDSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C008 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 51 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2248: TLS12_ECDHE_ECDSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C009 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 52 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2249: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00A -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 53 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2250: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 54 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2251: TLS12_ECDH_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 55 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2252: TLS12_ECDH_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00D -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 56 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2253: TLS12_ECDH_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00E -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 57 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2254: TLS12_ECDH_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C00F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 58 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 256-bit RSA, Key Exchange: 256-bit ECDH Compression: NULL, Extended Master Secret: Yes Signature Scheme: none subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2255: TLS12_ECDH_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_NULL_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C010 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 59 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 0-bit NULL with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2256: TLS12_ECDHE_RSA_WITH_NULL_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_RC4_128_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C011 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 60 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit RC4 with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2257: TLS12_ECDHE_RSA_WITH_RC4_128_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C012 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 61 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 112-bit 3DES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2258: TLS12_ECDHE_RSA_WITH_3DES_EDE_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C013 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 62 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2259: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C014 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 63 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 160-bit SHA1 MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2260: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C023 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 64 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2261: TLS12_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C024 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 65 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2262: TLS12_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C027 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 66 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES with 256-bit SHA256 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2263: TLS12_ECDHE_RSA_WITH_AES_128_CBC_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C028 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 67 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES with 384-bit SHA384 MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2264: TLS12_ECDHE_RSA_WITH_AES_256_CBC_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02B -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 68 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2265: TLS12_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02C -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 69 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2266: TLS12_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C02F -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 70 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2267: TLS12_ECDHE_RSA_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :C030 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 71 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2268: TLS12_ECDHE_RSA_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA8 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 72 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit RSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2269: TLS12_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :CCA9 -V tls1.0:tls1.2 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 73 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: SSL version 3.3 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 256-bit ECDSA, Key Exchange: 256-bit ECDHE Compression: NULL, Extended Master Secret: Yes Signature Scheme: ecdsa_secp256r1_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2270: TLS12_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_128_GCM_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1301 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 74 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 128-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2271: TLS13_ECDHE_WITH_AES_128_GCM_SHA256 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_AES_256_GCM_SHA384 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1302 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 75 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit AES-GCM with 128-bit AEAD MAC FIPS tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2272: TLS13_ECDHE_WITH_AES_256_GCM_SHA384 produced a returncode of 0, expected is 0 - PASSED ssl.sh: running TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 ---------------------------- tstclnt -p 9997 -h localhost.localdomain -c :1303 -V tls1.0:tls1.3 -I P256,P384,P521,FF2048,FF3072,FF4096,FF6144,FF8192 \ -f -d ../ext_client -v -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: About to call accept. selfserv: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC selfserv: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes selfserv: subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US selfserv: issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures tstclnt: connecting to localhost.localdomain:9997 (address=::) tstclnt: connect: PR_IN_PROGRESS_ERROR: Operation is still in progress (probably a non-blocking connect) tstclnt: about to call PR_Poll for connect completion! tstclnt: PR_Poll returned 0x02 for socket out_flags. tstclnt: ready... tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 18 bytes tstclnt: Writing 18 bytes to server tstclnt: 0 bytes written tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: using asynchronous certificate validation tstclnt: 0 bytes written tstclnt: handshake was paused by auth certificate hook tstclnt: SSL version 3.4 using 256-bit CHACHA20POLY1305 with 128-bit AEAD MAC tstclnt: Server Auth: 2048-bit TLS 1.3, Key Exchange: 256-bit TLS 1.3 Compression: NULL, Extended Master Secret: Yes Signature Scheme: rsa_pss_rsae_sha256 subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) tstclnt: about to call PR_Poll on writable socket ! tstclnt: PR_Poll returned with writable socket ! tstclnt: 18 bytes written tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for stdin out_flags. tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: stdin read 0 bytes tstclnt: PR_Poll returned 0x00 for socket out_flags. tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 137 bytes HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF tstclnt: about to call PR_Poll ! tstclnt: PR_Poll returned! tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: PR_Poll returned 0x01 for socket out_flags. tstclnt: Read from server 0 bytes tstclnt: exiting with return code 0 ssl.sh: #2273: TLS13_ECDHE_WITH_CHACHA20_POLY1305_SHA256 produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3026 at Wed Oct 18 17:19:30 UTC 2023 kill -USR1 3026 selfserv: PR_Accept returned error -5993: Operation interrupted by another thread selfserv: Closing listen socket. selfserv: 0 cache hits; 76 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3026 killed at Wed Oct 18 17:19:30 UTC 2023 ssl.sh: SSL Cipher Coverage (RSA-PSS) Extended Test - server normal/client fips =============================== ssl.sh: skipping SSL Cipher Coverage (RSA-PSS) for Extended Test ssl.sh: SSL Client Authentication Extended Test - server normal/client fips =============================== ssl.sh: skipping TLS Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:19:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3849 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3849 found at Wed Oct 18 17:19:30 UTC 2023 selfserv_9997 with PID 3849 started at Wed Oct 18 17:19:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2274: TLS Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3849 at Wed Oct 18 17:19:30 UTC 2023 kill -USR1 3849 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3849 killed at Wed Oct 18 17:19:30 UTC 2023 ssl.sh: TLS Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:19:30 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3902 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3902 found at Wed Oct 18 17:19:30 UTC 2023 selfserv_9997 with PID 3902 started at Wed Oct 18 17:19:30 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2275: TLS Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 3902 at Wed Oct 18 17:19:55 UTC 2023 kill -USR1 3902 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3902 killed at Wed Oct 18 17:19:55 UTC 2023 ssl.sh: TLS Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:19:55 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:55 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 3977 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 3977 found at Wed Oct 18 17:19:56 UTC 2023 selfserv_9997 with PID 3977 started at Wed Oct 18 17:19:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2276: TLS Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 3977 at Wed Oct 18 17:19:56 UTC 2023 kill -USR1 3977 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 3977 killed at Wed Oct 18 17:19:56 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:19:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4041 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4041 found at Wed Oct 18 17:19:56 UTC 2023 selfserv_9997 with PID 4041 started at Wed Oct 18 17:19:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12285: Unable to find the certificate or key necessary for authentication. Failed to load a suitable client certificate tstclnt: write to SSL socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2277: SSL3 Require client auth (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4041 at Wed Oct 18 17:19:56 UTC 2023 kill -USR1 4041 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4041 killed at Wed Oct 18 17:19:56 UTC 2023 ssl.sh: SSL3 Require client auth (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:19:56 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:19:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4093 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4093 found at Wed Oct 18 17:19:56 UTC 2023 selfserv_9997 with PID 4093 started at Wed Oct 18 17:19:56 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2278: SSL3 Require client auth (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4093 at Wed Oct 18 17:20:19 UTC 2023 kill -USR1 4093 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4093 killed at Wed Oct 18 17:20:19 UTC 2023 ssl.sh: SSL3 Require client auth (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:20:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:20:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4151 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4151 found at Wed Oct 18 17:20:19 UTC 2023 selfserv_9997 with PID 4151 started at Wed Oct 18 17:20:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2279: SSL3 Require client auth (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4151 at Wed Oct 18 17:20:19 UTC 2023 kill -USR1 4151 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4151 killed at Wed Oct 18 17:20:19 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:20:19 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:20:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4215 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4215 found at Wed Oct 18 17:20:19 UTC 2023 selfserv_9997 with PID 4215 started at Wed Oct 18 17:20:19 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2280: TLS Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4215 at Wed Oct 18 17:20:20 UTC 2023 kill -USR1 4215 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4215 killed at Wed Oct 18 17:20:20 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:20:20 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:20:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4267 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4267 found at Wed Oct 18 17:20:20 UTC 2023 selfserv_9997 with PID 4267 started at Wed Oct 18 17:20:20 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2281: TLS Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4267 at Wed Oct 18 17:20:45 UTC 2023 kill -USR1 4267 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4267 killed at Wed Oct 18 17:20:45 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:20:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:20:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4337 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4337 found at Wed Oct 18 17:20:45 UTC 2023 selfserv_9997 with PID 4337 started at Wed Oct 18 17:20:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2282: TLS Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4337 at Wed Oct 18 17:20:45 UTC 2023 kill -USR1 4337 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4337 killed at Wed Oct 18 17:20:45 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:20:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:20:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4401 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4401 found at Wed Oct 18 17:20:45 UTC 2023 selfserv_9997 with PID 4401 started at Wed Oct 18 17:20:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2283: TLS 1.0 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4401 at Wed Oct 18 17:20:45 UTC 2023 kill -USR1 4401 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4401 killed at Wed Oct 18 17:20:45 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:20:45 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:20:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4453 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4453 found at Wed Oct 18 17:20:45 UTC 2023 selfserv_9997 with PID 4453 started at Wed Oct 18 17:20:45 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2284: TLS 1.0 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4453 at Wed Oct 18 17:21:10 UTC 2023 kill -USR1 4453 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4453 killed at Wed Oct 18 17:21:10 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:21:10 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:21:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4505 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4505 found at Wed Oct 18 17:21:10 UTC 2023 selfserv_9997 with PID 4505 started at Wed Oct 18 17:21:10 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2285: TLS 1.0 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4505 at Wed Oct 18 17:21:11 UTC 2023 kill -USR1 4505 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4505 killed at Wed Oct 18 17:21:11 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client does not provide auth) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:21:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:21:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4569 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4569 found at Wed Oct 18 17:21:11 UTC 2023 selfserv_9997 with PID 4569 started at Wed Oct 18 17:21:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -w nss -n none < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_BAD_CERT_ALERT: SSL peer cannot verify your certificate. ssl.sh: #2286: SSL3 Require client auth on 2nd hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4569 at Wed Oct 18 17:21:11 UTC 2023 kill -USR1 4569 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4569 killed at Wed Oct 18 17:21:11 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:21:11 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:21:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4621 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4621 found at Wed Oct 18 17:21:11 UTC 2023 selfserv_9997 with PID 4621 started at Wed Oct 18 17:21:11 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2287: SSL3 Require client auth on 2nd hs (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4621 at Wed Oct 18 17:21:34 UTC 2023 kill -USR1 4621 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4621 killed at Wed Oct 18 17:21:34 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:21:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:21:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4675 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4675 found at Wed Oct 18 17:21:34 UTC 2023 selfserv_9997 with PID 4675 started at Wed Oct 18 17:21:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2288: SSL3 Require client auth on 2nd hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4675 at Wed Oct 18 17:21:34 UTC 2023 kill -USR1 4675 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4675 killed at Wed Oct 18 17:21:34 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:21:34 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:21:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4731 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4731 found at Wed Oct 18 17:21:34 UTC 2023 selfserv_9997 with PID 4731 started at Wed Oct 18 17:21:34 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n pkcs11:object=ExtendedSSLUser -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2289: TLS 1.3 Require client auth on post hs (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4731 at Wed Oct 18 17:21:35 UTC 2023 kill -USR1 4731 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4731 killed at Wed Oct 18 17:21:35 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs (client does not provide auth) (non-FIPS only) ssl.sh: TLS 1.3 Require client auth on post hs (client does not provide auth) ---- selfserv_9997 starting at Wed Oct 18 17:21:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -E -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:21:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4787 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4787 found at Wed Oct 18 17:21:35 UTC 2023 selfserv_9997 with PID 4787 started at Wed Oct 18 17:21:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3:tls1.3 -E -n none -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: SSL_ForceHandshake returned error -12285: Unable to find the certificate or key necessary for authentication. subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) Failed to load a suitable client certificate tstclnt: read from socket failed: SSL_ERROR_RX_CERTIFICATE_REQUIRED_ALERT: SSL received a certificate_required alert. ssl.sh: #2290: TLS 1.3 Require client auth on post hs (client does not provide auth) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4787 at Wed Oct 18 17:21:35 UTC 2023 kill -USR1 4787 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4787 killed at Wed Oct 18 17:21:35 UTC 2023 ssl.sh: skipping TLS 1.3 Request don't require client auth on post hs with session ticket (client auth) (non-FIPS only) ssl.sh: TLS 1.2 Require client auth auto select(RSA) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:21:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:21:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4843 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4843 found at Wed Oct 18 17:21:35 UTC 2023 selfserv_9997 with PID 4843 started at Wed Oct 18 17:21:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2291: TLS 1.2 Require client auth auto select(RSA) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4843 at Wed Oct 18 17:21:35 UTC 2023 kill -USR1 4843 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4843 killed at Wed Oct 18 17:21:35 UTC 2023 ssl.sh: skipping TLS Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:21:35 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:21:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4903 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4903 found at Wed Oct 18 17:21:35 UTC 2023 selfserv_9997 with PID 4903 started at Wed Oct 18 17:21:35 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2292: TLS Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 4903 at Wed Oct 18 17:22:00 UTC 2023 kill -USR1 4903 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4903 killed at Wed Oct 18 17:22:00 UTC 2023 ssl.sh: TLS Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:22:00 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:22:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 4972 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 4972 found at Wed Oct 18 17:22:00 UTC 2023 selfserv_9997 with PID 4972 started at Wed Oct 18 17:22:00 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2293: TLS Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 4972 at Wed Oct 18 17:22:00 UTC 2023 kill -USR1 4972 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 4972 killed at Wed Oct 18 17:22:00 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:22:01 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:22:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5032 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5032 found at Wed Oct 18 17:22:01 UTC 2023 selfserv_9997 with PID 5032 started at Wed Oct 18 17:22:01 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2294: SSL3 Require client auth (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5032 at Wed Oct 18 17:22:24 UTC 2023 kill -USR1 5032 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5032 killed at Wed Oct 18 17:22:24 UTC 2023 ssl.sh: SSL3 Require client auth (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:22:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:22:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5089 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5089 found at Wed Oct 18 17:22:24 UTC 2023 selfserv_9997 with PID 5089 started at Wed Oct 18 17:22:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2295: SSL3 Require client auth (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5089 at Wed Oct 18 17:22:24 UTC 2023 kill -USR1 5089 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5089 killed at Wed Oct 18 17:22:24 UTC 2023 ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:22:24 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:22:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5149 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5149 found at Wed Oct 18 17:22:24 UTC 2023 selfserv_9997 with PID 5149 started at Wed Oct 18 17:22:24 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2296: TLS Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5149 at Wed Oct 18 17:22:49 UTC 2023 kill -USR1 5149 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5149 killed at Wed Oct 18 17:22:49 UTC 2023 ssl.sh: TLS Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:22:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:22:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5220 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5220 found at Wed Oct 18 17:22:49 UTC 2023 selfserv_9997 with PID 5220 started at Wed Oct 18 17:22:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.2 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2297: TLS Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5220 at Wed Oct 18 17:22:49 UTC 2023 kill -USR1 5220 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5220 killed at Wed Oct 18 17:22:49 UTC 2023 ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping TLS 1.0 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:22:49 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:22:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5280 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5280 found at Wed Oct 18 17:22:49 UTC 2023 selfserv_9997 with PID 5280 started at Wed Oct 18 17:22:49 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w bogus -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12192: Peer reports failure of signature verification or key exchange. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_BAD_SIGNATURE: Peer's certificate has an invalid signature. ssl.sh: #2298: TLS 1.0 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5280 at Wed Oct 18 17:23:14 UTC 2023 kill -USR1 5280 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5280 killed at Wed Oct 18 17:23:14 UTC 2023 ssl.sh: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:23:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5333 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5333 found at Wed Oct 18 17:23:15 UTC 2023 selfserv_9997 with PID 5333 started at Wed Oct 18 17:23:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:tls1.0 -w nss -n pkcs11:object=ExtendedSSLUser-ec < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2299: TLS 1.0 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5333 at Wed Oct 18 17:23:15 UTC 2023 kill -USR1 5333 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5333 killed at Wed Oct 18 17:23:15 UTC 2023 ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (bad password) (non-FIPS only) ssl.sh: skipping SSL3 Request don't require client auth on 2nd hs (EC) (client auth) (non-FIPS only) ssl.sh: SSL3 Require client auth on 2nd hs (EC) (bad password) ---- selfserv_9997 starting at Wed Oct 18 17:23:15 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5393 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5393 found at Wed Oct 18 17:23:15 UTC 2023 selfserv_9997 with PID 5393 started at Wed Oct 18 17:23:15 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w bogus < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12227: SSL peer was unable to negotiate an acceptable set of security parameters. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. Incorrect password/PIN entered. tstclnt: write to SSL socket failed: SEC_ERROR_NO_MODULE: security library: no security module can perform the requested operation. ssl.sh: #2300: SSL3 Require client auth on 2nd hs (EC) (bad password) produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 5393 at Wed Oct 18 17:23:38 UTC 2023 kill -USR1 5393 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5393 killed at Wed Oct 18 17:23:38 UTC 2023 ssl.sh: SSL3 Require client auth on 2nd hs (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:23:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -r -r -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5445 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5445 found at Wed Oct 18 17:23:38 UTC 2023 selfserv_9997 with PID 5445 started at Wed Oct 18 17:23:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V ssl3:ssl3 -n pkcs11:object=ExtendedSSLUser-ec -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2301: SSL3 Require client auth on 2nd hs (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5445 at Wed Oct 18 17:23:38 UTC 2023 kill -USR1 5445 selfserv: 0 cache hits; 2 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5445 killed at Wed Oct 18 17:23:38 UTC 2023 ssl.sh: TLS 1.2 Require client auth auto select(EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:23:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5497 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5497 found at Wed Oct 18 17:23:38 UTC 2023 selfserv_9997 with PID 5497 started at Wed Oct 18 17:23:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2302: TLS 1.2 Require client auth auto select(EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5497 at Wed Oct 18 17:23:38 UTC 2023 kill -USR1 5497 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5497 killed at Wed Oct 18 17:23:38 UTC 2023 ssl.sh: TLS 1.3 Require client auth auto select (EC) (client auth) ---- selfserv_9997 starting at Wed Oct 18 17:23:38 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -r -r -J ecdsa_secp256r1_sha256,ecdsa_secp384r1_sha384 -i ../tests_pid.17687\ -V tls1.0:tls1.3 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:38 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5549 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5549 found at Wed Oct 18 17:23:39 UTC 2023 selfserv_9997 with PID 5549 started at Wed Oct 18 17:23:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.3: -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ecmixed@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2303: TLS 1.3 Require client auth auto select (EC) (client auth) produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5549 at Wed Oct 18 17:23:39 UTC 2023 kill -USR1 5549 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5549 killed at Wed Oct 18 17:23:39 UTC 2023 ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: skipping SSL3 Server hello response without SNI for Extended Test ssl.sh: skipping SSL3 Server hello response with SNI: SSL don't have SH extensions for Extended Test ssl.sh: skipping TLS Server hello response without SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name on 2d HS for Extended Test ssl.sh: skipping TLS Server hello response with SNI: Change name to invalid 2d HS for Extended Test ssl.sh: skipping TLS Server response with alert for Extended Test ssl.sh: SSL Cert Status (OCSP Stapling) Extended Test - server normal/client fips =============================== ssl.sh: skipping OCSP stapling, signed response, good status for Extended Test ssl.sh: skipping OCSP stapling, signed response, revoked status for Extended Test ssl.sh: skipping OCSP stapling, signed response, unknown status for Extended Test ssl.sh: skipping OCSP stapling, unsigned failure response for Extended Test ssl.sh: skipping OCSP stapling, good status, bad signature for Extended Test ssl.sh: skipping OCSP stapling, invalid cert status data for Extended Test ssl.sh: skipping Valid cert, Server doesn't staple for Extended Test ssl.sh: skipping Stress OCSP stapling, server uses random status for Extended Test ssl.sh: SSL Signed Certificate Timestamps Extended Test - server normal/client fips =============================== ssl_signed_cert_timestamps ssl.sh: ssl_signed_cert_timestamps ---- selfserv_9997 starting at Wed Oct 18 17:23:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -e localhost.localdomain-ecmixed -e localhost.localdomain-ec -S localhost.localdomain-dsa -w nss -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5632 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5632 found at Wed Oct 18 17:23:39 UTC 2023 selfserv_9997 with PID 5632 started at Wed Oct 18 17:23:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -U -V tls1.0:tls1.2 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain-ec@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA (ECC),O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2274: ssl_signed_cert_timestamps produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5632 at Wed Oct 18 17:23:39 UTC 2023 kill -USR1 5632 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5632 killed at Wed Oct 18 17:23:39 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:23:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5674 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5674 found at Wed Oct 18 17:23:39 UTC 2023 selfserv_9997 with PID 5674 started at Wed Oct 18 17:23:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2275: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5674 at Wed Oct 18 17:23:39 UTC 2023 kill -USR1 5674 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5674 killed at Wed Oct 18 17:23:39 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:23:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5713 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5713 found at Wed Oct 18 17:23:39 UTC 2023 selfserv_9997 with PID 5713 started at Wed Oct 18 17:23:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2276: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 5713 at Wed Oct 18 17:23:39 UTC 2023 kill -USR1 5713 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5713 killed at Wed Oct 18 17:23:39 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:23:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5752 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5752 found at Wed Oct 18 17:23:39 UTC 2023 selfserv_9997 with PID 5752 started at Wed Oct 18 17:23:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2277: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5752 at Wed Oct 18 17:23:39 UTC 2023 kill -USR1 5752 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5752 killed at Wed Oct 18 17:23:39 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:23:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5791 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5791 found at Wed Oct 18 17:23:39 UTC 2023 selfserv_9997 with PID 5791 started at Wed Oct 18 17:23:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. tstclnt: write to SSL socket failed: SSL_ERROR_NO_CYPHER_OVERLAP: Cannot communicate securely with peer: no common encryption algorithm(s). ssl.sh: #2278: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 254, expected is 254 - PASSED trying to kill selfserv_9997 with PID 5791 at Wed Oct 18 17:23:39 UTC 2023 kill -USR1 5791 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5791 killed at Wed Oct 18 17:23:39 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:23:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5830 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5830 found at Wed Oct 18 17:23:39 UTC 2023 selfserv_9997 with PID 5830 started at Wed Oct 18 17:23:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2279: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5830 at Wed Oct 18 17:23:39 UTC 2023 kill -USR1 5830 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5830 killed at Wed Oct 18 17:23:39 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:23:39 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5869 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5869 found at Wed Oct 18 17:23:39 UTC 2023 selfserv_9997 with PID 5869 started at Wed Oct 18 17:23:39 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2280: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5869 at Wed Oct 18 17:23:40 UTC 2023 kill -USR1 5869 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5869 killed at Wed Oct 18 17:23:40 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:23:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5908 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5908 found at Wed Oct 18 17:23:40 UTC 2023 selfserv_9997 with PID 5908 started at Wed Oct 18 17:23:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2281: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5908 at Wed Oct 18 17:23:40 UTC 2023 kill -USR1 5908 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5908 killed at Wed Oct 18 17:23:40 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:23:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5947 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5947 found at Wed Oct 18 17:23:40 UTC 2023 selfserv_9997 with PID 5947 started at Wed Oct 18 17:23:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2282: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5947 at Wed Oct 18 17:23:40 UTC 2023 kill -USR1 5947 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5947 killed at Wed Oct 18 17:23:40 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:23:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 5986 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 5986 found at Wed Oct 18 17:23:40 UTC 2023 selfserv_9997 with PID 5986 started at Wed Oct 18 17:23:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -f -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat subject DN: CN=localhost.localdomain,E=localhost.localdomain@example.com,O=BOGUS NSS,L=Mountain View,ST=California,C=US issuer DN: CN=NSS Chain2 Server Test CA,O=BOGUS NSS,L=Santa Clara,ST=California,C=US 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes Received 0 Cert Status items (OCSP stapled data) HTTP/1.0 200 OK Server: Generic Web Server Date: Tue, 26 Aug 1997 22:10:05 GMT Content-type: text/plain GET / HTTP/1.0 EOF ssl.sh: #2283: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 5986 at Wed Oct 18 17:23:40 UTC 2023 kill -USR1 5986 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 5986 killed at Wed Oct 18 17:23:40 UTC 2023 ssl.sh: SSL SCHEME Extended Test - server normal/client fips =============================== ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:23:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6025 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6025 found at Wed Oct 18 17:23:40 UTC 2023 selfserv_9997 with PID 6025 started at Wed Oct 18 17:23:40 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2284: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6025 at Wed Oct 18 17:23:40 UTC 2023 kill -USR1 6025 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6025 killed at Wed Oct 18 17:23:40 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:23:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6065 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6065 found at Wed Oct 18 17:23:40 UTC 2023 selfserv_9997 with PID 6065 started at Wed Oct 18 17:23:40 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2285: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6065 at Wed Oct 18 17:23:40 UTC 2023 kill -USR1 6065 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6065 killed at Wed Oct 18 17:23:40 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:23:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6105 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6105 found at Wed Oct 18 17:23:40 UTC 2023 selfserv_9997 with PID 6105 started at Wed Oct 18 17:23:40 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2286: ssl_scheme server='rsa_pkcs1_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6105 at Wed Oct 18 17:23:40 UTC 2023 kill -USR1 6105 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6105 killed at Wed Oct 18 17:23:40 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:23:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6145 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6145 found at Wed Oct 18 17:23:40 UTC 2023 selfserv_9997 with PID 6145 started at Wed Oct 18 17:23:40 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat selfserv: HDX PR_Read returned error -12153: The peer used an unsupported combination of signature and hash algorithm. strsclnt: PR_Send returned error -12286, OS error 0: Cannot communicate securely with peer: no common encryption algorithm(s). strsclnt: 0 cache hits; 0 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2287: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 1, expected is 1 - PASSED trying to kill selfserv_9997 with PID 6145 at Wed Oct 18 17:23:40 UTC 2023 kill -USR1 6145 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6145 killed at Wed Oct 18 17:23:40 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:23:40 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:40 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6185 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6185 found at Wed Oct 18 17:23:40 UTC 2023 selfserv_9997 with PID 6185 started at Wed Oct 18 17:23:40 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2288: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6185 at Wed Oct 18 17:23:40 UTC 2023 kill -USR1 6185 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6185 killed at Wed Oct 18 17:23:41 UTC 2023 ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:23:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6225 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6225 found at Wed Oct 18 17:23:41 UTC 2023 selfserv_9997 with PID 6225 started at Wed Oct 18 17:23:41 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2289: ssl_scheme server='rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6225 at Wed Oct 18 17:23:41 UTC 2023 kill -USR1 6225 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6225 killed at Wed Oct 18 17:23:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:23:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6265 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6265 found at Wed Oct 18 17:23:41 UTC 2023 selfserv_9997 with PID 6265 started at Wed Oct 18 17:23:41 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2290: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6265 at Wed Oct 18 17:23:41 UTC 2023 kill -USR1 6265 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6265 killed at Wed Oct 18 17:23:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:23:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6305 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6305 found at Wed Oct 18 17:23:41 UTC 2023 selfserv_9997 with PID 6305 started at Wed Oct 18 17:23:41 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2291: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6305 at Wed Oct 18 17:23:41 UTC 2023 kill -USR1 6305 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6305 killed at Wed Oct 18 17:23:41 UTC 2023 ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ssl.sh: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' ---- selfserv_9997 starting at Wed Oct 18 17:23:41 UTC 2023 selfserv_9997 -D -p 9997 -d ../ext_server -n localhost.localdomain \ -S localhost.localdomain-dsa -w nss -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 -i ../tests_pid.17687\ -V ssl3:tls1.2 -H 1 & trying to connect to selfserv_9997 at Wed Oct 18 17:23:41 UTC 2023 tstclnt -p 9997 -h localhost.localdomain -q \ -d ../ext_client < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat kill -0 6345 >/dev/null 2>/dev/null No server to kill selfserv_9997 with PID 6345 found at Wed Oct 18 17:23:41 UTC 2023 selfserv_9997 with PID 6345 started at Wed Oct 18 17:23:41 UTC 2023 strsclnt -q -p 9997 -d ../ext_client \ -V tls1.2:tls1.2 -J rsa_pkcs1_sha256,rsa_pss_rsae_sha256 localhost.localdomain -w nss < /builddir/build/BUILD/nss-3.90/nss/tests/ssl/sslreq.dat strsclnt: -- SSL: Server Certificate Validated. strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes strsclnt: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes ssl.sh: #2292: ssl_scheme server='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' client='rsa_pkcs1_sha256,rsa_pss_rsae_sha256' produced a returncode of 0, expected is 0 - PASSED trying to kill selfserv_9997 with PID 6345 at Wed Oct 18 17:23:41 UTC 2023 kill -USR1 6345 selfserv: 0 cache hits; 1 cache misses, 0 cache not reusable 0 stateless resumes, 0 ticket parse failures selfserv: normal termination selfserv_9997 -b -p 9997 2>/dev/null; selfserv_9997 with PID 6345 killed at Wed Oct 18 17:23:41 UTC 2023 ssl.sh: SSL - FIPS mode off for client =============================== ssl.sh: Turning FIPS off for the client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -fips false -force FIPS mode disabled. ssl.sh: #2293: expect failure to list cert, because we deleted it (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/client -list ssl.sh: #2294: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #2295: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED ssl.sh: Turning FIPS off for the extended client modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -fips false -force FIPS mode disabled. ssl.sh: #2296: expect failure to list cert, because we deleted it (modutil -fips false) produced a returncode of 0, expected is 0 - PASSED modutil -dbdir /builddir/build/BUILD/nss-3.90/tests_results/security/localhost.1/threadunsafe/ext_client -list ssl.sh: #2297: expect failure to list cert, because we deleted it (modutil -list) produced a returncode of 0, expected is 0 - PASSED ssl.sh: #2298: expect failure to list cert, because we deleted it (grep "FIPS PKCS #11") produced a returncode of 1, expected is 1 - PASSED TIMESTAMP ssl END: Wed Oct 18 17:23:41 UTC 2023 SUMMARY: ======== NSS variables: -------------- HOST=localhost DOMSUF=localdomain BUILD_OPT=1 USE_X32= USE_64=1 NSS_CYCLES="standard pkix upgradedb sharedb threadunsafe" NSS_TESTS="libpkix cert dbtests tools fips sdr crmf smime ssl ocsp merge pkits chains ec %{do_gtests} %{do_ssl_gtests}" NSS_SSL_TESTS="crl iopr policy normal_normal fips_normal normal_fips" NSS_SSL_RUN="cov auth stapling signed_cert_timestamps scheme" NSS_AIA_PATH= NSS_AIA_HTTP= NSS_AIA_OCSP= IOPR_HOSTADDR_LIST= PKITS_DATA= NSS_DISABLE_HW_AES= NSS_DISABLE_HW_SHA1= NSS_DISABLE_HW_SHA2= NSS_DISABLE_PCLMUL= NSS_DISABLE_AVX= NSS_DISABLE_ARM_NEON= NSS_DISABLE_SSSE3= Tests summary: -------------- Passed: 22238 Failed: 36 Failed with core: 0 ASan failures: 0 Unknown status: 0 RPM build errors: error: Bad exit status from /var/tmp/rpm-tmp.1iCAaz (%check) Bad exit status from /var/tmp/rpm-tmp.1iCAaz (%check) Child return code was: 1 EXCEPTION: [Error()] Traceback (most recent call last): File "/usr/lib/python2.7/site-packages/mockbuild/trace_decorator.py", line 88, in trace result = func(*args, **kw) File "/usr/lib/python2.7/site-packages/mockbuild/util.py", line 547, in do raise exception.Error("Command failed. See logs for output.\n # %s" % (command,), child.returncode) Error: Command failed. See logs for output. # bash --login -c /usr/bin/rpmbuild -bb --target ppc64le --nodeps /builddir/build/SPECS/nss.spec